Welcome to the network technology community forum and interact with 2 million technical staff. Therefore, do not convert each specific LSP table in the MPLS core network separately. The LSP is created between each PE device, 2. Next, the specific LSP table establishes a tunnel between these PES and the LPS of the PE, allowing the core network to be better upgraded and exchanged
Welcome to the network technology community forum and interact with 2 million technical staff> therefore, do not separately convert each specific LSP table in the MPLS core network, LSP is created between each PE device, as shown in figure 2. Next, the specific LSP table establishes a tunnel between these PES and the LPS of the PE, allowing the core network to be better upgraded and exchanged
Welcome to the network technology community forum and interact with 2 million technical staff> enter
Therefore, do not separately convert each specific LSP table in the MPLS core network. LSP is created between each PE device, as shown in figure 2. Next, the specific LSP table establishes a tunnel between these PES and the LPS of the PE, allowing the core network to be better upgraded, and the exchange must be performed in the middle of these fewer tunnels.
On this remote PE device, external header files appear and internal header file tags are checked. This tag tells the PE device what local information table to query. The internal header file is then popped up, And the encapsulated data packet or frame can be unwrapped and sent to the CE device specified in the correct information table.
This article describes how to send mpls vpn Information. In the second part, we will discuss how the reachable information contained in various information tables passes through MPLS to a remote PE device.
[1] [2]