- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Service Provider Networks
- •Scalability
- •Traffic Engineering
- •Quality of Service
- •MPLS Label Stack
- •Shim Header
- •MPLS Architecture
- •Control
- •Forwarding
- •MPLS Label Switching
- •MPLS Network Components
- •Device Output
- •Label-Switched Paths
- •MPLS Applications
- •MPLS and ATM
- •Overlay
- •Quality of Service
- •Traffic Engineering
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Routing Review
- •Frame-Mode MPLS Working Example
- •Network Routing Protocol Examples
- •MPLS Step by Step
- •Label Distribution
- •Assigning Labels
- •Troubleshooting and Verification
- •Device Configuration
- •IGP Verification
- •CEF Verification
- •MPLS Verification
- •Label Distribution and Bindings
- •Binding Verification
- •Troubleshooting the Network
- •Hiding Service Provider Devices
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Frame-Mode MPLS and ATM
- •Frame-Mode MPLS and ATM Configuration
- •Cell-Mode MPLS
- •Label Binding with ATM
- •Cell-Mode Label Switching
- •VC Merge
- •Loop Prevention
- •Cell-Mode MPLS Configuration
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •VPNs 101
- •Point-to-Point Connections
- •Virtual Private Networks
- •Categories of VPNs
- •VPN Routing
- •Peer-to-Peer VPNs
- •Optimal Routing
- •Peer-to-Peer Security
- •Peer-to-Peer VPN Routing
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Service Provider Configuration
- •MPLS VPNs
- •Virtual Router
- •Virtual Routing and Forwarding Tables
- •MPLS Operational Overview
- •MP-BGP Configuration
- •An MPLS VPN Example
- •Route Distinguisher
- •MP-IBGP Configuration Example
- •Initial Network Configuration
- •MP-IBGP Configuration
- •Verification
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •A Review of VPNs
- •Configuring a Simple MPLS VPN
- •Configuring VRF Interfaces
- •Running RIP in an MPLS VPN
- •Configuring RIPv2 with Address-Family ipv4
- •Configuring Redistribution
- •Route Targets
- •Configuring Route Targets
- •A Review of Simple VPN Configuration
- •Configuring MPLS in the Service Provider Network
- •Simple VPN Configuration
- •Configuring the PE-CE Routing Protocol
- •Lab: Configuring an MPLS VPN
- •Configuring POP Routers
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer 1 Running-Config
- •Peer 2 Running-Config
- •Verification with Ping
- •Routing Table Isolation
- •Verifying VRF Routes
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •MP-BGP and OSPF
- •A Review of OSPF
- •OSPF Router Types
- •Link State Advertisements
- •OSPF for MPLS VPNs
- •OSPF Super-Backbone
- •Preventing Routing Loops
- •Path Selection
- •MPLS VPN OSPF Lab
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Static Routing
- •Device Configuration
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer Router Configuration
- •Verification with Ping
- •Verifying Static VRF Routes
- •E-BGP and MPLS VPNs
- •Device Configuration
- •E-BGP Operation
- •AS-Override
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer Router Configuration
- •Peer 1 Running-Config
- •Peer 2 Running-Config
- •Verification with Ping
- •Advanced MPLS VPN Topologies
- •Simple VPNs
- •Central Services MPLS VPN Topology
- •Overlay MPLS VPN Topology
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Challenge Lab 1
- •MPLS
- •MP-IBGP
- •Answer to Lab 1.1
- •Answer to Lab 1.2
- •Answer to Lab 1.3
- •Challenge Lab 2
- •Tag Switching
- •MP-IBGP
- •Answer to Lab 2.1
- •Answer to Lab 2.2
- •Answer to Lab 2.3
- •Challenge Lab 3
- •VRF Configuration
- •RIPv2
- •Redistribution
- •Answer to Lab 3.1
- •Answer to Lab 3.2
- •Answer to Lab 3.3
- •Challenge Lab 4
- •VRF Configuration
- •OSPF
- •Redistribution
- •Answer to Lab 4.1
- •Answer to Lab 4.2
- •Answer to Lab 4.3
- •Challenge Lab 5
- •VRF Configuration
- •Static Routes and Redistribution
- •Answer to Lab 5.1
- •Answer to Lab 5.2
- •Challenge Lab 6
- •VRF Configuration
- •E-BGP Configuration
- •Answer to Lab 6.1
- •Answer to Lab 6.2
- •Service Provider Network Configuration with OSPF
- •Router Configuration
- •Routing Tables
- •Tags
- •Service Provider Network Configuration with IS-IS
- •Router Configuration
- •Routing Tables
- •Tag Switching Forwarding Tables
- •Glossary
Answers to Review Questions 259
Answers to Review Questions
1.D. A route target is 64 bits long, but only 48 bits of it are configurable.
2.A. For simple VPNs, the route distinguisher and route target values are usually the same.
3.B. To configure only an import route target, you use the routetarget import number command.
4.C. The address-family vpnv4 command is used to configure
MP-BGP, not a routing context.
5.A. ISDN is a Layer 1 VPN technology. Additional technologies at this layer are T1, E1, and SONET.
6.C. IPSec is a Layer 3 VPN technology. An additional technology at this layer is a GRE tunnel.
7.B. Frame Relay is a Layer 2 VPN technology. Additional technologies at this layer are ATM and X.25.
8.B. The command to view the VRF routing table is show ip route vrf vpn_name.
9.B, C. Just like the route distinguisher, the two acceptable ways of configuring a route target is 16-bit:32-bit or 32-bit:16 bit.
10.B. MP-BGP neighbors need to be activated.
11.C. Redistribution for a VRF is configured under address-family ipv4 vrf vpn_name.
12.B. Redistribution for a VRF is configured under address-family ipv4 vrf vpn_name.
13.B. If you use the show ip route command, you see the global routing table. To verify that a route is being learned from a CE router, you want to look at the routing table for the VRF. The command to view the VRF routing table is show ip route vrf vpn_name.
14.A, C. IPSec and GRE are Layer 3 VPN technologies. Frame Relay is a Layer 2 VPN technology, and ISDN is a Layer 1 VPN technology.
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
260Chapter 6 MPLS VPNs and RIP
15.A. To view the global routing table on a PE, use the show ip route command.
16.D. To associate an interface with a VRF, use the command ip vrf forwarding vpn_name.
17.C. Once an interface is associated with a VRF, it loses its IP address and must be reconfigured.
18.B. Routing tables are well isolated with MPLS VPNs. The CE routers participating in the VPN do not learn any service provider backbone routes.
19.A. The easiest way to verify that a VPN works is to ping from one CE device to another. If the ping works, you know that VRFs, redistribution, etc. are configured properly.
20.C. In this example, RIP routes are being redistributed into MP-BGP. The original RIP route is received by another MP-BGP router and added to the VRF as a (B) route because it was learned through MP-BGP.
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
Chapter
7
MPLS VPNs and OSPF
CCIP MPLS EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Describe how OSPF operates inside a VPN.
Describe the enhanced OSPF hierarchical model.
Explain the interactions between OSPF and MP-BGP.
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |