Table Of Contents
Configuring Remote Access to MPLS VPN
MPLS VPN Architecture
Access Technologies
PPP over ATM to MPLS VPN
PPP over Ethernet to MPLS VPN
RBE over ATM to MPLS VPN
MPLS VPN ID
DHCP Relay Agent Information Option—Option 82
DHCP Relay Support for MPLS VPN Suboptions
Feature History for RA to MPLS VPN
Restrictions for RA to MPLS VPN
Prerequisites for RA to MPLS VPN
Configuration Tasks for RA to MPLS VPN
Configuring the MPLS Core Network
Enabling Label Switching of IP Packets on Interfaces
Configuring Virtual Routing and Forwarding Instances
Associating VRFs
Configuring Multiprotocol BGP PE to PE Routing Sessions
Configuring Access Protocols and Connections
Configuring a Virtual Template Interface
Configuring PPP over ATM Virtual Connections and Applying Virtual Templates
Configuring PPPoE over ATM Virtual Connections and Applying Virtual Templates
Configuring PPPoE over Ethernet Virtual Connections and Applying Virtual Templates
Configuring RBE over ATM Virtual Connections
Configuring and Associating Virtual Private Networks
Configuring Virtual Private Networks
Associating VPNs with a Virtual Template Interface
Configuring RADIUS User Profiles for RADIUS-Based AAA
Verifying VPN Operation
Configuration Examples for RA to MPLS VPN
PPPoA to MPLS VPN Configuration Example
PPPoE to MPLS VPN Configuration Example
RBE to MPLS VPN Configuration Example
Monitoring and Maintaining an MPLS Configuration
Verifying the Routing Protocol Is Running
Verifying MPLS
Verifying Connections Between Neighbors
Verifying Label Distribution
Verifying Label Bindings
Verifying Labels Are Set
Monitoring and Maintaining the MPLS VPN
Verifying VRF Configurations
Verifying the Routing Table
Verifying the PE to PE Routing Protocols
Verifying the PE to CE Routing Protocol
Verifying the MPLS VPN Labels
Testing the VRF
Monitoring and Maintaining PPPoX to MPLS VPN
Monitoring and Maintaining RBE to MPLS VPN
Configuring Remote Access to MPLS VPN
TheCisco 10000 series router supports the IP virtual private network (VPN) feature for Multiprotocol Label Switching (MPLS). MPLS-based VPNs allow service providers to deploy a scalable and cost-effective VPN service that provides a stable and secure path through the network. An enterprise or Internet service provider (ISP) can connect to geographically dispersed sites through the service provider's network. Using the MPLS backbone, a set of sites are interconnected to create an MPLS VPN.
The remote access (RA) to MPLS VPN feature on the Cisco 10000 series router allows the service provider to offer a scalable end-to-end VPN service to remote users. The RA to MPLS VPN feature integrates the MPLS-enabled backbone with broadband access capabilities. By integrating access VPNs with MPLS VPNs, a service provider can:
•
Enable remote users and offices to seamlessly access their corporate networks
•
Offer equal access to a set of different ISPs or retail service providers
•
Integrate their broadband access networks with the MPLS-enabled backbone
•
Provide an end-to-end VPN service to enterprise customers with remote access users and offices
•
Separate network access and connectivity functions from ISP functions
The RA to MPLS VPN feature is described in the following topics:
•
MPLS VPN Architecture
•
Access Technologies
•
Feature History for RA to MPLS VPN
•
Restrictions for RA to MPLS VPN
•
Prerequisites for RA to MPLS VPN
•
Configuration Tasks for RA to MPLS VPN
•
Verifying VPN Operation
•
Configuration Examples for RA to MPLS VPN
•
Monitoring and Maintaining an MPLS Configuration
•
Monitoring and Maintaining the MPLS VPN
•
Monitoring and Maintaining PPPoX to MPLS VPN
•
Monitoring and Maintaining RBE to MPLS VPN
MPLS VPN Architecture
The MPLS VPN architecture enables the service provider to build the MPLS VPN network one time and add VPNs for new customers as needed, including them in the already established network. The elements that comprise the MPLS VPN are:
•
Customer edge (CE) routers—The CPE devices to which subscribers in a customer's network connect. The CE router connects to a service provider's edge router (PE router). The CE router initiates the remote access session to the PE router.
•
Provider edge (PE) routers—The router, such as the Cisco 10000 series router, located at the edge of the service provider's MPLS core network. The PE router connects to one or more CE routers and has full knowledge of the routes to the VPNs associated with those CE routers. The PE router does not have knowledge of the routes to VPNs whose associated CE routers are not connected to it.
•
Provider (P) routers—The service provider routers that comprise the provider's core network. The P routers do not assign VPN information and they do not have any knowledge of CE routers. Instead, the main focus of the P router is on label switching.
Figure 3-1 shows an example of the MPLS VPN architecture.
Figure 3-1 MPLS VPN Network—Example
Access Technologies
The Cisco 10000 series router supports routed bridge encapsulation (RBE) protocol. Point-to-point protocol (PPP) access-based permanent virtual circuits (PVCs) is supported by using the following PPP access encapsulation methods:
•
PPP over ATM (PPPoA)
•
PPP over Ethernet (PPPoE)
By using these PPP access technologies, the Cisco 10000 series router can terminate up to 32,000 sessions and support many features, including:
•
Per session authentication based on Password Authentication Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP)
•
Per session accounting
•
Per session quality of service
Note
The Cisco 10000 series router can terminate up to 32,000 ATM RBE sessions.
Figure 3-2 shows the topology of an integrated PPPoX (PPPoE or PPPoA) access to a multiprotocol label switching virtual private network (MPLS VPN) solution.
Figure 3-2 PPPoX Access to MPLS VPN Topology
In the figure, the service provider operates an MPLS VPN that interconnects all customer sites. The service provider's core network is an MPLS backbone with VPN service capability. The service provider provides all remote access operations to its customer. The network side interfaces are tagged interfaces, logically separated into multiple VPNs.
Figure 3-3 shows the topology of an RBE to MPLS VPN solution.
Figure 3-3 RBE to MPLS VPN Topology
In the figure, the wholesale provider uses VPNs to separate the subscribers of different retail providers. The subscribers are uniquely placed in VRFs on the access side. A tag interface separates traffic for the different retail providers on the network side. The MPLS VPN technology is used to assign tags in a VPN-aware manner.
PPP over ATM to MPLS VPN
The Cisco 10000 series router supports a PPP over ATM (PPPoA) connection to an MPLS VPN architecture. In this model, when a remote user attempts to establish a connection with a corporate network, a PPPoA session is initiated and is terminated on the service provider's virtual home gateway (VHG) or provider edge (PE) router. All remote hosts connected to a particular CE router must be part of the same VPN to which the CE router is connected.
The following events occur when the remote user attempts to access the corporate network or ISP:
1.
A PPPoA session is initiated over the broadband access network.
2.
The VHG/PE router accepts and terminates the PPPoA session.
3.
The VHG/PE router obtains virtual access interface (VAI) configuration information.
a.
The VHG/PE obtains virtual template interface configuration information, which typically includes virtual routing and forwarding (VRF) mapping for sessions.
b.
The VHG/PE sends a separate request to either the customer's or service provider's RADIUS server for the VPN to authenticate the remote user.
c.
The VPN's VRF instance was previously instantiated on the VHG or PE. The VPN's VRF contains a routing table and other information associated with a specific VPN.
Typically, the customer RADIUS server is located within the customer VPN. To ensure that transactions between the VHG/PE router and the customer RADIUS server occur over routes within the customer VPN, the VHG/PE router is assigned at least one IP address that is valid within the VPN.
4.
The VHG/PE router forwards accounting records to the service provider's proxy RADIUS server, which in turn logs the accounting records and forwards them to the appropriate customer RADIUS server.
5.
The VHG/PE obtains an IP address for the CPE. The address is allocated from one of the following:
•
Local address pool
•
Service provider's RADIUS server, which either specifies the address pool or directly provides the address
•
Service provider's DHCP server
6.
The CPE is now connected to the customer VPN. Packets can flow to and from the remote user.
Use virtual template interfaces to map sessions to VRFs. The Cisco 10000 series router can then scale to 32,000 sessions. In Cisco IOS Release 12.2(16)BX1 and later releases, when you map sessions to VRFs by using the RADIUS server, use the syntax ip:vrf-id or ip:ip-unnumbered. These vendor specific attributes (VSAs) enhance the scalability of per-user configurations because a new full virtual access interface is not required. For more information, see the "Enhancing Scalability of Per-User Configurations" section on page 2-17.
Note
In releases earlier than Cisco IOS Release 12.2(16)BX1, to map sessions to VRFs by using the RADIUS server, use the syntax lcp:interface-config. This configuration forces the Cisco 10000 series router to use full access virtual interfaces, which decreases scaling. We recommend that you do not use this configuration. Upgrading to Cisco IOS Release 12.2(16)BX1 or later eliminates this restriction.
PPP over Ethernet to MPLS VPN
The Cisco 10000 series router supports a PPP over Ethernet (PPPoE) connection to an MPLS VPN architecture. In this model, when a remote user attempts to establish a connection with a corporate network, a PPPoE session is initiated and is terminated on the service provider's virtual home gateway (VHG) or provider edge (PE) router. All remote hosts connected to a particular CE router must be part of the VPN to which the CE router is connected.
The PPPoE to MPLS VPN architecture is a flexible architecture with the following characteristics:
•
A remote host can create multiple concurrent PPPoE sessions, each to a different VPN.
•
If multiple remote hosts exist behind the same CE router, each remote host can log in to a different VPN.
•
Any remote host can log in to any VPN at any time because each VHG or PE router has the VRFs for all possible VPNs pre-instantiated on it. This configuration requires that the VRF be applied through the RADIUS server, which can cause scalability issues (see the following note).
Use virtual template interfaces to map sessions to VRFs. The Cisco 10000 series router can then scale to 32,000 sessions. In Cisco IOS Release 12.2(16)BX1 and later releases, when you map sessions to VRFs by using the RADIUS server, use the syntax ip:vrf-id or ip:ip-unnumbered. These vendor specific attributes (VSAs) enhance the scalability of per-user configurations because a new full virtual access interface is not required. For more information, see the "Enhancing Scalability of Per-User Configurations" section on page 2-17.
Note
For releases earlier than Cisco IOS Release 12.2(16)BX1, to map sessions to VRFs by using the RADIUS server, use the syntax lcp:interface-config. This configuration forces the Cisco 10000 series router to use full access virtual interfaces, which decreases scaling. We recommend that you do not use this configuration. Upgrading to Cisco IOS Release 12.2(16)BX1 or later releases will eliminate this restriction.
The following events occur as the VHG or PE router processes the incoming PPPoE session:
1.
A PPPoE session is initiated over the broadband access network.
2.
The VHG/PE router accepts and terminates the PPPoE session.
3.
The VHG/PE router obtains virtual access interface (VAI) configuration information.
a.
The VHG/PE obtains virtual template interface configuration information, which typically includes VRF mapping for sessions.
b.
The VHG/PE sends a separate request to either the customer's or service provider's RADIUS server for the VPN to authenticate the remote user.
c.
The VPN's VRF instance was previously instantiated on the VHG or PE. The VPN's VRF contains a routing table and other information associated with a specific VPN.
Use virtual template interfaces to map sessions to VRFs. The Cisco 10000 series router can then scale to 32,000 sessions. In Cisco IOS Release 12.2(16)BX1 and later releases, when you map sessions to VRFs by using the RADIUS server, use the syntax ip:vrf-id or ip:ip-unnumbered. These vendor specific attributes (VSAs) enhance the scalability of per-user configurations because a new full virtual access interface is not required. For more information, see the "Enhancing Scalability of Per-User Configurations" section on page 2-17.
Note
For releases earlier than Cisco IOS Release 12.2(16)BX1, to map sessions to VRFs by using the RADIUS server, use the syntax lcp:interface-config. This configuration forces the Cisco 10000 series router to use full access virtual interfaces, which decreases scaling. We recommend that you do not use this configuration. Upgrading to Cisco IOS Release 12.2(16)BX1 or later releases will eliminate this restriction.
Typically, the customer RADIUS server is located within the customer VPN. To ensure that transactions between the VHG/PE router and the customer RADIUS server occur over routes within the customer VPN, the VHG/PE router is assigned at least one IP address that is valid within the VPN.
4.
The VHG/PE router forwards accounting records to the service provider's proxy RADIUS server, which in turn logs the accounting records and forwards them to the appropriate customer RADIUS server.
5.
The VHG/PE obtains an IP address for the CPE. The address is allocated from one of the following:
•
Local address pool
•
Service provider's RADIUS server, which either specifies the address pool or directly provides the address
•
Service provider's DHCP server
6.
The CPE is now connected to the customer VPN. Packets can flow to and from the remote user.
RBE over ATM to MPLS VPN
The Cisco 10000 series router supports an ATM RBE to MPLS VPN connection. RBE is used to route IP over bridged RFC 1483 Ethernet traffic from a stub-bridged LAN. The ATM connection appears like a routed connection; however, the packets received on the interface are bridged IP packets. RBE looks at the IP header of the packets arriving at an ATM interface and routes the packets instead of bridging them.
In Figure 3-4, RBE is configured between the DSL router and the Cisco 10000 series router, acting as the VHG/PE router.
Figure 3-4 DSL RBE to MPLS VPN Integration
The DSL router can be set up as a pure bridge or it can be set up for integrated routing and bridging (IRB) where multiple LAN interfaces are bridged through the bridge group virtual interface (BVI). Each of the DSL routers terminates on a separate point-to-point subinterface on the VHG/PE, which is statically configured with a specific VRF. Remote user authentication or authorization is available with Option 82 for DSL RBE remote access. RBE treats the VHG/PE subinterface as if it is connected to an Ethernet LAN, but avoids the disadvantages of pure bridging, such as broadcast storms, IP hijacking, and ARP spoofing issues. Address management options include static and VRF-aware DHCP servers.
Note
For more information, see the "DSL Access to MPLS VPN Integration" chapter in the Cisco Remote Access to MPLS VPN Solution Overview and Provisioning Guide, Release 2.0, located at the following URL.
http://www.cisco.com/univercd/cc/td/doc/product/vpn/solution/rampls2/ovprov/ra_op_05.htm
MPLS VPN ID
The MPLS VPN ID is a 14-digit hexadecimal number that uniquely identifies a VPN and its associated VRF across all VHGs and PE routers in the network. In a router with multiple VPNs configured, you can use a VPN ID to identify a particular VPN. The VPN ID follows a standard specification (RFC 2685). The configuration of a VPN ID is optional.
You can configure a VRF instance for each VPN configured on the Cisco 10000 series router. By using the vpn id VRF configuration command, you can assign a VPN ID to a VPN. The router stores the VPN ID in the corresponding VRF structure for the VPN (see the "Configuring Virtual Routing and Forwarding Instances" section).
Note
The VPN ID is used for provisioning only. BGP routing updates do not include the VPN ID.
DHCP servers use the VPN ID to identify a VPN and allocate resources as the following describes:
1.
A VPN DHCP client requests a connection to the Cisco 10000 series router (PE router) from a VRF interface.
2.
The PE router determines the VPN ID associated with that interface.
3.
The PE router sends a request with the VPN ID and other information for assigning an IP address to the DHCP server.
4.
The DHCP server uses the VPN ID and IP address information to process the request.
5.
The DHCP server sends a response back to the PE router, allowing the VPN DHCP client access to the VPN.
The RADIUS server uses the VPN ID to assign dialin users to the proper VPN. Typically, a user login consists of the following packets:
•
Access-Request packet—A query from the network access server (NAS) that contains the user name, encrypted password, NAS IP address, VPN ID, and port. The format of the request also provides information on the type of session that the user wants to initiate.
•
Access-Accept or Access-Reject packet—A response from the RADIUS server. The server returns an Access-Accept response if it finds the user name and verifies the password. The response includes a list of attribute-value (AV) pairs that describe the parameters to be used for this session. If the user is not authenticated, the RADIUS server returns an Access-Reject packet, and access is denied.
Note
For more information, see the MPLS VPN ID, Release 12.2(4)B feature module, located at the following URL.
http://www.cisco.com/en/US/docs/ios/12_2/12_2b/12_2b4/feature/guide/12b_vpn.html
DHCP Relay Agent Information Option—Option 82
The Cisco 10000 series router supports the Dynamic Host Configuration Protocol (DHCP) relay agent information option (Option 82) feature when ATM routed bridge encapsulation (RBE) is used to configure DSL access. This feature communicates information to the DHCP server by using a suboption of the DHCP relay agent information option called agent remote ID. The information sent in the agent remote ID includes an IP address identifying the relay agent, information about the ATM interface, and information about the PVC over which the DHCP request came in. The DHCP server can use this information to make IP address assignments and security policy decisions.
Acting as the DHCP relay agent, the Cisco 10000 series router can also include VPN ID information in the agent remote ID suboption when forwarding client-originated DHCP packets to a DHCP server that has knowledge of existing VPNs. The VPN-aware DHCP server receives the DHCP packets and uses the VPN ID information to determine from which VPN to allocate an address. The DHCP server responds to the DHCP relay agent and includes information that identifies the originating client.
Note
For more information, see the DHCP Option 82 Support for Routed Bridge Encapsulation, Release 12.2(2)T feature module.
DHCP Relay Support for MPLS VPN Suboptions
The DHCP relay agent information option (Option 82) enables a Dynamic Host Configuration Protocol (DHCP) relay agent to include information about itself when forwarding client-originated DHCP packets to a DHCP server. In some environments, the relay agent has access to one or more MPLS VPNs. A DHCP server that wants to offer service to DHCP clients on those different VPNs needs to know the VPN where each client resides. The relay agent typically knows about the VPN association of the DHCP client and includes this information in the relay agent information option.
The DHCP relay support for MPLS VPN suboptions feature allows the Cisco 10000 series router, acting as the DHCP relay agent, to forward VPN-related information to the DHCP server by using the following three suboptions of the DHCP relay agent information option:
•
VPN identifier
•
Subnet selection
•
Server identifier override
The DHCP relay agent uses the VPN identifier suboption to tell the DHCP server the VPN for each DHCP request that it passes on to the DHCP server, and also uses the suboption to properly forward any DHCP reply that the DHCP server sends back to the relay agent. The VPN identifier suboption contains the VPN ID configured on the incoming interface to which the client is connected. If you configure the VRF name but not the VPN ID, the VRF name is used as the VPN identifier suboption. If the interface is in global routing space, the router does not add the VPN suboptions.
The subnet selection suboption allows the separation of the subnet where the client resides from the IP address that is used to communicate with the relay agent. In some situations, the relay agent needs to specify the subnet on which a DHCP client resides that is different from the IP address the DHCP server can use to communicate with the relay agent. The DHCP relay agent includes the subnet selection suboption in the relay agent information option, which the relay agent passes on to the DHCP server.
The server identifier override suboption contains the incoming interface IP address, which is the IP address on the relay agent that is accessible from the client. By using this information, the DHCP client sends all renew and release packets to the relay agent. The relay agent adds all the VPN suboptions and then forwards the renew and release packets to the original DHCP server.
After adding these suboptions to the DHCP relay agent information option, the gateway address changes to the relay agent's outgoing interface on the DHCP server side. The DHCP server uses this gateway address to send reply packets back to the relay agent. The relay agent then removes the relay agent information options and forwards the packets to the DHCP client on the correct VPN.
