
- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Service Provider Networks
- •Scalability
- •Traffic Engineering
- •Quality of Service
- •MPLS Label Stack
- •Shim Header
- •MPLS Architecture
- •Control
- •Forwarding
- •MPLS Label Switching
- •MPLS Network Components
- •Device Output
- •Label-Switched Paths
- •MPLS Applications
- •MPLS and ATM
- •Overlay
- •Quality of Service
- •Traffic Engineering
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Routing Review
- •Frame-Mode MPLS Working Example
- •Network Routing Protocol Examples
- •MPLS Step by Step
- •Label Distribution
- •Assigning Labels
- •Troubleshooting and Verification
- •Device Configuration
- •IGP Verification
- •CEF Verification
- •MPLS Verification
- •Label Distribution and Bindings
- •Binding Verification
- •Troubleshooting the Network
- •Hiding Service Provider Devices
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Frame-Mode MPLS and ATM
- •Frame-Mode MPLS and ATM Configuration
- •Cell-Mode MPLS
- •Label Binding with ATM
- •Cell-Mode Label Switching
- •VC Merge
- •Loop Prevention
- •Cell-Mode MPLS Configuration
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •VPNs 101
- •Point-to-Point Connections
- •Virtual Private Networks
- •Categories of VPNs
- •VPN Routing
- •Peer-to-Peer VPNs
- •Optimal Routing
- •Peer-to-Peer Security
- •Peer-to-Peer VPN Routing
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Service Provider Configuration
- •MPLS VPNs
- •Virtual Router
- •Virtual Routing and Forwarding Tables
- •MPLS Operational Overview
- •MP-BGP Configuration
- •An MPLS VPN Example
- •Route Distinguisher
- •MP-IBGP Configuration Example
- •Initial Network Configuration
- •MP-IBGP Configuration
- •Verification
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •A Review of VPNs
- •Configuring a Simple MPLS VPN
- •Configuring VRF Interfaces
- •Running RIP in an MPLS VPN
- •Configuring RIPv2 with Address-Family ipv4
- •Configuring Redistribution
- •Route Targets
- •Configuring Route Targets
- •A Review of Simple VPN Configuration
- •Configuring MPLS in the Service Provider Network
- •Simple VPN Configuration
- •Configuring the PE-CE Routing Protocol
- •Lab: Configuring an MPLS VPN
- •Configuring POP Routers
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer 1 Running-Config
- •Peer 2 Running-Config
- •Verification with Ping
- •Routing Table Isolation
- •Verifying VRF Routes
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •MP-BGP and OSPF
- •A Review of OSPF
- •OSPF Router Types
- •Link State Advertisements
- •OSPF for MPLS VPNs
- •OSPF Super-Backbone
- •Preventing Routing Loops
- •Path Selection
- •MPLS VPN OSPF Lab
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Static Routing
- •Device Configuration
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer Router Configuration
- •Verification with Ping
- •Verifying Static VRF Routes
- •E-BGP and MPLS VPNs
- •Device Configuration
- •E-BGP Operation
- •AS-Override
- •VPN Configuration
- •Raleigh Running-Config
- •Atlanta Running-Config
- •Peer Router Configuration
- •Peer 1 Running-Config
- •Peer 2 Running-Config
- •Verification with Ping
- •Advanced MPLS VPN Topologies
- •Simple VPNs
- •Central Services MPLS VPN Topology
- •Overlay MPLS VPN Topology
- •Summary
- •Exam Essentials
- •Key Terms
- •Review Questions
- •Answers to Review Questions
- •Challenge Lab 1
- •MPLS
- •MP-IBGP
- •Answer to Lab 1.1
- •Answer to Lab 1.2
- •Answer to Lab 1.3
- •Challenge Lab 2
- •Tag Switching
- •MP-IBGP
- •Answer to Lab 2.1
- •Answer to Lab 2.2
- •Answer to Lab 2.3
- •Challenge Lab 3
- •VRF Configuration
- •RIPv2
- •Redistribution
- •Answer to Lab 3.1
- •Answer to Lab 3.2
- •Answer to Lab 3.3
- •Challenge Lab 4
- •VRF Configuration
- •OSPF
- •Redistribution
- •Answer to Lab 4.1
- •Answer to Lab 4.2
- •Answer to Lab 4.3
- •Challenge Lab 5
- •VRF Configuration
- •Static Routes and Redistribution
- •Answer to Lab 5.1
- •Answer to Lab 5.2
- •Challenge Lab 6
- •VRF Configuration
- •E-BGP Configuration
- •Answer to Lab 6.1
- •Answer to Lab 6.2
- •Service Provider Network Configuration with OSPF
- •Router Configuration
- •Routing Tables
- •Tags
- •Service Provider Network Configuration with IS-IS
- •Router Configuration
- •Routing Tables
- •Tag Switching Forwarding Tables
- •Glossary
306 Chapter 7 MPLS VPNs and OSPF
Summary
In this chapter you learned about OSPF and how it works when implemented in an MPLS VPN. First of all, OSPF is not the best dynamic routing protocol to use between the PE and CE routers. OSPF is an intensive protocol, and having many instances of it running on a single router can slow the router down. In addition, OSPF can quickly use up the maximum number of routing processes (32) on a PE router.
However, many customers run OSPF, and the service provider needs to support it. To this end, there have been many extensions added to how OSPF works to ensure its proper operation in an MPLS VPN.
To start with, the hierarchy has changed with the introduction of the super-backbone. The super-backbone, or the service provider MP-BGP backbone, replaces the requirement for all OSPF areas to be connected to the OSPF backbone (Area 0). A new extended BGP community is used to preserve OSPF information such as the LSA type. In addition, standard BGP rules still work, such as preserving the OSPF cost in the MED attribute. When a PE router receives an LSA Type 1 or Type 2 from a CE and redistributes it into MP-BGP, a downstream OSPF customer learns this route as an inter-area (O IA) router. When an LSA Type 3 route is learned by the PE, the route is propagated through MP-BGP and learned by a downstream OSPF customer router as an inter-area (O IA) router. OSPF LSA Type 5 external routes keep their external attributes and are listed as external routes on a downstream OSPF customer router’s global routing table.
To make sure that routing loops do not occur, the down bit is used. One PE redistributes a route from MP-BGP into OSPF, and the down bit is set. When the same route is learned by another PE, upon observing the down bit, the route is not redistributed back into MP-BGP. The down bit can be lost, and therefore the tag field (set to the originating BGP AS number) is used. When a PE receives a route, with the tag field set to its own AS number, the route will not be redistributed.
To ensure proper path selection, any route learned with the down bit set results in the routing bit being set on the PE router. Any route with the routing bit set does not show up in the VRF routing table on the PE, even if it is the best path according to OSPF.
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
Exam Essentials 307
To configure global OSPF, you use the router ospf process_id command. To configure an OSPF routing context, you use the router ospf process_id vrf vpn_name command.
Exam Essentials
Be able to describe how OSPF operates in a VPN. OSPF operates normally in an MPLS VPN. Customer routers do not need an IOS upgrade to have an MPLS VPN that uses OSPF as the CE-to-PE routing protocol.
What is new is how the service provider handles these routes. To prevent routing loops, the down bit is set when routes are redistributed from MP-BGP into OSPF. The down bit prevents routing loops because when a PE router sees the down bit set, it does not redistribute the route back into MP-BGP. If the down bit is removed as it travels through the customer’s network, the tag field, containing the originating BGP AS number, is used to prevent loops. To ensure proper routing, a learned route with the down bit results in the routing bit (only on the PE router) being set. With the routing bit set, the PE router does not use the route, even if it is the best path as dictated by OSPF.
Be able to describe the enhanced OSPF hierarchical model. The standard OSPF rule is that all areas must connect to the backbone area (Area 0). Now, with MPLS, a new super-backbone is available. The super-backbone replaces the old OSPF backbone (an Area 0 requirement). Service provider routers appear as ABRs to customers.
Understand the interaction between OSPF and MP-BGP. When routes are learned by a PE router, from a CE router, the OSPF type is preserved in the new extended BGP community when redistributed into MP-BGP. When an OSPF LSA Type 1 or Type 2 is redistributed into MP-BGP, its attribute is preserved. When an OSPF LSA Type 3 is redistributed into MP-BGP, its attribute is preserved. When an OSPF LSA Type 5 is redistributed into MP-BGP, its attribute is preserved. When these routes are redistributed back into OSPF, an OSPF LSA Type 1 or Type 2 becomes an OSPF LSA Type 3, an OSPF LSA Type 3 remains an OSPF LSA Type 3, and an OSPF Type 5 remains an OSPF Type 5.
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
308 Chapter 7 MPLS VPNs and OSPF
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
area border router (ABR) |
link state advertisements (LSAs) |
autonomous system boundary |
OSPF domain |
router (ASBR) |
|
backbone area |
OSPF super-backbone |
backbone router |
routing bit |
down bit |
tag field |
internal router |
|
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
Review Questions 309
Review Questions
1.How many routing processes are supported on a PE router?
A.16
B.32
C.48
D.64
2.With standard OSPF, all areas must connect to Area ___________.
A.0
B.1
C.Super-backbone
D.None of the above
3.Without the OSPF super-backbone, PE routers are viewed as
___________ routers.
A.ABR
B.ASBR
C.Internal
D.External
4.Which of the following commands is used to configure OSPF for a VPN?
A.router ospf process
B.router ospf process address-family ipv4 vrf vpn_name
C.router ospf process_id vrf vpn_name
D.None of the above
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
310Chapter 7 MPLS VPNs and OSPF
5.Intra-area routes within a customer network are displayed as
___________ in a customer router’s global routing table.
A.O
B.O IA
C.O E2
D.None of the above
6.The OSPF cost is carried in which of the following?
A.New extended BGP community
B.MED
C.Cost field
D.None of the above
7.Intra-area routes are redistributed into MP-BGP by a PE router. When the route is ultimately learned by a downstream OSPF customer router, the route is displayed as ___________ in a customer router’s global routing table.
A.O
B.O IA
C.O E2
D.None of the above
8.Inter-area routes are redistributed into MP-BGP by a PE router. When the route is ultimately learned by a downstream OSPF customer router, the route is displayed as ___________ in a customer router’s global routing table.
A.O
B.O IA
C.O E2
D.None of the above
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
Review Questions 311
9.External routes are redistributed into MP-BGP by a PE router. When the route is ultimately learned by a downstream OSPF customer router, the route is displayed as ___________ in a customer router’s global routing table.
A.O
B.O IA
C.O E2
D.None of the above
10.With the OSPF super-backbone, PE routers are viewed as
___________ routers.
A.ABR
B.ASBR
C.Internal
D.External
11.The BGP AS number is mapped to which of the following?
A.Down bit
B.Tag field
C.Routing bit
D.None of the above
12.Which of the following is not sent to customer OSPF routers?
A.Down bit
B.Tag field
C.Routing bit
D.None of the above
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
312Chapter 7 MPLS VPNs and OSPF
13.An inter-area OSPF route is an LSA Type ___________.
A.1 or 2
B.3
C.4
D.5
14.An external OSPF route is an LSA Type ___________.
A.1 or 2
B.3
C.4
D.5
15.An intra-area OSPF route is an LSA Type ___________.
A.1 or 2
B.3
C.4
D.5
16.Which of the following OSPF LSA types is flooded throughout the OSPF domain?
A.1 or 2
B.3
C.4
D.5
17.Which of the following OSPF router types generate LSA Type 5 routes?
A.ABR
B.ASBR
C.Internal
D.Backbone
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |
Review Questions 313
18.Which of the following OSPF router types generate LSA Type 3 routes?
A.ABR
B.ASBR
C.Internal
D.Backbone
19.Which of the following are used to prevent routing loops? (Choose all that apply.)
A.Down bit
B.Tag field
C.Routing bit
D.MED
20.To ensure optimal path selection, the ___________ is used.
A.Down bit
B.Tag field
C.Routing bit
D.None of the above
Copyright ©2002 SYBEX, Inc., Alameda, CA |
www.sybex.com |