
- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Service Provider Networks
- •Scalability
- •Traffic Engineering
- •Quality of Service
- •MPLS Label Stack
- •Shim Header
- •MPLS Architecture
- •Control
- •Forwarding
- •MPLS Label Switching
- •MPLS Network Components
- •Device Output
- •Label-Switched Paths
- •MPLS Applications
- •MPLS and ATM
- •Overlay
- •Quality of Service
- •Traffic Engineering
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Routing Review
- •Frame-Mode MPLS Working Example
- •Network Routing Protocol Examples
- •MPLS Step by Step
- •Label Distribution
- •Assigning Labels
- •Troubleshooting and Verification
- •Device Configuration
- •IGP Verification
- •CEF Verification
- •MPLS Verification
- •Label Distribution and Bindings
- •Binding Verification
- •Troubleshooting the Network
- •Hiding Service Provider Devices
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Frame-Mode MPLS and ATM
- •Frame-Mode MPLS and ATM Configuration
- •Cell-Mode MPLS
- •Label Binding with ATM
- •Cell-Mode Label Switching
- •VC Merge
- •Loop Prevention
- •Cell-Mode MPLS Configuration
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •VPNs 101
- •Point-to-Point Connections
- •Virtual Private Networks
- •Categories of VPNs
- •VPN Routing
- •Peer-to-Peer VPNs
- •Optimal Routing
- •Peer-to-Peer Security
- •Peer-to-Peer VPN Routing
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Service Provider Configuration
- •MPLS VPNs
- •Virtual Router
- •Virtual Routing and Forwarding Tables
- •MPLS Operational Overview
- •MP-BGP Configuration
- •An MPLS VPN Example
- •Route Distinguisher
- •MP-IBGP Configuration Example
- •Initial Network Configuration
- •MP-IBGP Configuration
- •Verification
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •A Review of VPNs
- •Configuring a Simple MPLS VPN
- •Configuring VRF Interfaces
- •Running RIP in an MPLS VPN
- •Configuring RIPv2 with Address-Family ipv4
- •Configuring Redistribution
- •Route Targets
- •Configuring Route Targets
- •A Review of Simple VPN Configuration
- •Configuring MPLS in the Service Provider Network
- •Simple VPN Configuration
- •Configuring the PE-CE Routing Protocol
- •Lab: Configuring an MPLS VPN
- •Configuring POP Routers
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer 1 Running-Config
- •Peer 2 Running-Config
- •Verification with Ping
- •Routing Table Isolation
- •Verifying VRF Routes
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •MP-BGP and OSPF
- •A Review of OSPF
- •OSPF Router Types
- •Link State Advertisements
- •OSPF for MPLS VPNs
- •OSPF Super-Backbone
- •Preventing Routing Loops
- •Path Selection
- •MPLS VPN OSPF Lab
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Static Routing
- •Device Configuration
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer Router Configuration
- •Verification with Ping
- •Verifying Static VRF Routes
- •E-BGP and MPLS VPNs
- •Device Configuration
- •E-BGP Operation
- •AS-Override
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer Router Configuration
- •Peer 1 Running-Config
- •Peer 2 Running-Config
- •Verification with Ping
- •Advanced MPLS VPN Topologies
- •Simple VPNs
- •Central Services MPLS VPN Topology
- •Overlay MPLS VPN Topology
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Challenge Lab 1
- •MPLS
- •MP-IBGP
- •Answer to Lab 1.1
- •Answer to Lab 1.2
- •Answer to Lab 1.3
- •Challenge Lab 2
- •Tag Switching
- •MP-IBGP
- •Answer to Lab 2.1
- •Answer to Lab 2.2
- •Answer to Lab 2.3
- •Challenge Lab 3
- •VRF Configuration
- •RIPv2
- •Redistribution
- •Answer to Lab 3.1
- •Answer to Lab 3.2
- •Answer to Lab 3.3
- •Challenge Lab 4
- •VRF Configuration
- •OSPF
- •Redistribution
- •Answer to Lab 4.1
- •Answer to Lab 4.2
- •Answer to Lab 4.3
- •Challenge Lab 5
- •VRF Configuration
- •Static Routes and Redistribution
- •Answer to Lab 5.1
- •Answer to Lab 5.2
- •Challenge Lab 6
- •VRF Configuration
- •E-BGP Configuration
- •Answer to Lab 6.1
- •Answer to Lab 6.2
- •Service Provider Network Configuration with OSPF
- •Router Configuration
- •Routing Tables
- •Tags
- •Service Provider Network Configuration with IS-IS
- •Router Configuration
- •Routing Tables
- •Tag Switching Forwarding Tables
- •Glossary
Review Questions 197
Review Questions
1.How many bits long is a route distinguisher?
A.16
B.32
C.48
D.64
2.VPN names ___________ case-sensitive.
A.Are
B.Are not
3.Which of the following protocols is used to propagate VPN labels between edge routers?
A.TDP
B.LDP
C.Standard BGP with extended communities
D.MP-BGP
4.In Multi-Protocol BGP (MP-BGP), neighbors need to be ___________.
A.Configured
B.Activated
C.Sent standard communities
D.Configured with VDP
5.Which of the following commands is used to configure a VRF?
A.rd #.#
B.ip vrf vpn_name
C.address-family vpnv4
D.send-community both
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
198Chapter 5 MPLS VPNs
6.Which of the following commands is used to configure a route distinguisher?
A.rd #.#
B.ip vrf vpn_name
C.address-family vpnv4
D.send-community both
7.Which of the following commands configures MP-BGP to send extended communities? (Choose all that apply.)
A.send-community standard
B.send community extended
C.send-community both
D.send-community extended
8.Which of the following commands is used to enter MP-BGP configuration from BGP?
A.rd #.#
B.ip vrf vpn_name
C.address-family vpnv4
D.send-community both
9.How long in bits is the VPNv4 address?
A.32
B.48
C.64
D.96
10.Which of the following is the preferred route distinguisher identification scheme?
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
Review Questions 199
A.16:32
B.16:16:32
C.32:16
D.32:64
11.To have a single route appear as many routers, which of the following mechanisms is used?
A.RD
B.VPNv4
C.VPN
D.VRF
12.Which of the following mechanisms keeps overlapping addresses from doing so in MP-BGP?
A.RD
B.VPNv4
C.VPN
D.VRF
13.Which of the following is not a component of a VRF?
A.VRF-specific routes
B.CEF
C.Global routing table
D.None of the above
14.MPLS VPNs offer ___________ security as traditional overlay VPNs.
A.The same
B.Worse
C.Better
D.None of the above
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
200Chapter 5 MPLS VPNs
15.P routers ___________ knowledge of a customer’s VPN routes.
A.Do have
B.Do not have
16.A(n) ___________ imposes the VPN label.
A.LSR
B.LSP
C.Edge-LSR
D.None of the above
17.By default, BGP sends ___________.
A.Standard communities
B.Extended communities
C.No communities
18.What types of routes are in the PE router’s global routing table?
A.Customer routes
B.Service provider routes
C.Customer and service provider routes
D.None of the above
19.What types of routes are in the PE router’s VRF for a particular customer?
A.Customer routes
B.Service provider routes
C.Customer and service provider routes
D.None of the above
20.MP-BGP within an AS is called ___________.
A.MP-BGP
B.MP-IBGP
C.MP-EBGP
D.MP-MBGP
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |