Cisco IOS XR Software (End-of-Sale) Configuration Guide

Category
Networking
Type
Configuration Guide

This manual is also suitable for

L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500
Series Routers, IOS XR Release 6.3.x
First Published: 2017-09-01
Last Modified: 2018-03-01
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright ©1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
©2017–2018 Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface xi
PREFACE
Changes to This Document xi
Obtaining Documentation and Submitting a Service Request xi
New and Changed VPN Features 1
CHAPTER 1
New and Changed VPN Features 1
Configure Gigabit Ethernet for Layer 2 VPNs 5
CHAPTER 2
Introduction to Layer 2 Virtual Private Networks 5
Introduction to Layer 2 VPNs on Gigabit Ethernet Interfaces 6
Configure Gigabit Ethernet Interfaces for Layer 2 Transport 7
Configure Link Loss Forwarding for Layer 2 Transport 8
Ethernet Data Plane Loopback 9
Configure Ethernet Data Plane Loopback 10
Running Configuration 11
Verification 12
Related Topics 13
Associated Commands 13
Ethernet Local Management Interface (E-LMI) 13
E-LMI Messaging 14
E-LMI Operation 15
Configure Ethernet Local Management Interface (E-LMI) 15
Running Configuration 17
Verify the Ethernet Local Management Interface (E-LMI) Configuration 18
Configure Layer 2 Access Control Lists 21
CHAPTER 3
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
iii
Layer 2 Access Control Lists 21
Prerequisites for Configuring Layer 2 Access Control Lists 21
Layer 2 Access Control Lists Feature Highlights 22
Purpose of Layer 2 Access Control Lists 22
How a Layer 2 Access Control List Works 22
Layer 2 Access Control List Process and Rules 22
Create Layer 2 Access Control List 23
Restrictions for Configuring Layer 2 Access Control Lists 23
Configuration 23
Running Configuration 24
Verification 24
Configure Virtual LANs in Layer 2 VPNs 25
CHAPTER 4
Configure VLAN Sub-Interfaces 26
Introduction to Ethernet Flow Point 29
Identify Frames of an EFP 29
Apply Features 30
Define Data-Forwarding Behavior 31
Configure VLAN Header Rewrite 31
Valid Ingress Rewrite Actions 34
Valid Ingress-Egress Rewrite Combinations 35
L2CP Tunneling MEF 45
CHAPTER 5
L2CP Tunneling 45
Configure L2CP Tunneling 46
Configure Link Bundles for Layer 2 VPNs 47
CHAPTER 6
Configure Gigabit Ethernet Link Bundle 47
Configure VLAN Bundle 50
References for Configuring Link Bundles 51
Characteristics of Link Bundles 52
Methods of Forming Bundles of Ethernet Interfaces 52
Link Aggregation Through LACP 53
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
iv
Contents
Configure Multipoint Layer 2 Services 55
CHAPTER 7
Prerequisites for Implementing Multipoint Layer 2 Services 55
Information About Implementing Multipoint Layer 2 Services 56
Multipoint Layer 2 Services Overview 56
Bridge Domain 56
Pseudowires 56
Access Pseudowire is not supported over VPLS Bridge Domain 56
Virtual Forwarding Instance 57
VPLS for an MPLS-based Provider Core 57
VPLS for Layer 2 Switching 57
Interoperability Between Cisco IOS XR and Cisco IOS on VPLS LDP Signaling 58
MAC Address-related Parameters 58
MAC Address Flooding 58
MAC Address-based Forwarding 59
MAC Address Source-based Learning 59
MAC Address Aging 59
MAC Address Limit 59
MAC Address Withdrawal 60
Configuration Examples for Multipoint Layer 2 Services 60
Multipoint Layer 2 Services Configuration for Provider Edge-to-Provider Edge: Example 60
Multipoint Layer 2 Services Configuration for Provider Edge-to-Customer Edge: Example 61
Displaying MAC Address Withdrawal Fields: Example 61
Bridging on IOS XR Trunk Interfaces: Example 63
Bridging on Ethernet Flow Points: Example 67
Configure Point-to-Point Layer 2 Services 71
CHAPTER 8
Ethernet over MPLS 71
Ethernet Port Mode 71
VLAN Mode 72
Inter-AS Mode 73
QinQ Mode 73
QinAny Mode 74
Configure Local Switching Between Attachment Circuits 74
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
v
Contents
Flexible Cross-Connect Service 78
Flexible Cross-Connect Service - Single-Homed 79
Flexible Cross-Connect Service - Multi-Homed 79
Flexible Cross-Connect Service Supported Modes 80
VLAN Unaware 80
Configure Single-Homed Flexible Cross-Connect Service using VLAN Unaware 80
Configure Multi-Homed Flexible Cross-Connect Service using VLAN Unaware 82
VLAN Aware 85
Configure Single-Homed Flexible Cross-Connect using VLAN Aware 86
Configure Multi-Homed Flexible Cross-Connect Service using VLAN Aware 87
Local Switching 91
Configure Multi-Homed Flexible Cross-Connect Service using Local Switching 92
Configure Preferred Tunnel Path 94
Multisegment Pseudowire 95
Multisegment Pseudowire Redundancy 96
Configure Pseudowire Redundancy 97
EVPN Features 99
CHAPTER 9
EVPN Overview 99
EVPN Timers 100
EVPN Concepts 102
EVPN Operation 103
EVPN Route Types 104
Configure EVPN L2 Bridging Service 105
Running Configuration 106
Configure EVPN MAC Address Limit 106
EVPN Software MAC Learning 109
Configure EVPN Software MAC Learning 110
Supported Modes for EVPN Software MAC Learning 110
Single Home Device or Single Home Network Mode 111
Configure EVPN in Single Home Device or Single Home Network Mode 111
Dual Home Device—All-Active Load Balancing Mode 112
Configure EVPN Software MAC Learning in Dual Home Device—All-Active Mode 113
Verify EVPN Software MAC Learning 115
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
vi
Contents
EVPN Out of Service 117
Configure EVPN Out of Service 118
Running Configuration 118
EVPN Multiple Services per Ethernet Segment 120
Configure EVPN Multiple Services per Ethernet Segment 121
Configuration Example 121
Running Configuration 123
Associated Commands 126
EVPN Routing Policy 126
EVPN Route Types 127
EVPN RPL Attribute 131
EVPN RPL Attribute Set 133
Configure EVPN RPL Feature 134
Running Configuration 135
Configure EVPN IRB 143
CHAPTER 10
EVPN IRB 143
EVPN Single-Homing Access Gateway 144
EVPN Multihoming All-Active 145
Enable Auto-BGP RT with Manual ESI Configuration 146
Supported EVPN IRB Scenarios 146
Distributed Anycast Gateway 146
EVPN IRB with All-Active Multi-Homing without Subnet Stretch or Host-Routing across the Fabric
147
EVPN IRB with All-Active Multihoming with Subnet Stretch or Host-Routing across the Fabric
147
MAC and IP Unicast Control Plane 148
Intra-subnet Unicast Data Plane 149
Inter-subnet Unicast Data Plane 149
VM Mobility Support 149
MAC and MAC-IP Sequence Numbers 150
Synchronized MAC and MAC-IP Sequence Numbers 150
Local Sequence Number Updates 150
Best Route Selection after Host Movement 150
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
vii
Contents
Stale Route Deletion after a Host Movement 150
Host Movement Detection through GARP 151
Host Move Detection with Silent Host 151
Host Move Detection without GARP with Data Packet 151
Duplicate MAC Detection 151
Configuring EVPN IRB 151
Running Configuration for EVPN IRB 153
Verify EVPN IRB 154
EVPN IPv6 Hosts with Mobility 164
Configure EVPN IPv6 Hosts with Mobility 165
