Uploaded by mooliya

tech overview

advertisement
CH A P T E R
2
Technology Overview
This chapter describes the Network Activation wizards that allow you to provision Carrier Ethernet
activations. The wizards also allow you to provision elements that allow activations to be created and
activated, such as Ethernet flow points, QoS policies, and ACLs. This chapter also provides an overview
to the activations and technologies activated or provisioned by Network Activation. Topics include:
•
Carrier Ethernet Overview, page 2-1
•
Carrier Ethernet Technologies, page 2-2
•
MToP, page 2-9
Carrier Ethernet Overview
A Carrier Ethernet activation includes activation elements that exist on an Ethernet subnetwork domain.
Components include:
•
User Network Interface (UNI)—A UNI is a physical interface that marks the boundary between
service provider, cable operator, or carrier and the subscriber. The UNI is located at the edge of the
subnetwork domain.
•
Network to Network Interface (NNI)—An interface that marks the boundary between carrier
Ethernet networks operated by one or more carrier networks to network interface.
•
Ethernet Virtual Connection (EVC)—A logical representation of an Ethernet activation as defined
by the association between two or more UNIs.
Note
EVCs are not supported in this Network Activation release.
•
Ethernet Flow Point (EFP)—an Ethernet activation endpoint.
•
QoS Policy—Defines bandwidth profiles at the UNI and EFP levels.
•
MAC Layer Security Policy—If MAC security is enabled, defines a subset of MAC address for
inclusion or exclusion.
•
Layer 2 Access Control Lists—Are similar to Layer 3 (router) ACLs but are supported on physical
interfaces and configured on switch Layer 2 interfaces.
Cisco Prime Network 3.8 Activation User Guide
OL-24645-01
2-1
Chapter 2
Technology Overview
Carrier Ethernet Technologies
Carrier Ethernet Technologies
The following sections provide an overview to Carrier Ethernet technologies supported by Network
Activation:
•
E-Line Activation, page 2-2
•
E-LAN Activation, page 2-3
•
VPLS and H-VPLS, page 2-3
•
Layer 3 VPN, page 2-6
•
QoS, page 2-8
•
Layer 2 Access Control Lists, page 2-8
•
MToP, page 2-9
E-Line Activation
An E-Line Ethernet activation (Figure 2-1), is based on a point-to-point Ethernet Virtual Connection
(EVC). An E-Line activation can be used to create a broad range of point-to-point activations. E-Line
point-to-point activations include Ethernet Private Line (EPL) and Ethernet Virtual Private Line (EVPL).
•
Ethernet Private Line—Uses a point-to-point EVC between two UNIs. EPLs provide high service
frame transparency between interconnected UNIs such that the service frame header and payload
are identical at both the source and destination UNI.
•
Ethernet Virtual Private Line—Creates a point-to-point EVC similar to the EPL. However, the
EVPL allows for service multiplexing at the UNI, which means the EVPL can support more than
one EVC at the UNI. The EVPL also does not require full service frame transparency.
Figure 2-1
E-Line Activation
Point-to-Point EVC
UNI
Metro Ethernet
Network
247868
UNI
Network Activation provides the following E-Line wizards:
•
E-Line Point-to-Point Activation, page 3-21.
•
E-Line Local Connect Activation, page 3-28.
Cisco Prime Network 3.8 Activation User Guide
2-2
OL-24645-01
Chapter 2
Technology Overview
Carrier Ethernet Technologies
E-LAN Activation
An E-LAN activation is a multipoint-to-multipoint EVC that delivers service frames to a UNI in an EVC
following rules that are defined for the activation. Figure 2-2 displays the E-LAN activation that is a
multipoint-to-multipoint EVC. A single broadcast or multicast ingress service frame (as determined
from the destination MAC address) at a given UNI is replicated in the Carrier Ethernet Network and a
single copy is delivered to each of the other UNIs in the EVC.
Figure 2-2
E-LAN Activation
Multipoint-to-Multipoint EVC
UNI
UNI
Metro Ethernet
Network
247867
UNI
UNI
Network Activation provides E-LAN activations combined with VPLS and H-VPLS. See VPLS and
H-VPLS, page 2-3.
VPLS and H-VPLS
Virtual Private LAN Service (VPLS) offers multipoint Ethernet LAN activation over MPLS networks.
A VPLS offers the same connectivity as a network element attached to an Ethernet switch. The VPLS
architecture that links virtual switch instances (VSIs) using MPLS pseudowires form an emulated
Ethernet switch. Figure 2-3 shows the basic VPLS configuration component.
Cisco Prime Network 3.8 Activation User Guide
OL-24645-01
2-3
Chapter 2
Technology Overview
Carrier Ethernet Technologies
Figure 2-3
VPLS Configuration
N-PE
N-PE
Tunnel LSP
CE
CE
PW
PW
PW
CE
CE
CE
CE
Red VSI
Red VSI
Blue VSI
Blue VSI
Green VSI
Green VSI
CE
CE
Legend
Customer Edge Device
Network Facing Provider Edge
Virtual Switch Instance
Pseudowire
Tunnel Label Switch Path
that provides PW transport
Blue VSI
Red VSI
242142
CE
N-PE
VSI
PW
Tunnel LSP
VPLS offers two types of services:
•
Transparent LAN Service (TLS)
•
Ethernet Virtual Connection Service (EVCS)
TLS and EVCS services are differentiated by the way that MAC addresses are learned and the way that
bridging protocol data units (BPDU) are processed. TLS performs unqualified learning. All customer
VLANs of a Layer 2 VPN are treated as if they are in the same broadcast domain. In EVCS, the outer
VLAN tag on the Ethernet packet differentiates one customer VLAN instance from another. Each VLAN
has its own MAC address space, which allows qualified learning. In qualified learning:
•
MAC addresses of different VLANs might overlap with one another
•
Each VLAN has a separate Layer 2 forwarding table.
VPLS requires that the:
•
Edge network element supports MPLS
•
Network element participates in routing protocols and the Label Distribution Protocol (LDP).
Hierarchical VPLS (H-VPLS) partitions the network into several edge domains that are interconnected
using an MPLS core. The edge network elements only learn of their local N-PE network elements and
therefore do not need large routing table support. The edge domain can also be built using Ethernet
switches and techniques such as Q-in-Q.
Cisco Prime Network 3.8 Activation User Guide
2-4
OL-24645-01
Chapter 2
Technology Overview
Carrier Ethernet Technologies
Network Activation provides the following VPLS and H-VPLS wizards:
•
E-LAN VPLS Hub, page 3-2
•
E-LAN VPLS Neighbor, page 3-9
•
E-LAN H-VPLS Hub Neighbor, page 3-13
•
E-LAN H-VPLS Spoke, page 3-15
Ethernet Flow Points
An Ethernet Flow Point (EFP) is a forwarding decision point in the PE router, which gives network
designers flexibility to make many Layer 2 flow decisions within the interface itself. Many EFPs can be
configured on a single physical port. (The number varies from one device to another.) EFPs are the
logical demarcation points of an Ethernet virtual connection (EVC) on an interface. An EVC that uses
two or more UNIs requires an EFP on the associated ingress and egress interfaces of every device that
the EVC passes through.
EFPs can be configured on any Layer 2 traffic port; however, they are usually configured on UNI ports.
The following parameters can be configured on the EFP:
•
Match criteria—Defines the matching rules of the frames that should enter the EFP. The matching
rules can be for:
– Frames of a specific VLAN, a VLAN range, or a list of VLANs (100-150 or 100,103,110).
– Frames with no tags (untagged).
– Frames with the same double-tags (VLAN tags) as specified.
– Frames with same Class of Service (CoS).
A frame passes each configured match criteria until the correct matching point is found. If a frame does
not fit any of the matching criteria, it is dropped. Default criteria can be configured to avoid dropping
frames.
•
Rewrite commands—In each EFP, VLAN tag management can be specified with the following
actions:
Command
Pop
Push
Translate
•
Action
•
Pops out a tag
•
Pops out two tags
•
Pushes in a tag
•
Pushes in two tags
•
1 to 1— Changes a tag value
•
1 to 2— Pops one tag and pushes two tags
•
2 to 1— Pops two tags and pushes one tag
•
2 to 2— Changes the value for two tags
Forwarding commands—Each EFP specifies the forwarding command for the frames that enter it.
Only one forwarding command can be configured per EFP. The forwarding options are:
– Layer 2 Point-to-Point—Forwards to a pseudowire tunnel.
Cisco Prime Network 3.8 Activation User Guide
OL-24645-01
2-5
Chapter 2
Technology Overview
Carrier Ethernet Technologies
– Multipoint Bridging—Forwards to a bridge domain entity.
– Local Switching—Switches between two different interfaces.
•
Feature commands—Change QoS parameters and update the ACL
In addition, the direction of the configuration can be indicated. The symmetric option indicates whether
or not this configuration is the same for the both ingress and egress traffic.
EFPs are implemented as activation instances for Cisco 7600 Series Routers, or as subinterfaces for the
Cisco ASR 9000 Aggregation Series Routers. These two implementations function identically.
Prime Network displays EFP information on the port physical inventory, and on the VLAN bridge and
link aggregation group logical inventories.
Network Activation provides the following EFP wizard:
•
Activate Access, page 3-33
Layer 3 VPN
MPLS Layer 3 VPNs use a peer-to-peer VPN Model that leverages BGP to distribute VPN-related
information. This peer-to-peer model allows subscribers to outsource routing information to Service
Providers. Service Providers can provide additional services, such as QoS and Traffic Engineering, to
enable voice, video, and data convergence. MPLS Layer 3 VPNs can be deployed with a MPLS TE and
Fast Reroute to offer Tight SLAs. Layer 3 VPN QoS-based offerings range from two to five services
classes.
Layer 3 VPNs use roles to describe a specific job in the network system. The role describes what the
element should do irrespective of any physical platform. Layer 3 VPN roles include:
•
Provider Edge (PE)
•
Provider (P)
•
Route Reflector (RR)
•
Autonomous System Boundary Router (ASBR).
Figure 2-4 shows the Layer 3 VPN roles within a Carrier Ethernet network.
Figure 2-4
Layer 3 VPN Roles
Inter-AS (c) Multi-hop EBGP redistribution of VPNv4
MP-BGP
MPLS (LDP)
IGP (ISIS, OSPF)
IP
(Static, IGP, BGP)
Inter-AS (b) EBGP
redistribution of VPNv4
MP-BGP
MPLS (LDP)
IGP (ISIS, OSPF)
IP
(Static, IGP, BGP)
Inter-AS (a)
VRF-to-VRF
RR
P
PE
ASBR
ASBR
P
PE
Network Roles
CE
190500
RR
CE
MPLS VPN functionality is enabled at the edge of a MPLS network. The PE router:
•
Exchanges routing updates with the Customer Edge (CE) router.
Cisco Prime Network 3.8 Activation User Guide
2-6
OL-24645-01
Chapter 2
Technology Overview
Carrier Ethernet Technologies
•
Translates the CE routing information into VPNv4 routes.
•
Exchanges VPNv4 routes with other PE routers through the Multiprotocol Border Gateway Protocol
(MP-BGP)
Each VPN is associated with one or more virtual routing and forwarding (VRF) instances. A VRF
defines the VPN membership of a customer site attached to a PE router. A VRF consists of the following
components:
•
An IP routing table.
•
A derived Cisco Express Forwarding (CEF) table.
•
A set of interfaces that use the forwarding table.
•
A set of rules and routing protocol parameters that control the information that is included in the
routing table.
A one-to-one relationship does not necessarily exist between customer sites and VPNs. A site can be a
member of multiple VPNs. However, a site can associate with only one VRF. The VRF of a site contains
all the routes available to the site from all the VPNs of which it is a member.
Packet forwarding information is stored in the IP routing table and in the CEF table for each VRF. A
separate set of routing and CEF tables is maintained for each VRF. These tables prevent information
from being forwarded outside a VPN, and also prevent packets that are outside a VPN from being
forwarded to a router within the VPN.
The distribution of VPN routing information is controlled through the use of VPN route target
communities, implemented by BGP extended communities. VPN routing information is distributed as
follows:
•
When a VPN route that is learned from a CE router is injected into BGP, a list of VPN route target
extended community attributes is associated with it. Typically the list of route target community
extended values is set from an export list of route targets associated with the VRF from which the
route was learned.
•
An import list of route target extended communities is associated with each VRF. The import list
defines route target extended community attributes that a route must have in order for the route to
be imported into the VRF. For example, if the import list for a particular VRF includes route target
extended communities A, B, and C, then any VPN route that carries any of those route target
extended communities—A, B, or C—is imported into the VRF.
A PE router can learn an IP prefix from the following sources:
•
A CE router by static configuration.
•
A BGP session with the CE router.
•
A Routing Information Protocol (RIP) exchange with the CE router.
The IP prefix is a member of the IPv4 address family. After the PE router learns the IP prefix, the PE
converts it into a VPN-IPv4 prefix by combining it with an eight-byte route distinguisher (RD). The
generated prefix is a member of the VPN-IPv4 address family. It uniquely identifies the customer
address, even if the customer site is using globally non-unique (unregistered private) IP addresses. The
route distinguisher used to generate the VPN-IPv4 prefix is specified by a configuration command
associated with the VRF on the PE router.
BGP distributes reachability information for VPN-IPv4 prefixes for each VPN. BGP communication
takes place at two levels:
•
Within IP domains, known as an autonomous system (interior BGP [IBGP]).
•
Between autonomous systems (external BGP [EBGP]).
Cisco Prime Network 3.8 Activation User Guide
OL-24645-01
2-7
Chapter 2
Technology Overview
Carrier Ethernet Technologies
PE-PE or PE-RR (route reflector) sessions are IBGP sessions, and PE-CE sessions are EBGP sessions.
BGP propagates reachability information for VPN-IPv4 prefixes among PE routers by means of the BGP
multiprotocol extensions (refer to RFC 2283, Multiprotocol Extensions for BGP-4), which define
support for address families other than IPv4. Using the extensions ensures that the routes for a given
VPN are learned only by other members of that VPN, enabling members of the VPN to communicate
with each other.
Network Activation provides the following Layer 3 VPN wizards:
•
Layer 3 VPN, page 3-37
QoS
Quality of Service (QoS) refers to the capability of a network to provide better service to selected
network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM),
Ethernet and 802.1 networks, SONET, and IP-routed networks that might use any or all of these
underlying technologies. The primary goal of QoS is to provide a prioritization methodology, including
dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic),
and improved loss characteristics. A secondary goal is to ensure that providing priority for one or more
flows does not cause other flows to fail. QoS technologies provide the elemental building blocks.
Network Activation provides the following QoS wizards:
•
QoS Policy, page 3-77
Layer 2 Access Control Lists
Access lists filter network traffic by controlling whether the routed packets are forwarded or blocked at
the router interfaces. The router examines each packet to determine whether to forward or drop the
packet, based on the criteria specified within the access lists. Access list criteria can be the source
address of the traffic, the destination address of the traffic, the upper-layer protocol, or any other
information.
Layer 2 (port) ACLs are similar to Layer 3 (router), ACLs but are supported on physical interfaces and
configured on switch Layer 2 interfaces. Layer 2 ACLs support only inbound traffic filtering. The
Layer 2 ACL can be configured as one of three access type lists— standard, extended, and
MAC-extended.
Processing of the Layer 2 ACL is similar to that of the router ACLs; the switch examines ACLs
associated with features configured on a given interface and permits or denies packet forwarding based
on packet-matching criteria in the ACL.
When applied to a trunk port, the ACL filters traffic on all VLANs present on the trunk port. When
applied to a port with voice VLAN, the ACL filters traffic on both data and voice VLANs.
The main benefit of the Layer 2 ACL is that it can filter IP traffic (using IP access lists) and non-IP traffic
(using MAC access list). Both types of filtering can be achieved—that is, a Layer 2 interface can have
both an IP access list and a MAC access list applied to it at the same time.
Cisco Prime Network 3.8 Activation User Guide
2-8
OL-24645-01
Chapter 2
Technology Overview
MToP
MToP
Cisco Mobile Transport over Packet (MToP) extends Cisco IP network intelligence from the network
core to the edge by preparing Radio Access Network (RAN) traffic for transport on the packet network.
MToP establishes a common backbone for migration from traditional, disparate networks to a converged
IP/Multiprotocol Label Switching (MPLS) mobile architecture.
MToP uses pseudowires to extend the packet-based core closer to the edge of the network. It flattens the
multiple layers of the RAN onto a single MPLS network by encapsulating and transporting time-division
multiplexing (TDM), Frame Relay, and ATM traffic over MPLS.
MToP builds a MPLS cloud between the distribution nodes (between access and aggregation) and the
aggregation nodes on the network edge. The MPLS network is also extended over point-to-point links
from the distribution nodes through Ethernet, serial, microwave, or a Layer 2 access network.
The CEoPs and STM-1c/OC-3c ATM SPAs on aggregation Cisco 7600 Series routers terminate the
pseudowire connections at the RNC/BSC site. CEoPS SPAs collect ATM/TDM native traffic at the
distribution nodes and encapsulates them in pseudowires and transports the traffic to the aggregation
nodes using MPLS.
MToP activations include:
•
Using MPLS technology to extend the packet-based core to the edge of the network.
•
Employing pseudowires, which are MPLS virtual circuit tunnels, aggregate and transport
time-division multiplexing (TDM), IP, Ethernet, and ATM traffic, as well as clock synchronization,
from the RAN to the network core.
•
Converting RAN voice and data frames into IP packets at the cell site and transporting them
seamlessly over a backhaul network.
At the central site, extracting the frames from the IP packets rebuilding the ATM or TDM streams.
Network Activation provides the following MToP wizards:
•
MToP ATM Pseudowire, page 3-43
•
MToP TDM Clock Pseudowire, page 3-49
•
MToP TDM Pseudowire, page 3-53
•
MToP Clocking Synchronization, page 3-58
Cisco Prime Network 3.8 Activation User Guide
OL-24645-01
2-9
Chapter 2
Technology Overview
MToP
Cisco Prime Network 3.8 Activation User Guide
2-10
OL-24645-01
Download