JSPX_14.a_SG_V1
JSPX_14.a_SG_V1
A
SH
Junos Service Provider Switching
T
NO
14.a
DO
—
Student Guide
Volume 1
LY
ON
E
US
408-745-2000
www.juniper.net
A
marks are the property of their respective owners.
Junos Service Provider Switching Student Guide, Revision 14.a
Copyright © 2015, Juniper Networks, Inc.
SH
All rights reserved. Printed in USA.
Revision History:
Revision 10.a—May 2010
Revision 11.a—December 2011
Revision 12.a—May 2013
T
Revision 12.b—June 2015
The information in this document is current as of the date listed above.
NO
The information in this document has been carefully verified and is believed to be accurate for software Release 14.2R3.8. Juniper Networks assumes no responsibilities for
any inaccuracies that may appear in this document. In no event will Juniper Networks be liable for direct, indirect, special, exemplary, incidental or consequential damages
resulting from any defect or omission in this document, even if advised of the possibility of such damages.
DO
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has no known
time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
—
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable, in an agreement
executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and agree to be bound by its
license terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the Juniper Networks software, may contain
prohibitions against certain uses, and may state conditions under which the license is automatically terminated. You should consult the software license for further details.
LY
ON
E
US
AL
RN
TE
IN
Contents
RE
Chapter 1: Course Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
A
SH
Chapter 2: Ethernet Switching and Virtual LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Ethernet LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Configuring and Monitoring VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Automating VLAN Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-31
T
Configuring and Monitoring IRB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-43
Layer 2 Address Learning and Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-48
NO
Layer 2 Firewall Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-54
Ethernet Switching and VLANs Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-65
DO
Routing Instances Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Configuring and Monitoring Virtual Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Interconnecting Routing Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22
Virtual Switches Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33
—
Chapter 4: Provider Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Expanding the Bridged Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
LY
iv • Contents www.juniper.net
Course Overview
RE
This two-day course is designed to provide students with intermediate switching knowledge and configuration examples.
The course includes an overview of switching concepts such as LANs, Layer 2 address learning, bridging, virtual LANs
(VLANs), provider bridging, VLAN translation, spanning-tree protocols, and Ethernet Operation, Administration, and
A
Maintenance (OAM). This course also covers Junos operating system-specific implementations of integrated routing and
bridging (IRB) interfaces, routing instances, virtual switches, load balancing, and port mirroring. Furthermore, this course
SH
covers the basics of Multiple VLAN Registration Protocol (MVRP), link aggregation groups (LAG), and multichassis LAG
(MC-LAG). This course is based on the Junos OS Release 14.2R3.8.
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS
and in device operations.
T
Objectives
NO
After successfully completing this course, you should be able to:
• Describe carrier Ethernet.
• Describe the different Ethernet standards organizations.
• Describe the Layer 2 services that are available on the MX Series 3D Ethernet Universal Edge Routers.
DO
• Describe the function of an Ethernet LAN.
• Describe learning and forwarding in a bridging environment.
• Describe Ethernet frame filtering.
• Implement VLAN tagging. —
• Describe and implement MVRP.
• Implement IRB.
LY
• Describe the different Institute of Electrical and Electronics Engineers (IEEE) VLAN stacking models.
US
• Describe the basic operation of the STP, the Rapid Spanning Tree Protocol (RSTP), the Multiple Spanning
Tree Protocol (MSTP), and the VLAN Spanning Tree Protocol (VSTP)
• Configure and monitor the STP, the RSTP, the MSTP, and the VSTP.
RN
• Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection.
• Explain typical OAM features.
• Describe the basic operation of link fault management (LFM).
TE
RE
• Configure and monitor a LAG and MC-LAGs.
• Describe the basic functionality of MX Series Virtual Chassis.
• Describe a basic troubleshooting method.
A
• List common issues that disrupt network operations.
SH
• Identify tools used in network troubleshooting.
• Use available tools to resolve network issues.
Intended Audience
This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.
T
Course Level
NO
Junos Service Provider Switching is an intermediate-level course.
Prerequisites
Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI)
model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS)
DO
and Junos Routing Essentials (JRE) courses prior to attending this class.
—
LY
ON
E
US
AL
RN
TE
IN
RE
Day 1
Chapter 1: Course Introduction
A
Chapter 2: Ethernet Switching and Virtual LANs
SH
Ethernet Switching and VLANs Lab
Chapter 3: Virtual Switches
Virtual Switches Lab
Chapter 4: Provider Bridging
T
Provider Bridging Lab
NO
Day 2
Chapter 5: Spanning-Tree Protocols
MSTP Lab
Chapter 6: Ethernet OAM
DO
Ethernet OAM Lab
Chapter 7: High Availability and Network Optimization
High Availability and Network Optimization Lab
Chapter 8: Troubleshooting and Monitoring
—
Troubleshooting and Monitoring Lab
LY
ON
E
US
AL
RN
TE
IN
RE
CLI and GUI Text
Frequently throughout this course, we refer to text that appears in a command-line interface (CLI) or a graphical user
A
interface (GUI). To make the language of these documents easier to read, we distinguish GUI and CLI text from chapter
text according to the following table.
SH
Style Description Usage Example
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
T
Courier New Console text:
commit complete
• Screen captures
NO
• Noncommand-related Exiting configuration mode
syntax
GUI text elements:
Select File > Open, and then click
• Menu names Configuration.conf in the
DO
Filename text box.
• Text field entry
CLI Input Text that you must enter. lab@San_Jose> show route
GUI Input Select File > Save, and type
config.ini in the Filename field.
E
Finally, this course distinguishes between regular text and syntax variables, and it also distinguishes between syntax
variables where the value is already assigned (defined variables) and syntax variables where you must assign the value
(undefined variables). Note that these styles can be combined with the input style as well.
AL
CLI Undefined Text where the variable’s value is Type set policy policy-name.
the user’s discretion or text where
ping 10.0.x.y
the variable’s value as shown in
GUI Undefined the lab guide might differ from the Select File > Save, and type
TE
RE
Education Services Offerings
You can obtain information on the latest Education Services offerings, course dates, and class locations from the World
A
Wide Web by pointing your Web browser to: http://www.juniper.net/training/education/.
About This Publication
SH
The Junos Service Provider Switching Student Guide was developed and tested using software Release 14.2R3.8.
Previous and later versions of software might behave differently so you should always consult the documentation and
release notes for the version of code you are running before reporting errors.
This document is written and maintained by the Juniper Networks Education Services development team. Please send
T
questions and suggestions for improvement to [email protected].
NO
Technical Publications
You can print technical manuals and release notes directly from the Internet in a variety of formats:
• Go to http://www.juniper.net/techpubs/.
• Locate the specific software or hardware release and title you need, and choose the format in which you
DO
want to view or print the document.
Documentation sets and CDs are available through your local Juniper Networks sales office or account representative.
Juniper Networks Support
For technical support, contact Juniper Networks at http://www.juniper.net/customers/support/, or at 1-888-314-JTAC
—
(within the United States) or 408-745-2121 (from outside the United States).
LY
ON
E
US
AL
RN
TE
IN
T
NO
Chapter 1: Course Introduction
DO
—
LY
ON
E
US
AL
RN
TE
IN
Junos Service Provider Switching
A RE
SH
T
NO
DO
—
LY
ON
We Will Discuss:
• Objectives and course content information;
E
A RE
SH
T
NO
DO
—
LY
ON
Introductions
The slide asks several questions for you to answer during class introductions.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Course Contents
The slide lists the topics we discuss in this course.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Prerequisites
The slide lists the prerequisites for this course.
E
US
AL
RN
TE
IN
RE
A
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
Additional Resources
The slide provides links to additional resources available to assist you in the installation, configuration, and operation of
Juniper Networks products.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Satisfaction Feedback
Juniper Networks uses an electronic survey system to collect and analyze your comments and feedback. Depending on the
class you are taking, please complete the survey at the end of the class, or be sure to look for an e-mail about two weeks
E
from class completion that directs you to complete an online survey form. (Be sure to provide us with your current e-mail
address.)
US
Submitting your feedback entitles you to a certificate of class completion. We thank you in advance for taking the time to
help us improve our educational offerings.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
staff with deep technical and industry knowledge, providing you with instructor-led hands-on courses in the classroom and
online, as well as convenient, self-paced eLearning courses.
US
Courses
You can access the latest Education Services offerings covering a wide range of platforms at
http://www.juniper.net/training/technical_education/.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
hands-on configuration and troubleshooting exams. Successful candidates demonstrate thorough understanding of Internet
and security technologies and Juniper Networks platform configuration and troubleshooting skills.
US
Associate-level and Specialist-level exams are computer-based exams composed of multiple choice questions administered
at Prometric testing centers worldwide.
Professional-level and Expert-level exams are composed of hands-on lab exercises administered at select Juniper Networks
testing centers. Professional-level and Expert-level exams require that you first obtain the next lower certification in the track.
TE
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
Junos Genius
The Junos Genius application takes certification exam preparation to a new level. With Junos Genius you can practice for
your exam with flashcards, simulate a live exam in a timed challenge, and even build a virtual network with device
E
achievements earned by challenging Juniper instructors. Download the app now and Unlock your Genius today!
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Find Us Online
The slide lists some online resources to learn and share information about Juniper Networks.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Any Questions?
If you have any questions or concerns about the class you are attending, we suggest that you voice them now so that your
instructor can best address your needs during class.
E
T
NO
Chapter 2: Ethernet Switching and Virtual LANs
DO
—
LY
ON
E
US
AL
RN
TE
IN
Junos Service Provider Switching
A RE
SH
T
NO
DO
—
LY
ON
We Will Discuss:
• The functions of an Ethernet LAN;
E
A RE
SH
T
NO
DO
—
LY
ON
Ethernet LANs
The slide lists the topics we will discuss. We discuss the highlighted topic first.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Ethernet Defined
Ethernet is a family of LAN specifications defined in the Institute of Electrical and Electronics Engineers (IEEE) 802.3
standard. The slide lists some common examples, including the 802.3i, 802.3u, and 802.3ab specifications. Each Ethernet
E
implementation uses a unique wiring and signaling standard—typically a copper-based medium or fiber optics—for the
Physical Layer. Although the various implementations of Ethernet can use various wiring and signaling standards, they all
US
Each node on a LAN has a unique identifier so that it can be unambiguously located on the network. Ethernet uses the Layer
2 media access control (MAC) address for this purpose. MAC addresses are 48-bit hardware addresses programmed into the
Ethernet processor of each node.
Ethernet uses the carrier-sense multiple access with collision detection (CSMA/CD) protocol to avoid and manage frame
RN
collisions.
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
connected through a hub using a copper-based physical medium. This type of implementation allows only a single stream of
data at a time. All nodes participating in this shared Ethernet LAN listen to verify that the line is idle before transmitting. If
US
the line is idle, the nodes begin transmitting data frames. If multiple nodes listen and detect that the line is idle and then
begin transmitting data frames simultaneously, a collision occurs. When collisions occur, an error is generated and travels
back to the transmitting devices. When a node receives a collision error message, it stops transmitting immediately and
waits for a period of time before trying to send the frame again. If the node continues to detect collisions, it progressively
increases the time between retransmissions in an attempt to find a time when no other data is being transmitted on the
AL
LAN. The node uses a backoff algorithm to calculate the increasing retransmission time intervals. When a node does
successfully transmit traffic, that traffic replicates out all ports on the hub and all other nodes on the shared Ethernet
segment see it. This traffic-flooding approach, coupled with collisions, consumes network resources.
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
segment, each participating node receives an increase of traffic from all other participating nodes for which it is not the
actual destination. This unwanted consumption of network resources, along with an increase of collisions, inevitably
US
A RE
SH
T
NO
DO
—
LY
ON
Bridging
The slide highlights the topic we discuss next.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Bridging Defined
Defined in the IEEE 802.1D-2004 standard, bridging addresses some of the inherent problems of large, shared Ethernet
LANs. Bridging uses microsegmentation to divide a single-collision domain into multiple, smaller, bridged collision domains.
E
Reducing the size of a collision domain effectively reduces the likelihood that collisions might occur. This approach also
enhances performance by allowing multiple streams of data to flow through the switch within a common LAN or broadcast
US
domain.
Bridging allows a mixed collection of interface types and speeds to be logically grouped within the same bridged LAN. The
ability to logically group dissimilar interfaces in a bridged LAN environment provides design flexibility not found in a shared
Ethernet LAN environment.
AL
Bridging builds and maintains a forwarding table, known as a bridge table, for all destinations within the bridged LAN. The
bridge table is based on the source MAC addresses for all devices participating in the bridged LAN. The bridge table can aid
in intelligent forwarding decisions. This approach reduces unnecessary traffic on the LAN.
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Bridging Mechanics
The transparent bridging protocol allows a switch to learn information about all nodes on the LAN. The switch uses this
information to create the address-lookup tables, referred to as bridge tables, that it consults when forwarding traffic to (or
E
When a switch first connects to an Ethernet LAN or VLAN, it has no information about other nodes on the network. Learning
is a process the switch uses to obtain the MAC addresses of all the nodes on the network. It stores these addresses in a
bridge table. To learn MAC addresses, the switch reads all frames that it detects on the LAN or on the local VLAN, looking for
MAC addresses of sending nodes. It places these addresses into its bridge table, along with two other pieces of information—
the interface (or port) on which the traffic was received and the time it learned the address.
AL
The switch uses the forwarding mechanism to deliver traffic, passing it from an incoming interface to an outgoing interface
that leads to (or toward) the destination. To forward frames, the switch consults the bridge table to determine whether the
table contains the MAC address corresponding to the destination of the frames. If the bridge table contains an entry for the
desired destination address, the switch sends the traffic out the interface associated with the MAC address. The switch also
RN
consults the bridge table in the same way when transmitting frames that originate on devices connected directly to the
switch.
Continued on the next page.
TE
IN
RE
Flooding is a transparent mechanism used to deliver packets to unknown MAC addresses. If the bridging table has no entry
for a particular destination MAC address, or if the packet received is a broadcast or multicast packet, the switch floods the
traffic out all interfaces except the interface on which it was received. (If traffic originates on the switch, the switch floods
that traffic out all interfaces.) When the unknown destination host responds to traffic that has been flooded through a
A
switch, the switch learns the MAC address of that node and updates its bridge table with the source MAC address of the host
and ingress port.
SH
The filtering mechanism limits traffic to its associated network segment or VLAN. As the number of entries in the bridge table
grows, the switch pieces together an increasingly complete picture of the individual network segments—the picture clarifies
which nodes belong to which network. The switch uses this information to filter traffic. Filtering prevents the switch from
forwarding traffic from one network segment to another.
T
Finally, the switch uses aging to ensure that only active MAC address entries are in the bridge table. For each MAC address
in the bridge table, the switch records a timestamp of when it learned the information about the network node. Each time
NO
the switch detects traffic from a MAC address, it updates the timestamp. A timer on the switch periodically checks the
timestamp; if the timestamp is older than the global-mac-table-aging-time value (discussed later in this chapter),
the switch removes the node’s MAC address from the bridge table.
DO
—
LY
ON
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
LAN, the switch reviews that traffic and creates a MAC address table (a bridge table) based on the source address of the
sender along with the switch port on which it received the traffic. In this example, we see that the MAC addresses for A1 and
US
A2 are associated with port ge-0/0/0, whereas the MAC addresses for B1 and B2 are associated with port ge-0/0/1.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
that the destination MAC address does not match its own MAC address, at which time A2 discards the frame. The switch
receives the frame, checks the MAC address table for a matching entry, and forwards the frame out the associated port
US
based on the lookup results. Ultimately, B2 receives and processes the frame while B1 receives and discards the frame.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
matches its own MAC address, at which time A2 processes the frame. The switch receives the frame and checks the MAC
address table for a matching entry. The entry in the MAC address table shows the egress port, which, in this example, is the
US
same port on which the switch received the frame. Because the egress port in the MAC address table is the same port on
which the frame was received, the switch filters the frame.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Flooding Frames
Flooding is used to learn a MAC address not recorded in the bridge table. This mechanism is also used when sending
broadcast and, in many cases, multicast frames. The example on the slide shows A1 sending a broadcast frame with a
E
destination MAC address of FFFF.FFFF.FFFF to the LAN. The attached hub sends the frame out all ports. The switch floods
the broadcast frame out all ports associated with the LAN, except for the port on which it received the frame. The slide shows
US
A RE
SH
T
NO
DO
—
LY
ON
associated VLANs.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
00:21:59:ab:8a:99 D ge-1/0/3.0
...
Routing instance : default-switch
Bridging domain : vlan_200, VLAN : 200
MAC MAC Logical
TE
RE
user@switch> clear bridge mac-table interface ge-1/0/3.0
A
MAC flags (S -static MAC, D -dynamic MAC,
SE -Statistics enabled, NM -Non configured MAC)
SH
Routing instance : default-switch
Bridging domain : vlan_100, VLAN : 100
MAC MAC Logical
address flags interface
T
00:21:59:ab:8a:95 D ge-1/0/0.0
NO
MAC flags (S -static MAC, D -dynamic MAC,
SE -Statistics enabled, NM -Non configured MAC)
DO
Bridging domain : vlan_200, VLAN : 200
MAC MAC Logical
address flags interface
00:21:59:ab:8a:97 D ge-1/0/2.0
—
LY
ON
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
VLANs Defined
A VLAN is a collection of network nodes that are logically grouped together to form separate broadcast domains. A VLAN has
the same general attributes as a physical LAN, but it allows all nodes for a particular VLAN to be grouped together, regardless
E
of physical location. One advantage of using VLANs is design flexibility. VLANs allow grouping of individual users based on
business needs. You can establish and maintain connectivity within a VLAN through software configuration, which makes
US
A RE
SH
T
NO
DO
—
LY
ON
An access port connects to network devices such as desktop computers, IP phones, printers, or file servers. Access ports
typically belong to a single VLAN and transmit and receive untagged Ethernet frames.
US
A trunk port typically connects to another switch or to a customer edge router. Interfaces configured for trunk mode handle
traffic for multiple VLANs, multiplexing the traffic for all configured VLANs over the same physical connection, and separating
the traffic by tagging it with the appropriate VLAN ID. Trunk ports can also carry untagged traffic when configured with the
native-vlan-id statement. Furthermore, trunk ports send control traffic untagged.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
802.1Q—Ethernet Frame
To consistently associate traffic with a particular VLAN, the individual frames must be tagged as they pass throughout a
network. The slide illustrates an 802.1Q-tagged Ethernet frame along with the key components of the tag:
E
• Priority;
• Canonical Format Indicator (CFI); and
• Unique VLAN identifier (VID).
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
multiple VLANs, multiplexing the traffic for all configured VLANs over a single physical connection rather than using separate
physical links for each configured VLAN.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
of a named bridge domain. This method requires that you configure each VLAN as part of a single bridge domain. On a
subsequent slide, we cover how we can specify several VLANs within a single bridge domain using the vlan-id-list
US
statement.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
The slide also illustrates the usage of the native-vlan-id statement. This configuration statement does two things.
First, if interface ge-1/0/3 receives any untagged frames, it associates those frames to VLAN 100. Second, if interface ge-1/
0/3 transmits any outgoing frames that associate with VLAN 100, they transmit as untagged frames.
Notice the vlan-id-list statement. It specifies the VLANs to which the interface will be a member. The following
statements are examples of how you can use the vlan-id-list statement:
AL
• vlan-id-list [100-109 111-200]: All VLANs between 100 and 200, except VLAN 110; or
• vlan-id-list [100-109 111 113-200]: All VLANs between 100 and 200, except VLAN 110 and 112.
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
statement, you would use the vlan-id-list statement. The usage of this statement is similar to the usage described on
the previous page. When using the vlan-id-list statement, the switch automatically configures the appropriate bridge
US
domains, which have names that take the form prefix-vlan-number, where the prefix is the configured bridge
domain name.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
interface is configured as an access port, it receives and transmits only untagged frames. If a trunk port were also
configured to pass traffic for the vlan_100 bridge domain, it would add and remove the 802.1Q tag value of 100 for all
US
traffic for the vlan_100 bridge domain. We look at a trunk port configuration and monitoring example next.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
interconnecting the switches). Because of this configuration, all broadcast and unknown unicast traffic sourced and
destined within a given VLAN should be flooded throughout the entire Layer 2 network passing through all access and
US
distribution switches.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
ports for VLAN 10). Even though AS-3 no longer has active end-user devices participating in VLAN 10, it still receives all
broadcast and unknown unicast traffic associated with VLAN 10 because of the current configurations on the connected
US
switches.
In order to stop this unwanted traffic from being flooded on to AS-3, you must modify the configurations on the connected
distribution switches (DS-1 and DS-2) so that their trunk ports, which connect to AS-3, no longer service VLAN 10.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Introducing MVRP
To simplify VLAN management, you can enable MVRP on your EX Series Ethernet Switches. MVRP dynamically manages
VLAN registration in a LAN. MVRP helps reduce administration and network overhead by dynamically pruning VLAN
E
information when a switch no longer has active access ports for a configured VLAN. In addition to the pruning functionality,
MVRP can also be used to dynamically create VLANs in switching networks.
US
MVRP is an application protocol of the Multiple Registration Protocol (MRP) and is defined in the IEEE 802.1ak standard.
MRP and MVRP were designed by IEEE to perform the same functions as Generic Attribute Registration Protocol (GARP) and
GARP VLAN Registration Protocol (GVRP). MRP and MVRP overcome some GARP and GVRP limitations, in particular
limitations involving bandwidth usage and convergence time in large networks with large numbers of VLANs.
AL
MVRP was created by IEEE as a replacement application for GVRP. MX Series switches support MVRP. We do not cover GVRP
in this course.
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
which VLANs and which switch interfaces are in which VLAN. MVRP shares all information in the PDU with all switches
participating in MVRP in the switching network.
US
MVRP stays synchronized using these PDUs. The MVRP PDUs are sent to other switches on the network only when an MVRP
state change occurs. Switches participating in MVRP receive these PDUs during state changes and update their MVRP states
accordingly. MVRP timers dictate when PDUs can be sent and when switches receiving MVRP PDUs can update their MVRP
information.
AL
MVRP registration and updates are controlled by timers that are part of the MRP protocol. These timers are set on a
per-interface basis and define when MVRP PDUs can be sent and when MVRP information can be updated on a switch. The
following timers are used to control MVRP operations:
RN
• Join: Controls the interval for the next MVRP PDU transmit opportunity.
• Leave: Controls the period of time that an interface on the switch waits in the Leave state before changing to
the unregistered state.
• LeaveAll: Controls the frequency with which the interface generates LeaveAll messages.
TE
RE
VLAN information is distributed as part of the MVRP message exchange process and can be used to dynamically create
VLANs, which are VLANs created on one switch and propagated to other switches as part of the MVRP message exchange
process. Dynamic VLAN creation using MVRP is enabled by default but can be disabled.
MVRP uses MRP messages to register and declare MVRP states for a switch and to inform the switching network of state
A
changes. These messages are included in the PDUs and communicate state information to the other switches in the
network. The following messages are communicated for MVRP:
SH
• Empty: VLAN information is not being declared and is not registered.
• In: VLAN information is not being declared but is registered.
• JoinEmpty: VLAN information is being declared but not registered.
T
• JoinIn: VLAN information is being declared and is registered.
NO
• Leave: VLAN information that was previously registered is being withdrawn.
• LeaveAll: All registrations will be de-registered. Participants that want to participate in MVRP must
re-register.
• New: VLAN information is new and possibly not previously registered.
DO
To ensure VLAN membership information is current, MVRP uses the MRP messages to remove switches and interfaces that
are no longer available from the VLAN information. Pruning VLAN information limits the network VLAN configuration to active
participants only, reducing network overhead. Pruning VLAN information also targets the scope of broadcast, unicast with
unknown destination, and multicast (BUM) traffic to interested devices only.
MVRP is disabled by default on all MX Series devices. You can configure MVRP on MX Series device interfaces to participate
—
in MVRP for the switching network. MVRP can only be enabled on trunk interfaces, and dynamic VLAN configuration through
MVRP is enabled by default when MVRP is enabled. We cover MVRP configuration on a subsequent slide. Note that MVRP
does not support all spanning tree protocols. Currently, MVRP does not support the VLAN Spanning Tree Protocol (VSTP).
LY
ON
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A Starting Point
When implementing MVRP, you should ensure that all required VLANs are configured on the access switches and that the
access ports are associated with their respective VLANs. We illustrate a basic starting point configuration for the AS-1 switch
E
on the slide. Note that the sample configuration is trimmed for brevity and that the AS-2 switch requires a similar
configuration.
US
Also worth noting is that none of the trunk ports, on any of the participating switches, should be associated with the
configured VLANs. The trunk ports must still be configured under the
[edit interfaces] hierarchy level as trunk ports, but they will not be manually associated with VLANs. MVRP will make
the needed associations once it is enabled.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Enabling MVRP
This slide illustrates the required configuration used to enable MVRP. Note that MVRP is only enabled on the trunk ports of
all participating switches. Once MVRP is enabled, dynamic VLAN configuration information will be shared and created on
E
participating switches. You can disable dynamic VLAN configuration using the following no-dynamic-vlan statement:
US
[edit protocols]
user@AS-1# show
mvrp {
no-dynamic-vlan;
interface ge-0/0/14.0;
AL
}
Continued on the next page.
RN
TE
IN
RE
Remember that MVRP registration and updates are controlled by timers, which are part of MRP. These timers are set on a
per-interface basis and define when MVRP PDUs can be sent and when MVRP information can be updated. If needed, you
can adjust the timers as shown here:
A
[edit protocols]
user@AS-1# set mvrp interface ge-0/0/14 ?
SH
Possible completions:
<[Enter]> Execute this command
+ apply-groups Groups from which to inherit configuration data
+ apply-groups-except Don't inherit configuration data from these groups
join-timer Join timer interval (100..500 milliseconds)
leave-timer Leave timer interval (300..1000 milliseconds)
T
leaveall-timer Leaveall timer interval (10..60 seconds)
NO
point-to-point Port is point to point
registration Registration mode
| Pipe through a command
The default MVRP timer values are 200 ms for the join timer, 800 ms for the leave timer, and 10,000 ms for the leaveall
timer. Unless there is a compelling reason to make a change, we recommend you use the default timer settings. Modifying
timers to inappropriate values might cause an imbalance in MVRP operations.
DO
—
LY
ON
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
switch and a router at the same time. An integrated routing and bridging (IRB) interface is a logical Layer 3 interface used as
an IP gateway for a VLAN. The following slides provide configuration and monitoring examples for an IRB interface.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
operation, the attached devices must have configured gateway addresses that match the IP address associated with the
corresponding IRB interface.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Monitoring IRB
The slide lists a key command used to monitor an IRB interface, and shows the output from the show interfaces
terse command. This command shows the state and IP address information for an IRB interface. As indicated on the slide,
E
at least one active port must associate with the bridge domain for the IRB interface to be administratively up.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Verifying Routing
As with any router, when you configure an IP address for an interface on that router, routes are automatically added to the
routing table. In the Junos OS, for each configured IP interface, two routes are added to the routing table. One route is a host
E
route (32-bit mask) that is used to forward traffic to the Routing Engine (RE) when locally destined packets arrive. The other
route is a route to the network subnet to which that interface belongs. This route allows the router to route packets to other
US
hosts on that same subnet. The slide shows that four routes were added to the inet.0 table as a result of configuring two IRB
interfaces.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
change as well as where the changes can apply to a switch. The following list provides configurable values for each of the
MAC learning properties:
US
To view MAC statistics once you enable the feature, issue the show bridge mac-table extensive command.
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Switch level settings apply to all bridge domains associated with a virtual switch.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Interface Level
US
Settings at this level affect only the interface specified in the configuration.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
but still forwards or floods traffic in the case of unknown destinations. The slide shows that this default behavior was
overridden so that Ethernet frames with unknown destinations will drop when the configured limit is reached.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
Actions
You can use filters to control the frames destined to the RE as well as control frames passing through the router.
E
Accept or Discard
US
You can define input filters that affect only inbound traffic and output filters that affect only outbound traffic. Filters can
accept or discard frames based on the contents of the frame’s address fields, protocol type, VLAN ID, or even the 802.1p bit
field in the frame header.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Syntax
A Junos OS filter consists of one or more named terms, similar to a policy statement. Each term has a set of match
conditions preceded by the keyword from, and a set of actions or action modifiers preceded by the keyword then.
E
Hierarchy Level
US
Layer 2 firewall filters are defined under the [edit firewall family bridge] section of the configuration hierarchy.
Firewall filter terms (at least one term is necessary) are processed sequentially. If no from condition is present, then all
frames match. If no frames match any term, the default action is to discard the frame silently! Take care to ensure that
wanted frames are not discarded. Use the command-line interface (CLI) insert, copy, and rename functions to assist in
the management of your multiterm firewall filters.
RN
slides.
IN
A RE
SH
T
NO
DO
—
LY
ON
output filter at the [edit interface interface interface-name unit number family bridge filter]
level of the configuration hierarchy. To apply a filter to all interfaces that belong to a particular bridge domain, you can apply
US
a firewall filter at the [edit bridge-domain name forwarding-options filter] level of the configuration
hierarchy. If firewall filters are applied as input filters to both the interface and bridge-domain levels, the Junos OS logically
concatenates the bridge- domain-level filter to the end of the interface-level filter.
Note that you cannot use bridge-domain-level filters when the vlan-id-list statement was used to create the bridge
AL
domain.
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Single Terms
When a firewall filter consists of a single term, the filter is evaluated as follows: if the frame matches all the conditions, the
device takes the action in the then statement; if the frame does not match all the conditions, the device discards it.
E
Multiple Terms
US
When a firewall filter consists of more than one term, the filter is evaluated sequentially. First, the frame is evaluated against
the conditions in the from statement in the first term. If the frame matches, the device takes the action in the then
statement. If it does not match, it is evaluated against the conditions in the from statement in the second term. This
process continues until either the frame matches the from condition in one of the subsequent terms or until no more terms
AL
remain.
If a frame passes through all the terms in the filter without matching any of them, the device discards it.
If a term does not contain a from statement, the frame is considered to match, and the device takes the action in the term’s
RN
then statement.
If a term does not contain a then statement, or if you do not configure an action in the then statement (that is, the frame
is just counted), and if the frame matches the conditions in the term’s from statement, the device accepts the frame.
TE
Filter Lists
Instead of applying a single filter to an interface using filter input or filter output, you can apply a list of up to 16 filters. You
perform this action with the input-list and output-list keywords.
IN
A RE
SH
T
NO
DO
—
LY
ON
ARE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
Match Actions
accept and discard are the actions that you can apply to a frame. However, you can apply modifiers to the frames as
well:
E
• count: This modifier counts the number of matches that occur to a named counter. See the current totals by
US
A RE
SH
T
NO
DO
—
LY
ON
Example Filter
• The slide shows an example of configuring, applying, and viewing the effects of a firewall filter named
myFilterName. To clear the counters, use the clear firewall command.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
We Discussed:
• The functions of an Ethernet LAN;
E
A RE
SH
T
NO
DO
—
LY
ON
Review Questions
1.
E
2.
US
3.
AL
4.
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
RE
1.
A bridge domain allows you to specify which VLANs will be used for Layer 2 switching.
2.
A
A bridge generally forwards multicast frames out of every interface except for the one from which they were received.
SH
3.
A IRB interface eliminates the need for an external router to route between VLANs. It acts as an IP gateway for the hosts attached to a
VLAN.
4.
T
The match condition used in a Layer 2 firewall filter to match on 802.1p priority bits is learn-vlan-1p-priority.
NO
DO
—
LY
ON
E
US
AL
RN
TE
IN
T
NO
Chapter 3: Virtual Switches
DO
—
LY
ON
E
US
AL
RN
TE
IN
Junos Service Provider Switching
A RE
SH
T
NO
DO
—
LY
ON
We Will Discuss:
• The use of a routing instance;
E
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
allow your single chassis to appear as either more than one router or more than one switch, respectively. Each virtual router
acts as a standalone router. For example, each virtual router has its own routing table, routing protocols, interfaces, and just
US
about everything that encompasses the typical things that comprise a router. Similarly, each configured virtual switch has its
own MAC tables, virtual LAN (VLAN) ID space, bridge domains, spanning-tree domains, and so forth. A Juniper Networks MX
Series 3D Universal Edge Router uses two default routing instances. For routing, it uses the default virtual router (inet.0 is
its routing table). For switching, it uses the default-switch virtual switch.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
tables. When troubleshooting virtual routers and switches, you generally can spend your time focused on the Routing
Engine’s (RE’s) copy of the routing and MAC tables, while trusting that equivalent copies appear as forwarding tables in the
US
PFEs of your switch. To view the PFE forwarding tables, both for routing and switching, use the show route
forwarding-table command.
In a routing-only environment, configured interfaces and their associated local and direct routes appear in the default virtual
router’s routing table, inet.0. In a mixed Layer 2 and Layer 3 environment, Layer 3 interfaces continue to work as
AL
described, whereas Layer 2 interfaces, having been associated with a bridge domain at the [edit bridge-domains]
hierarchy, associate with the default virtual switch’s MAC tables. Because IRB interfaces are Layer 3 interfaces, their
associated local and direct routes appear in inet.0 as well.
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
table. To override that behavior, you simply list the interface at the [edit routing-instances instance-name]
level of the hierarchy. The local and direct routes now appear in the instance-name.inet.0 routing table (the virtual
US
A RE
SH
T
NO
DO
—
LY
ON
Virtual Switch
The slide shows the routing and MAC table relationships when using virtual switches. Each virtual switch, including the
default switch, has interfaces assigned for bridging. Also, you can configure integrated routing and bridging (IRB) interfaces
E
for each virtual switch. The local and direct routes for all IRB interfaces in all virtual switches are placed in inet.0, by
default. However, you can also place them in a virtual router’s routing table by listing the IRB interfaces at the [edit
US
routing-instances instance-name] level of the hierarchy. The following slides cover the process of configuring a
virtual switch.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
careful not to commit the configuration as it stands, because you might introduce a loop into your switched network. One of
the following slides shows how to place the interface in the virtual switch. We highly recommend that you perform that step
US
A RE
SH
T
NO
DO
—
LY
ON
switch. Be careful not to commit the configuration as it stands, because you might introduce a loop into your switched
network. One of the following slides shows how to place the interface in the virtual switch. We highly recommended that you
US
A RE
SH
T
NO
DO
—
LY
ON
switch. Be careful not to commit the configuration as it stands, because you might introduce a loop into your switched
network. The following slide shows how to place the interface in the virtual switch. We recommended that you perform that
US
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
Verify Settings
Looking at the output on the slide, you can see that the ge-1/1/4.0 interface is now bound to the virtual-sw-1
routing instance and the bridge domains vlan_100 and vlan_200. Also, ge-1/0/5.0 is bound to the appropriate
E
A RE
SH
T
NO
DO
—
LY
ON
IRB Routes
The local and direct routes that associate with the IRB interface should be in the inet.0 table. Use the show route
command to verify that the routes were added properly.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
virtual routers, you can accomplish this task using either a logical tunnel interface or by looping two interfaces together with
a single cable. For virtual switches, this process works only using the external cable method. The reason why spanning tree
US
protocols do not function properly between virtual switches is because all virtual switches use the same MAC address as
part of their bridge ID in the bridge protocol data units (BPDUs). Unfortunately, you cannot change a virtual switch’s MAC
address.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Tunnel Services
Anytime you need to use layer tunneling, you must enable tunnel services on the MX Series router. For example, you must
enable tunnel services for a generic routing encapsulation (GRE) tunnel, an IP over IP (IP-IP) tunnel, Physical Interface
E
Module (PIM) encapsulation or decapsulation of register messages, and for our case, using logical tunnel interfaces. Each
Dense Port Concentrator (DPC) on a switch has either 40 Gigabit Ethernet ports (10 ports per PFE) or 4 10-Gigabit Ethernet
US
ports (1 port per PFE.) Each PFE on an MX Series DPC can provide tunneling services but you must enable it. The slide shows
how to enable tunnel services on the first PFE (serving ge-1/0/0 through ge-1/0/9) on the 40 1-Gigabit Ethernet DPC in slot
number 1. Once you enable this feature, you will notice that you have several tunnel type interfaces that become available
for your use. Notice that the tunnel interfaces use the logical PIC port number of 10 (normally PIC port numbers stop at 9.)
When enabling tunnel services on a PFE of a 4-port 10 Gigabit Ethernet DPC, the Ethernet interface for that PFE is removed
AL
A RE
SH
T
NO
DO
—
LY
ON
default, logical tunnel interfaces are placed in the default virtual router. To place a logical tunnel interface in a virtual router,
specify the logical tunnel interface at the [edit routing instance instance-name] level of the hierarchy.
US
AL
RN
TE
IN
RE
A
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
Verify Settings
Looking at the output on the slide, you can see that the ge-1/1/4.0 interface is now bound to the virtual-sw-1
routing instance and the bridge domains vlan_100 and vlan_200, whereas ge-1/0/4.0 belongs to the default switch.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Logical Systems
The slide highlights the topic we discuss next.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Logical Systems
In addition to routing instances, logical systems (LSYSs) provide another method by which to partition a device. LSYSs differ
from routing instances in that each LSYS has its own discrete administrative domain, logical interfaces, routing instances,
E
security policies, and other routing and security features. As shown on the right side of the slide, a set of logical systems
within a single router can handle the functions previously performed by several small routers.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
• Logical systems offer routing and management separation. That is, each logical system contains its own routing
tables and can contain routing instances of its own. Furthermore, management separation means multiple user
access can be configured.
RN
• Supported protocols include, but are not limited to: Open Shortest Path First (OSPF), Intermediate
System-to-Intermediate System (IS-IS), Routing Information Protocol (RIP), RIP next generation (RIPng), Border
Gateway Protocol (BGP), static routes, Internet Protocol version 4 (IPv4) and version 6 (IPv6) are supported at
the [edit logical-systems logical-system-name protocols] hierarchy level.
TE
• Some High Availability (HA) features are not supported: Non-stop routing (NSR), non-stop bridging (NSB), and
unified in-service software upgrade (ISSU). However, graceful restart is supported at the [edit
logical-systems logical-system-name routing-options] hierarchy level.
IN
A RE
SH
T
NO
DO
—
LY
ON
encapsulation types, for a given interface, are configured within the main [edit interfaces interface-name]
hierarchy level.
US
In the example, interface ge-1/0/5 has been added to the lsys-1 logical system with a static MAC address configured.
Note that the static MAC address was configured on the interface at the [edit interfaces ge-1/0/5] hierarchy level
and not at the [edit logical-systems lsys-1 interfaces ge-1/0/5] hierarchy level.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
domains. In the slide example, note the routing instance name of Default even though we’ve specified the lsys-2 logical
system. This demonstrates the wholly separate partitioning that logical systems achieve versus that of routing instances.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
The slide shows a basic configuration using looped interfaces to configure a trunk between two logical systems. Note the use
of the show bridge domain logical-systems all command to view bridge domain information for all configured
logical systems.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
• From the CLI using the set cli logical-system logical-system-name command.
US
logical-systems logical-system-name protocols ospf. If, after setting the CLI to a particular logical system,
you want to return to the main context, use the clear cli logical-system command.
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
configuration statements. This also means that command output is restricted to the context to which the logical users are
assigned.
US
Configuring a user account for each logical system helps in navigating the CLI. This enables you to log in to each logical
system and be positioned within the root of that logical system as if you were in the root of a physical router. Note that if you
access a logical system using this direct-login method, you cannot clear out of it as shown on the previous slide. As
mentioned previously, as far as the Junos OS is concerned, you are logged into a separate router and must log out of it as
AL
A RE
SH
T
NO
DO
—
LY
ON
We Discussed:
• The use of a routing instance;
E
A RE
SH
T
NO
DO
—
LY
ON
Review Questions
1.
E
2.
US
3.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
RE
1.
For multiple routers, you can configure virtual-router routing instances. For multiple switches, you can configure virtual-switch routing
instances.
A
2.
You must list the interface at the [edit routing-instances vs1] level of the hierarchy to ensure that it appears as part of
SH
the vs1 virtual switch.
3.
By default, you can find the routes associated with IRB interfaces in the inet.0 routing table.
T
NO
DO
—
LY
ON
E
US
AL
RN
TE
IN
T
NO
Chapter 4: Provider Bridging
DO
—
LY
ON
E
US
AL
RN
TE
IN
Junos Service Provider Switching
A RE
SH
T
NO
DO
—
LY
ON
We Will Discuss:
• Institute of Electrical and Electronics Engineers (IEEE) virtual LAN (VLAN) stacking models;
E
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
broadcast domains (or VLANs). With a 12-bit length VLAN ID, 4094 VLANs are available for use on a single physical Ethernet
network.
US
two sites should appear as a simple Ethernet link or VLAN through the service provider’s network. IEEE 802.1Q VLAN tagging
does not provide the scalability (in the service provider network) for a service provider to deliver that type of service.
From the service provider’s point of view, the following is a list of some of the scaling issues that might arise:
RN
• Because only one VLAN tag field exists in an 802.1Q frame, customers and the service provider need to
coordinate the use of VLAN ID space. Considering that a service provider might have thousands of customers,
this coordination would be an overly extreme effort.
• To pass Ethernet frames between customer sites, the service provider bridges must learn customer MAC
TE
addresses.
• To provide redundant links between customers and the service provider, running a form of the Spanning Tree
Protocol (STP), which is generally not a viable solution, might be necessary. The STPs of today cannot scale to
IN
support all service provider and customer bridges of the world in a single spanning-tree domain.
A RE
SH
T
NO
DO
—
LY
ON
IEEE 802.1ad
IEEE 802.1ad, also known as Q-in-Q tunneling, has standardized the methodology of stacking VLAN tags. The slide shows the
frame format that the standard introduced. The standard gives a new name to the 802.1Q VLAN tag: the Customer VLAN
E
(C-VLAN) tag (C-TAG). It also introduces a new tag named the Service VLAN (S-VLAN) tag (S-TAG). By adding the S-TAG to the
frame, much less coordination is necessary between the customer and the service provider. At the customer site, the
US
customer can continue to use 802.1Q tagging using C-VLAN IDs that are relevant only to their network (not the service
provider’s network). As 802.1Q-tagged frames arrive at the edge of the service provider’s bridged network, the provider edge
bridge (PEB) adds an S-TAG to the frame. The S-TAG, using a single S-VLAN ID, can carry any or all of the 4094 C-VLANs that
are possibly in use by the customer. In the simplest case, a service provider can allocate a single S-VLAN ID to represent
each of its individual customers, which allows the service provider to potentially support up to 4094 customers. IEEE
AL
802.1ad also allows for the translating of S-VLAN IDs at the edge of a service provider’s bridged network, which helps in the
coordination of VLAN ID usage between service providers.
Scaling Issues
RN
Although IEEE 802.1ad helps to solve the issue of the limited VLAN ID space that we discussed in relation to IEEE 802.1Q
tagging, it does not solve the MAC learning problem. That is, for frames to be forwarded between bridges in the service
provider’s network, the bridges each must learn and store MAC addresses learned from the customer networks. A service
provider can help alleviate this problem by limiting the number of learned MAC addresses or charging the customer more for
TE
A RE
SH
T
NO
DO
—
LY
ON
Provider Bridging
The slide highlights the topic we discuss next.
E
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
Provider Bridging
Provider bridging is defined under IEEE 802.1ad. It was developed to allow a service provider to provide a more scalable EVC
service to its customers. A typical provider bridged network (PBN) provides for C-VLAN tagging and forwarding at the edge of
E
the network using the ports that face the customer. For all ports that face the core of the PBN, the provider bridges forward
based only on the S-VLAN tag.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
indicator (CFI) field in the C-TAG is rarely used (for use in token ring networks), it has been redefined in the S-TAG to represent
a frame’s eligibility to be dropped. The Drop Eligibility Indicator (DEI) is used for class of service, which we do not discuss in
US
this course. Also, IEEE 802.1ad has reserved a Tag Protocol Identifier (TPID) of 0x88A8 for the S-TAG, however, the Junos
operating system default behavior is to set the TPID equal to 0x8100.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
PBN Terms
The following terms are used in a PBN network:
E
• PBN: A network of provider bridges that provide for transparent EVC service to the service provider’s customers.
• Provider Bridge: A bridge in the service provider’s network that performs IEEE 802.1ad VLAN tagging and
US
forwarding. These bridges learn and store the MAC addresses of the service provider’s customers.
• Provider Edge Bridge (PEB): Accepts and forwards IEEE 802.1Q frames to and from customers. PEBs also
encapsulate the received customer frames using the IEEE 802.1ad format to forward customer frames across
the PBN.
AL
• S-VLAN Bridge: A nonedge provider bridge that forwards frames based only on the S-VLAN tag.
• Provider Network Port: A port on a provider bridge that forwards frames based on the S-VLAN tag.
• Customer Edge Port: A port on a PEB that connects to customer equipment that receives and transmits C-VLAN
RN
tagged frames.
• Customer Network Port: A port on a PEB that receives and transmits S-VLAN tagged frames.
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
the service provider-facing ports. The service provider has allocated an S-VLAN tag of 200 to transparently forward the
customer’s frames across the PBN. This allocation is performed by configuring a bridge domain on each provider bridge
US
specifically for the customer specifying an S-VLAN ID of 200, and by configuring all possible inbound and outbound
interfaces to support the appropriate VLAN tagging for the customer’s bridge domain. For example, on Bridge A, the service
provider would need to configure a Bridge Domain that accepts C-tagged frames on the customer-facing interface and
S-tagged frames (VLAN ID 200) on the core-facing interfaces. Over the next several slides we look at the frame processing
steps for traffic traversing a Q-in-Q tunnel.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
appropriate outbound interface (ge-1/0/4.1 in this case) and the interface adds an S-VLAN of 200 on to the frame before
sending the frame to the next bridge. The act of adding an outer tag to the frame is known as a push operation.
US
Note that if Bridge A did not previously learn the destination MAC address of the frames, it floods the frame out of every
other interface associated with the customer’s bridge domain except for the one that originally received the frame.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
appropriate outbound interface (ge-1/0/6.1 in this case) and the interface sends the frame unchanged to the next bridge.
US
Note that a few ways exist to configure the VLAN operations on an S-VLAN bridge. The inbound interface on Bridge C can
possibly also pop the S-VLAN tag on reception and then the outbound interface can push S-VLAN of 200 on transmittal.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
the frame, it forwards the frame to the appropriate outbound interface (ge-1/0/6.100 in this case) and the interface sends
the C-tagged frame to the customer bridge.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
forward the frame on to their intended destination, if known. If the destination MAC address is unknown, Customer Bridge 2
will flood frame out all other interfaces associated with VLAN-ID 100.
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
interfaces can be configured for each physical interface. Multiple interface families can be configured for each logical
interface. In regards to bridging, understanding how a configuration affects the number of logical interfaces on an MX Series
US
occurs on a per VLAN basis. That means, broadcast, unicast with unknown destination, and multicast (BUM) traffic flooded
on interfaces is associated with a single VLAN. However, another bridge domain mode exists named shared VLAN learning
mode (SVL). This allows for VLANs to share MAC learning. That means, the BUM traffic floods on all interfaces and all VLANs
associated with a bridge domain. The following slides show examples of each mode of operation.
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
statement. We expect only S-tagged frames to arrive on each trunk interface, so you can configure them for a single
vlan-id-list statement as well. To allow the interfaces to support two VLAN tags, include the
US
A RE
SH
T
NO
DO
—
LY
ON
single-tagged frames to enter the customer-facing interface, you must specify the interface-mode access statement.
US
You will see on the next few slides that each configuration method results in some combination of one of the following:
1. A bridge domain mode (IVL or SVL).
2. Customer-facing logical interface usage.
3. Bridge domain usage.
AL
A RE
SH
T
NO
DO
—
LY
ON
customer to its own virtual switch (in the case of overlapping C-VLAN space).
US
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
1. A frame with C-VLAN ID 112 arrives on ge-1/0/0.112 destined for a MAC address that exists on the remote side
US
of the network.
2. Because the bridge domain is configured for vlan-id none, the C-VLAN tag pops before the MAC-table
lookup.
3. If the destination MAC address is unknown, then the frame is flooded out of all interfaces that associate with
AL
the bridge domain, including the subinterfaces of ge-1/0/0 (because of SVL). If the destination MAC is known,
the frame is forwarded out of the ge-1/0/4.0 interface with a C-VLAN of 111 (normalization) and an S-VLAN of
200.
4. Upon arriving at the remote PEB, assuming the bridge domain is configured for vlan-id none, the S-VLAN
RN
and the C-VLAN tags are popped before the MAC-table lookup.
If the destination MAC address is unknown, then the frame is flooded out of all interfaces that associate with the bridge
domain, including the subinterfaces of customer-facing interfaces (because of SVL). If the destination MAC address is
known, the frame is forwarded out of the appropriate subinterface using the encapsulation specified on the interface.
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
However, the case might be that each service provider is using a different S-TAG to provide the EVC. In the
example, PBN 1 uses S-VLAN 200 and PBN 2 uses S-VLAN 300. IEEE 802.1ad provides the ability to perform
US
S-VLAN translation between service providers. The slide shows the configuration necessary for the S-VLAN
bridge in PBN 1 to perform VLAN translation.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
A RE
SH
T
NO
DO
—
LY
ON
• Because there are 4096 unique VLANs, the number of customers can be severely limited.
• If there is a network failure, Ethernet’s STP can take tens of seconds to find an alternate path. Even the new
US
Rapid Spanning Tree Protocol (RSTP) can take multiple seconds in most situations, and convergence time
increases as the network grows.
An alternative to Q-in-Q tunneling that can be provided to the customer is virtual private LAN service (VPLS). VPLS delivers an
Ethernet service that can span one or more metro areas and that provides connectivity between multiple sites as if these
AL
sites were attached to the same Ethernet LAN. To the customer, a VPLS appears to be a single LAN segment. In fact, it
appears to act similarly to a learning bridge. That is, when the destination media access control (MAC) address is not known,
an Ethernet frame is sent to all remote sites. If the destination MAC address is known, it is sent directly to the site that owns
it. VPLS requires a strong background in MPLS as well as other routing protocols. A full discussion on VPLS is outside the
RN
A RE
SH
T
NO
DO
—
LY
ON
We Discussed:
• IEEE VLAN stacking models;
E
A RE
SH
T
NO
DO
—
LY
ON
Review Questions
1.
E
2.
US
3.
AL
RN
TE
IN
A RE
SH
T
NO
DO
—
LY
ON
RE
1.
The service provider and potentially thousands of customers must share a limited number of VLAN IDs when a service provider uses
IEEE 802.1Q VLANs to provide LAN service. Also, each service provider switch must learn the MAC addresses of its customers.
A
2.
Three VLAN tag operations that a switch can perform on a frame are pop, push, and swap.
SH
3.
The two modes are independent VLAN learning mode (IVL) and shared VLAN learning mode (SVL).
T
NO
DO
—
LY
ON
E
US
AL
RN
TE
IN
RE
AE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . aggregated Ethernet
A
AIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .alarm indication signal
APS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automatic Protection Switching
SH
ARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Address Resolution Protocol
ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Asynchronous Transfer Mode
BCB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . backbone core bridge
BDI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backward Defect Indicator
BEB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . backbone edge bridge
T
BID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bridge ID
BPDU. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . bridge protocol data unit
NO
B-TAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backbone VLAN tag
BUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . broadcast, unicast with unknown destination, and multicast
B-VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backbone VLAN
CBP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Customer Backbone Port
CC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . continuity check
CCM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . centralized configuration management
DO
CE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . customer edge
CFI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Canonical Format Indicator
CFM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .connectivity fault management
CIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .common and internal spanning tree
CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .command-line interface
—
CoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . class of service
CSMA/CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . carrier-sense multiple access with collision detection
CST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . common spanning tree
C-TAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .customer VLAN tag
LY
IP-IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IP over IP
IRB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .integrated routing and bridging
I-SID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backbone Service Instance ID
I-TAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Backbone Service Instance tag
RN
RE
MC-LAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . multichassis LAG
MEF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Metro Ethernet Forum
MEP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . maintenance association end point
MIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . maintenance association intermediate point
MISTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multiple Instance STP
A
MPC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Modular Port Concentrator
MRP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multiple Registration Protocol
SH
MSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .multiple service operator
MST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . multiple spanning tree
MSTI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . multiple spanning tree instance
MSTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multiple Spanning Tree Protocol
MVRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multiple VLAN Registration Protocol
T
NMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .network management system
OAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Operation, Administration, and Maintenance
NO
OAMPDU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OAM protocol data unit
OSI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Open Systems Interconnection
PBB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . provider backbone bridge
PBN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .provider bridged network
PDU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . protocol data unit
DO
PE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . provider edge
PEB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Power and Ethernet Board
PFE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Packet Forwarding Engine
PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Physical Interface Module
PIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Provider Instance Port
PVC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . permanent virtual circuit
—
PVST+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Per-VLAN Spanning Tree Plus
Rapid-PVST+. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rapid Per-VLAN Spanning Tree Plus
R-APS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ring Automatic Protection Switching
RE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Routing Engine
LY
TLV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . type/length/value
TPID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tag Protocol Identifier
TTL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . time to live
UCA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Customer Address
UNI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . user-to-network interface
AL