Layer 2 VPN Architectures

Layer 2 VPN Architectures

4.8 (5 ratings by Goodreads)
By (author)  , By (author)  , By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?

Description

A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications * Evaluate market drivers for Layer 2 VPNs * Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 * Grasp the essentials of Layer 2 LAN and WAN technologies * Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM * Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks * Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching * Understand the operation and application of Virtual Private LAN Services (VPLS) * Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems(R) now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco(R) Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability.show more

Product details

  • Paperback | 648 pages
  • 190 x 230 x 42mm | 1,301.8g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • black & white illustrations, black & white line drawings, black & white tables, figures
  • 1587058480
  • 9781587058486
  • 1,567,047

Back cover copy

A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applicationsEvaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems(R) now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco(R) Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. "Layer 2 VPN Architectures" is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability.show more

About Wei Luo

Wei Luo, CCIE No. 13,291, is a technical leader for Cisco Systems. He is the principle designer and developer for Cisco Layer 2 VPN products including AToM and VPLS. Wei actively participates in IETF standarization processes. Carlos Pignataro, CCIE No. 4619, is a senior engineer in the Escalation Team for Cisco Systems. In this role he is responsible for handling difficult and complex escalations, working on critical or stalled software defects, and participating in the new product and development process. Dmitry Bokotey, CCIE No. 4460, holds a quadruple CCIE title in the fields of Routing and Switching, ISP Dial, Security, and Service Provider. He is a network consulting engineer with the Central Engineering and Metro Ethernet team of Cisco Systems. Anthony Chan, CCIE No. 10,266, is a network consulting engineer for the Cisco System Advanced Services Central Engineering organization. Anthony participates in MPLS and routing technology teams, which provide focused design and proactive support to service provider and enterprise customers.show more

Table of contents

Introduction Part I Foundation Chapter 1 Understanding Layer 2 VPNs Understanding Traditional VPNs Legacy Layer 2 VPNs Layer 3 VPNs Challenges of Traditional VPNs Introducing Enhanced Layer 2 VPNs Summary Chapter 2 Pseudowire Emulation Framework and Standards Pseudowire Emulation Overview Network Reference Model Protocol Layer and System Architecture Native Service Processing Pseudowire Encapsulation Processing Transporting over the PSN Setting Up a Pseudowire Pseudowire Emulation Standardization IETF Working Groups Layer 2 VPN Architectures on Pseudowire Emulation draft-martini draft-kompella Other Layer 2 VPN Architectures Summary Chapter 3 Layer 2 VPN Architectures Legacy Layer 2 VPNs Frame Relay and ATM Data Link Switching Virtual Private Dial-Up Network Any Transport over MPLS Overview Using Label Stacking in AToM Layer 2 Protocols Supported by AToM Deciding Whether to Use AToM Existing Network Installation Base Advanced Network Services Interoperability Network Operation Complexity Layer 2 Tunnel Protocol Version 3 Overview L2TPv3 Operations Layer 2 Protocols Supported by L2TPv3 Deciding Whether to Use L2TPv3 Existing Network Installation Base Advanced Network Services Interoperability Network Operation Complexity Summary Part II Layer 2 Protocol Primer Chapter 4 LAN Protocols Ethernet Background and Encapsulation Overview Metro Ethernet Overview Metro Ethernet Service Architectures Understanding Spanning Tree Protocol Spanning-Tree Operation Overview Drawbacks of a Spanning-Tree Implementation in Today's Networks Pure Layer 2 Implementation 802.1q Tunneling 802.1q and 802.1p Tagging Understanding How 802.1q Tunneling Works 802.1q Tunneling Guidelines and Restrictions Summary Chapter 5 WAN Data-Link Protocols Introducing HDLC Encapsulation Introducing PPP Encapsulation Understanding Frame Relay Encapsulation Frame Relay Link Management Interface Protocol Status Enquiry Message Frame Status Message Frame Update Status Message Frame Comparing Gang of Four LMI with Annex A and Annex D Managing Traffic Frame Relay Traffic Policing Frame Relay Traffic Shaping Understanding ATM Encapsulation ATM Adaptation Layer ATM Cell Structure ATM Management Protocols: ILMI and OAM Managing Traffic ATM Traffic Policing ATM Traffic Shaping Summary Part III Any Transport over MPLS Chapter 6 Understanding Any Transport over MPLS Introducing the Label Distribution Protocol LDP Protocol Components Discovery Mechanisms LDP Basic Discovery LDP Extended Discovery Session Establishment Label Distribution and Management Label Binding LDP Advertisement Message Label Advertisement Mode Label Distribution Control Mode Label Retention Mode LDP Security Understanding AToM Operations Pseudowire Label Binding Establishing AToM Pseudowires Control Word Negotiation Using Sequence Numbers Pseudowire Encapsulation ATM Frame Relay HDLC PPP Ethernet Summary Chapter 7 LAN Protocols over MPLS Case Studies Understanding Ethernet over MPLS Technology EoMPLS Label Stack Packet Format MTU Size Requirements Supported VC Types Label Imposition Label Disposition EoMPLS Transport Case Studies Case Study 7-1: Router to Router-Port Based Configuring Port Transparency Verifying and Troubleshooting Port Transparency Operation Case Study 7-2: Router to Router-VLAN Based Configuring VLAN-Based EoMPLS on PE Routers Configuring VLAN-Based EoMPLS on CE Routers Verifying and Troubleshooting the Configuration Case Study 7-3: VLAN Rewrite Case Study 7-4: Switch to Switch-VLAN Based Configuring VLAN-Based EoMPLS on PEs Configuring VLAN-Based EoMPLS on the CE Switches Verifying and Troubleshooting the Configuration Case Study 7-5: Switch to Switch-Port Based Configuring Port-Based EoMPLS on the SanFran Switch Configuring Port-Based EoMPLS on the NewYork Switch Case Study 7-6: VLAN Rewrite in Cisco 12000 Series Routers Verifying and Troubleshooting the Configuration Port VLAN ID Inconsistency Issue Case Study 7-7: Map to Pseudowire Common Troubleshooting Techniques Troubleshooting EoMPLS on Routers Debugging EoMPLS Operation on PE Routers Troubleshooting EoMPLS on Switches Summary Chapter 8 WAN Protocols over MPLS Case Studies Setting Up WAN over MPLS Pseudowires Control Plane Pseudowire Types Used Data Plane Encapsulation Usage of the Control Word MTU Requirements Introducing WAN Protocols over MPLS HDLC over MPLS PPP over MPLS Frame Relay over MPLS ATM over MPLS Encapsulations and Packet Format for AAL5 Transport Encapsulations and Packet Format for Cell Transport Configuring WAN Protocols over MPLS Case Studies Case Study 8-1: HDLC over MPLS Configuring HDLCoMPLS Verifying HDLCoMPLS Troubleshooting HDLCoMPLS Case Study 8-2: PPP over MPLS Configuring PPPoMPLS Verifying and Troubleshooting PPPoMPLS Case Study 8-3: Frame Relay DLCI over MPLS Configuring Frame Relay DLCI over MPLS Verifying and Troubleshooting Frame Relay DLCI over MPLS Case Study 8-4: ATM AAL5 SDU over MPLS Configuring AAL5oMPLS Verifying and Troubleshooting AAL5oMPLS Case Study 8-5: ATM Cell over MPLS Configuring CRoMPLS Verifying CRoMPLS Advanced WAN AToM Case Studies Case Study 8-6: Decoding LDP Label Mapping and Pseudowire ID FEC Elements Case Study 8-7: AToM Hardware Capabilities Case Study 8-8: Packed Cell Relay over MPLS Configuring Cell Packing Verifying Cell Packing Configuration and Operation Case Study 8-9: Understanding Different ATM Transfer Modes AAL5 CPCS-SDU Mode Single Cell Relay Mode Packed Cell Relay Mode Summary Chapter 9 Advanced AToM Case Studies Load Sharing Case Study 9-1: Unequal-Cost Multipath Case Study 9-2: Equal-Cost Multipath Preferred Path Case Study 9-3: Configuring Preferred Path Using IP Routing Case Study 9-4: Configuring a Preferred Path Using MPLS Traffic Engineering Tunnels Case Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast Reroute Case Study 9-6: Configuring AToM Pseudowire over GRE Tunnel Pseudowire Emulation in Multi-AS Networks Case Study 9-7: Interconnecting Pseudowires with Dedicated Circuits Case Study 9-8: BGP IPv4 Label Distribution with IGP Redistribution Case Study 9-9: BGP IPv4 Label Distribution with IBGP Peering Case Study 9-10: Configuring LDP Authentication for Pseudowire Signaling Verifying Pseudowire Data Connectivity Case Study 9-11: Advertising the VCCV Capability Case Study 9-12: Verifying Data Plane Connectivity Quality of Service in AToM Case Study 9-13: Traffic Marking Case Study 9-14: Traffic Policing Case Study 9-15: Queuing and Shaping Case Study 9-16: Intermediate Markings Case Study 9-17: Layer 2-Specific Matching and Setting Ethernet over MPLS QoS Frame Relay over MPLS QoS ATM over MPLS QoS Summary Part IV Layer 2 Tunneling Protocol Version 3 Chapter 10 Understanding L2TPv3 Universal Transport Interface: L2TPv3's Predecessor Introducing L2TPv3 L2TPv3 Data Encapsulation Packet-Switched Network Layer Demultiplexing Sublayer Encapsulation Sublayer L2TPv3 Control Connection Control Message Encapsulation L2TPv3 Control Channel Signaling Summary Chapter 11 LAN Protocols over L2TPv3 Case Studies Introducing the L2TPv3 Configuration Syntax xconnect Command Syntax pseudowire-class Command Syntax l2tp-class Command Syntax LAN Protocols over L2TPv3 Case Studies Case Study 11-1: Ethernet Port-to-Port Manual Session Ethernet Port-to-Port Manual Configuration Verifying Ethernet Port-to-Port Manual Session Ethernet Port-to-Port L2TPv3 Data Plane Details Case Study 11-2: Ethernet Port-to-Port Manual Session with Keepalive Ethernet Port-to-Port Manual Session with Keepalive Configuration Ethernet Port-to-Port Manual Session with Keepalive Verification Ethernet Port-to-Port Manual Session with Keepalive Control Plane Details Case Study 11-3: Ethernet Port-to-Port Dynamic Session Ethernet Port-to-Port Dynamic Configuration Ethernet Port-to-Port Dynamic Session Verification Ethernet Port-to-Port Dynamic Session Control Plane Details Case Study 11-4: Ethernet VLAN-to-VLAN Dynamic Session Ethernet VLAN-to-VLAN Dynamic Configuration Ethernet VLAN-to-VLAN Dynamic Session Verification Ethernet VLAN-to-VLAN Dynamic Session Control Plane Details Ethernet VLAN-to-VLAN Frame Encapsulation Summary Chapter 12 WAN Protocols over L2TPv3 Case Studies WAN Protocols over L2TPv3 Technology Overview Control Plane Data Plane Using the Layer 2-Specific Sublayer MTU Considerations HDLC and PPP over L2TPv3 Frame Relay over L2TPv3 ATM over L2TPv3 Configuring WAN Protocols over L2TPv3 Case Studies Case Study 12-1: HDLC over L2TPv3 with Static Session Configuring HDLCoL2TPv3 Verifying HDLCoL2TPv3 Data Plane Details Case Study 12-2: PPP over L2TPv3 with Dynamic Session Configuring PPPoL2TPv3 Verifying PPPoL2TPv3 Control Plane Negotiation Data Plane Details Case Study 12-3: Frame Relay DLCI over L2TPv3 with Dynamic Session Configuring FRoL2TPv3 Verifying FRoL2TPv3 Data Plane Details Case Study 12-4: AAL5 SDU over L2TPv3 with Dynamic Session Configuring AAL5_SDUoL2TPv3 with Dynamic Session Verifying AAL5_SDUoL2TPv3 Control Plane Details Data Plane Details Case Study 12-5: ATM Cell Relay over L2TPv3 with Dynamic Session Configuring ATM_CRoL2TPv3 with Dynamic Session Verifying ATM_CRoL2TPv3 Cell Relay Details Summary Chapter 13 Advanced L2TPv3 Case Studies Case Study 13-1: L2TPv3 Path MTU Discovery The Problem: MTU and Fragmentation with L2TPv3 The Solution: Path MTU Discovery Understanding PMTUD Implementing PMTUD Combining PMTUD with DF Bit Advanced ATM Transport over L2TPv3 Case Study 13-2: ATM OAM Emulation Case Study 13-3: ATM Cell Packing Quality of Service Case Study 13-4: Traffic Marking ToS Setting ToS Reflection MQC IP Precedence or DSCP Setting Case Study 13-5: Traffic Policing Case Study 13-6: Queuing and Shaping Case Study 13-7: Layer 2-Specific Matching and Setting Summary Part V Additional Layer 2 VPN Architectures Chapter 14 Layer 2 Interworking and Local Switching Layer 2 Interworking Technology Overview Bridged Interworking Routed Interworking Interworking MTU Considerations Layer 2 Interworking Case Studies Ethernet (Bridged) Interworking Case Studies Case Study 14-1: Ethernet-to-VLAN Using AToM Case Study 14-2: Ethernet-to-VLAN Using L2TPv3 Case Study 14-3: ATM AAL5-to-VLAN Using AToM Ethernet-VLAN IW Switch Environment Considerations Routed Interworking Case Study 14-4: Frame Relay-to-VLAN Using AToM Case Study 14-5: Frame Relay-to-PPP Using L2TPv3 Case Study 14-6: IP L2-Transport MTU Considerations Case Study 14-7: Frame Relay-to-ATM Interworking Best Practices Layer 2 Local Switching Case Study 14-8: Frame Relay-to-Frame Relay Local Switching Case Study 14-9: ATM-to-ATM Local Switching Case Study 14-10: Ethernet-to-Ethernet Local Switching Layer 2 Local Switching with Interworking Case Study 14-11: Ethernet-to-VLAN Local Switching Case Study 14-12: ATM Attachment Circuits and Local Switching Understanding Advanced Interworking and Local Switching connect Command Encapsulation Encapsulation 1: Ethernet-to-VLAN Local Switching Ethernet IW Encapsulation 2: Frame Relay-to-VLAN IP IW Using AToM Encapsulation 3: VLAN-to-Ethernet Bridged IW Using L2TPv3 Encapsulation 4: Frame Relay-to-PPP IP-IW Using L2TPv3 Summary Chapter 15 Virtual Private LAN Service Understanding VPLS Fundamentals Service Definitions Virtual Switch VPLS Forwarding and Flooding VPLS Signaling VPLS Deployment Models Basic Topologic Models Full Mesh Hub and Spoke Partial Mesh Hierarchical VPLS Hierarchical VPLS with MPLS Access Network Hierarchical VPLS with QinQ Access Network VPLS Redundancy VPLS Configuration Case Studies Case Study 15-1: Basic Configuration Configuring Attachment Circuit Configuring VFI Associating Attachment Circuits to the VFI Configuration Example Case Study 15-2: Per-VLAN MAC Address Limiting Case Study 15-3: Quality of Service Case Study 15-4: Layer 2 Protocol Tunneling Case Study 15-5: Multihoming Summary Appendix L2TPv3 AVP Attribute Types Indexshow more

Rating details

5 ratings
4.8 out of 5 stars
5 80% (4)
4 20% (1)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X