Note
For more information, see the DHCP Relay Support for MPLS VPN Suboptions, Release 12.2(4)B feature module, located at the following URL.
http://www.cisco.com/en/US/docs/ios/12_2/12_2b/12_2b4/feature/guide/12b_dhc.html
Feature History for RA to MPLS VPN
Cisco IOS Release
|
Description
|
Required PRE
|
12.2(4)BZ1
|
This feature was integrated into Cisco IOS Release 12.2(4)BZ1.
|
PRE1
|
12.3(7)XI1
|
This feature was integrated into Cisco IOS Release 12.3(7)XI1.
|
PRE2
|
12.2(28)SB
|
This feature was integrated into Cisco IOS Release 12.2(28)SB.
|
PRE2
|
Restrictions for RA to MPLS VPN
The RA to MPLS VPN feature has the following restrictions:
•
When BGP aggregates customer routes, the received packets that match the aggregate route require an additional feedback in the PXF forwarding engine, which reduces performance.
•
RBE to MPLS VPN does not support MAC-layer access lists; only IP access lists are supported.
•
Before configuring DHCP relay support for MPLS VPN suboptions, you must configure standard MPLS VPNs. For more information, see the "Configuring Virtual Private Networks" section and the "Configuring the MPLS Core Network" section, or see the Cisco IOS Switching Services Configuration Guide, Release 12.2, located at the following URL http://www.cisco.com/en/US/docs/ios/12_2/switch/configuration/guide/fswtch_c.html.
•
The VPN ID is not used to control the distribution of routing information or to associate IP addresses with VPN IDs in routing updates.
Prerequisites for RA to MPLS VPN
The RA to MPLS VPN feature has the following requirements:
•
Your network must be running the following Cisco IOS services before you configure VPN operation:
–
MPLS in the service provider backbone routers
–
Tag distribution protocol (TDP) or the label distribution protocol (LDP)
–
BGP in all routers providing a VPN service
–
Cisco Express Forwarding (CEF) switching in each MPLS-enabled router
Note
IP CEF is on by default on the Cisco 10000 series router and it cannot be turned off. If you attempt to enable IP CEF, an error appears.
•
For PPPoX to MPLS VPN networks, the Cisco 10000 series router must be running Cisco IOS Release 12.2(4)BZ1 or later releases and the performance routing engine must be installed in the router's chassis.
•
For ATM RBE to MPLS VPN networks, the Cisco 10000 series router must be running Cisco IOS Release 12.2(15)BX or later releases and the performance routing engine must be installed in the router's chassis.
•
You must configure DHCP option 82 support on the DHCP relay agent by using the ip dhcp relay information option command before you can use the DHCP Option 82 support for the RBE feature.
•
Configure all the PE routers that belong to the same VPN with the same VPN ID. Make sure that the VPN ID is unique to the service provider network.
Configuration Tasks for RA to MPLS VPN
To configure the RA to MPLS VPN feature, perform the following configuration tasks:
•
Configuring the MPLS Core Network
•
Configuring Access Protocols and Connections
•
Configuring and Associating Virtual Private Networks
•
Configuring RADIUS User Profiles for RADIUS-Based AAA
Configuring the MPLS Core Network
To configure an MPLS core network, perform the following tasks:
•
Enabling Label Switching of IP Packets on Interfaces
•
Configuring Virtual Routing and Forwarding Instances
•
Associating VRFs
•
Configuring Multiprotocol BGP PE to PE Routing Sessions
Enabling Label Switching of IP Packets on Interfaces
Enable label switching of IP packets on each PE router interface on the MPLS side of the network. The Cisco 10000 series router MPLS network side interface is a tagged interface. The packets passing through the interface are tagged packets.
Note
Multiple interfaces require a Label Switch Router (LSR).
To enable label switching of IP packets on interfaces, enter the following command in interface configuration mode:
Command
|
Purpose
|
Router(config-if)# mpls ip
|
Enables label switching of IP packets on the interface.
|
Note
The Cisco 10000 series router supports the PPP Terminated Aggregation (PTA) to VRF feature, which terminates incoming PPP sessions and places them into the appropriate VRF for transport to the customer network. Unlike the RA to MPLS VPN model, the network side interface is not a tagged interface and there are no tagged packets. In the PTA to VRF model, the network side interface is an IP interface with IP packets. In this case, the traffic for the different VRFs is typically separated at Layer 2.
Configuring Virtual Routing and Forwarding Instances
Configure VRF instances on each PE router in the provider network. Create one VRF for each VPN connected using the ip vrf command in global configuration mode or router configuration mode.
To create the VRF, do the following:
•
Specify the correct route distinguisher (RD) used for that VPN using the rd command in VRF configuration submode. The RD is used to extend the IP address so that you can identify the VPN to which it belongs.
•
Set up the import and export policies for the MP-BGP extended communities using the route-target command in VRF configuration submode. These policies are used for filtering the import and export process.
To configure a VRF, enter the following commands on the PE router beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# ip vrf vrf-name
|
Enters VRF configuration mode and defines the virtual routing instance by assigning a VRF name.
|
Step 2
|
Router(config-vrf)# rd route-distinguisher
|
Creates routing and forwarding tables.
|
Step 3
|
Router(config-vrf)# route-target {import |
export | both} route-target-ext-community
|
Creates a list of import and export route target communities for the specified VRF.
|
Step 4
|
Router(config-vrf)# vpn id oui:vpn-index
|
Assigns or updates a VPN ID on the VRF. The VPN ID uniquely identifies a VPN and VRF across all VHG and PE routers in the network.
Note The VPN ID is used for provisioning only. BGP routing updates do not include the VPN ID.
|
Associating VRFs
After you define and configure the VRFs on the PE routers, associate each VRF with:
•
An interface or subinterface
•
A virtual template interface
The virtual template interface is used to create and configure a virtual access interface (VAI). For information about configuring a virtual template interface, see the "Configuring a Virtual Template Interface" section.
To associate a VRF, enter the following commands on the PE router beginning in interface configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config-if)# ip vrf forwarding
vrf-name
|
Associates a VRF with an interface or subinterface.
|
Step 2
|
Router(config-if)# ip address ip-address
mask
|
Sets a primary or secondary address for an interface.
|
Step 3
|
Router(config-if)# exit
|
Returns to global configuration mode.
|
Step 4
|
Router(config)# interface virtual-template
number
|
Creates a virtual template interface and enters interface configuration mode.
|
Step 5
|
Router(config-if)# ip vrf forwarding
vrf-name
|
Associates a VRF with a virtual template interface.
|
Note
Apply the ip vrf forwarding command and then the ip address command. If you do not, the ip vrf forwarding command removes the existing IP address on the interface.
Example 3-1 Associating a VRF with an Interface
interface GigabitEthernet7/0/0.1
ip address 192.168.1.1 255.255.255.0
Example 3-2 Associating a VRF with a Virtual Template Interface
interface Virtual-Template1
no peer default ip address
ppp authentication chap vpn1
Configuring Multiprotocol BGP PE to PE Routing Sessions
To configure multiprotocol BGP (MP-BGP) routing sessions between the PE routers, enter the following commands on the PE routers beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# router bgp autonomous-system
|
Configures the internal BGP (iBGP) routing process with the autonomous system number passed along to other iBGP routers.
|
Step 2
|
Router(config-router)# no bgp default
ipv4-unicast
|
Disables IPv4 BGP routing.
|
Step 3
|
Router(config-router)# neighbor {ip-address |
peer-group-name} remote-as as-number
|
Configures the neighboring PE router's IP address or iBGP peer group and identifies it to the local autonomous system. The MP-BGP neighbors must use the loopback addresses.
|
Step 4
|
Router(config-router)# neighbor {ip-address |
peer-group-name} update-source interface-type
|
Allows iBGP sessions to use any operational interface for TCP connections.
|
Step 5
|
Router(config-router)# neighbor {ip-address |
peer-group-name} activate
|
Activates route exchanges with the global BGP neighbors.
|
Step 6
|
Router(config-router)# address-family ipv4 vrf
vrf-name
|
Enters address family configuration mode and configures the VRF routing table for BGP routing sessions that use standard IPv4 address prefixes.
The vrf-name argument specifies the name of the virtual routing and forwarding (VRF) instance to associate with subsequent IPv4 address family configuration mode commands.
|
Step 7
|
Router(config-router-af)# redistribute
protocol
|
Redistributes routes from one routing domain into another routing domain.
The protocol argument is the source protocol from which routes are being redistributed. It can be one of the following keywords: bgp, connected, egp, igrp, isis, ospf, static [ip], or rip.
The connected keyword refers to routes that are established automatically by virtue of having enabled IP on an interface.
|
Step 8
|
Router(config-router-af)# exit-address-family
|
Exits address family configuration mode.
|
Step 9
|
Router(config-router)# address-family vpnv4
[unicast]
|
Enters address family configuration mode for configuring BGP routing sessions that use standard Virtual Private Network (VPN) Version 4 address prefixes.
(Optional) The unicast keyword specifies VPN Version 4 unicast address prefixes.
|
Step 10
|
Router(config-router-af)# neighbor {ip-address
| peer-group-name} activate
|
Activates route exchanges with the global BGP neighbors.
|
Step 11
|
Router(config-router-af)# neighbor {ip-address
| peer-group-name} send-community [both]
|
Specifies that a communities attribute should be sent to a BGP neighbor.
The both keyword specifies that both communities attributes should be sent.
|
Example 3-3 Configuring MP-BGP
no bgp default ipv4-unicast
neighbor 10.1.1.4 remote-as 100
neighbor 10.1.1.4 update-source Loopback0
neighbor 10.1.1.4 activate
neighbor 10.3.1.4 remote-as 100
neighbor 10.3.1.4 update-source Loopback0
neighbor 10.3.1.4 activate
address-family ipv4 vrf vrf-1
neighbor 10.1.1.4 activate
neighbor 10.1.1.4 send-community both
neighbor 10.3.1.4 activate
neighbor 10.3.1.4 send-community both
Note
Typically, you enable BGP only on the PE routers. It is not necessary to enable BGP on all provider (P) core routers. However, if your network topology includes a route reflector, you may then enable BGP on a core router, which might be a P or PE router.
Configuring Access Protocols and Connections
The Cisco 10000 series router supports the following access protocols:
•
PPP over ATM
•
PPP over Ethernet
•
RBE over ATM
When a remote user initiates a PPPoA or PPPoE session to the Cisco 10000 series router, a predefined configuration template is used to configure a virtual interface known as a virtual access interface (VAI). The VAI is created and configured dynamically by using a virtual template interface. When the user terminates the session, the VAI goes down and the resources are freed for other client uses.
Note
Virtual template interfaces and VAIs do not apply to RBE over ATM.
The virtual template interface is a logical entity that the Cisco 10000 series router applies dynamically as needed to a connection. It is a configuration for an interface, but it is not tied to the physical interface. The VAI uses the attributes of the virtual template to create the session, which results in a VAI that is uniquely configured for a specific user.
After you configure a virtual template, configure the virtual connection that will use the template and then apply the template to the connection. The order in which you create virtual templates and configure the virtual connections that use the templates is not important. However, both the virtual templates and connections must exist before a remote user initiates a session to the Cisco 10000 series router.
The following sections describe how to create a virtual template and apply it to a VAI. For more information, see the "Configuring Virtual Template Interfaces" chapter in the Cisco IOS Dial Technologies Configuration Guide, Release 12.2.
Note
If you are using a RADIUS server, the RADIUS configuration takes precedence over the virtual template interface configuration. For example, the RADIUS configuration might override a number of parameters with the remainder of the configuration coming from the virtual template interface.
To configure access protocols and connections, perform the following configuration tasks. The first task listed is required and you can perform any of the remaining tasks as needed:
•
Configuring a Virtual Template Interface
•
Configuring PPP over ATM Virtual Connections and Applying Virtual Templates
•
Configuring PPPoE over ATM Virtual Connections and Applying Virtual Templates
•
Configuring PPPoE over Ethernet Virtual Connections and Applying Virtual Templates
•
Configuring RBE over ATM Virtual Connections
Configuring a Virtual Template Interface
To create and configure a virtual template interface, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface virtual-template
number
|
Creates a virtual template interface and enters interface configuration mode.
|
Step 2
|
Router(config)# ip unnumbered ethernet
number
|
Enables IP without assigning a specific IP address on the LAN.
|
Step 3
|
Router(config-if)# ppp authentication chap
|
Enables PPP authentication on the virtual template interface.
|
Step 4
|
Router(config-if)# ppp ipcp ip address
required
|
Required for legacy dial up and DSL networks. Prevents a PPP session from being set up with 0.0.0.0 remote ip address.
|
Example 3-4 Configuring a Virtual Template Interface
interface virtual-template 1
no peer default ip address
ppp authentication chap vpn1
ppp ipcp ip address required
Monitoring and Maintaining a Virtual Access Interface
When a virtual template interface is applied dynamically to an incoming user session, a virtual access interface (VAI) is created. You cannot use the command line interface (CLI) to directly create or configure a VAI, but you can display and clear the VAI by using the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show interfaces virtual-access number
[configuration]
|
Displays the configuration of the active VAI that was created using a virtual template interface.
The configuration keyword restricts output to configuration information.
|
Router# clear interface virtual-access number
|
Tears down the live sessions and frees the memory for other client uses.
|
Example 3-5 Displaying the Active VAI Configuration
Router# show interfaces virtual-access 1.1 configuration
interface virtual-access1.1
peer default ip address pool vrf-1
Note
Virtual-access 1.1 is a PPPoE subinterface.
Example 3-6 Clearing Live Sessions
Router# clear interface virtual-access 1.1
Configuring PPP over ATM Virtual Connections and Applying Virtual Templates
To configure a range of PVC connections and apply a virtual template interface to them, perform the following configuration task:
•
Configuring Encapsulated PPP over ATM Permanent Virtual Circuits
Note
For more information, see the "Configuring Broadband Access: PPP and Routed Bridge Encapsulation" chapter in the Cisco IOS Wide-Area Networking Configuration Guide, Release 12.2.
Configuring Encapsulated PPP over ATM Permanent Virtual Circuits
Configure ATM permanent virtual circuits (PVCs) for encapsulated PPP over ATM on either point-to-point or multipoint subinterfaces. Using point-to-multipoint PVCs significantly increases the maximum number of PPPoA sessions that you can run on the Cisco 10000 series router.
To configure a PVC range with encapsulated PPPoA, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface atm
slot/port.subinterface-number multipoint
|
Specifies an ATM multipoint subinterface.
|
Step 2
|
Router(config-subif)# range [range-name] pvc
start-vpi/start-vci end-vpi/end-vci
|
Creates a range of PVCs.
|
Step 3
|
Router(config-if-atm-range)# encapsulation
aal5encap ppp virtual-template number
|
Configures the ATM adaptation layer (AAL) and encapsulation type on an ATM PVC range and links it to the virtual template interface.
|
Configuring PPPoE over ATM Virtual Connections and Applying Virtual Templates
To configure PPPoE over ATM, perform the following configuration tasks:
•
Configure a virtual template (see the "Configuring a Virtual Template Interface" section).
•
Configuring a VPDN Group for PPPoE over ATM
•
Configuring PPPoE on ATM Permanent Virtual Circuits
•
Configuring PPPoE on ATM PVCs Using a Different MAC Address
Note
For more information, see the "Configuring Broadband Access: PPP and Routed Bridge Encapsulation" chapter in the Cisco IOS Wide-Area Networking Configuration Guide, Release 12.2.
Configuring a VPDN Group for PPPoE over ATM
To configure the physical interface that will carry the PPPoE session and link it to the appropriate virtual template interface, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# vpdn enable
|
Enables virtual private dial network (VPDN) configuration on this router.
|
Step 2
|
Router(config)# vpdn group name
|
Associates a VPDN group with a customer or VPDN profile.
|
Step 3
|
Router(config-vpdn)# accept-dialin
|
Creates an accept dial-in VPDN group.
|
Step 4
|
Router(config-vpdn-acc-in)# protocol pppoe
|
Specifies the VPDN group to be used to establish PPPoE sessions.
|
Step 5
|
Router(config-vpdn-acc-in)# virtual-template
template-number
|
Specifies the virtual template interface to use to clone virtual access interfaces (VAIs).
|
Step 6
|
Router(config-vpdn)# pppoe limit per-vc
number
|
Specifies the maximum number of PPPoE sessions to be established over a virtual circuit.
|
Configuring PPPoE on ATM Permanent Virtual Circuits
To configure PPPoE on a range of ATM PVCs, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface atm
slot/0.subinterface-number multipoint
|
Specifies an ATM multipoint subinterface.
|
Step 2
|
Router(config-subif)# range [range-name]
pvc start-vpi/start-vci end-vpi/end-vci
|
Creates a range of PVCs.
|
Step 3
|
Router(config-if-atm-range)# encapsulation
aal5snap
|
Configures VC multiplexed encapsulation on a PVC range.
|
Step 4
|
Router(config-if)# protocol pppoe
|
Specifies the VPDN group to be used to establish PPPoE sessions on the PVC range.
|
Configuring PPPoE on ATM PVCs Using a Different MAC Address
To change the way PPPoE selects a MAC address when PPPoE and RBE are configured on two separate PVCs on the same DSL line, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# vpdn-group pppoe-term
|
Specifies the VPDN group to be used to establish PPPoE sessions on a PVC.
|
Step 2
|
Router(config-vpdn)# accept-dialin
|
Configures the L2TP access concentrator (LAC) to accept PPPoE sessions from a client and creates an accept-dialin VPDN subgroup.
|
Step 3
|
Router(config-vpdn-acc-in)# protocol pppoe
|
Configures a static map for an ATM PVC.
|
Step 4
|
Router(config-vpdn-acc-in)# exit
|
Exits accept-dialin configuration mode and returns to VPDN configuration mode.
|
Step 5
|
Router(config-vpdn)# pppoe mac-address
{autoselect | mac-address}
|
Changes the way PPPoE selects a MAC address.
The autoselect option always chooses a "MAC plus 7" address and no other address. For example, it chooses the ATM interface MAC address, interface MAC address plus 1, plus 2, plus 3, plus 4, plus 5, or plus 6).
Use the mac-address option to enter an explicit MAC address value.
|

Note
Use the pppoe mac-address command in VPDN group configuration mode. The Cisco 10000 series router applies the command to all PPPoEoA sessions brought up after you issue the command. MAC address usage does not change until you explicitly configure it using the pppoe mac-address command. The router limits the change to PPPoE sessions on ATM interfaces only and does not apply it to other interfaces on which PPPoE operates (such as Ethernet, Ethernet VLAN and DOCSIS interfaces).
Configuring PPPoE over Ethernet Virtual Connections and Applying Virtual Templates
To configure PPPoE over Ethernet, perform the following configuration tasks:
•
Configuring a Virtual Template Interface
•
Configuring PPPoE over Ethernet in a BBA Group
Configuring PPPoE over Ethernet in a BBA Group
Note
Cisco IOS Release 12.2(15)BX does not support RADIUS configuration of BBA groups. You must configure BBA groups manually.
To configure a broadband aggregation (BBA) group for PPPoE and to link it to the appropriate virtual template interface, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# bba-group pppoe {name |
global}
|
Configures a BBA group to be used to establish PPPoE sessions.
name identifies the BBA group. You can have multiple BBA groups.
global is the default BBA group used for ATM connections when a BBA group name is not specified.
|
Step 2
|
Router(config-bba)# virtual-template
template-number
|
Specifies the virtual template interface to use to clone virtual access interfaces (VAIs).
|
Step 3
|
Router(config-bba)# pppoe limit per-mac
per-mac-limit
|
(Optional) Specifies the maximum number of sessions per MAC address for each PPPoE port that uses the group.
|
Step 4
|
Router(config-bba)# pppoe limit max-sessions
number
|
(Optional) Specifies the maximum number of PPPoE sessions that can be terminated on this router from all interfaces.
|
Step 5
|
Router(config-bba)# pppoe limit per-vc
per-vc-limit
|
(Optional) Specifies the maximum number of PPPoE sessions for each VC that uses the group.
|
Step 6
|
Router(config-bba)# exit
|
Returns to global configuration mode.
|
Step 7
|
Router(config)# interface atm
slot/subslot/port.subinterface
|
Specifies the interface to which you want to attach the BBA group.
|
Step 8
|
Router(config-if)# pvc [name] vpi/vci
|
Creates an ATM permanent virtual circuit (PVC) and enters ATM PVC configuration mode.
(Optional) name specifies the name of the PVC or map. The name can be up to 16 characters.
vpi/ specifies the ATM network VPI for the PVC that you named. Valid values are from 0 to 255. If a value is not specified, the vpi value is set to 0.
vci specifies the ATM network VCI for the PVC you named. Valid values are from 0 to 1 less than the maximum value set for this interface using the atm vc-per-vp command.
Note You cannot set both vpi and vci to 0; if one is 0, the other cannot be 0.
|
Step 9
|
Router(config-if)# protocol pppoe group
group-name
|
Attaches the BBA group to the PVC.
|

Note
You cannot simultaneously configure a BBA group for PPPoE and a VPDN group for PPPoE. If you configure a BBA group and then you configure a VPDN group, the protocol command in VPDN accept-dialin configuration mode does not include an option for PPPoE (for example, you cannot specify the protocol pppoe command). Use the no bba-group pppoe command to re-enable the pppoe option for the protocol command.
Configuring RBE over ATM Virtual Connections
To configure RBE over ATM virtual connections and apply virtual templates, perform the following configuration tasks:
•
Configuring the PE Router
•
Configuring DHCP Option 82 for RBE
•
Configuring DHCP Relay Support for MPLS VPN Suboptions
•
Specifying a VPN ID
Configuring the PE Router
To configure the PE router, perform the following required configuration tasks:
•
Defining Loopbacks
•
Defining PVCs
•
Configuring Label Switching
•
Configuring the VRF for Each VPN
•
Configuring a Dedicated PVC
•
Configuring BGP to Advertise Networks
Note
For more information, see the "DSL Access to MPLS VPN Integration" chapter in the Cisco Remote Access to MPLS VPN Solution Overview and Provisioning Guide, Release 2.0.
Defining Loopbacks
To define loopbacks, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface loopback number
|
Creates a loopback interface to reach the router. Enters interface configuration mode.
|
Step 2
|
Router(config-if)# ip vrf forwarding
vrf-name
|
Associates a VRF with the loopback interface.
|
Step 3
|
Router(config-if)# ip address [address]
[netmask]
|
Assigns an IP address to the loopback interface.
|
Defining PVCs
To define PVCs, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface atm
slot/port.subinterface-number
point-to-point
|
Specifies an ATM point-to-point subinterface. Enters subinterface configuration mode.
|
Step 2
|
Router(config-subif)# ip vrf forwarding
vrf-name
|
Associates a VRF with the ATM point-to-point subinterface.
|
Step 3
|
Router(config-subif)# ip unnumbered
Loopback number
|
Configures the ATM subinterface as unnumbered to a loopback interface.
Note The loopback interface must be in the same VRF.
|
Step 4
|
Router(config-subif)# pvc [vpi/vci
number]
|
Configures the PVC on the subinterface. Enters PVC configuration mode.
|
Step 5
|
Router(config-subif-pvc)# encapsulation
aal5snap
|
Configures the ATM adaptation layer (AAL) and encapsulation type on the ATM PVC.
|
Step 6
|
Router(config-subif-pvc)# no protocol ip
inarp
|
Disables Inverse ARP on the ATM PVC.
|
Configuring Label Switching
To configure label switching on the interface connected to the MPLS cloud, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface atm
slot/port.subinterface-number
tag-switching
|
Connects to an MPLS cloud using MPLS ATM tagging. Enters subinterface configuration mode.
|
Step 2
|
Router(config-subif)# ip address address
|
Assigns an IP address to the ATM subinterface.
|
Step 3
|
Router(config-subif)# tag-switching atm
vp-tunnel vpi
|
Specifies an interface or subinterface as a virtual private (VP) tunnel.
|
Step 4
|
Router(config-subif)# tag-switching ip
|
Enables label switching of IP packets on the interface.
|
Configuring the VRF for Each VPN
To configure the VRF for each VPN, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# ip vrf vrf-name
|
Enters VRF configuration mode and defines the virtual routing instance by assigning a VRF name.
|
Step 2
|
Router(config-vrf)# rd
route-distinguisher
|
Creates routing and forwarding tables.
|
Step 3
|
Router(config-vrf)# route-target {import
| export | both}
route-target-ext-community
|
Creates a list of import and export route target communities for the specified VRF.
|
Configuring a Dedicated PVC
To configure a dedicated PVC for each VPN, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface atm
slot/port.subinterface-number
point-to-point
|
Creates a point-to-point ATM subinterface. Enters subinterface configuration mode.
|
Step 2
|
Router(config-subif)# ip vrf forwarding
vrf-name
|
Associates a VRF with the ATM point-to-point subinterface.
|
Step 3
|
Router(config-subif)# ip address address
|
Assigns an IP address to the ATM subinterface.
|
Step 4
|
Router(config-subif)# pvc [vpi/vci
number]
|
Configures the PVC on the subinterface. Enters PVC configuration mode.
|
Step 5
|
Router(config-subif-pvc)# encapsulation
aal5snap
|
Configures the ATM adaptation layer (AAL) and encapsulation type on the ATM PVC.
|
Configuring BGP to Advertise Networks
To configure BGP to advertise the networks for each VPN, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# router bgp autonomous-system
|
Configures the internal BGP (iBGP) routing process with the autonomous system number passed along to other iBGP routers.
|
Step 2
|
Router(config-router)# no bgp default
ipv4-unicast
|
Disables IPv4 BGP routing.
|
Step 3
|
Router(config-router)# neighbor {ip-address |
peer-group-name} remote-as as-number
|
Configures the neighboring PE router's IP address or iBGP peer group and identifies it to the local autonomous system. The MP-BGP neighbors must use the loopback addresses.
|
Step 4
|
Router(config-router)# neighbor {ip-address |
peer-group-name} update-source interface-type
|
Allows iBGP sessions to use any operational interface for TCP connections.
|
Step 5
|
Router(config-router)# neighbor {ip-address |
peer-group-name} activate
|
Activates route exchanges with the global BGP neighbors.
|
Step 6
|
Router(config-router)# address-family ipv4 vrf
vrf-name
|
Enters address family configuration mode and configures the VRF routing table for BGP routing sessions that use standard IPv4 address prefixes.
The vrf-name argument specifies the name of the virtual routing and forwarding (VRF) instance to associate with subsequent IPv4 address family configuration mode commands.
|
Step 7
|
Router(config-router-af)# redistribute
protocol
|
Redistributes routes from one routing domain into another routing domain.
The protocol argument is the source protocol from which routes are being redistributed. It can be one of the following keywords: bgp, connected, egp, igrp, isis, ospf, static [ip], or rip.
The connected keyword refers to routes that are established automatically by virtue of having enabled IP on an interface.
|
Step 8
|
Router(config-router-af)# exit-address-family
|
Exits address family configuration mode.
|
Step 9
|
Router(config-router)# address-family vpnv4
[unicast]
|
Enters address family configuration mode for configuring BGP routing sessions that use standard Virtual Private Network (VPN) Version 4 address prefixes.
(Optional) The unicast keyword specifies VPN Version 4 unicast address prefixes.
|
Step 10
|
Router(config-router-af)# neighbor {ip-address
| peer-group-name} activate
|
Activates route exchanges with the global BGP neighbors.
|
Step 11
|
Router(config-router-af)# neighbor {ip-address
| peer-group-name} send-community [both]
|
Specifies that a community attribute should be sent to a BGP neighbor.
The both keyword specifies that both community attributes should be sent.
|
Step 12
|
Router(config-router-af)# exit-address-family
|
Exits address family configuration mode.
|
Step 13
|
Router(config-router)# exit
|
Exits router configuration mode.
|
Step 14
|
Router(config)# interface atm
slot/port.subinterface-number point-to-point
|
Creates a point-to-point ATM subinterface. Enters subinterface configuration mode.
|
Step 15
|
Router(config-subif)# atm route-bridged ip
|
Enables RBE on the subinterface.
|
Configuring DHCP Option 82 for RBE
To configure DHCP Option 82 support for RBE connections, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# ip dhcp relay information
option
|
Enables the system to insert the DHCP relay agent information option in VPN suboptions.
|
Step 2
|
Router(config)# rbe nasip source_interface
|
Specifies the IP address of an interface on the DHCP relay agent. This is the interface address that is sent to the DHCP server in the agent remote ID suboption.
|
Example 3-7 enables DHCP option 82 support on the DHCP relay agent by using the ip dhcp relay information option command. The rbe nasip command configures the router to forward the IP address for Loopback0 to the DHCP server. The value (in hexadecimal) of the agent remote ID suboption is 010100000B0101814058320 and the value of each field is the following:
•
Port Type: 0x01
•
Version: 0x01
•
Reserved: undefined
•
NAS IP address: 0x0B010181 (hexadecimal value of 11.1.1.129)
•
NAS Port
–
Interface (slot/module/port): 0x40 (The slot/module/port values are 01 00/0/000.)
–
VPI: 0x58 (hexadecimal value of 88)
–
VCI: 0x320 (hexadecimal value of 800)
Example 3-7 Configuring Option 82 for RBE
ip dhcp-server 172.16.1.2
ip dhcp relay information option
ip address 11.1.1.129 255.255.255.192
interface ATM4/0.1 point-to-point
ip helper-address 172.16.1.2
ip address 172.16.1.1 255.255.0.0
Configuring DHCP Relay Support for MPLS VPN Suboptions
To configure DHCP relay support for MPLS VPN suboptions, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# ip dhcp relay information
option vpn
|
Enables the system to insert VPN suboptions into the DHCP relay agent information option in forwarded BOOTREQUEST messages to a DHCP server. Sets the gateway address to the outgoing interface toward the DHCP server. The VPN suboptions are also added to the BOOTP broadcast packets when the command is configured.
|
Step 2
|
Router(config)# interface type number
|
Specifies an interface and enters interface configuration mode.
|
Step 3
|
Router(config-if)# ip helper-address vrf
name [global] address
|
Forwards UDP broadcasts, including BOOTP, received on an interface.
If the DHCP server resides in a VPN or global space that is different from the VPN, the vrf name or global options allow you to specify the name of the VRF or global space where the DHCP server resides.
The vrf name argument is the virtual routing and forwarding (VRF) instance for the VPN.
The global argument is the global routing table.
The address argument is the destination broadcast or host address to be used when forwarding UDP broadcasts. You can configure more than one helper address per interface.
|
In Example 3-8, the DHCP relay receives a DHCP request on Ethernet interface 0/1 and sends the request to the DHCP server located at IP helper address 10.44.23.7, which is associated with the VRF named red.
Example 3-8 Configuring DHCP Relay Support for MPLS VPN Suboptions
ip dhcp relay information option vpn
ip helper-address vrf red 10.44.23.7
Specifying a VPN ID
To specify a VPN ID, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# ip vrf vrf-name
|
Creates a VRF routing table and a CEF forwarding table and enters VRF configuration mode.
The vrf-name argument is the name you assign to the VRF.
|
Step 2
|
Router(config-vrf)# vpn id oui:vpn-index
|
Assigns a VPN ID to the VRF.
The oui: argument is an organizationally unique identifier. The IEEE organization assigns this identifier to companies. The OUI is restricted to three octets.
The vpn-index argument identifies the VPN within the company. This VPN index is restricted to four octets.
|
Example 3-9 assigns a VPN ID to the VRF named vpn1.
Example 3-9 Configuring a VPN ID
Router(config)# ip vrf vpn1
Router(config-vrf)# vpn id al:3f6c
Configuring and Associating Virtual Private Networks
To add a virtual private network (VPN) service to your MPLS configuration, you perform the following tasks:
•
Configure VPNs
•
Associate VPNs with a virtual template interface
Configuring Virtual Private Networks
To configure dial-in and dial-out virtual private networks (VPNs), perform the following tasks:
•
Enable a VPN tunnel
•
Configure VPN tunnel authentication
For more information about configuring virtual private networks, see the "Configuring Virtual Private Networks" chapter in the Cisco IOS Dial Technologies Configuration Guide, Release 12.2. This chapter describes the procedures used to configure, verify, monitor, and troubleshoot VPNs and also provides configuration examples.
Associating VPNs with a Virtual Template Interface
After you configure the VPNs, associate each one with a virtual template interface. To do this association, perform the following tasks:
•
Creating a VRF Configuration for a VPN
•
Associating a VRF Configuration for a VPN with a Virtual Template Interface
Note
Do not enable VPN service on the fa0/0/0 management interface. The configuration for this interface is included in the configuration file.
Creating a VRF Configuration for a VPN
To create a VRF configuration for a VPN, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# ip vrf vrf-name
|
Enters VRF configuration mode and defines the VPN routing instance by assigning a VRF name.
|
Step 2
|
Router(config-vrf)# rd route-distinguisher
|
Creates routing and forwarding tables.
|
Step 3
|
Router(config-vrf)# vpn id
route-distinguisher
|
Associates the VPN with the VRF.
|
Step 4
|
Router(config-vrf)# route-target {import |
export | both} route-target-ext-community
|
Creates a list of import and export route target communities for the specified VRF.
|
Example 3-10 Creating a VRF Configuration for a VPN
route-target export 100:1000
route-target import 100:1000
Note
For more information about creating VRFs, see the "Configuring Virtual Routing and Forwarding Instances" section.
Associating a VRF Configuration for a VPN with a Virtual Template Interface
After you create a VRF configuration for a VPN, associate the VRF with a virtual template interface. The virtual template interface is used to create and configure a virtual access interface (VAI).
To associate a VRF, enter the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface virtual-template
number
|
Creates a virtual template interface and enters interface configuration mode.
|
Step 2
|
Router(config-if)# ip vrf forwarding
vrf-name
|
Associates the VRF with the virtual template interface.
|
Step 3
|
Router(config-if)# ip unnumbered type number
|
Enables IP without assigning a specific IP address to the interface.
The type and number arguments are the type and number of another interface on which the router has an assigned IP address. The interface cannot be another unnumbered interface.
|
Example 3-11 Associating a VRF Configuration for a VPN with a Virtual Template Interface
interface Virtual-Template1
Note
•
For more information about configuring a virtual template interface, see the "Configuring a Virtual Template Interface" section.
•
For more information about creating and associating VRFs, see the "Configuring Virtual Routing and Forwarding Instances" section and the "Associating VRFs" section.
Configuring RADIUS User Profiles for RADIUS-Based AAA
Use the per VRF AAA feature to partition authentication, authorization, and accounting (AAA) services based on a virtual routing and forwarding (VRF) instance. This feature allows the Cisco 10000 router to communicate directly with the customer RADIUS server without having to go through a RADIUS proxy.
For more information about configuring the per VRF AAA feature on the Cisco 10000 series router, see the "Optional Configuration Tasks for LAC" section on page 5-7.
For more information about configuring your RADIUS server, see your RADIUS documentation.
Verifying VPN Operation
To verify VPN operation, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show ip vrf
|
Displays the defined VRFs and interfaces.
|
Router# show ip vrf [{brief | detail |
interfaces}] vrf-name
|
Displays information about defined VRFs and associated interfaces.
|
Router# show ip route vrf vrf-name
|
Displays the IP routing table for a VRF.
|
Router# show ip protocols vrf vrf-name
|
Displays the routing protocol information for a VRF.
|
Router# show ip interface interface-number
|
Displays the VRF table associated with an interface.
|
Router# show ip bgp vpnv4 all [tags]
|
Displays information about all BGPs.
|
Router# show tag-switching forwarding vrf
vrf-name [prefix mask/length][detail]
|
Displays label forwarding entries that correspond to VRF routes advertised by this router.
|
Configuration Examples for RA to MPLS VPN
This section provides configuration examples for the following configurations:
•
PPPoA to MPLS VPN Configuration Example
•
PPPoE to MPLS VPN Configuration Example
•
RBE to MPLS VPN Configuration Example
PPPoA to MPLS VPN Configuration Example
Example 3-12 shows how to configure the RA to MPLS VPN feature on the Cisco 10000 series router. In this example, one VRF is configured with 300 PPPoA sessions.
Example 3-12 Configuring PPPoA to MPLS VPN
!Enables the AAA access control model.
!Configures AAA accounting.
aaa authentication login default none
aaa authentication ppp default local
aaa authorization network default local
username vpn1 password 0 vpn1
!Configures the vpn1 VRF.
!Configures the policy map for the default class.
police 200000 400000 800000 conform-action transmit exceed-action drop
!Sets the size of the small and middle buffers.
buffers small permanent 20000
buffers middle permanent 7000
!Defines the general loopback interface used for reachability to the router and as a
!source IP address for sessions (IBGP, TDP, and so on).
ip address 10.1.1.1 255.255.255.255
!Creates a loopback interface in the vpn1 VRF. You do this for each customer VRF you IP
ip address 10.16.1.1 255.255.255.255
!Configures the management interface. You should not configure VPN over the FastEthernet
interface FastEthernet0/0/0
ip address 192.168.16.1 255.255.255.0
!Enables label switching of IP packets on the interface.
interface GigabitEthernet1/0/0
ip address 172.16.4.1 255.255.0.0
interface GigabitEthernet2/0/0
ip address 172.16.3.1 255.255.0.0
interface ATM4/0/0.1 multipoint
encapsulation aa5mux ppp Virtual-Template1
!Enables label switching of IP packets on the interface.
ip address 172.16.1.1 255.255.0.0
ip address 172.16.2.1 255.255.0.0
!Configures the virtual template and associates the vpn1 VRF with it.
interface Virtual-Template1
peer default ip address pool vpn1
ppp timeout authentication 20
!Configures OSPF to advertise networks.
auto-cost reference-bandwidth 10000
network 10.1.1.1 0.0.0.0 area 40
network 172.16.0.0 0.255.255.255 area 40
!Configures BGP to advertise the networks for each VPN.
no bgp default ipv4-unicast
bgp bestpath scan-time 30
neighbor 10.1.1.4 remote-as 100
neighbor 10.1.1.4 update-source Loopback0
neighbor 10.1.1.4 activate
!Enters address family configuration mode to configure the VRF routing table on BGP.
address-family ipv4 vrf vpn1
neighbor 10.1.1.4 activate
neighbor 10.1.1.4 send-community both
!Specifies the IP local pool to use for the vpn1 VRF address assignment.
ip local pool vpn1 192.168.1.1 192.168.2.67
!Enters routing information in the routing table.
ip route 192.168.16.0 255.255.255.0 198.168.76.1
!Configures RADIUS accounting. radius-server retransmit is on by default and cannot be
removed.
radius-server retransmit 3
radius-server authorization permit missing Service-Type
PPPoE to MPLS VPN Configuration Example
Example 3-13shows how to configure the RA to MPLS VPN feature with one VRF for PPPoE sessions.
Example 3-13 Configuring PPPoE to MPLS VPN
!Enables the AAA access control model.
!Configures AAA accounting.
aaa authentication login default none
aaa authentication enable default none
aaa authentication ppp default group radius
aaa authorization config-commands
aaa authorization network default local
username pppoe password 0 pppoe
username pppoa password 0 pppoa
username common password 0 common
!Preprovisions slots in the Cisco 10000 series router for line cards.
route-target export 100:1000
route-target import 100:1000
!Specifies the VPDN group to be used to establish PPPoE sessions and specifies the maximum
!number of PPPoE sessions to be established over a virtual circuit.
pppoe limit per-mac 32000
!Configures the small buffer.
buffers small permanent 15000
!Defines the general loopback interface used for reachability to the router and as a
!source IP address for sessions (IBGP, TDP, and so on).
ip address 10.16.3.1 255.255.255.255
ip ospf network point-to-point
!Creates a loopback interface in the vpn1 VRF. You do this for each customer VRF you IP
ip address 10.24.1.1 255.255.255.255
ip address 10.8.1.2 255.255.255.255
!Configures the management interface. You should not configure VPN over the FastEthernet
interface FastEthernet0/0/0
ip address 10.9.100.32 255.0.0.0
!Enables label switching of IP packets on the interface.
interface GigabitEthernet1/0/0
ip address 10.1.10.1 255.255.0.0
interface GigabitEthernet2/0/0
ip address 10.2.10.1 255.255.0.0
ip address 10.3.10.1 255.255.0.0
ip address 10.4.10.1 255.255.0.0
interface ATM5/0/0.1000 multipoint
interface ATM6/0/0.1000 multipoint
interface ATM8/0/3.100 multipoint
!Associates the common VRF with the interface.
interface ATM8/0/3.101 point-to-point
ip address 10.22.10.1 255.255.255.0
!Defines the virtual template and associates the common VRF with it.
interface Virtual-Template1
peer default ip address pool common
!Configures OSPF to advertise the networks.
auto-cost reference-bandwidth 1000
network 10.16.3.1 0.0.0.0 area 0
network 10.1.0.0 0.0.255.255 area 0
network 10.2.0.0 0.0.255.255 area 0
network 10.3.0.0 0.0.255.255 area 0
network 10.4.0.0 0.0.255.255 area 0
!Enters address family configuration mode to configure the VRF for PE to CE routing
address-family ipv4 vrf common
!Configures BGP to advertise the networks for the VPN.
no bgp default ipv4-unicast
neighbor 172.16.1.4 remote-as 100
neighbor 172.16.1.4 activate
!Enters address family configuration mode to configure the common VRF for PE to CE routing
address-family ipv4 vrf common
aggregate-address 2.10.0.0 255.255.0.0 summary-only
neighbor 172.16.1.4 activate
neighbor 172.16.1.4 send-community both
!Specifies the IP local pool to use for the VRF address assignment.
ip local pool common 2.10.1.1 2.10.126.0
!Enters routing information in the routing table for the VRF.
ip route 20.0.0.0 255.0.0.0 FastEthernet0/0/0 20.9.0.1
ip route vrf common 10.22.0.0 255.255.0.0 Null0
ip route vrf common 10.30.0.0 255.255.0.0 2.1.1.1 3
ip route vrf common 10.32.0.0 255.255.0.0 2.2.151.1 2
ip route vrf common 10.33.0.0 255.255.0.0 2.3.101.1 2
!Specifies the RADIUS host and configures RADIUS accounting. radius-server retransmit is
!on by default and cannot be removed.
radius-server host 10.19.100.150 auth-port 1645 acct-port 1646
radius-server retransmit 3
radius-server authorization permit missing Service-Type
radius-server vsa send authentication
RBE to MPLS VPN Configuration Example
Example 3-14 shows how to configure RBE on ATM interfaces, creates and associates two VRFs named CustomerA and CustomerB, and configures DHCP Option 82 support for RBE connections.
Example 3-14 Configuring RBE to MPLS VPN
route-target export 100:100
route-target import 100:100
route-target export 101:101
route-target import 101:101
ip address 192.168.1.1 255.255.255.0
ip address 10.100.10.1 255.255.255.255
network 192.168.1.0 0.0.0.255 area 0
! description for VRF CustomerA
ip address 10.101.10.1 255.255.255.255
ip vrf forwarding CustomerA
! description for VRF CustomerB
ip address 10.102.20.1 255.255.255.255
ip vrf forwarding CustomerB
ip dhcp relay information option
ip dhcp relay information option vpn
interface atm7/0/0.1 point-to-point
ip vrf forwarding CustomerA
ip helper-address vrf CustomerA 192.168.2.1
range pvc 101/32 101/2031
interface atm8/0/0.1 point-to-point
ip vrf forwarding CustomerB
ip helper-address vrf CustomerB 192.168.3.1
range pvc 102/32 102/2031
neighbor 192.168.1.2 remote-as 1
neighbor 192.168.1.2 update source loopback0
neighbor 192.168.1.2 activate
address-family ipv4 vrf CustomerA
address-family ipv4 vrf CustomerB
neighbor 192.168.1.2 activate
neighbor 192.168.1.2 send-community extended
Monitoring and Maintaining an MPLS Configuration
To monitor and maintain an MPLS configuration, perform the following verification tasks:
•
Verifying the Routing Protocol Is Running
•
Verifying MPLS
•
Verifying Connections Between Neighbors
•
Verifying Label Distribution
•
Verifying Label Bindings
•
Verifying Labels Are Set
For more information, see the "Troubleshooting Tag and MPLS Switching Connections" chapter in the ATM and Layer 3 Switch Router Troubleshooting Guide, Cisco IOS Release 12.1(13)E1.
Verifying the Routing Protocol Is Running
To verify that the routing protocol is running, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show ip protocols
|
Displays the parameters and current state of the active routing protocol process. Ensure that the protocol routes for the MPLS network and all neighbors are present.
|
Router# show ip route
|
Displays the current state of the routing table. Ensure that all routers and routes are present.
|
Verifying MPLS
To verify MPLS, enter the following command in privileged EXEC mode:
Command
|
Purpose
|
Router# show mpls interfaces
|
Displays information about the interfaces that have been configured for label switching. Use this command to verify that MPLS is globally enabled and that a label distribution protocol is running on the requested interfaces.
|
Example 3-15 show mpls interfaces
Router# show mpls interfaces
Interface IP Tunnel Operational
Serial0/1.1 Yes (tdp) Yes Yes
Serial0/1.3 Yes (tdp) Yes Yes
The fields in this example indicate the following:
•
IP field—Indicates that MPLS IP is configured for an interface. The label distribution protocol (LDP) appears in parentheses to the right of the IP status. The LDP is either Tag Distribution Protocol (TDP) as defined in the Cisco Tag Switching architecture, or LDP as defined by IETF in RFC 3036.
•
Tunnel field—Indicates the capacity of traffic engineering on the interface.
•
Operational field—Indicates the status of the LDP. In the above example, the Operational field indicates down on Serial 0/1.2 because the interface is down.
Verifying Connections Between Neighbors
An unlabeled connection must exist between each pair of neighboring routers. The routing protocol and the label distribution protocol use the unlabeled connection to build the outing table and the Label Forwarding Information Base (LFIB).
To verify the connections between neighbors, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# ping [protocol | tag] {host-name |
system-address}
|
Verifies basic network connectivity between neighbors.
|
Router# ping vrf vrf-name system-address
|
Verifies connectivity to the VRF specified.
|
Router# debug mpls packet
|
Verifies that MPLS labels are set.
|
Caution 
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Example 3-16 ping
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.6, timeout is 2 seconds:
Success rate is 100 percent (5/5), round-trip min/avg/max = 56/56/60 ms
Example 3-17 ping vrf
Router# ping vrf vrf-1 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4/ ms
Verifying Label Distribution
To verify label distribution, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show mpls forwarding-table
|
Displays the discovered neighbors. The Local Tag field displays the label assigned by the router.
|
Router# show tag-switching tdp discovery
|
Displays the status of the LDP discovery process.
|
Example 3-18 show mpls forwarding-table Command
Router# show mpls forwarding-table
Local Outgoing Prefix Bytes tag Outgoing Next Hop
tag tag or VC or Tunnel Id switched interface
16 Untagged 10.1.0.0/16 0 AT9/0/0 10.4.4.2
17 Untagged 10.0.0.0/8 0 AT9/0/0 10.4.4.2
18 Untagged 192.168.0.0/16 0 AT9/0/1 10.6.6.2
19 Pop tag 192.168.2.1/32 624 Fal1/0/0 172.16.0.1
20 Pop tag 192.168.2.2/32 0 Fal1/0/1 172.16.0.18
In Example 3-19, TDP is used to bind labels with routes. If label distribution protocol is running correctly, it assigns one label per forwarding equivalent class. If any of the presumed neighbors is missing and cannot be pinged, a connectivity problem exists and the label distribution protocol cannot run.
Example 3-19 show tag-switching tdp discovery Command
Router# show tag-switching tdp discovery
Serial0/1.1 (tdp): xmit/recv
Serial0/1.2 (tdp): xmit/recv
Serial0/1.3 (tdp): xmit/recv
Note
The neighbor relationship is not established when the router ID for the label distribution protocol cannot be reached from the global routing table.
Verifying Label Bindings
To verify label bindings, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show mpls ip bindings
|
Displays the labels assigned to each destination.
|
Router# show mpls tag-switching forwarding-table
{ip-address | prefix} detail
|
Displays the different routes and the labels associated with them.
|
Example 3-20 show mpls ip bindings Command
Router# show mpls ip binding
out label: imp-null lsr: 172.16.1.18:0
out label: imp-null lsr: 172.16.1.18:0
out label: imp-null lsr: 192.168.1.1:0
out label: 20 lsr: 172.16.1.18:0
out label: 16 lsr: 192.168.1.1:0
out label: imp-null lsr: 172.16.1.18:0
Verifying Labels Are Set
To verify that the labels are set, enter the following command in privileged EXEC mode:
Command
|
Purpose
|
Router# traceroute address
|
Displays the route to the specified address and the labels set for the interfaces.
|
Example 3-21 traceroute Command
Router# traceroute 10.10.10.4
Type escape sequence to abort.
Tracing the route to 10.10.10.4
1 10.1.1.21 [MPLS: Label 25 Exp 0] 296 msec 256 msec 244 msec
2 10.1.1.5 [MPLS: Label 22 Exp 0] 212 msec 392 msec 352 msec
3 10.1.1.14 436 msec * 268 msec
Monitoring and Maintaining the MPLS VPN
To monitor and maintain an MPLS VPN configuration, perform the following verification tasks:
•
Verifying VRF Configurations
•
Verifying the Routing Table
•
Verifying the PE to PE Routing Protocols
•
Verifying the PE to CE Routing Protocol
•
Verifying the MPLS VPN Labels
•
Testing the VRF
Note
Before you establish an MPLS VPN, verify the connections between PE routers by using the ping command.
Verifying VRF Configurations
To verify VRF configurations, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show ip vrf
|
Displays a summary of all VRFs present on the current router and their associated route distinguishers and interfaces. Use this command to verify the names and configuration of each VRF and the route distinguisher configuration at each PE router.
|
Router# show ip vrf interfaces
|
Displays the VRFs present on the router and the associated interfaces.
|
Router# show ip vrf detail vrf-name
|
Displays detailed information about the VRF you specify. Use this command to determine if the global routing table contains all connected addresses, if the exported routing attributes of a VRF on a PE router are the imported routing attributes of the VRF on another PE router, and to determine the status and IP addresses of interfaces.
|
Example 3-22 show ip vrf interfaces Command
Route# show ip vrf interfaces
Interface IP-Address VRF Protocol
Loopback101 100.0.6.1 vrf-1 up
Loopback111 200.1.6.1 vrf-2 up
Example 3-23 show ip vrf detail vrf-name
Router# show ip vrf detail vrf-1
VRF vrf-1; default RD 100:101
Connected addresses are not in global routing table
Export VPN route-target communities
Import VPN route-target communities
Verifying the Routing Table
To verify the routing table for VRFs, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show ip route vrf vrf-name
|
Displays MPLS VPN connections in the routing table.
|
Router# show ip route vrf vrf-name system-address
|
Displays routing table information for the specified address.
|
Verifying the PE to PE Routing Protocols
Border Gateway Protocol (BGP) is used for routing sessions between PE routers. To verify PE to PE routing sessions, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show ip bgp neighbors
|
Displays detailed information on the BGP and TCP connections to individual neighbors.
|
Router# show ip bgp vpnv4 all
|
Shows the VPN address information from the BGP table.
|
Router# show ip bgp vpnv4 vrf vrf-name
|
Displays network layer reachability information associated with the specified VRF.
|
Router# show ip bgp vpnv4 vrf vrf-name ip-address
|
Displays network layer reachability information associated with the specified VRF and a specific connection.
|
Example 3-24 show ip bgp vpnv4 all Command
Router# show ip bgp vpnv4 all
BGP table version is 17, local router ID is 192.168.1.2
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal
Origin codes: i - IGP, e - EGP, ? - incomplete
Route Distinguisher: 100:1 (default for vrf vrf-1)
*>i10.1.1.0/24 192.168.1.1 0 100 0 101 ?
*>i172.16.1.100/30 192.168.1.1 0 100 0 ?
*> 172.16.1.116/30 0.0.0.0 0 32768 ?
*>i172.16.42.0/24 192.168.1.1 0 100 0 101 ?
*>i192.168.2.1/32 192.168.1.1 0 100 0 101 i
*> 192.168.5.1/32 172.16.1.118 0 0 202 i
Route Distinguisher: 200:1 (default for vrf vrf-2)
*>i172.16.2.100/30 192.168.1.1 0 100 0 ?
*> 172.16.2.116/30 0.0.0.0 0 32768 ?
Example 3-25 show ip bgp vpnv4 vrf vrf-name ip-address Command
Router# show ip bgp vpnv4 vrf vrf-1 172.16.2.116
BGP routing table entry for 200:1:172.16.2.116/30, version 7
Paths: (1 available, best #1, table vrf-1)
Advertised to non peer-group peers:
0.0.0.0 from 0.0.0.0 (102.168.1.2)
Origin incomplete, metric 0, localpref 100, weight 32768, valid, sourced
Extended Community: RT:200:1
Verifying the PE to CE Routing Protocol
If the CE router uses a routing protocol other than BGP (for example, RIP or OSPF), enter any of the following commands in privileged EXEC mode to verify the PE to CE routing sessions:
Command
|
Purpose
|
Router# show ip rip database vrf vrf-name
|
Displays summary address entries in the Routing Information Protocol (RIP) routing database for the specified VRF.
|
Router# show ip ospf [process-id [area-id]]
database
|
Displays lists of information related to the OSPF database for a specific router.
|
Note
The show ip rip database vrf and show ip ospf commands are useful for verifying the routing table from the CE router side of the connection and for determining if neighbors are missing from the routing table.
Verifying the MPLS VPN Labels
An MPLS VPN uses a transport label to identify the VRF and another label to identify the backbone. To verify the MPLS VPN labels, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# traceroute vrf vrf-name ip-address
|
Displays the transport addresses for the specified VRF. Ensure that the interfaces displayed are the correct cross-connect addresses.
|
Router# show ip bgp vpnv4 all tags
|
Displays the labels for a particular VRF.
|
Note
The traceroute vrf command works with an MPLS-aware traceroute, and only if the backbone ATM switch routers are configured to propagate and generate IP Time to Live (TTL) information.
Example 3-26 traceroute vrf Command
Router# traceroute vrf vrf-1 192.168.1.1
Type escape sequence to abort.
Tracing the route to 192.168.1.1
1 10.0.1.17 4 msec 0 msec 4 msec
2 10.0.1.101 0 msec 0 msec 0 msec
3 10.0.1.102 4 msec * 0 msec
Testing the VRF
To test the VRF to ensure that it is working properly, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# ping [protocol | tag] {host-name |
system-address}
|
Verifies basic network connectivity between neighbors.
|
Router# ping vrf vrf-name system-address
|
Tests network connectivity of the specified VRF from the PE router.
|
Example 3-27 ping vrf vrf-name system-address Command
Router# ping vrf vrf-1 192.168.6.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.6.1, timeout is 2 seconds:
Success rate is 100 percent (5/5), round-trip min/avg/max = 176/264/576 ms
Monitoring and Maintaining PPPoX to MPLS VPN
To monitor and maintain PPPoX to MPLS VPN environments, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show atm pvc ppp
|
Displays all ATM PVCs and PPPoA traffic information.
Note This command applies only to PPPoA sessions.
|
Router# show int virtual-access virtual access
interface #
|
Displays status, traffic data, and configuration information about a specified virtual access interface.
|
Router# show ip route vrf vrf-name
|
Displays the IP routing table associated with a VRF.
|
Router# show ip local pool
|
Displays statistics for any defined IP address pools.
|
Router# show vpdn session [all]
|
Displays information about active L2TP tunnel and message identifiers in a virtual private dialup network (VPDN).
Note This command applies to PPPoE sessions.
|
Router# show vpdn tunnel
|
Displays information about active L2TP tunnel and message identifiers in a VPDN.
Note This command applies to PPPoE sessions.
|
Router# debug aaa authentication
|
Displays information about AAA authentication.
|
Router# debug aaa authorization
|
Displays information about AAA authorization.
|
Router# debug ip peer
|
Displays address activity and contains additional output when pool groups are defined.
|
Router# debug ppp negotiation
|
Displays PPP packets transmitted during PPP startup where PPP options are negotiated.
|
Router# debug ppp authentication
|
Displays authentication protocol messages, including Challenge Authentication Protocol (CHAP) packet exchanges and Password Authentication Protocol (PAP) exchanges.
|
Router# debug radius
|
Displays information associated with the Remote Authentication Dial-In User (RADIUS) server.
|
Router# debug vpdn pppoe-events
|
Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established session to be closed.
|
Router# debug vtemplate
|
Displays cloning information for a virtual access interface from the time it is cloned from a virtual template to the time the virtual access interface comes down when the call ends.
|

Caution 
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Note
For more information, see the "Troubleshooting DSL Access to MPLS VPN Integration" chapter in the Troubleshooting Cisco Remote Access to MPLS VPN Integration, Release 2.0.
Monitoring and Maintaining RBE to MPLS VPN
To monitor and maintain RBE to MPLS VPN environments, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show atm map
|
Displays the list of all configured ATM static maps to remote hosts on an ATM network and on ATM bundle maps.
Note This command enables you to confirm the configuration of the map statements in a static map. This command is useful when an encapsulation failure occurs on a packet because a Layer 3 address could not be mapped to a corresponding Layer 2 address.
|
Router# show atm vc
|
Displays all ATM PVCs, SVCs, and traffic information.
|
Router# show interfaces atm interface
|
Displays information about the ATM interface.
|
Router# show ip arp vrf name
|
Displays the Address Resolution Protocol (ARP) cache associated with a VRF.
|
Router# show ip route vrf name
|
Displays the IP routing table associated with a VRF.
|
Router# debug ip packet
|
Displays general IP debugging information and IP security option (IPSO) security transactions.
Note This command is useful if the RFC 1483 PVC does not connect.
|
Router# debug ip dhcp
|
Displays information about DHCP client activities and the status of DHCP packets.
|
Router# debug ip dhcp server events
|
Reports server events, such as address assignments and database updates.
|
Router# debug ip dhcp server packet
|
Decodes DHCP receptions and transmissions.
|

Caution 
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Note
For more information, see the "Troubleshooting DSL Access to MPLS VPN Integration" chapter in the Troubleshooting Cisco Remote Access to MPLS VPN Integration, Release 2.0.