Cisco CMTS Router Layer 2 and VPN Features Configuration Guide First Published: February 14, 2008 Last Modified: July 11, 2012

Cisco CMTS Router Layer 2 and VPN Features Configuration Guide First Published: February 14, 2008 Last Modified: July 11, 2012

Cisco CMTS Router Layer 2 and VPN Features Configuration Guide First Published: February 14, 2008 Last Modified: July 11, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-27608-01 © Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 EtherChannel for the Cisco Cable Modem Termination System 1 Prerequisites for EtherChannel on the Cisco CMTS 2 Restrictions for EtherChannel on the Cisco CMTS 3 Information About EtherChannel on the Cisco CMTS 3 Introduction to EtherChannel on the Cisco CMTS 3 Cisco FastEtherChannel (FEC) and GigabitEtherChannel (GEC) on the Cisco uBR7246VXR Router 4 Cisco GigabitEtherChannel (GEC) on the Cisco uBR10012 Router 4 How to Configure EtherChannel on the Cisco CMTS 5 Configuring FEC or GEC EtherChannel on the Cisco CMTS 5 Troubleshooting Tips 7 What to Do Next 7 Verifying EtherChannel on the Cisco CMTS 8 Configuration Examples for EtherChannel on the Cisco CMTS 8 Additional References 11 Feature Information for EtherChannel on the Cisco CMTS 14 CHAPTER 2 Link Aggregation Control Protocol (IEEE 802.3ad) Support for Cisco uBR10012 Routers 15 LACP Feature Advantages 16 LACP Feature Limitations 18 LACP Feature Components 18 Configuring LACP Service Components 19 Configuring a Port Channel Virtual Interface 19 Configuring LACP Port Priority 20 Configuring LACP System Priority 21 Configuring LACP 1:1 Link Redundancy 22 Configuring Minimum Active Bundled LACP Ports 22 Configuring Maximum Active Bundled LACP Ports 23 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide OL-27608-01 iii Contents Configuring LACP 24 Additional References 25 Feature Information for LACP services 26 CHAPTER 3 Cisco uBR7200 Series MPLS VPN Cable Enhancements 27 Feature Overview 28 Benefits 30 Restrictions 31 Supported Platforms 32 Prerequisites 32 Other Important Information 32 Configuration Tasks 33 Creating VRFs for each VPN 33 Defining Subinterfaces on a Virtual Bundle Interface and Assigning VRFs 34 Configuring Cable Interface Bundles 35 Configuring Subinterfaces and MPLS VPNs on a Virtual Bundle Interface 36 Configuring MPLS in the P Routers in the Provider Core 36 Verifying the MPLS VPN Configuration 37 Configuration Examples 37 Subinterface Configuration Example 37 Cable Interface Bundling Example 38 Subinterface Definition on Virtual Bundle Example 38 Cable Interface Bundle Master Configuration Example 39 PE Router Configuration Example 39 P Router Configuration Example 42 Command Reference 44 Additional References 44 Feature Information for Cisco uBR7200 Series MPLS VPN Cable Enhancements 45 CHAPTER 4 Generic Routing Encapsulation on the Cisco CMTS Routers 47 Prerequisites for Generic Routing Encapsulation 48 Important Notes about Configuring GRE 49 Restrictions for Generic Routing Encapsulation 49 Information About Generic Routing Encapsulation 49 Tunneling 49 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide iv OL-27608-01 Contents Generic Routing Encapsulation Overview 50 How to Configure Generic Routing Encapsulation 50 Additional References 54 Feature Information for Generic Routing Encapsulation 55 CHAPTER 5 L2VPN Support over Cable 57 Prerequisites for L2VPN Support over Cable 58 Restrictions for L2VPN Support over Cable 59 VPN ID Restrictions 60 Information About L2VPN Support over Cable 60 Point-to-Point L2VPN Forwarding Mode 61 L2VPN Encodings in the CM Configuration File 62 Supported L2VPN Encodings 62 SNMPv3 Interface 63 DOCSIS-L2VPN-MIB 63 Voice-Call Support on L2VPN CM 64 How to Configure L2VPN Support over Cable 65 Configuring the Ethernet Network System Interface 65 Preparing the DOCSIS Configuration File for L2VPN Support 66 Manual Switchover Command Line Interface 66 Verifying L2VPN Support over Cable 66 Enabling Voice-Call on a L2VPN CM 69 Verifying Dynamic Service Flows 69 Configuration Examples for L2VPN over Cable 70 Example: Specifying the Ethernet NSI Interface 70 Example: Enabling Voice Call Support on MPLS L2VPN 70 Example: Enabling Voice Call Support on 802.1q L2VPN 71 Example: Enabling Voice Call Support on CLI-based L2VPN 72 Additional References 72 Feature Information for L2VPN Support over Cable 74 CHAPTER 6 MPLS Pseudowire for Cable L2VPN 77 Prerequisites for MPLS Pseudowire for Cable L2VPN 78 Restrictions for MPLS Pseudowire for Cable L2VPN 79 Information About MPLS Pseudowire for Cable L2VPN 79 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide OL-27608-01 v Contents How MPLS Transports Layer 2 Packets 80 Supported Ethernet Encapsulation on UNI 82 MPLS Pseudowire 82 Bundle254 Interface 82 Ingress Process 83 Egress Process 83 MPLS Pseudowire Control Plane Process 83 L2VPN Pseudowire Redundancy 83 MPLS Pseudowire Provisioning Methods 84 Static Provisioning Method for MPLS Pseudowires 84 Dynamic Provisioning Method for MPLS Pseudowires 84 Cisco-Specific L2VPN TLVs 87 How to Enable MPLS on a Cisco CMTS Router 91 Configuring an LDP Router ID 91 Configuring MPLS on a Gigabit Ethernet Interface 93 Configuring an MPLS Label Distribution Protocol 94 Enabling the Cisco CMTS Support for MPLS Pseudowire for Cable L2VPN 95 How to Provision MPLS Pseudowires 95 Dynamic Provisioning of MPLS Pseudowires 95 Static Provisioning of MPLS Pseudowires 96 How to Configure L2VPN Pseudowire Redundancy 97 Configuring the Backup Pseudowire 97 Configuring Backup Delay 99 Performing Manual Switchover 100 Troubleshooting Tips 101 Configuration Examples for MPLS Pseudowire for Cable L2VPN 101 Configuration Example for Static Provisioning of MPLS Pseudowires 101 Configuration Examples for Dynamic Provisioning of MPLS Pseudowires 101 BSOD Specification-Based MPLS Pseudowire Provisioning: Example 101 Type-4 MPLS Pseudowire Provisioning Using the CM Configuration File: Example 103 Type-5 MPLS Pseudowire Provisioning Using the CM Configuration File: Example 105 Configuration Examples for L2VPN Pseudowire Redundancy 105 Example: Configuring Backup Pseudowire Peer and VC ID 106 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide vi OL-27608-01 Contents Example: Configuring Backup Delay 106 Example: L2VPN Backup MPLS Pseudowire Provisioning Using the CM Configuration File 106 Verifying the MPLS Pseudowire Configuration 107 Additional References 110 Feature Information for MPLS Pseudowire for Cable L2VPN 112 CHAPTER 7 Point-to-Point Protocol over Ethernet Termination on the Cisco CMTS 115 Prerequisites for PPPoE Termination 116 Restrictions for PPPoE Termination 116 Information About PPPoE Termination 117 Feature Overview 117 Benefits 118 How to Configure the PPPoE Termination Feature 119 Enabling VPDN Operations on the Cisco CMTS 119 Configuring a Virtual Template on the Cisco CMTS 121 Configuring a VPDN Group for PPPoE Sessions 124 Configuring a VPDN Group for L2TP Tunnel Initiation on the Cisco CMTS 127 Enabling PPPoE on a Cable Interface 130 Configuring a Cisco Router as LNS 131 Clearing PPPoE Sessions 134 Enabling SNMP Traps for Active PPPoE Sessions 135 Monitoring the PPPoE Termination Feature 136 Configuration Examples for PPPoE Termination 136 PPPoE Termination on a Cisco CMTS without L2TP Tunneling 137 PPPoE Termination on a Cisco CMTS with L2TP Tunneling 138 PPPoE Client Configuration on a Cisco Router 139 PPPoE Configuration for the L2TP Network Server 140 Additional References 141 Feature Information for PPPoE Termination 142 CHAPTER 8 Service Flow Mapping to MPLS-VPN on the Cisco CMTS 145 Prerequisites for Mapping Service Flows to MPLS-VPN 146 Restrictions for Mapping Service Flows to MPLS-VPN 148 Information About Mapping Service Flows to MPLS-VPN 148 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide OL-27608-01 vii Contents MPLS QoS via TLV for non-L2VPN Service Flow 150 VoIP SFID Mapping 150 Prerequisites for VOIP SFID Mapping 150 Restrictions for VOIP SFID Mapping 151 How to Configure the Service Flow Mapping to MPLS-VPN feature 151 Creating a DOCSIS Configuration File 151 Mapping Dynamic Service Flows 153 Configuring MPLS QoS via TLV for non-L2VPN Service Flow 155 Restrictions for Configuring MPLS QoS via TLV 155 Traffic Class for MPLS Imposition Packets 156 Traffic Classification for MPLS Disposition Packets 156 Using Vendor-Specific TLVs with AToM L2VPN and MPLS L3VPN 156 Monitoring and Maintaining Examples for Service Flow Mapping to MPLS-VPN Feature 157 Displaying CMs and CPE devices 157 Displaying SID and MPLS Mappings 158 Displaying Service Flow Configurations 159 Configuration Examples 162 Example: DOCSIS Configuration File 162 Example: MPLS VPN Interface Configuration 163 Example: Upstream Service Flow Marking TLV 164 Example: Downstream Packet Classification TLV 164 Example: MPLS QoS Configuration File 164 Additional References 166 Feature Information for Service Flow Mapping to MPLS-VPN on the Cisco CMTS Routers 169 CHAPTER 9 Transparent LAN Service over Cable 171 Prerequisites for Transparent LAN Service over Cable 172 Restrictions for Transparent LAN Service over Cable 172 Information About Transparent LAN Service over Cable 173 Feature Overview 173 Transparent LAN Service and Layer 2 Virtual Private Networks 173 IEEE 802.1Q Mapping 174 Overview 174 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide viii OL-27608-01 Contents Details of IEEE 802.1Q Mapping 174 Benefits 175 How to Configure the Transparent LAN Service over Cable 175 Configuring IEEE 802.1Q VLAN Mapping 176 Enabling and Configuring Layer 2 Tunneling for IEEE 802.1Q Mapping 176 Creating the IEEE 802.1Q VLAN Bridge

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    204 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us