- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applicationsEvaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems (R) now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco (R) Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs.Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability.
Contents
IntroductionPart I FoundationChapter 1 Understanding Layer 2 VPNsUnderstanding Traditional VPNsLegacy Layer 2 VPNsLayer 3 VPNsChallenges of Traditional VPNsIntroducing Enhanced Layer 2 VPNsSummaryChapter 2 Pseudowire Emulation Framework and StandardsPseudowire Emulation OverviewNetwork Reference ModelProtocol Layer and System ArchitectureNative Service ProcessingPseudowire Encapsulation ProcessingTransporting over the PSNSetting Up a PseudowirePseudowire Emulation StandardizationIETF Working GroupsLayer 2 VPN Architectures on Pseudowire Emulationdraft-martinidraft-kompellaOther Layer 2 VPN ArchitecturesSummaryChapter 3 Layer 2 VPN ArchitecturesLegacy Layer 2 VPNsFrame Relay and ATMData Link SwitchingVirtual Private Dial-Up NetworkAny Transport over MPLS OverviewUsing Label Stacking in AToMLayer 2 Protocols Supported by AToMDeciding Whether to Use AToMExisting Network Installation BaseAdvanced Network ServicesInteroperabilityNetwork Operation ComplexityLayer 2 Tunnel Protocol Version 3 OverviewL2TPv3 OperationsLayer 2 Protocols Supported by L2TPv3Deciding Whether to Use L2TPv3Existing Network Installation BaseAdvanced Network ServicesInteroperabilityNetwork Operation ComplexitySummaryPart II Layer 2 Protocol PrimerChapter 4 LAN ProtocolsEthernet Background and Encapsulation OverviewMetro Ethernet OverviewMetro Ethernet Service ArchitecturesUnderstanding Spanning Tree ProtocolSpanning-Tree Operation OverviewDrawbacks of a Spanning-Tree Implementation in Today's Networks Pure Layer 2 Implementation 802.1q Tunneling 802.1q and 802.1p Tagging Understanding How 802.1q Tunneling Works 802.1q Tunneling Guidelines and Restrictions Summary Chapter 5 WAN Data-Link ProtocolsIntroducing HDLC EncapsulationIntroducing PPP EncapsulationUnderstanding Frame RelayEncapsulationFrame Relay Link Management Interface ProtocolStatus Enquiry Message FrameStatus Message FrameUpdate Status Message FrameComparing Gang of Four LMI with Annex A and Annex DManaging TrafficFrame Relay Traffic PolicingFrame Relay Traffic ShapingUnderstanding ATMEncapsulationATM Adaptation LayerATM Cell StructureATM Management Protocols: ILMI and OAMManaging TrafficATM Traffic PolicingATM Traffic ShapingSummaryPart III Any Transport over MPLSChapter 6 Understanding Any Transport over MPLSIntroducing the Label Distribution ProtocolLDP Protocol ComponentsDiscovery MechanismsLDP Basic DiscoveryLDP Extended DiscoverySession EstablishmentLabel Distribution and ManagementLabel BindingLDP Advertisement MessageLabel Advertisement ModeLabel Distribution Control ModeLabel Retention ModeLDP SecurityUnderstanding AToM OperationsPseudowire Label BindingEstablishing AToM PseudowiresControl Word NegotiationUsing Sequence NumbersPseudowire EncapsulationATMFrame RelayHDLCPPPEthernetSummaryChapter 7 LAN Protocols over MPLS Case StudiesUnderstanding Ethernet over MPLS TechnologyEoMPLS Label StackPacket FormatMTU Size RequirementsSupported VC TypesLabel ImpositionLabel DispositionEoMPLS Transport Case StudiesCase Study 7-1: Router to Router-Port BasedConfiguring Port TransparencyVerifying and Troubleshooting Port Transparency OperationCase Study 7-2: Router to Router-VLAN BasedConfiguring VLAN-Based EoMPLS on PE RoutersConfiguring VLAN-Based EoMPLS on CE RoutersVerifying and Troubleshooting the ConfigurationCase Study 7-3: VLAN RewriteCase Study 7-4: Switch to Switch-VLAN BasedConfiguring VLAN-Based EoMPLS on PEsConfiguring VLAN-Based EoMPLS on the CE SwitchesVerifying and Troubleshooting the ConfigurationCase Study 7-5: Switch to Switch-Port BasedConfiguring Port-Based EoMPLS on the SanFran SwitchConfiguring Port-Based EoMPLS on the NewYork SwitchCase Study 7-6: VLAN Rewrite in Cisco 12000 Series RoutersVerifying and Troubleshooting the ConfigurationPort VLAN ID Inconsistency IssueCase Study 7-7: Map to PseudowireCommon Troubleshooting TechniquesTroubleshooting EoMPLS on RoutersDebugging EoMPLS Operation on PE RoutersTroubleshooting EoMPLS on SwitchesSummaryChapter 8 WAN Protocols over MPLS Case StudiesSetting Up WAN over MPLS PseudowiresControl PlanePseudowire Types UsedData Plane EncapsulationUsage of the Control WordMTU RequirementsIntroducing WAN Protocols over MPLSHDLC over MPLSPPP over MPLSFrame Relay over MPLSATM over MPLSEncapsulations and Packet Format for AAL5 TransportEncapsulations and Packet Format for Cell TransportConfiguring WAN Protocols over MPLS Case StudiesCase Study 8-1: HDLC over MPLSConfiguring HDLCoMPLSVerifying HDLCoMPLSTroubleshooting HDLCoMPLSCase Study 8-2: PPP over MPLSConfiguring PPPoMPLSVerifying and Troubleshooting PPPoMPLSCase Study 8-3: Frame Relay DLCI over MPLSConfiguring Frame Relay DLCI over MPLSVerifying and Troubleshooting Frame Relay DLCI over MPLSCase Study 8-4: ATM AAL5 SDU over MPLSConfiguring AAL5oMPLSVerifying and Troubleshooting AAL5oMPLSCase Study 8-5: ATM Cell over MPLSConfiguring CRoMPLSVerifying CRoMPLSAdvanced WAN AToM Case StudiesCase Study 8-6: Decoding LDP Label Mapping and Pseudowire ID FEC ElementsCase Study 8-7: AToM Hardware CapabilitiesCase Study 8-8: Packed Cell Relay over MPLSConfiguring Cell PackingVerifying Cell Packing Configuration and OperationCase Study 8-9: Understanding Different ATM Transfer ModesAAL5 CPCS-SDU ModeSingle Cell Relay ModePacked Cell Relay ModeSummaryChapter 9 Advanced AToM Case StudiesLoad SharingCase Study 9-1: Unequal-Cost MultipathCase Study 9-2: Equal-Cost MultipathPreferred PathCase Study 9-3: Configuring Preferred Path Using IP RoutingCase Study 9-4: Configuring a Preferred Path Using MPLS Traffic Engineering TunnelsCase Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast RerouteCase Study 9-6: Configuring AToM Pseudowire over GRE TunnelPseudowire Emulation in Multi-AS NetworksCase Study 9-7: Interconnecting Pseudowires with Dedicated CircuitsCase Study 9-8: BGP IPv4 Label Distribution with IGP RedistributionCase Study 9-9: BGP IPv4 Label Distribution with IBGP PeeringCase Study 9-10: Configuring LDP Authentication for Pseudowire SignalingVerifying Pseudowire Data ConnectivityCase Study 9-11: Advertising the VCCV CapabilityCase Study 9-12: Verifying Data Plane ConnectivityQuality of Service in AToMCase Study 9-13: Traffic MarkingCase Study 9-14: Traffic PolicingCase Study 9-15: Queuing and ShapingCase Study 9-16: Intermediate MarkingsCase Study 9-17: Layer 2-Specific Matching and SettingEthernet over MPLS QoSFrame Relay over MPLS QoSATM over MPLS QoSSummaryPart IV Layer 2 Tunneling Protocol Version 3Chapter 10 Understanding L2TPv3Universal Transport Interface: L2TPv3's PredecessorIntroducing L2TPv3L2TPv3 Data EncapsulationPacket-Switched Network LayerDemultiplexing SublayerEncapsulation SublayerL2TPv3 Control ConnectionControl Message EncapsulationL2TPv3 Control Channel SignalingSummaryChapter 11 LAN Protocols over L2TPv3 Case StudiesIntroducing the L2TPv3 Configuration Syntaxxconnect Command Syntaxpseudowire-class Command Syntaxl2tp-class Command SyntaxLAN Protocols over L2TPv3 Case StudiesCase Study 11-1: Ethernet Port-to-Port Manual SessionEthernet Port-to-Port Manual ConfigurationVerifying Ethernet Port-to-Port Manual SessionEthernet Port-to-Port L2TPv3 Data Plane DetailsCase Study 11-2: Ethernet Port-to-Port Manual Session with KeepaliveEthernet Port-to-Port Manual Session with Keepalive ConfigurationEthernet Port-to-Port Manual Session with Keepalive VerificationEthernet Port-to-Port Manual Session with Keepalive Control Plane DetailsCase Study 11-3: Ethernet Port-to-Port Dynamic SessionEthernet Port-to-Port Dynamic ConfigurationEthernet Port-to-Port Dynamic Session VerificationEthernet Port-to-Port Dynamic Session Control Plane DetailsCase Study 11-4: Ethernet VLAN-to-VLAN Dynamic SessionEthernet VLAN-to-VLAN Dynamic ConfigurationEthernet VLAN-to-VLAN Dynamic Session VerificationEthernet VLAN-to-VLAN Dynamic Session Control Plane DetailsEthernet VLAN-to-VLAN Frame EncapsulationSummaryChapter 12 WAN Protocols over L2TPv3 Case StudiesWAN Protocols over L2TPv3 Technology OverviewControl PlaneData PlaneUsing the Layer 2-Specific SublayerMTU ConsiderationsHDLC and PPP over L2TPv3Frame Relay over L2TPv3ATM over L2TPv3Configuring WAN Protocols over L2TPv3 Case StudiesCase Study 12-1: HDLC over L2TPv3 with Static SessionConfiguring HDLCoL2TPv3Verifying HDLCoL2TPv3Data Plane DetailsCase Study 12-2: PPP over L2TPv3 with Dynamic SessionConfiguring PPPoL2TPv3Verifying PPPoL2TPv3Control Plane NegotiationData Plane DetailsCase Study 12-3: Frame Relay DLCI over L2TPv3 with Dynamic SessionConfiguring FRoL2TPv3Verifying FRoL2TPv3Data Plane DetailsCase Study 12-4: AAL5 SDU over L2TPv3 with Dynamic SessionConfiguring AAL5_SDUoL2TPv3 with Dynamic SessionVerifying AAL5_SDUoL2TPv3Control Plane DetailsData Plane DetailsCase Study 12-5: ATM Cell Relay over L2TPv3 with Dynamic SessionConfiguring ATM_CRoL2TPv3 with Dynamic SessionVerifying ATM_CRoL2TPv3Cell Relay DetailsSummaryChapter 13 Advanced L2TPv3 Case StudiesCase Study 13-1: L2TPv3 Path MTU DiscoveryThe Problem: MTU and Fragmentation with L2TPv3The Solution: Path MTU DiscoveryUnderstanding PMTUDImplementing PMTUDCombining PMTUD with DF BitAdvanced ATM Transport over L2TPv3Case Study 13-2: ATM OAM EmulationCase Study 13-3: ATM Cell PackingQuality of ServiceCase Study 13-4: Traffic MarkingToS SettingToS ReflectionMQC IP Precedence or DSCP SettingCase Study 13-5: Traffic PolicingCase Study 13-6: Queuing and ShapingCase Study 13-7: Layer 2-Specific Matching and SettingSummaryPart V Additional Layer 2 VPN ArchitecturesChapter 14 Layer 2 Interworking and Local SwitchingLayer 2 Interworking Technology OverviewBridged InterworkingRouted InterworkingInterworking MTU ConsiderationsLayer 2 Interworking Case StudiesEthernet (Bridged) Interworking Case StudiesCase Study 14-1: Ethernet-to-VLAN Using AToMCase Study 14-2: Ethernet-to-VLAN Using L2TPv3Case Study 14-3: ATM AAL5-to-VLAN Using AToMEthernet-VLAN IW Switch Environment ConsiderationsRouted InterworkingCase Study 14-4: Frame Relay-to-VLAN Using AToMCase Study 14-5: Frame Relay-to-PPP Using L2TPv3Case Study 14-6: IP L2-Transport MTU ConsiderationsCase Study 14-7: Frame Relay-to-ATM Interworking Best PracticesLayer 2 Local SwitchingCase Study 14-8: Frame Relay-to-Frame Relay Local SwitchingCase Study 14-9: ATM-to-ATM Local SwitchingCase Study 14-10: Ethernet-to-Ethernet Local SwitchingLayer 2 Local Switching with InterworkingCase Study 14-11: Ethernet-to-VLAN Local SwitchingCase Study 14-12: ATM Attachment Circuits and Local SwitchingUnderstanding Advanced Interworking and Local Switchingconnect CommandEncapsulationEncapsulation 1: Ethernet-to-VLAN Local Switching Ethernet IWEncapsulation 3: VLAN-to-Ethernet Bridged IW Using L2TPv3Encapsulation 4: Frame Relay-to-PPP IP-IW Using L2TPv3SummaryChapter 15 Virtual Private LAN ServiceUnderstanding VPLS FundamentalsService DefinitionsVirtual SwitchVPLS Forwarding and FloodingVPLS SignalingVPLS Deployment ModelsBasic Topologic ModelsFull MeshHub and SpokePartial MeshHierarchical VPLSHierarchical VPLS with MPLS Access NetworkHierarchical VPLS with QinQ Access NetworkVPLS RedundancyVPLS Configuration Case StudiesCase Study 15-1: Basic ConfigurationConfiguring Attachment CircuitConfiguring VFIAssociating Attachment Circuits to the VFIConfiguration ExampleCase Study 15-2: Per-VLAN MAC Address LimitingCase Study 15-3: Quality of ServiceCase Study 15-4: Layer 2 Protocol TunnelingCase Study 15-5: MultihomingSummaryAppendix L2TPv3 AVP Attribute TypesIndex