EVPN Automatic Unfreezing of MAC and IP Addresses 175
EVPN Virtual Private Wire Service (VPWS) 177
CHAPTER 11
EVPN-VPWS Single Homed 177
Configure EVPN-VPWS Single Homed 178
Running Configuration 178
EVPN-VPWS Multi-Homed 179
Configure EVPN-VPWS Multi-Homed 179
Running Configuration 181
L2VPN Services over Segment Routing for Traffic Engineering Policy 183
CHAPTER 12
EVPN VPWS Preferred Path over SR-TE Policy 184
Configure EVPN VPWS Preferred Path over SR-TE Policy 185
Configure Prefix-SID in ISIS 185
Configure Adjacency-SID in ISIS 187
Configure Segment-list 189
Configure SR-TE Policy 189
Configure EVPN VPWS over SR-TE Policy 190
Running Configuration 191
Verify EVPN VPWS Preferred Path over SR-TE Policy Configuration 195
Associated Commands 196
Related Topics 196
L2VPN VPWS Preferred Path over SR-TE Policy 197
Configure L2VPN VPWS Preferred Path over SR-TE Policy 197
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
viii
Contents
Configure Prefix-SID in IS-IS 197
Configure Adjacency-SID in IS-IS 199
Configure Segment-list 200
Configure SR-TE Policy 201
Configure VPWS over SR-TE Policy 202
Running Configuration 203
Verify L2VPN VPWS Preferred Path over SR-TE Policy Configuration 207
Associated Commands 209
Related Topics 209
EVPN VPWS On-Demand Next Hop with SR-TE 209
Configure EVPN VPWS On Demand Next Hop with SR-TE 210
Topology 210
Configure Prefix-SID in ISIS 211
Configure SR-TE 212
Configure PCE and PCC 213
Configure SR Color 214
Configure EVPN Route Policy 214
Configure BGP 215
Configure EVPN VPWS 216
Configure Flexible Cross-connect Service (FXC) VLAN-unaware 216
Running Configuration 217
Related Topics 223
Overview of Segment Routing 224
How Segment Routing Works 224
Segment Routing Global Block 225
Configure BPDU Transparency with MACsec 227
CHAPTER 13
Layer 2 Control Plane Tunneling in MACsec 227
MACsec and MKA Overview 227
L2CP Tunneling 228
L2CP Tunneling in MACsec 228
Configuration 228
Running Configuration 230
Verification 231
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
ix
Contents
References 235
CHAPTER 14
Gigabit Ethernet Protocol Standards 235
Carrier Ethernet Model References 235
Default Configuration Values for Gigabit Ethernet and 10-Gigabit Ethernet 237
References for Configuring Link Bundles 238
Characteristics of Link Bundles 238
Methods of Forming Bundles of Ethernet Interfaces 239
Link Aggregation Through LACP 239
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
x
Contents
Preface
This product has reached end-of-life status. For more information, see the End-of-Life and End-of-Sale Notices.
This preface contains these sections:
•Changes to This Document, on page xi
•Obtaining Documentation and Submitting a Service Request, on page xi
Changes to This Document
This table lists the technical changes made to this document since it was first released.
Table 1: Changes to This Document
SummaryDate
Initial release of this document.September 2017
Republished for Release 6.3.2.March 2018
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information,
see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco
technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
xi
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
xii
Preface
Obtaining Documentation and Submitting a Service Request
CHAPTER 1
New and Changed VPN Features
This table summarizes the new and changed feature information for the L2VPN and Ethernet Services
Configuration Guide for Cisco NCS 5500 Series Routers, and tells you where they are documented.
•New and Changed VPN Features, on page 1
New and Changed VPN Features
Table 2: VPN Features Added or Modified in IOS XR Release 6.3.x
Where DocumentedChanged in ReleaseDescriptionFeature
Ethernet Data Plane
Loopback, on page 9
Release 6.3.1The Ethernet Data Plane
Loopback feature
provides a means for
remotely testing the
throughput of an Ethernet
port.
Ethernet Data Plane
Loopback
Ethernet Local
Management Interface
(E-LMI), on page 13
Release 6.3.1The Cisco NCS 5500
Series Router supports the
Ethernet Local
Management Interface
(E-LMI) protocol as
defined by the Metro
Ethernet Forum,
Technical Specification
MEF 16, Ethernet Local
Management Interface
(E-LMI), January 2006
standard.
Ethernet Local
Management Interface
(E-LMI)
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
1
Where DocumentedChanged in ReleaseDescriptionFeature
L2CP Tunneling MEF, on
page 45
Release 6.3.1Layer 2 Control Protocol
Tunneling (L2PT) is a
Cisco proprietary protocol
for tunneling Ethernet
protocol frames across
layer 2 switching
domains. The system
supports the following
tunnel protocols:
L2CP Tunneling
EVPN IPv6 Hosts with
Mobility, on page 164
Release 6.3.2EVPN IPv6 Hosts with
Mobility feature enables
you to provide EVPN
IPv6 service over
IPv4-MPLS core network.
EVPN IPv6 Hosts with
Mobility
EVPN Multiple Services
per Ethernet Segment, on
page 120
Release 6.3.2EVPN Multiple Services
per Ethernet Segment
(ES) feature allows you to
configure multiple
services over single ES.
EVPN Multiple Services
per Ethernet Segment
EVPN VPWS
On-Demand Next Hop
with SR-TE, on page 209
Release 6.3.2The EVPN VPWS
On-Demand Next Hop
with SR-TE feature
enables you to fetch the
best path to send traffic
from the source to
destination in a
point-to-point service
using IOS XR Traffic
Controller (XTC).
EVPN VPWS On
Demand Next Hop with
SR-TE
EVPN VPWS Preferred
Path over SR-TE Policy,
on page 184
Release 6.3.2EVPN VPWS Preferred
Path over SR-TE Policy
feature allows you to set
the preferred path between
the two end points for
EVPN VPWS pseudowire
(PW) using SR-TE policy.
EVPN VPWS Preferred
Path over SR-TE Policy
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
2
New and Changed VPN Features
New and Changed VPN Features
Where DocumentedChanged in ReleaseDescriptionFeature
L2VPN VPWS Preferred
Path over SR-TE Policy,
on page 197
Release 6.3.2L2VPN VPLS or VPWS
Preferred Path over
SR-TE Policy feature
allows you to set the
preferred path between the
two end-points for
L2VPN Virtual Private
LAN Service (VPLS) or
Virtual Private Wire
Service (VPWS) using
SR-TE policy.
L2VPN VPLS or VPWS
Preferred Path over
SR-TE Policy
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
3
New and Changed VPN Features
New and Changed VPN Features
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
4
New and Changed VPN Features
New and Changed VPN Features
CHAPTER 2
Configure Gigabit Ethernet for Layer 2 VPNs
This chapter introduces you to Layer 2 features and standards, and describes how you can configure L2VPN
features.
The distributed Gigabit Ethernet (including 10-Gigabit and 100-Gigabit) architecture and features deliver
network scalability and performance, while enabling service providers to offer high-density, high-bandwidth
networking solutions designed to interconnect the router with other systems in POPs, including core and edge
routers and Layer 2 and Layer 3 switches.
•Introduction to Layer 2 Virtual Private Networks, on page 5
•Introduction to Layer 2 VPNs on Gigabit Ethernet Interfaces, on page 6
•Configure Gigabit Ethernet Interfaces for Layer 2 Transport, on page 7
•Configure Link Loss Forwarding for Layer 2 Transport, on page 8
•Ethernet Data Plane Loopback, on page 9
•Ethernet Local Management Interface (E-LMI), on page 13
•E-LMI Messaging, on page 14
•E-LMI Operation, on page 15
•Configure Ethernet Local Management Interface (E-LMI) , on page 15
Introduction to Layer 2 Virtual Private Networks
A Layer 2 Virtual Private Network (VPN) emulates a physical sub-network in an IP or MPLS network, by
creating private connections between two points. Building a L2VPN network requires coordination between
the service provider and customer. The service provider establishes Layer 2 connectivity. The customer builds
a network by using the data link resources obtained from the service provider. In a L2VPN service, the service
provider does not require information about the customer's network topology and other information. This
helps maintain customer privacy, while using the service provider resources to establish the network.
The service provider requires Provider Edge (PE) routers with the following capabilities:
• Encapsulation of L2 protocol data units (PDU) into Layer 3 (L3) packets.
• Interconnection of any-to-any L2 transports.
• Support for MPLS tunneling mechanism.
• Process databases that include all information related to circuits and their connections.
This section introduces Layer 2 Virtual Private Networks (VPNs) and the corresponding Gigabit Ethernet
services.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
5
Introduction to Layer 2 VPNs on Gigabit Ethernet Interfaces
A L2VPN network enables service providers (SPs) to provide L2 services to geographically disparate customer
sites. Typically, a SP uses an access network to connect the customer to the core network. This access network
may use a mixture of L2 technologies, such as Ethernet and Frame Relay. The connection between the customer
site and the nearby SP edge router is known as an attachment circuit (AC). Traffic from the customer travels
over this link to the edge of the SP core network. The traffic then tunnels through a pseudowire over the SP
core network to another edge router. The edge router sends the traffic down another AC to the customer's
remote site.
The L2VPN feature enables the connection between different types of L2 attachment circuits and pseudowires,
allowing users to implement different types of end-to-end services.
BOOTP traffic (dst UDP 68) over any type of pseudowire is unsupported.
Note
Cisco IOS XR software supports a point-to-point end-to-end service, where two Ethernet circuits are connected
together. An L2VPN Ethernet port can operate in one of two modes:
• Port Mode—In this mode, all packets reaching the port are sent over the pseudowire, regardless of any
VLAN tags that are present on the packets. In Port mode, the configuration is performed under the
l2transport configuration mode.
• VLAN Mode—Each VLAN on a CE (customer edge) or access network to PE (provider edge) link can
be configured as a separate L2VPN connection (using either VC type 4 or VC type 5). To configure
L2VPN on VLANs, see The Carrier Ethernet Model chapter in this manual. In VLAN mode, the
configuration is performed under the individual sub-interface.
Switching can take place in the following ways:
• AC-to-PW—Traffic reaching the PE is tunneled over a PW (pseudowire) (and conversely, traffic arriving
over the PW is sent out over the AC). This is the most common scenario.
• Local switching—Traffic arriving on one AC is immediately sent out of another AC without passing
through a pseudowire.
• PW stitching—Traffic arriving on a PW is not sent to an AC, but is sent back into the core over another
PW.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
6
Configure Gigabit Ethernet for Layer 2 VPNs
Introduction to Layer 2 VPNs on Gigabit Ethernet Interfaces
• If your network requires that packets are transported transparently, you may need to modify the packet’s
destination MAC (Media Access Control) address at the edge of the Service Provider (SP) network. This
prevents the packet from being consumed by the devices in the SP network.
• The encapsulation dot1ad vlan-id and encapsulation dot1ad vlan-id dot1q any commands cannot
co-exist on the same physical interface or bundle interface. Similarly, the encapsulation dot1q vlan-id
and encap dot1q vlan-id second-dot1q any commands cannot co-exist on the same physical interface
or bundle interface. If there is a need to co-exist, it is recommended to use the exact keyword in the single
tag encapsulation. For example, encap dot1ad vlan-id exact or encap dot1q vlan-id exact.
•In an interface which already has QinQ configuration, you cannot configure the QinQ Range sub-interface
where outer VLAN range of QinQ Range overlaps with outer VLAN of QinQ. Attempting this
configuration results in the splitting of the existing QinQ and QinQ Range interfaces. However, the
system can be recovered by deleting a recently configured QinQ Range interface.
• In an interface which already has QinQ Range configuration, you cannot configure the QinQ Range
sub-interface where outer VLAN range of QinQ Range overlaps with inner VLAN of QinQ Range.
Attempting this configuration results in the splitting of the existing QinQ and QinQ Range interfaces.
However, the system can be recovered by deleting a recently configured QinQ Range interface.
Note
You can use the show interfaces command to display AC and pseudowire information.
Configure Gigabit Ethernet Interfaces for Layer 2 Transport
This section describes how you can configure Gigabit ethernet interfaces for Layer 2 transport.
Configuration Example
/* Enter the interface configuration mode */
Router# configure
Router(config)# interface TenGigE 0/0/0/10
/* Configure the ethertype for the 802.1q encapsulation (optional) */
/* For VLANs, the default ethertype is 0x8100. In this example, we configure a value of
0x9100.
/* The other assignable value is 0x9200 */
/* When ethertype is configured on a physical interface, it is applied to all sub-interfaces
created on this interface */
Router(config-if)# dot1q tunneling ethertype 0x9100
/* Configure Layer 2 transport on the interface, and commit your configuration */
Router(config-if)# l2transport
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# commit
Running Configuration
configure
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
7
Configure Gigabit Ethernet for Layer 2 VPNs
Configure Gigabit Ethernet Interfaces for Layer 2 Transport
interface TenGigE 0/0/0/10
dot1q tunneling ethertype 0x9100
l2transport
!
Verification
Verify that the Ten-Gigabit Ethernet interface is up and operational.
router# show interfaces TenGigE 0/0/0/10
...
TenGigE0/0/0/10 is up, line protocol is up
Interface state transitions: 1
Hardware is TenGigE, address is 0011.1aac.a05a (bia 0011.1aac.a05a)
Layer 1 Transport Mode is LAN
Layer 2 Transport Mode
MTU 1514 bytes, BW 10000000 Kbit (Max: 10000000 Kbit)
reliability 255/255, txload 0/255, rxload 0/255
Encapsulation ARPA,
Full-duplex, 10000Mb/s, link type is force-up
output flow control is off, input flow control is off
Carrier delay (up) is 10 msec
loopback not set,
...
Associated Commands
•l2transport (Ethernet)
Configure Link Loss Forwarding for Layer 2 Transport
Link Loss Forwarding (LLF) is supported on Cisco router. The LLF is used to avoid any packet loss and
trigger the network convergence through alternate links.
LLF sends signals across the PW to the neighbouring device to bring the PW and far-end AC down if the
local AC goes down. The LLF feature supports the l2transport propagate remote-status command used to
propagate Layer 2 transport events.
LLF is supported for TenGigE and GigE interfaces and not supported on the Bundle interfaces.
• Link Loss Forwarding (LLF) does not function on a 1GE copper SFP, irrespective of whether
auto-negotiation is enabled or disabled.
• LLF does not function on a 1 GE fiber SFP, when auto-negotiation is enabled. LLF functions only when
auto-negotiation is disabled on the 1 GE fiber SFP.
Note
Running Configuration
/* Configuring propagation remote-status */
interface TenGigE 0/0/0/5
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5500 Series Routers, IOS XR Release 6.3.x
8
Configure Gigabit Ethernet for Layer 2 VPNs
Configure Link Loss Forwarding for Layer 2 Transport
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252

Cisco IOS XR Software (End-of-Sale) Configuration Guide

Category
Networking
Type
Configuration Guide
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI