O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

MPLS and VPN Architectures, Volume II

Book Description

Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks

With MPLS and VPN Architectures, Volume II, you'll learn:

  • How to integrate various remote access technologies into the backbone providing VPN service to many different types of customers

  • The new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT)

  • How VRFs can be extended into a customer site to provide separation inside the customer network

  • The latest MPLS VPN security features and designs aimed at protecting the MPLS VPN backbone

  • How to carry customer multicast traffic inside a VPN

  • The latest inter-carrier enhancements to allow for easier and more scalable deployment of inter-carrier MPLS VPN services

  • Advanced troubleshooting techniques including router outputs to ensure high availability

  • MPLS and VPN Architectures, Volume II, builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.

    MPLS and VPN Architectures, Volume II, begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting.

    MPLS and VPN Architectures, Volume II, also introduces the latest advances in customer integration, security, and troubleshooting features essential to providing the advanced services based on MPLS VPN technology in a secure and scalable way.

    This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

    Table of Contents

    1. Copyright
    2. About the Authors
    3. About the Technical Reviewers
    4. About the Content Reviewer
    5. Acknowledgments
    6. Introduction
    7. Icons Used in This Book
    8. Command Syntax Conventions
    9. Introduction
      1. MPLS VPN Architecture Overview
        1. MPLS VPN Terminology
        2. Connection-Oriented VPNs
        3. Connectionless VPNs
        4. MPLS-Based VPNs
        5. New MPLS VPN Developments
        6. Summary
    10. Advanced PE-CE Connectivity
      1. Remote Access to an MPLS VPN
        1. Feature Enhancements for MPLS VPN Remote Access
        2. Overview of Access Protocols and Procedures
        3. Providing Dial-In Access to an MPLS VPN
        4. Providing Dial-Out Access via LSDO
        5. Providing Dial-Out Access Without LSDO (Direct ISDN)
        6. Providing Dial Backup for MPLS VPN Access
        7. Providing DSL Access to an MPLS VPN
        8. Providing Cable Access to an MPLS VPN
        9. Advanced Features for MPLS VPN Remote Access
        10. Summary
      2. PE-CE Routing Protocol Enhancements and Advanced Features
        1. PE-CE Connectivity: OSPF
        2. PE-CE Connectivity: Integrated IS-IS
        3. PE-CE Connectivity: EIGRP
        4. Summary
      3. Virtual Router Connectivity
        1. Configuring Virtual Routers on CE Routers
        2. Linking the Virtual Router with the MPLS VPN Backbone
        3. VRF Selection Based on Source IP Address
        4. Performing NAT in a Virtual Router Environment
        5. Summary
    11. Advanced Deployment Scenarios
      1. Protecting the MPLS-VPN Backbone
        1. Inherent Security Capabilities
        2. Neighbor Authentication
        3. CE-to-CE Authentication
        4. Control of Routes That Are Injected into a VRF
        5. PE to CE Circuits
        6. Extranet Access
        7. Internet Access
        8. IPSec over MPLS
        9. Summary
      2. Large-Scale Routing and Multiple Service Provider Connectivity
        1. Large Scale Routing: Carrier's Carrier Solution Overview
        2. Carrier Backbone Connectivity
        3. Label Distribution Protocols on PE-CE Links
        4. BGP-4 Between PE/CE Routers
        5. Hierarchical VPNs: Carrier's Carrier MPLS VPNs
        6. VPN Connectivity Between Different Service Providers
        7. Summary
      3. Multicast VPN
        1. Introduction to IP Multicast
        2. Enterprise Multicast in a Service Provider Environment
        3. mVPN Architecture
        4. MDTs
        5. Case Study of mVPN Operation in SuperCom
        6. Summary
      4. IP Version 6 Transport Across an MPLS Backbone
        1. IPv6 Business Drivers
        2. Deployment of IPv6 in Existing Networks
        3. Quick Introduction to IPv6
        4. In-Depth 6PE Operation and Configuration
        5. Complex 6PE Deployment Scenarios
        6. Summary
    12. Troubleshooting
      1. Troubleshooting of MPLS-Based Solutions
        1. Introduction to Troubleshooting of MPLS-Based Solutions
        2. Troubleshooting the MPLS Backbone
        3. Other Quick Checks
        4. MPLS Control Plane Troubleshooting
        5. MPLS Data Plane Troubleshooting
        6. MPLS VPN Troubleshooting
        7. In-Depth MPLS VPN Troubleshooting
        8. Summary
    13. Index