
- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Service Provider Networks
- •Scalability
- •Traffic Engineering
- •Quality of Service
- •MPLS Label Stack
- •Shim Header
- •MPLS Architecture
- •Control
- •Forwarding
- •MPLS Label Switching
- •MPLS Network Components
- •Device Output
- •Label-Switched Paths
- •MPLS Applications
- •MPLS and ATM
- •Overlay
- •Quality of Service
- •Traffic Engineering
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Routing Review
- •Frame-Mode MPLS Working Example
- •Network Routing Protocol Examples
- •MPLS Step by Step
- •Label Distribution
- •Assigning Labels
- •Troubleshooting and Verification
- •Device Configuration
- •IGP Verification
- •CEF Verification
- •MPLS Verification
- •Label Distribution and Bindings
- •Binding Verification
- •Troubleshooting the Network
- •Hiding Service Provider Devices
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Frame-Mode MPLS and ATM
- •Frame-Mode MPLS and ATM Configuration
- •Cell-Mode MPLS
- •Label Binding with ATM
- •Cell-Mode Label Switching
- •VC Merge
- •Loop Prevention
- •Cell-Mode MPLS Configuration
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •VPNs 101
- •Point-to-Point Connections
- •Virtual Private Networks
- •Categories of VPNs
- •VPN Routing
- •Peer-to-Peer VPNs
- •Optimal Routing
- •Peer-to-Peer Security
- •Peer-to-Peer VPN Routing
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Service Provider Configuration
- •MPLS VPNs
- •Virtual Router
- •Virtual Routing and Forwarding Tables
- •MPLS Operational Overview
- •MP-BGP Configuration
- •An MPLS VPN Example
- •Route Distinguisher
- •MP-IBGP Configuration Example
- •Initial Network Configuration
- •MP-IBGP Configuration
- •Verification
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •A Review of VPNs
- •Configuring a Simple MPLS VPN
- •Configuring VRF Interfaces
- •Running RIP in an MPLS VPN
- •Configuring RIPv2 with Address-Family ipv4
- •Configuring Redistribution
- •Route Targets
- •Configuring Route Targets
- •A Review of Simple VPN Configuration
- •Configuring MPLS in the Service Provider Network
- •Simple VPN Configuration
- •Configuring the PE-CE Routing Protocol
- •Lab: Configuring an MPLS VPN
- •Configuring POP Routers
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer 1 Running-Config
- •Peer 2 Running-Config
- •Verification with Ping
- •Routing Table Isolation
- •Verifying VRF Routes
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •MP-BGP and OSPF
- •A Review of OSPF
- •OSPF Router Types
- •Link State Advertisements
- •OSPF for MPLS VPNs
- •OSPF Super-Backbone
- •Preventing Routing Loops
- •Path Selection
- •MPLS VPN OSPF Lab
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Static Routing
- •Device Configuration
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer Router Configuration
- •Verification with Ping
- •Verifying Static VRF Routes
- •E-BGP and MPLS VPNs
- •Device Configuration
- •E-BGP Operation
- •AS-Override
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer Router Configuration
- •Peer 1 Running-Config
- •Peer 2 Running-Config
- •Verification with Ping
- •Advanced MPLS VPN Topologies
- •Simple VPNs
- •Central Services MPLS VPN Topology
- •Overlay MPLS VPN Topology
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Challenge Lab 1
- •MPLS
- •MP-IBGP
- •Answer to Lab 1.1
- •Answer to Lab 1.2
- •Answer to Lab 1.3
- •Challenge Lab 2
- •Tag Switching
- •MP-IBGP
- •Answer to Lab 2.1
- •Answer to Lab 2.2
- •Answer to Lab 2.3
- •Challenge Lab 3
- •VRF Configuration
- •RIPv2
- •Redistribution
- •Answer to Lab 3.1
- •Answer to Lab 3.2
- •Answer to Lab 3.3
- •Challenge Lab 4
- •VRF Configuration
- •OSPF
- •Redistribution
- •Answer to Lab 4.1
- •Answer to Lab 4.2
- •Answer to Lab 4.3
- •Challenge Lab 5
- •VRF Configuration
- •Static Routes and Redistribution
- •Answer to Lab 5.1
- •Answer to Lab 5.2
- •Challenge Lab 6
- •VRF Configuration
- •E-BGP Configuration
- •Answer to Lab 6.1
- •Answer to Lab 6.2
- •Service Provider Network Configuration with OSPF
- •Router Configuration
- •Routing Tables
- •Tags
- •Service Provider Network Configuration with IS-IS
- •Router Configuration
- •Routing Tables
- •Tag Switching Forwarding Tables
- •Glossary

VPNs 101 129
Categories of VPNs
In addition to topological definitions, VPNs can also be categorized by the business need they fill or by the characterization of services they provide. There are three categories of VPNs:
Intranets An intranet is a collection of sites that are controlled by the same organization. An example of an intranet is a single company with all its sites connected together in a single network. Figure 4.13 shows multiple sites connected in an intranet.
F I G U R E 4 . 1 3 A simple intranet
Miami headquarters |
VC1 |
Orlando office |
|
|
|
|
VC2 |
|
Tampa office
Extranet An extranet is a connection between two or more organizations. An example of an extranet might be a company with a connection to a partner company. Figure 4.14 shows two company sites connected together in an extranet.
F I G U R E 4 . 1 4 A simple extranet
Virtual circuits (VCs)
Company A Company B
Combination of intranets and extranets Oftentimes, VPNs are a combination of both intranets and extranets. Figure 4.15 shows two companies with both intranets and extranets deployed.
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |

130 Chapter 4 VPNs: An Overview
In Figure 4.15, both Company A and Company B have an intranet deployed. A separate connection runs between the headquarters of Company A and Company B, creating the extranet. An extranet poses a security risk not present in intranets because Company A may have unauthorized access to Company B’s network (and vice versa). In the combination network, both Company A and Company B must take efforts to secure their sites.
F I G U R E 4 . 1 5 A two-company network with intranets and extranets
Company A intranet |
Company B intranet |
Company A |
Company B |
Headquarters |
Headquarters |
Miami |
Atlanta |
|
Extranet connection |
Company A |
Company A |
Company B |
Company B |
Site office |
Site office |
Site office |
Site office |
Orlando |
Tampa |
Augusta |
Macon |
VPN Routing
So now that you know about the various VPN topologies, you need to know about routing inside a VPN. Figure 4.16 illustrates a simple network, with two customer sites connected with point-to-point links.
F I G U R E 4 . 1 6 A simple point-to-point network
|
|
.1/16 |
.1/16 |
|
.2/16 |
.1/16 |
|
||
|
|
.0 |
.0 |
|
.0 |
.0 |
|
||
|
|
.1 |
.2 |
|
.2 |
.3 |
|
||
|
|
10 |
10 |
|
10 |
10 |
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10.1.0.0 |
|
R1 |
|
10.2.0.0 |
R2 |
10.3.0.0 |
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |

VPNs 101 131
Table 4.1 lists the IP addresses and interfaces of the network devices in Figure 4.16.
T A B L E 4 . 1 Point-to-Point Network Addressing
Device |
Interface |
IP Address |
|
|
|
R1 |
Serial 0 |
10.2.0.1 |
R1 |
Ethernet0 |
10.1.0.1 |
R2 |
Serial 0 |
10.2.0.2 |
R2 |
Ethernet0 |
10.3.0.1 |
|
|
|
Instead of just adding the routing table to this section, let’s go through a routing table exercise that I use in my classes. We’ll start with R1. What are the connected interfaces? 10.2.0.1 and 10.1.0.1. Suppose the router has a 16-bit mask (/16 or 255.255.0.0). What are the two networks that R1 knows about as being directly connected? 10.2.0.0 and 10.1.0.0.
Now let’s move to R2. What are the connected interfaces on R2? 10.2.0.2 and 10.3.0.1. Using a 16-bit mask, the two networks that R2 knows are directly connected are 10.2.0.0 and 10.3.0.0. So based on the information you have so far, you can build two routing tables. Table 4.2 contains the routing table for R1, and Table 4.3 contains the routing table for R2.
T A B L E 4 . 2 R1 Routing Table
Network |
Method |
Interface |
|
|
|
10.1.0.0 |
Directly connected |
Ethernet0 |
10.2.0.0 |
Directly connected Serial 0 |
Serial 0 |
|
|
|
T A B L E 4 . 3 R2 Routing Table
Network |
Method |
Interface |
|
|
|
10.3.0.0 |
Directly connected |
Ethernet0 |
10.2.0.0 |
Directly connected Serial 0 |
Serial 0 |
|
|
|
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
132 Chapter 4 VPNs: An Overview
What happens to the routing tables when a routing protocol is enabled such as RIP? The router R1 advertises 10.1.0.0 to R2. The router R2 advertises 10.3.0.0. Table 4.4 contains the new routing table for R1, and Table 4.5 contains the new routing table for R2.
T A B L E |
4 . 4 |
R1 Routing Table with RIP |
|
|
|
|
|
|
|
|
|
|
|
Network |
Method |
Interface |
|
|
|
|
|
|
|
|
|
10.1.0.0 |
Directly connected |
Ethernet0 |
|
|
|
10.2.0.0 |
Directly connected |
Serial 0 |
|
|
|
10.3.0.0 |
RIP |
Serial 0 |
|
T A B L E |
4 . 5 |
|
|
|
|
R2 Routing Table with RIP |
|
|
|||
|
|
|
|
|
|
|
|
Network |
Method |
Interface |
|
|
|
|
|
|
|
|
|
10.1.0.0 |
RIP |
Serial 0 |
|
|
|
10.2.0.0 |
Directly connected |
Serial 0 |
|
|
|
10.3.0.0 |
Directly connected |
Ethernet0 |
|
|
|
|
|
|
|
There’s a reason that I’m going through all this basic material for you. First of all, there is no service provider infrastructure showing up on the customer routers R1 and R2. R1 and R2 are totally oblivious to anything behind their point-to-point connection. In addition, the service provider is totally oblivious to the IP addressing and routing protocols being run on the customer routers. R1 and R2 are on a private and isolated connection. If the customers misconfigure an IP address or a routing protocol, the service provider is unaware of it.
Since point-to-point networks are well isolated and private, it is possible to have customers using the exact same IP addressing scheme. For example, suppose a consultant sets up a network for Customer A using an IP addressing scheme of 10.1.0.0, 10.2.0.0, and 10.3.0.0. And suppose the very same consultant sets up a network for Customer B using 10.1.0.0, 10.2.0.0, and 10.3.0.0. Figure 4.17 illustrates the point-to-point networks for both Customer A and Customer B.
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |

VPNs 101 133
F I G U R E 4 . 1 7 Point-to-point networks for Customer A and Customer B
Customer A |
Customer B |
10.3.0.0 |
10.3.0.0 |
10.2.0.0 |
10.2.0.0 |
10.1.0.0 |
10.1.0.0 |
VPNs came about as a less expensive alternative to point-to-point links. Figure 4.18 illustrates a simple VPN with two customer sites connected with a single VC, simulating the original point-to-point connectivity illustrated in Figure 4.17.
F I G U R E 4 . 1 8 A simple VPN with two customer sites
10.1.0.0 |
10.2.0.0 |
10.3.0.0 |
||
|
||||
|
|
Virtual circuits |
|
|
|
|
|
|
|
|
|
(VCs) |
|
|
|
R1 |
R2 |
||
|
|
Table 4.6 lists the IP addresses and interfaces of the network devices in Figure 4.18.
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |

134 Chapter 4 VPNs: An Overview
T A B L E 4 . 6 VPN Addressing
Device |
Interface |
IP Address |
|
|
|
R1 |
Serial 0 |
10.2.0.1 |
R1 |
Ethernet0 |
10.1.0.1 |
R2 |
Serial 0 |
10.2.0.2 |
R2 |
Ethernet0 |
10.3.0.1 |
|
|
|
Just like the point-to-point example, R1 and R2 build routing tables based on directly connected interfaces. Table 4.7 contains the routing table for R1, and Table 4.8 contains the routing table for R2.
T A B L E 4 . 7 R1 Routing Table
Network |
Method |
Interface |
|
|
|
10.1.0.0 |
Directly connected |
Ethernet0 |
10.2.0.0 |
Directly connected S0 |
Serial 0 |
|
|
|
T A B L E 4 . 8 R2 Routing Table
Network |
Method |
Interface |
|
|
|
10.3.0.0 |
Directly connected |
Ethernet0 |
10.2.0.0 |
Directly connected S0 |
Serial 0 |
|
|
|
When a routing protocol such as RIP is enabled, the router R1 advertises 10.1.0.0 to R2 and the router R2 advertises 10.3.0.0. Table 4.9 contains the new routing table for R1, and Table 4.10 contains the new routing table for R2. Just like point-to-point links, network devices connected together with VCs
in a VPN have no knowledge of the service provider infrastructure. With a VPN, R1 and R2 are totally oblivious to anything behind their VC connection. In addition, the service provider is totally oblivious to the IP addressing and
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |

VPNs 101 135
routing protocols being run on the customer routers. If the customers misconfigure an IP address or a routing protocol, the service provider is unaware of it.
T A B L E |
4 . 9 |
R1 Routing Table with RIP |
|
|
|
|
|
|
|
|
|
|
|
Network |
Method |
Interface |
|
|
|
|
|
|
|
|
|
10.1.0.0 |
Directly connected |
Ethernet0 |
|
|
|
10.2.0.0 |
Directly connected |
Serial 0 |
|
|
|
10.3.0.0 |
RIP |
Serial 0 |
|
T A B L E |
4 . 1 0 |
|
|
|
|
R2 Routing Table with RIP |
|
|
|||
|
|
|
|
|
|
|
|
Network |
Method |
Interface |
|
|
|
|
|
|
|
|
|
10.1.0.0 |
RIP |
Serial 0 |
|
|
|
10.2.0.0 |
Directly connected |
Serial 0 |
|
|
|
10.3.0.0 |
Directly connected |
Ethernet0 |
|
|
|
|
|
|
|
VPNs result in well-isolated networks with the same privacy as point-to- point connections. With VPNs, it’s possible to have customers using the exact same IP addressing scheme. For example, suppose a consultant sets up a network for Customer A using an IP addressing scheme of 10.1.0.0, 10.2.0.0, and 10.3.0.0. And suppose the very same consultant sets up a network for Customer B using 10.1.0.0, 10.2.0.0, and 10.3.0.0. Figure 4.19 illustrates the VPNs for both Customer A and Customer B.
F I G U R E 4 . 1 9 VPNs for Customer A and Customer B
Customer A |
10.2.0.0 |
Customer A |
|
|
|
10.1.0.0 |
|
10.3.0.0 |
R1 |
Virtual circuit (VC) |
R2 |
|
||
Customer B |
Virtual circuit (VC) |
Customer B |
10.1.0.0 |
|
10.3.0.0 |
R1 |
10.2.0.0 |
R2 |
|
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |