Recently, I have been reading mpls vpn, but I have never understood the differences between the two RD and RT parameters in VRF. By searching materials on the Internet for repeated reading and thinking, I finally understood it. The following uses a more understandable metaphor for sharing.
For example, if you receive an invitation letter, you need to go to a high-end office building to attend the meeting. Because of the strict security requirements,
BGP/MPLSVPN Concept 1: VRF
One of the security measures of BGP/MPLSVPN is routing isolation and information isolation. It is implemented through the VPN route Forwarding (VPNRouting Forwarding: VRF) Table and LSP in MPLS. On a PE router, there are multiple BGP/MPLSVPN concepts 1: VRF tables, which correspond to one or more sub-interfaces on the PE router, used to store the route information of the VPN to which these subinterfaces belong.
Generally, t
VPN clients can be provided Internet access by forwarding the traffic of the VPN user to the ISP's Internet network management.
Implemented by creating a static route in the VRF of the PE router and specifying the next hop in the global routing
We break down the Multi-Protocol Label exchange technology into several major elements, hoping to help you understand the working principles of this technology. To facilitate understanding, we will use an interesting analogy to describe how the
1. Interconnection between different VRF: (Integration of intranet and external network)
The topic finally found a positive solution in the book.
There's always a question around me and some friends, if two vrf (companies) have access to each
, provides the NSP (Network Service Provider) service.
Figure 1 upgrading an IP private network in a single industry to a network service platform in multiple industries
As shown in figure 1, the original IP private network in industry a is transformed and upgraded to become a network service platform, providing network services for multiple industries at the same time. There are similar demands in Politics and Law networks and e-government affairs networks. How to provide a logically isolated,
recommend that you deploy IRF virtualization technology on the access layer. The Virtualized access switch connects to the aggregation switch through multi-link bundling. On the one hand, it can completely avoid second-layer loops and make full use of the uplink bandwidth of the access layer. Note that STP should be enabled even in L2 Networks without loops to prevent errors in device configuration and physical link maintenance. At the same time, although the network does not have a loop, STP m
At present, PE routers are widely used. They are one type of VPN routers. So I have studied the explanations and principles of PE routers and will share them with you here, I hope it will be useful to you. VPNVirtual Private Network (VPNVirtual Private Network) is a virtual Private Network based on public networks. It uses tunneling, encryption, and other technologies to provide users with a sense of direct connection to the Private LAN.
Introduction to MPLS
command.
4. set-dscp-transmit------- Sends the DSCP and transmit the packet.
5. set-mpls-exp-transmit--- Sets the MPLS experimental bits (0 to 7) and sends the packet.
6. set-prec-continue---- Sets the IP precedence (0 to 7) and evaluates the next rate-limit command.
7. set-qos-continue---- Sets the QoS group ID (1 to 99) and evaluates the next rate-limit command.
8. transmit---- Sends the packet.
Ex
average rate (bits/second), a multiple of 8 kbpBurst-normal maximum rate, the minimum value is BPS divided by 2000.Maximum rate (in bytes) of the burst-Max exception)Action corresponding to conform-action1. Continue -- evaluates the next rate-limit command.
2. Drop to discard the package
3. Set-dscp-continue ----- sets the Differentiated Services Code Point (dscp) (0To 63) and evaluate the next rate-limit command.
4. Set-dscp-transmit------- sends the dscp and transmit the packet.
5. Set-
1. Should I use MPLS (Multiprotocol label switching) VPN?
For many business network needs, the answer is absolutely certain. The transition to MPLS is well underway.
Take a look at this data. MPLS VPN has been gobbling up the market for frame Relay for years, according to data from market research firm Vertical Systems Group. In the next 18 months, the number o
Source Address:Https://www.juniper.net/techpubs/software/junos-security/junos-security10.2/junos-security-swconfig-mpls/topic-47253.htmlBody:This example shows us how to create an LSP in an IP network between routers using RSVP as the signaling protocol. (Translator Press: The so-called signaling protocol that I understand is used to distribute the label to determine which LSR is in which port to use which label's protocol. such as Cisco's Ldp,juniper
adopted. In the exchange structure design, the inter-network design of the giant computer is adopted or the optical switching structure is introduced. In addition, the fast search technology of Route tables, QoS Assurance, and MPLS network optimization are also being paid more and more attention to the introduction of optical switching in routers.
ASIC Technology
Because manufacturers need to reduce costs, ASIC technology has been widely used in rout
Absrtact: Firstly, this paper introduces the expansion of MPLS to optical network, secondly, this paper expounds the application of the traditional electric domain switching technology in the optical domain, and finally analyzes the all-optical Internet solution based on label switching: Multiprotocol wavelength label Switching (mplms), lobs switching based on label Optical burst switch, all optical label packet switching olps.
Key words: Multi-proto
, and the use of MPLS technology to optimize the future network, and the introduction of optical switching in routers are also receiving increasing attention. The new technologies of routers mainly refer to innovations in these aspects.I. ASIC Technology Because manufacturers need to reduce costs, ASIC technology has been widely used in routers. In a vro, to greatly increase the speed, the first thing you don't think of is ASIC. ASIC can be used for p
Absrtact: Firstly, the three stages of MSTP technology development are outlined, then the paper introduces the key technologies of virtual cascade, general frame Regulation, link capacity adjustment mechanism and intelligent adaptation layer in the third generation MSTP technology, and introduces and compares the MPLS and RPR technology of the intelligent adaptation layer.
Key words: Metropolitan area Network, MSTP,
I. Introduction With the continuous improvement of modern management methods, people's sense of time efficiency has been constantly strengthened. In the past, only people were not heard of their communication methods, affecting interpersonal communication.Multi-Protocol Label Switching MPLS) combines the label-based Layer 2 technology with the layer-3 routing technology, and introduces a connection-oriented mechanism in a connectionless IP address, A
Today we will talk about the establishment of LSP in the MPLS network by the Belkin router. I believe many people do not quite understand what the MPLS network structure is. I will give you a brief introduction below.1. MPLS network structure 1. The so-called MPLS network is the basic unit of the label exchange router
transport standard organization, and ITU-T SG15 only defines a series of standards based on Ethernet transport networks, MSTP is not officially mentioned. The reason may be that we believe that MSTP belongs to the category of communication products or devices, and similar terms are inappropriate in rigorous technical standards, but in fact, the content of technical standard specifications is consistent with the actual MSTP product features.
Whether it's ITU-T or China's industry standard [1-6],
As the network continues to expand, the volume of data traffic is growing, business increasingly complex, so that the existing network overwhelmed, people are increasingly unable to endure the best effort transmission mode.
On the other hand, Internet service provider ispinternet service Providers pay more attention to profit than ever before, the Internet urgently needs to expand on demand bandwidth consumption, fast and convenient route choice, Guaranteed quality of service qosquality of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.