- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
09-MPLS L2VPN commands | 231.53 KB |
Contents
display l2vpn service-instance
l2vpn mac-address software-learning enable
pw-class (auto-discovery cross-connect group view)
ac interface
Use ac interface to bind an Ethernet service instance to a cross-connect.
Use undo ac interface to remove the binding.
Syntax
ac interface interface-type interface-number service-instance instance-id [ access-mode { ethernet | vlan } ]
undo ac interface interface-type interface-number service-instance instance-id
Default
No Ethernet service instance is bound to a cross-connect.
Views
Cross-connect view, auto-discovery cross-connect view
Predefined user roles
network-admin
Parameters
interface-type interface-number: Specifies an interface.
service-instance instance-id: Specifies an Ethernet service instance by its ID in the range of 1 to 4096.
access-mode: Specifies the access mode. By default, the access mode is VLAN.
ethernet: Specifies the Ethernet access mode.
vlan: Specifies the VLAN access mode.
Usage guidelines
After you bind an Ethernet service instance on a Layer 2 interface to a cross-connect, the Ethernet service instance matches packets received on the interface. The matching packets are forwarded to the bound PW or another AC.
The access mode determines how the PE treats the VLAN tag in Ethernet frames received from the AC. It also determines how the PE forwards Ethernet frames to the AC.
· VLAN access mode—Ethernet frames received from the AC must carry a VLAN tag in the Ethernet header. The VLAN tag is called a P-tag assigned by the service provider. Ethernet frames sent to the AC must also carry the P-tag.
· Ethernet access mode—If Ethernet frames from the AC have a VLAN tag in the header, the VLAN tag is called a U-tag, and the PE ignores it. Ethernet frames sent to the AC do not carry the P-tag.
The Ethernet service instance specified in this command must have match criteria configured by encapsulation.
Examples
# Configure Ethernet service instance 200 on Layer 2 interface FortyGigE 1/1/1 to match packets with an outer VLAN tag of 200, and bind the Ethernet service instance to the cross-connect actopw in the cross-connect group vpn1.
<Sysname> system-view
[Sysname] interface fortygige 1/1/1
[Sysname-FortyGigE1/1/1] service-instance 200
[Sysname-FortyGigE1/1/1-srv200] encapsulation s-vid 200
[Sysname-FortyGigE1/1/1-srv200] quit
[Sysname-FortyGigE1/1/1] quit
[Sysname] xconnect-group vpn1
[Sysname-xcg-vpn1] connection actopw
[Sysname-xcg-vpn1-actopw] ac interface fortygige 1/1/1 service-instance 200
# Configure Ethernet service instance 200 on FortyGigE 1/1/1 to match packets with an outer VLAN tag of 200, and bind the Ethernet service instance to the auto-discovery cross-connect in the cross-connect group vpwsbgp.
<Sysname> system-view
[Sysname] interface fortygige 1/1/1
[Sysname-FortyGigE1/1/1] service-instance 200
[Sysname-FortyGigE1/1/1-srv200] encapsulation s-vid 200
[Sysname-FortyGigE1/1/1-srv200] quit
[Sysname-FortyGigE1/1/1] quit
[Sysname] xconnect-group vpwsbgp
[Sysname-xcg-vpwsbgp] auto-discovery bgp
[Sysname-xcg-vpwsbgp-auto] site 1 range 10 default-offset 0
[Sysname-xcg-vpwsbgp-auto-1] connection remote-site-id 2
[Sysname-xcg-vpwsbgp-auto-1-2] ac interface fortygige 1/1/1 service-instance 200
Related commands
· connection
· display l2vpn interface
· display l2vpn service-instance
· encapsulation
· pw-type
address-family l2vpn
Use address-family l2vpn to create the BGP L2VPN address family, and enter BGP L2VPN address family view.
Use undo address-family l2vpn to delete the BGP L2VPN address family and all settings from BGP L2VPN address family view.
Syntax
address-family l2vpn
undo address-family l2vpn
Default
The BGP L2VPN address family is not created.
Views
BGP view
Predefined user roles
network-admin
Usage guidelines
To establish a BGP PW to a remote PE, you must execute the peer enable command in BGP L2VPN address family view to enable the remote PE.
Examples
# Create the BGP L2VPN address family, and enter BGP L2VPN address family view.
<Sysname> system-view
[Sysname] bgp 100
[Sysname-bgp] address-family l2vpn
[Sysname-bgp-l2vpn]
auto-discovery
Use auto-discovery to enable a cross-connect group to automatically discover neighbors and create PWs through BGP, and enter auto-discovery cross-connect group view.
Use undo auto-discovery to disable BGP auto-discovery for a cross-connect group.
Syntax
auto-discovery bgp
undo auto-discovery
Default
A cross-connect group does not use BGP to automatically discover neighbors and create PWs.
Views
Cross-connect group view
Predefined user roles
network-admin
Parameters
bgp: Enables the cross-connect group to automatically discover neighbors and create PWs through BGP.
Usage guidelines
In auto-discovery cross-connect group view, you can configure parameters such as the local site, remote site, and route target for BGP. The local PE can use BGP to discover remote PEs and create PWs.
Examples
# Enable the cross-connect group bbb to automatically discover neighbors and create PWs through BGP, and enter auto-discovery cross-connect group view.
<Sysname> system-view
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] auto-discovery bgp
[Sysname-xcg-bbb-auto]
Related commands
· display l2vpn pw
· display l2vpn xconnect-group
backup-peer
Use backup-peer to configure a backup PW for a cross-connect and enter cross-connect backup PW view. If the backup PW has been configured, this command places you into cross-connect backup PW view.
Use undo backup-peer to remove the backup PW from a cross-connect.
Syntax
backup-peer ip-address pw-id pw-id [ in-label label-value out-label label-value ] [ pw-class class-name | tunnel-policy tunnel-policy-name ] *
undo backup-peer ip-address pw-id pw-id
Default
No backup PW is specified for a cross-connect.
Views
Cross-connect PW view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the LSR ID of the peer PE on the backup PW.
pw-id pw-id: Specifies a PW ID for the backup PW, in the range of 1 to 4294967295.
in-label label-value: Specifies the incoming label for the backup PW, in the range of 16 to 1023.
out-label label-value: Specifies the outgoing label for the backup PW, in the range of 16 to 1023.
pw-class class-name: Specifies a PW class by its name, a case-sensitive string of 1 to 19 characters. You can specify a PW class to configure the PW type and control word. If you do not specify a PW class, the PW type is determined by the link type of the AC interface. The control word feature is not supported for PW types that do not require using control word.
tunnel-policy tunnel-policy-name: Specifies a tunnel policy by its name, a case-sensitive string of 1 to 19 characters. If you do not specify a tunnel policy, the default tunnel policy is used.
Usage guidelines
This command configures a backup PW to implement PW redundancy. The backup PW is used when the primary PW fails.
To configure a backup static PW, you must specify the in-label and out-label. To configure a backup LDP PW, you do not need to specify the in-label and out-label.
The peer LSR ID and PW ID specified for the backup PW must not be the same as those for any VPLS PW or any PW bound to a cross-connect.
PW redundancy is mutually exclusive from the multi-segment PW feature. If you have configured two PWs by using the peer command in cross-connect view, you cannot configure a backup PW by using the backup-peer command in cross-connect PW view, and vice versa.
Examples
# Configure a primary PW and a backup PW for the cross-connect pw2pw in the cross-connect group vpn2. The primary PW is destined to 6.6.6.6 and has a PW ID of 100. The backup PW is destined to 7.7.7.7 and has a PW ID of 200.
<Sysname> system-view
[Sysname] xconnect-group vpn2
[Sysname-xcg-vpn2] connection pw2pw
[Sysname-xcg-vpn2-pw2pw] peer 6.6.6.6 pw-id 100 in-label 16 out-label 17
[Sysname-xcg-vpn2-pw2pw-6.6.6.6-100] backup-peer 7.7.7.7 pw-id 200 in-label 18 out-label 19
[Sysname-xcg-vpn2-pw2pw-6.6.6.6-100-backup]
Related commands
· display l2vpn ldp
· display l2vpn pw
ccc
Use ccc to create a remote Circuit Cross Connect (CCC) connection.
Use undo ccc to delete a remote CCC connection.
Syntax
ccc in-label in-label-value out-label out-label-value { nexthop nexthop | out-interface interface-type interface-number } [ pw-class class-name ]
undo ccc
Default
No remote CCC connection exists.
Views
Cross-connect view
Predefined user roles
network-admin
Parameters
in-label in-label-value: Specifies the incoming label in the range of 16 to 1023.
out-label out-label-value: Specifies the outgoing label in the range of 16 to 1023.
nexthop ip-address: Specifies the IP address of the next hop.
out-interface interface-type interface-number: Specifies the outgoing interface by its type and number.
pw-class class-name: Specifies a PW class by its name, a case-sensitive string of 1 to 19 characters. You can specify a PW class to configure the PW type and control word. If you do not specify a PW class, the PW type is determined by the interface type. The control word feature is not supported for PW types that do not require using control word.
Usage guidelines
This command must be configured on both the local and remote PEs to create a remote CCC connection.
A remote CCC connection is a static L2VPN connection that is manually created by specifying the incoming and outgoing labels on two PEs. A remote CCC connection does not need a public tunnel, but it requires configuring two static LSPs in opposite directions on each P device between the two PEs.
CCC employs only one level of label to transfer packets. The static LSPs on the P devices transfer data only for the CCC connection. The outgoing label specified on a device must be the same as the incoming label specified on the next-hop device.
After you create a remote CCC connection, you must execute the ac interface command to bind an interface or Ethernet service instance. The PE can forward packets from the interface or matching the Ethernet service instance to the remote CCC connection.
Use the out-interface keyword to specify the outgoing interface only on a point-to-point link. On other interfaces such as Layer 3 Ethernet interfaces, VLAN interfaces, and Layer 3 aggregate interfaces, you must use the nexthop keyword to specify the next hop IP address.
CCC connection settings such as the encapsulation type and control word feature must be consistent on the two PEs. Otherwise, the PEs might fail to forward packets over the CCC connection.
Examples
# Create a remote CCC connection that has incoming label 100, outgoing label 200, and next hop 10.1.1.1, and uses PW class pwc1.
<Sysname> system-view
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] connection ccc1
[Sysname-xcg-bbb-ccc1] ccc in-label 100 out-label 200 nexthop 10.1.1.1 pw-class pwc1
Related commands
· ac interface
· display l2vpn pw
connection
Use connection to create a cross-connect and enter cross-connect view. If the specified cross-connect has been created, this command places you into cross-connect view.
Use undo connection to remove a cross-connect.
Syntax
connection connection-name
undo connection connection-name
Default
No cross-connect is created.
Views
Cross-connect group view
Predefined user roles
network-admin
Parameters
connection-name: Specifies the name of the cross-connect, a case-sensitive string of 1 to 20 characters, excluding hyphens.
Usage guidelines
A cross-connect is a point-to-point connection. You can perform the following operations in cross-connect view:
· Execute ac interface and peer to connect an AC to a PW, so the PE can forward packets between the AC and the PW.
· Execute peer twice to connect two PWs to form a multi-segment PW.
· Execute ac interface and ccc to connect an AC to a remote CCC connection, so the PE can forward packets between the AC and the remote CCC connection.
Examples
# Create cross-connect ac2pw for cross-connect group vpn1 and enter cross-connect view.
<Sysname> system-view
[Sysname] xconnect-group vpn1
[Sysname-xcg-vpn1] connection ac2pw
[Sysname-xcg-vpn1-ac2pw]
connection remote-site-id
Use connection remote-site-id to create an auto-discovery cross-connect and enter auto-discovery cross-connect view. If the specified cross-connect has been created, this command places you into auto-discovery cross-connect view.
Use undo connection remote-site-id to remove an auto-discovery cross-connect.
Syntax
connection remote-site-id remote-site-id
undo connection remote-site-id remote-site-id
Default
No auto-discovery cross-connect is created.
Views
Site view
Predefined user roles
network-admin
Parameters
remote-site-id: Specifies the remote site by its ID in the range of 0 to 32.
Usage guidelines
This command creates an auto-discovery cross-connect that uses BGP to establish a PW from the local site to the specified remote site.
In auto-discovery cross-connect view, you can execute ac interface to bind an AC to the auto-discovery cross-connect. The PE can forward packets between the AC and the PW.
Examples
# Create an auto-discovery cross-connect from site 1 to site 3 in site view and enter auto-discovery cross-connect view.
<Sysname> system-view
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] auto-discovery bgp
[Sysname-xcg-bbb-auto] site 1 range 10
[Sysname-xcg-bbb-auto-1] connection remote-site-id 3
[Sysname-xcg-bbb-auto-1-3]
control-word enable
Use control-word enable to enable the control word feature.
Use undo control-word enable to restore the default.
Syntax
control-word enable
undo control-word enable
Default
The control word feature is disabled.
Views
PW class view
Predefined user roles
network-admin
Usage guidelines
The control word field is between the MPLS label stack and the Layer 2 data. It carries control information for the Layer 2 packet, for example, the sequence number.
The control word feature has the following functions:
· Avoids fragment disorder. In multipath forwarding, fragments received might be disordered. You can configure the control word feature so the device reorders the fragments according to the sequence number carried in the control word field.
· Identifies the original payload length for packets that include padding.
The control word field is optional, and you can configure whether to carry the control word field in packets sent on the PW.
For packets transmitted on a PW to carry the control word field, you must enable the control word feature on both PEs of the PW.
Examples
# Enable the control word feature for the PW class pw100.
<Sysname> system-view
[Sysname] pw-class pw100
[Sysname-pw-pw100] control-word enable
Related commands
display l2vpn pw-class
description
Use description to configure a description for a cross-connect group.
Use undo description to remove the description of a cross-connect group.
Syntax
description text
undo description
Default
No description is configured for a cross-connect group.
Views
Cross-connect group view
Predefined user roles
network-admin
Parameters
text: Configures a description, a case-sensitive string of 1 to 80 characters.
Examples
# Configure a description of vpws for vpn2 for cross-connect group vpn2.
<Sysname> system-view
[Sysname] xconnect-group vpn2
[Sysname-xcg-vpn2] description vpws for vpn2
Related commands
display l2vpn xconnect-group
display bgp l2vpn signaling
Use display bgp l2vpn signaling to display MPLS L2VPN label block information discovered by BGP.
Syntax
display bgp l2vpn signaling [ peer ip-address { advertised | received } [ statistics ] | route-distinguisher route-distinguisher [ site-id site-id [ label-offset label-offset [ advertise-info ] ] ] | statistics ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
peer ip-address: Specifies a BGP peer by its IP address.
advertised: Displays MPLS L2VPN label block information advertised to the BGP peer.
received: Displays MPLS L2VPN label block information received from the BGP peer.
statistics: Displays BGP MPLS L2VPN label block statistics.
route-distinguisher route-distinguisher: Displays BGP MPLS L2VPN label block information for the route distinguisher (RD), which is a string of 3 to 21 characters. You can specify an RD in one of the following formats:
· 16-bit AS number:32-bit user-defined number, such as 101:3.
· 32-bit IP address:16-bit user-defined number, such as 192.168.122.15:1.
· 32-bit AS number:16-bit user-defined number, such as 65536:1. In this format, the minimum value of the AS number is 65536.
site-id site-id: Displays BGP MPLS L2VPN label block information for the specified site. The value range for the site ID is 0 to 32.
label-offset label-offset: Displays information about the BGP MPLS L2VPN label block with the specified offset in the range of 0 to 65535.
advertise-info: Displays BGP MPLS L2VPN label block advertisement information.
Usage guidelines
If you do not specify any parameters, this command displays brief information about all BGP MPLS L2VPN label blocks.
Examples
# Display brief information about all BGP MPLS L2VPN label blocks.
<Sysname> display bgp l2vpn signaling
BGP local router ID is 192.168.1.135
Status codes: * - valid, > - best, d - dampened, h - history,
s - suppressed, S - stale, i - internal, e - external
Origin: i - IGP, e - EGP, ? - incomplete
Total number of label blocks: 2
Route distinguisher: 2:2
Total number of label blocks: 2
Site ID LB offset LB range LB base Nexthop
* > 1 0 10 65634 0.0.0.0
* >i 2 0 10 65662 192.3.3.3
Table 1 Command output
Field |
Description |
Status codes |
Status codes: · * – valid—Valid route. · > – best—Best route. · d – damped—Dampened route. · h – history—History route. · s – suppressed—Suppressed route. · S – Stale—Stale route. · i – internal—Internal route. · e – external—External route. |
Origin |
Origin of the label block: · i – IGP—Originated in the AS. · e – EGP—Learned through EGP. · ? – incomplete—Unknown origin. |
LB offset |
Offset of the label block. |
LB range |
Size of the label block. |
LB base |
Initial value of the label block. |
<Sysname> display bgp l2vpn signaling route-distinguisher 2:2 site-id 2 label-offset 0
BGP local router ID: 192.168.1.135
Local AS number: 100
Route distinguisher: 2:2
Total number of label blocks: 1
Paths: 1 available, 1 best
From : 192.3.3.3 (192.168.1.140)
Original nexthop: 192.3.3.3
Ext-Community : <RT: 2:2>, <L2VPN info: MTU 1500, Encap type VLAN>
AS-path : (null)
Origin : igp
Attribute value : localpref 100, pref-val 0
Site ID : 2
LB offset : 0
LB base : 65662
LB range : 10
State : valid, internal, best,
CSV : 0x01000ABFFF
Table 2 Command output
Field |
Description |
Paths |
Number of label block messages: · available—Number of available label block messages. · best—Number of best label block messages. |
From |
IP address of the peer from which the label block was received. |
Original nexthop |
Original next hop. If the label block was obtained from a BGP route update, this field displays the next hop address in that BGP route update. |
Ext-Community |
Extended community attribute: · RT—Route target. · L2VPN info—L2VPN information, including the MTU and encapsulation type. |
AS-path |
AS path attribute, which records all ASs that the label block passed to prevent routing loops. |
Origin |
Origin of the label block: · igp—Originated in the AS. · egp—Learned through EGP. · incomplete—Unknown origin. |
Attribute value |
Attribute of the label block: · MED—Multi-Exit Discriminator attribute. · localpref—Local preference value. · pref-val—Preferred value. · pre—Preference value. |
LB offset |
Offset of the label block. |
LB base |
Initial value of the label block. |
LB range |
Size of the label block. |
State |
State of the label block: · valid. · internal. · external. · local. · best. |
CSV |
Link state. |
# Display BGP advertisement information for the specified MPLS L2VPN label block.
<Sysname> display bgp l2vpn signaling route-distinguisher 2:2 site-id 1 label-offset 0 advertise-info
BGP local router ID: 192.168.1.135
Local AS number: 100
Route distinguisher: 2:2
Total number of label blocks: 1
Paths: 1 best
Site ID : 1
LB offset : 0
LB base : 65634
LB range : 10
CSV : 0x01000ADFFF
Advertised to peers (1 in total):
192.3.3.3
Table 3 Command output
Field |
Description |
Paths |
Number of label block messages: · available—Number of available label block messages. · best—Number of best label block messages. |
LB offset |
Offset of the label block. |
LB base |
Initial value of the label block. |
LB range |
Size of the label block. |
CSV |
Link state. |
Advertised to peers (1 in total) |
Peers to which the label block has been advertised. |
display l2vpn bgp
Use display l2vpn bgp to display MPLS L2VPN label block information.
Syntax
display l2vpn bgp [ local | peer ip-address ] [ xconnect-group group-name ] [ verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
local: Displays local MPLS L2VPN label block information.
peer ip-address: Displays MPLS L2VPN label block information received from the remote peer.
xconnect-group group-name: Displays MPLS L2VPN label block information for the cross-connect group specified by its name, a case-sensitive string of 1 to 31 characters. If you do not specify a cross-connect group, this command displays MPLS L2VPN label block information for all cross-connect groups.
verbose: Displays detailed information. If you do not specify this keyword, the command displays brief information.
Usage guidelines
If you specify a peer, this command displays both the label block received from the peer and the local label block that matches the received label block.
If you do not specify a peer or local, this command displays label blocks received from all peers and local label blocks that match the received ones. If no local label block matches the received ones, the command only displays the label blocks received from all peers.
A local label block matches a received label block if the following condition is met: local label block LO ≤ remote site ID ≤ local label block LO + local label block LR – 1.
Examples
# Display brief information about label blocks received from all peers.
<Sysname> display l2vpn bgp
Total number of BGP PWs: 1, 1 up, 0 down
Xconnect-group Name: vpnb, Site ID:1
Rmt Site Offset RD Nexthop In/Out Label State
2 0 2:2 192.3.3.3 65636/65663 Up
Table 4 Command output
Field |
Description |
Rmt Site |
ID of the remote site. |
Offset |
Offset of the label block. |
# Display detailed information about label blocks received from all peers.
<Sysname> display l2vpn bgp verbose
Xconnect-group Name: vpnb, Site ID:1
Remote Site ID : 2
Offset : 0
RD : 2:2
PW State : Up
Encapsulation : VLAN
MTU : 1500
Nexthop : 192.3.3.3
Local VC Label : 65636
Remote VC Label : 65663
Link ID : 1
Local Label Block : 65634/10/0
Remote Label Block : 65662/10/0
Export Route Target: 2:2
Table 5 Command output
Field |
Description |
Local VC Label |
Incoming label of the PW. |
Remote VC Label |
Outgoing label of the PW. |
Link ID |
Link ID of the PW. |
Local Label Block |
Local label block: label base/label range/Label-block offset. |
Remote Label Block |
Remote label block: label base/label range/Label-block offset. |
Export Route Target |
Route target of the remote label block. |
# Display brief information about all local label blocks.
<Sysname> display l2vpn bgp local
Xconnect-group Name: vpnb
Site Offset Range Label Base RD
1 0 10 65634 2:2
# Display detailed information about all local label blocks.
<Sysname> display l2vpn bgp local verbose
Xconnect-group Name: vpnb
Site ID : 1
Offset : 0
RD : 2:2
Range : 10
Label Base : 65634
Link ID : 1
Table 6 Command output
Field |
Description |
Offset |
Offset of the label block. |
RD |
RD of the label block. If no RD is configured, this field displays a hyphen (-). |
Range |
Range of the label block. |
Label Base |
Initial value of the label block. |
Link ID |
Link ID of the PW established using the label block. The link ID is fixed to 1 because an MPLS L2VPN cross-connect can establish only one BGP PW. |
Related commands
display l2vpn pw
display l2vpn ldp
Use display l2vpn ldp to display LDP PW label information.
Syntax
display l2vpn ldp [ peer ip-address [ pw-id pw-id ] | xconnect-group group-name ] [ verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
peer ip-address: Displays LDP PW label information advertised by the specified peer PE. The ip-address argument specifies the LSR ID of the peer PE. If you do not specify a peer PE, this command displays LDP PW label information advertised by all peer PEs.
pw-id pw-id: Displays LDP PW label information for the PW specified by its PW ID. The PW ID is in the range of 1 to 4294967295. If you specify peer ip-address without this option, the command displays all LDP PW label information advertised by the peer PE.
xconnect-group group-name: Displays LDP PW label information for the cross-connect group specified by its name, a case-sensitive string of 1 to 31 characters. If you do not specify a cross-connect group, this command displays LDP PW label information for all cross-connect groups.
verbose: Displays detailed information. If you do not specify this keyword, the command displays brief information.
Examples
# Display brief information about all LDP PW labels.
<Sysname> display l2vpn ldp
Total number of LDP PWs: 1, 1 up, 0 down
Peer PW ID/VPLS ID In/Out Label State Owner
192.3.3.3 1001 65663/65665 Up vpn1
Table 7 Command output
Field |
Description |
PW ID/VPLS ID |
This field displays the PW ID for FEC 128, and displays the VPLS ID of the PE for FEC 129. Only VPLS supports FEC 129. |
Owner |
Cross-connect group of the PW. |
# Display detailed information about all LDP PW labels.
<Sysname> display l2vpn ldp verbose
Peer: 192.2.2.2 PW ID: 1000
Xconnect-group: vpn1
Connection : ldp
PW State : Up
PW Status Communication: Notification method
PW ID FEC (Local/Remote):
PW Type : VLAN/VLAN
Group ID : 0/0
Label : 65651/65779
Control Word: Disabled/Disabled
VCCV CC Type: -/-
VCCV CV Type: -/-
MTU : 1500/1500
PW Status : PW forwarding/PW forwarding
Table 8 Command output
Field |
Description |
Xconnect-group |
Cross-connect group of the PW. |
Connection |
Cross-connect of the PW. |
PW Status Communication |
PW state communicate: · Notification method—Uses notifications to communicate PW states. · Label withdraw method—Assigns a PW label to the PW when the AC is up and withdraws the PW label when the AC goes down. |
VCCV CC Type |
This field is not supported in the current release. |
VCCV CV Type |
This field is not supported in the current release. |
PW Status |
PW status: · PW forwarding—PW is ready for packet forwarding. · PW not forwarding—PW is not ready for packet forwarding. · AC receive fault—AC cannot receive packets. · AC transmit fault—AC cannot send packets. · PW receive fault—PW cannot receive packets. · PW transmit fault—PW cannot send packets. |
display l2vpn forwarding
Use display l2vpn forwarding to display cross-connect forwarding information.
Syntax
display l2vpn forwarding { ac | pw } [ xconnect-group group-name ] [ slot slot-number ] [ verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
ac: Displays AC forwarding information.
pw: Displays PW forwarding information.
xconnect-group group-name: Displays forwarding information for the cross-connect group specified by its name, a case-sensitive string of 1 to 31 characters. If you do not specify a group, this command displays forwarding information for all cross-connect groups.
slot slot-number: Displays cross-connect forwarding information for an IRF member device. The slot-number argument specifies the ID of the IRF member device. If you do not specify a member device, this command displays cross-connect forwarding information for the master device.
verbose: Displays detailed information. If you do not specify this keyword, the command displays brief information.
Examples
# Display brief AC forwarding information for all cross-connect groups.
<Sysname> display l2vpn forwarding ac
Total number of cross-connections: 3
Total number of ACs: 3
AC Xconnect-group Link ID
FGE1/1/5 srv1 vpn1 0
FGE1/1/5 srv2 vpn2 1
FGE1/1/6 vpn3 0
Table 9 Command output
Field |
Description |
Total number of cross-connections |
Total number of cross-connects, including cross-connects not bound to any AC. |
AC |
AC type. The value is an Ethernet service instance on a Layer 2 interface, such as FGE1/1/5 srv1. |
# Display detailed AC forwarding information for all cross-connect groups.
<Sysname> display l2vpn forwarding ac verbose
Xconnect-group: vpws1
Connection: actopw1
Interface: FGE1/1/3 Service Instance: 1
Link ID : 1
Access Mode : VLAN
Encapsulation: s-vid 100
Xconnect-group: vpws5
Connection: actopw2
Interface: FGE1/1/4 Service Instance: 10
Link ID : 0
Access Mode : VLAN
Encapsulation: s-vid 10
Table 10 Command output
Field |
Description |
Xconnect-group |
Cross-connect group name. |
Connection |
Cross-connect name. |
Access Mode |
AC access mode: · VLAN. · Ethernet. |
Encapsulation |
Match criterion of the Ethernet service instance. |
# Display brief PW forwarding information for all cross-connect groups.
<Sysname> display l2vpn forwarding pw
Total number of cross-connections: 1
Total number of PWs: 2, 2 up, 0 blocked, 0 down
Xconnect-group In/Out Label NID Link ID State
vpn1 65779/65651 135 0 Up
vpn1 65778/65651 137 1 Up
Table 11 Command output
Field |
Description |
Total number of cross-connections |
Total number of cross-connects, including those not bound to any PW. |
NID |
NHLFE ID for the public tunnel that carries the PW. If equal-cost tunnels are available, this field displays multiple NIDs. If no tunnel is available, this field displays None. |
State |
PW state: Up, Down, Blocked, or BFD Defect. Blocked indicates that the PW is a backup PW. BFD Defect indicates BFD has detected a defect on the PW. |
# Display detailed PW forwarding information for all cross-connect groups.
<Sysname> display l2vpn forwarding pw verbose
Xconnect-group: vpn1
Connection: ldp
Link ID: 0
PW Type : VLAN PW State : Up
In Label : 65660 Out Label: 65661
MTU : 1500
PW Attributes : Main
VCCV CC : Router-Alert
VCCV BFD : Fault Detection with BFD
Tunnel Group ID : 0x1800000460000004
Tunnel NHLFE IDs: 131
Link ID: 1
PW Type : VLAN PW State : Up
In Label : 65659 Out Label: 65663
MTU : 1500
PW Attributes : Main
VCCV CC : Router-Alert
VCCV BFD : Fault Detection with BFD
Tunnel Group ID : 0x1800000060000000
Tunnel NHLFE IDs: 133
Table 12 Command output
Field |
Description |
PW State |
PW state: Up, Down, Blocked, or BFD Defect. Blocked indicates that the PW is a backup PW. BFD Defect indicates BFD has detected a defect on the PW. |
PW Attributes |
PW attribute: · Main—The PW is the primary PW. · Backup—The PW is the backup PW. |
VCCV CC |
This field is not supported in the current release. |
VCCV BFD |
This field is not supported in the current release. |
Tunnel Group ID |
ID of the tunnel group for the PW. |
Tunnel NHLFE IDs |
NHLFE IDs of the public tunnels that carry the PW. If equal-cost tunnels are available, this field displays multiple tunnel NHLFE IDs. If no tunnel is available, this field displays None. |
display l2vpn pw
Use display l2vpn pw to display L2VPN PW information.
Syntax
display l2vpn pw [ xconnect-group group-name ] [ protocol { bgp | ldp | static } ] [ verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
xconnect-group group-name: Displays L2VPN PW information for the cross-connect group specified by its name, a case-sensitive string of 1 to 31 characters. If you do not specify a group, this command displays L2VPN PW information for all cross-connect groups.
protocol: Displays L2VPN PW information established by a protocol. If you do not specify a protocol, this command displays L2VPN PW information established by all protocols.
bgp: Displays BGP PW information.
ldp: Displays LDP PW information.
static: Displays static PW information, including remote CCC connections.
verbose: Displays detailed information. If you do not specify this keyword, the command displays brief information.
Examples
# Display brief information about all L2VPN PWs.
<Sysname> display l2vpn pw
Flags: M - main, B - backup, H - hub link, S - spoke link, N - no split horizon
Total number of PWs: 2, 2 up, 0 blocked, 0 down, 0 defect
Xconnect-group Name: ldp
Peer PW ID/Rmt Site In/Out Label Proto Flag Link ID State
192.3.3.3 500 65699/65699 LDP M 0 Up
Xconnect-group Name: vpnb
Peer PW ID/Rmt Site In/Out Label Proto Flag Link ID State
192.3.3.3 2 65636/65663 BGP M 1 Up
Table 13 Command output
Field |
Description |
Flag |
PW flag: · M—Primary PW. · B—Backup PW. |
PW ID/Rmt Site |
This field displays the PW ID for a static or LDP PW, and displays the remote site ID for a BGP PW. |
Proto |
Protocol that established the PW, LDP, Static, or BGP. |
Link ID |
Link ID of the PW. |
State |
PW state: Up, Down, Blocked, or Defect. Blocked indicates that the PW is a backup PW. Defect indicates BFD has detected a defect on the PW. |
# Display detailed information about all PWs.
<Sysname> display l2vpn pw verbose
Xconnect-group Name: ldp
Connection Name: ldp
Peer: 192.3.3.3 PW ID: 500
Signaling Protocol : LDP
Link ID : 0 PW State : Up
In Label : 65699 Out Label: 65699
MTU : 1500
PW Attributes : Main
VCCV CC : -
VCCV BFD : -
Tunnel Group ID : 0x1800000160000000
Tunnel NHLFE IDs : 136
Xconnect-group Name: vpnb
Connection of auto-discovery: Site 1
Peer: 192.3.3.3 Remote Site: 2
Signaling Protocol : BGP
Link ID : 1 PW State : Up
In Label : 65636 Out Label: 65663
MTU : 1500
PW Attributes : Main
VCCV CC : -
VCCV BFD : -
Tunnel Group ID : 0x1800000160000000
Tunnel NHLFE IDs : 136
Table 14 Command output
Field |
Description |
|
Xconnect-group Name |
Cross-connect group name. |
|
Connection |
Cross-connect name, which is displayed for LDP and static PWs. |
|
Peer |
IP address of the peer PE of the PW. |
|
PW State |
PW state: Up, Down, Blocked, or Defect. Blocked indicates that the PW is a backup PW. Defect indicates BFD has detected a defect on the PW. |
|
Wait to Restore Time |
Wait time to switch traffic from the backup PW to the primary PW when the primary PW recovers, in seconds. If the switchover is disabled, this field displays Infinite. This field is available when both primary and backup PW exist, and is displayed only for the primary PW. |
|
Remaining Time |
Remaining wait time for traffic switchover, in seconds. |
|
PW Attributes |
PW attribute: · Main—Primary PW. · Backup—Backup PW. |
|
VCCV CC |
This field is not supported in the current release. |
|
VCCV BFD |
This field is not supported in the current release. |
|
Tunnel Group ID |
ID of the tunnel group for the PW. |
|
Tunnel NHLFE IDs |
NHLFE IDs of the public tunnels that carry the PW. If equal-cost tunnels are available, this field displays multiple tunnel NHLFE IDs. If no tunnel is available, this field displays None. |
|
Connection of auto-discovery |
The PW is a BGP PW. |
|
Site |
Local site ID. |
|
Remote site |
Remote site ID. |
|
display l2vpn pw-class
Use display l2vpn pw-class to display PW class information.
Syntax
display l2vpn pw-class [ class-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
class-name: Displays information about the PW class specified by its name, a case-sensitive string of 1 to 19 characters. If you do not specify a PW class, this command displays information about all PW classes.
Examples
# Display information about all PW classes.
<Sysname> display l2vpn pw-class
Total number of PW classes: 2
PW Class Name PW Type Control Word VCCV CC VCCV BFD
pw1 Ethernet Enabled Router-Alert BFD
pw2 VLAN Disabled Router-Alert BFD
Table 15 Command output
Field |
Description |
|
VCCV CC |
This field is not supported in the current release. |
|
VCCV BFD |
This field is not supported in the current release. |
|
Related commands
pw-class
display l2vpn service-instance
Use display l2vpn service-instance to display Ethernet service instance information.
Syntax
display l2vpn service-instance [ interface interface-type interface-number [ service-instance instance-id ] ] [ verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
interface interface-type interface-number: Displays Ethernet service instance information for the specified Layer 2 Ethernet interface or Layer 2 aggregate interface. If you do not specify an interface, this command displays Ethernet service instance information for all Layer 2 Ethernet interfaces and Layer 2 aggregate interfaces.
service-instance instance-id: Displays information about the Ethernet service instance specified by its ID. The instance ID is in the range of 1 to 4096. If you specify interface interface-type interface-number without this option, the command displays information about all Ethernet service instances on the specified Layer 2 Ethernet interface or Layer 2 aggregate interface.
verbose: Displays detailed information. If you do not specify this keyword, the command displays brief information.
Examples
# Display brief information about all Ethernet service instances.
<Sysname> display l2vpn service-instance
Total number of service-instances: 5, 5 up, 0 down
Total number of ACs: 4, 4 up, 0 down
Interface SrvID Owner LinkID State Type
FGE1/1/3 1 vpws1 1 Up VPWS
FGE1/1/3 2 vpws2 1 Up VPWS
FGE1/1/3 3 vpws3 1 Up VPWS
FGE1/1/3 4 vpws4 1 Up VPWS
FGE1/1/3 5 Up
Table 16 Command output
Field |
Description |
SrvID |
Ethernet service instance ID. |
Owner |
Name of the cross-connect group bound to the Ethernet service instance. If no cross-connect group is bound, this field is blank. |
Type |
L2VPN type: VPLS or VPWS. |
# Display detailed information about all Ethernet service instances on the Layer Ethernet port FortyGigE 1/1/1.
<Sysname> display l2vpn service-instance interface fortygige 1/1/1 verbose
Interface: FGE1/1/1
Service Instance: 1
Encapsulation : s-vid 100
Xconnect-group: vpws1
Connection : actopw
Link ID : 1
State : Up
Service Instance: 2
Encapsulation : s-vid 1001
Xconnect-group: vpws2
Connection : pwtopw
Link ID : 1
State : Up
Service Instance: 3
Encapsulation : s-vid 2000
Xconnect-group: vpws3
AD Connection : Site 1, Remote Site 2
Link ID : 1
State : Up
Table 17 Command output
Field |
Description |
Interface |
Layer 2 Ethernet interface or Layer 2 aggregate interface. |
Encapsulation |
Match criteria of the Ethernet service instance. If no match criteria are configured, the field is blank. |
Xconnect-group |
Name of the cross-connect group bound to the Ethernet service instance. |
AD connection |
Name of the auto-discovery cross-connect bound to the Ethernet service instance, identified by the local and remote site IDs. |
Related commands
service-instance
display l2vpn xconnect-group
Use display l2vpn xconnect-group to display cross-connect group information.
Syntax
display l2vpn xconnect-group [ name group-name ] [ verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
name group-name: Displays information about the cross-connect group specified by its name, a case-sensitive sting of 1 to 31 characters. If you do not specify a group, this command displays information about all cross-connect groups.
verbose: Displays detailed information. If you do not specify this keyword, the command displays brief information.
Examples
# Display brief information about all cross-connect groups.
<Sysname> display l2vpn xconnect-group
Total number of cross-connections: 3, 0 up, 3 down, 0 admin down
Xconnect-group Name Connection ID MTU State
abc 0 1500 Down
vpn1 2 1500 Down
vpn2 1 1500 Down
Table 18 Command output
Field |
Description |
Connection ID |
Cross-connect ID. |
State |
Cross-connect group state: Up, Down, or Admin down. Admin down indicates the cross-connect group has been shut down by the shutdown command. |
# Display detailed information about all cross-connect groups.
<Sysname> display l2vpn xconnect-group verbose
Xconnect-group Name: ldp
Description : ldp-pw
Connection Name : ldp
Connection ID : 1
State : Down
MTU : 1500
LDP PWs:
Peer PW ID Link ID State
192.3.3.3 200 1 Down
ACs:
AC Link ID State
FGE1/1/1 srv2002 0 Up
Xconnect-group Name: vpnb
Connection of auto-discovery: Site 1, Remote Site 2
Connection ID : 0
State : Up
MTU : 1500
BGP PWs:
Peer Remote Site Link ID State
192.3.3.3 2 1 Up
ACs:
AC Link ID State
FGE1/1/4 srv200 0 Up
Table 19 Command output
Field |
Description |
Xconnect-group Name |
Cross-connect group name. |
Description |
Description for the cross-connect group. If no description is configured, this field is not displayed. |
Connection Name |
Cross-connect name. |
Connection of auto-discovery |
Auto-discovery cross-connect. |
Site |
Local site ID. |
Remote site |
Remote site ID. |
Connection ID |
Cross-connect ID. |
State |
Cross-connect group state: Up, Down, or Admin down. Admin down indicates the cross-connect group has been shut down by the shutdown command. |
AC |
AC type. The value is an Ethernet service instance on a Layer 2 interface, such as FGE1/1/3 srv1. |
State |
PW state: Up, Down, Blocked, or Defect. |
Related commands
xconnect-group
encapsulation
Use encapsulation to configure a packet match criterion for an Ethernet service instance.
Use undo encapsulation to remove a match criterion from an Ethernet service instance.
Syntax
encapsulation default
encapsulation { tagged | untagged }
encapsulation s-vid vlan-id [ only-tagged ]
undo encapsulation
Default
No packet match criterion is configured for an Ethernet service instance.
Views
Ethernet service instance view
Predefined user roles
network-admin
Parameters
default: Matches all incoming packets.
tagged: Matches tagged packets.
untagged: Matches untagged packets.
s-vid vlan-id: Matches packets with a specific outer VLAN ID. The vlan-id argument specifies a VLAN ID in the range of 1 to 4094.
only-tagged: Matches only tagged packets. If the outer VLAN is not the PVID, the matching result does not differ, whether or not you specify the only-tagged keyword. If the outer VLAN is the PVID, the matching result depends on whether or not the only-tagged keyword is specified.
· To match only PVID-tagged packets, specify the only-tagged keyword.
· To match both untagged packets and PVID-tagged packets, do not specify the only-tagged keyword.
Usage guidelines
You can configure only one of the following match criteria for an Ethernet service instance:
· Match all incoming packets.
· Match incoming packets with any VLAN ID or no VLAN ID.
· Match incoming packets with a specific outer VLAN ID.
To match incoming packets with VLAN IDs on an interface, you must first create the VLANs, and then assign the interface to the VLANs.
The match criteria for different Ethernet service instances configured on an interface must be different.
An Ethernet service instance can contain only one match criterion. To modify the match criterion, execute the undo encapsulation command to remove the criterion and then execute the encapsulation command. When you remove the match criterion in an Ethernet service instance, the mapping between the Ethernet service instance and the cross-connect is removed automatically.
Examples
# Configure Ethernet service instance 1 on FortyGigE 1/1/1 to match packets that have an outer VLAN ID of 111.
<Sysname> system-view
[Sysname] interface fortygige 1/1/1
[Sysname-FortyGigE1/1/1] service-instance 1
[Sysname-FortyGigE1/1/1-srv1] encapsulation s-vid 111
Related commands
display l2vpn service-instance
l2vpn enable
Use l2vpn enable to enable L2VPN.
Use undo l2vpn enable to disable L2VPN.
Syntax
l2vpn enable
undo l2vpn enable
Default
L2VPN is disabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
You must enable L2VPN before configuring other L2VPN settings.
Examples
# Enable L2VPN.
<Sysname> system-view
[Sysname] l2vpn enable
l2vpn mac-address software-learning enable
Use l2vpn mac-address software-learning enable to enable MAC address software learning on an itnerface.
Use undo l2vpn mac-address software-learning enable to disable MAC address software learning on an itnerface.
Syntax
l2vpn mac-address software-learning enable
undo l2vpn mac-address software-learning enable
Default
MAC address software learning is disabled on an interface.
Views
Layer 2 Ethernet interface view, Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
This command applies to a Software Defined Network (SDN).
On an SDN network, the device uploads the learned MAC addresses to the controller, and the controller issues the received MAC address to other remote devices, which reduces unnecessary broadcasts.
An interface can learn MAC addresses through one of the following methods:
· Hardware learning—MAC addresses are learned through hardware (the default setting). Hardware learning requires the software to periodically check whether the hardware has learned new MAC addresses, and then uploads the learned MAC addresses to the controller.
· Software learning—The software learns MAC addresses, issues the learned MAC addresses to the hardware, and uploads the MAC addresses to the controller. Software learning has a faster learning speed than hardware learning because software learning does not require a periodical check.
To avoid impacting the system, H3C recommends not enabling this feature when a large number of MAC addresses change frequently.
Examples
# Enable MAC address software learning on Layer 2 Ethernet interface FortyGigE 1/1/1.
<Sysname> system-view
[Sysname] interface fortygige 1/1/1
[Sysname-FortyGigE1/1/1] l2vpn mac-address software-learning enable
l2vpn switchover
Use l2vpn switchover to switch traffic from the specified PW to its backup or primary PW.
Syntax
l2vpn switchover peer ip-address pw-id pw-id
Views
User view
Predefined user roles
network-admin
Parameters
peer ip-address: Specifies the LSR ID of the peer PE on the PW.
pw-id pw-id: Specifies the PW ID in the range of 1 to 4294967295.
Usage guidelines
The specified LSR ID and PW ID uniquely identify a PW. The specified PW must be in up state.
If the specified PW has a backup PW or primary PW, this command switches traffic from the PW to the backup or primary PW. If the PW does not have a backup or primary PW, this command does not perform the switchover.
Examples
# Switch traffic from PW 100 destined for 3.3.3.3 to its backup PW.
<Sysname> l2vpn switchover peer 3.3.3.3 pw-id 100
mtu
Use mtu to set an MTU for PWs established on a cross-connect or auto-discovery cross-connect.
Use undo mtu to restore the default.
Syntax
mtu mtu
undo mtu
Default
A PW has an MTU of 1500 bytes.
Views
Cross-connect view, auto-discovery cross-connect view
Predefined user roles
network-admin
Parameters
mtu: Sets an MTU value in the range of 300 to 65535 bytes.
Usage guidelines
The MTU specifies the maximum packet length, including the control word, PW label, and network layer packet.
The PEs at the two ends of an LDP PW must have the same MTU. Otherwise, the PW cannot come up.
Examples
# Set the MTU to 1400 bytes for the cross-connect ac2pw in the cross-connect group vpn1.
<Sysname> system-view
[Sysname] xconnect-group vpn1
[Sysname-xcg-vpn1] connection ac2pw
[Sysname-xcg-vpn1-ac2pw] mtu 1400
# Set the MTU to 1400 bytes for the auto-discovery cross-connect in the cross-connect group bbb.
<Sysname> system-view
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] auto-discovery bgp
[Sysname-xcg-bbb-auto] mtu 1400
Related commands
display l2vpn xconnect-group
peer
Use peer to configure a PW for a cross-connect and enter cross-connect PW view. If the specified PW has been created, this command places you into cross-connect PW view.
Use undo peer to delete a PW for a cross-connect.
Syntax
peer ip-address pw-id pw-id [ in-label label-value out-label label-value ] [ pw-class class-name | tunnel-policy tunnel-policy-name ] *
undo peer ip-address pw-id pw-id
Default
No PW is configured for a cross-connect.
Views
Cross-connect view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the LSR ID of the peer PE.
pw-id pw-id: Specifies a PW ID for the PW, in the range of 1 to 4294967295.
in-label label-value: Specifies the incoming label of the PW, in the range of 16 to 1023.
out-label label-value: Specifies the outgoing label of the PW, in the range of 16 to 1023.
pw-class class-name: Specifies a PW class by its name, a case-sensitive string of 1 to 19 characters. You can specify a PW class to configure the PW type and control word. If you do not specify a PW class, the PW type is determined by the interface type. The control word feature is not supported for PW types that do not require using control word.
tunnel-policy tunnel-policy-name: Specifies a tunnel policy by its name, a case-sensitive string of 1 to 19 characters. If you do not specify a tunnel policy, the default tunnel policy is used.
Usage guidelines
To create a static PW, you must specify the incoming and outgoing labels. To enter the view of an existing static PW, you do not need to specify the incoming and outgoing labels.
If you do not specify the incoming and outgoing labels when you create a new PW, LDP is used to create the PW.
The PW ID for a PW must be the same on the PEs at the ends of the PW.
The LSR ID of the peer PE and the PW ID uniquely identify a PW, and must not both be the same as those of any VPLS PW or PW bound to a cross-connect.
PW redundancy is mutually exclusive with multi-segment PW feature. If you have configured two PWs by using the peer command in cross-connect view, you cannot configure a backup PW by using the backup-peer command in cross-connect PW view, and vice versa.
Examples
# Configure an LDP PW destined to 4.4.4.4 for the cross-connect pw2pw in the cross-connect group vpn1 and enter cross-connect PW view. The PW ID is 200.
<Sysname> system-view
[Sysname] xconnect-group vpn1
[Sysname-xcg-vpn1] connection pw2pw
[Sysname-xcg-vpn1-pw2pw] peer 4.4.4.4 pw-id 200
[Sysname-xcg-vpn1-pw2pw-4.4.4.4-200]
# Configure a static PW destined to 5.5.5.5 for the cross-connect pw2pw in the cross-connect group vpn1 and enter cross-connect PW view. The static PW has an ID of 200, an incoming label of 100, and an outgoing label of 200.
<Sysname> system-view
[Sysname] xconnect-group vpn1
[Sysname-xcg-vpn1] connection pw2pw
[Sysname-xcg-vpn1-pw2pw] peer 5.5.5.5 pw-id 200 in-label 100 out-label 200
[Sysname-xcg-vpn1-pw2pw-5.5.5.5-200]
Related commands
· display l2vpn ldp
· display l2vpn pw
· pw-class
peer signaling
Use peer signaling to enable BGP to exchange label block information with the specified peer or peer group.
Use undo peer signaling to disable BGP to exchange label block information with the specified peer or peer group.
Syntax
peer { group-name | ip-address [ mask-length ] } signaling [ non-standard ]
undo peer { group-name | ip-address [ mask-length ] } signaling
Default
BGP can exchange label block information with a peer or peer group through RFC 4761 MP_REACH_NLRI.
Views
BGP L2VPN address family view
Predefined user roles
network-admin
Parameters
group-name: Specifies a peer group by its name, a case-sensitive string of 1 to 47 characters. The specified peer group must have been created.
ip-address: Specifies a peer by its IP address. The specified peer must have been created.
mask-length: Specifies a mask length in the range of 0 to 32. You can use the ip-address and mask-length arguments together to specify a subnet. If you specify a subnet, this command enables BGP to exchange label block information with all dynamic peers in the subnet.
non-standard: Uses draft-kompella-ppvpn-l2vpn-03 MP_REACH_NLRI to exchange label block information. If you do not specify this keyword, RFC 4761 MP_REACH_NLRI is used to exchange label block information.
Usage guidelines
L2VPN uses MP-BGP to exchange label blocks when creating a BGP PW.
To enable BGP to exchange label blocks with the specified peers through RFC 4761 MP_REACH_NLRI, you can also use the peer enable command in BGP L2VPN address family view. To disable the capability, execute the undo peer signaling command.
Examples
# Enable BGP to exchange label block information with the peer 3.3.3.9 through draft-kompella-ppvpn-l2vpn-03 MP_REACH_NLRI.
<Sysname> system-view
[Sysname] bgp 100
[Sysname-bgp] address-family l2vpn
[Sysname-bgp-l2vpn] peer 3.3.3.9 signaling non-standard
Related commands
display bgp l2vpn signaling
policy vpn-target
Use policy vpn-target to enable route target-based filtering of incoming BGP L2VPN information.
Use undo policy vpn-target to disable route target-based filtering of incoming BGP L2VPN information.
Syntax
policy vpn-target
undo policy vpn-target
Default
Route target-based filtering of incoming BGP L2VPN information is enabled.
Views
BGP L2VPN address family view
Predefined user roles
network-admin
Usage guidelines
If route target-based filtering is enabled, L2VPN accepts only the incoming BGP L2VPN information whose export route target attribute matches the local import route target attribute.
If route target-based filtering is disabled, L2VPN accepts all incoming BGP L2VPN information.
On an inter-AS VPN option B network, an ASBR-PE needs to store all BGP L2VPN information (label block information) and advertises the information to the remote ASBR-PE. To meet this need, execute the undo policy vpn-target command on the ASBR-PE to accept all incoming BGP L2VPN information.
For more information about an inter-AS VPN option B network, see MPLS Configuration Guide.
Examples
# Disable route target-based filtering of incoming BGP L2VPN information.
<Sysname> system-view
[Sysname] bgp 100
[Sysname-bgp] address-family l2vpn
[Sysname-bgp-l2vpn] undo policy vpn-target
pw-class (system view)
Use pw-class to create a PW class and enter PW class view.
Use undo pw-class to delete a PW class.
Syntax
pw-class class-name
undo pw-class class-name
Default
No PW class is created.
Views
System view
Predefined user roles
network-admin
Parameters
class-name: Specifies the name of the PW class, a case-sensitive string of 1 to 19 characters.
Usage guidelines
In PW class view, you can configure PW attributes such as the PW type and control word. PWs with the same attributes can use the same PW class to simplify configuration.
Examples
# Create a PW class named pw100 and enter PW view.
<Sysname> system-view
[Sysname] pw-class pw100
[Sysname-pw-pw100]
Related commands
· control-word enable
· display l2vpn pw-class
· pw-type
pw-class (auto-discovery cross-connect group view)
Use pw-class to specify a PW class for an auto-discovery cross-connect group.
Use undo pw-class to remove the configuration.
Syntax
pw-class class-name
undo pw-class
Default
No PW class is specified.
Views
Auto-discovery cross-connect group view
Predefined user roles
network-admin
Parameters
class-name: Specifies a PW class by its name, a case-sensitive string of 1 to 19 characters.
Usage guidelines
The specified PW class will be used to establish all PWs in the auto-discovery cross-connect group.
Examples
# Specify a PW class named pw100 for the auto-discovery cross-connect group bbb.
<Sysname> system-view
[Sysname] pw-class pw100
[Sysname-pw-pw100] quit
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] auto-discovery bgp
[Sysname-xcg-bbb-auto] pw-class pw100
Related commands
· control-word enable
· display l2vpn pw-class
· pw-class
· pw-type
pw-type
Use pw-type to specify a PW type for a PW class.
Use undo pw-type to restore the default.
Syntax
pw-type { ethernet | vlan }
undo pw-type
Default
The PW type is VLAN.
Views
PW class view
Predefined user roles
network-admin
Parameters
ethernet: Specifies the PW type as Ethernet.
vlan: Specifies the PW type as VLAN.
Usage guidelines
This command takes effect only when the AC type is Ethernet.
Packets are forwarded between the AC and PW as follows according to the PW type:
· Ethernet—P-tag is not transferred on a PW.
¡ For a packet from a CE:
- If the packet contains a P-tag, the PE removes the P-tag, and adds a PW label and an outer tag into the packet before forwarding it.
- If the packet contains no P-tag, the PE directly adds a PW label and an outer tag into the packet before forwarding it.
¡ For a packet to a CE:
- If the access mode is configured as VLAN by using the ac interface command, the PE adds a P-tag into the packet before sending it to the CE.
- If the access mode is configured as Ethernet by using the ac interface command, the PE directly sends the packet to the CE.
You cannot rewrite or remove existing tags.
· VLAN—Packets transmitted over a PW must carry a P-tag.
¡ For a packet from a CE:
- If the peer PE does not require the ingress to rewrite the P-tag, the PE keeps the P-tag unchanged for the packet, and then encapsulates the packet. If the packet contains no P-tag, the PE adds a null label (the label value is 0) into the packet, and then encapsulates the packet.
- If the peer PE requires the ingress to rewrite the P-tag, the PE changes the P-tag to the expected VLAN tag (the tag value might be 0), and then adds a PW label and an outer tag into the packet. If the packet contains no P-tag, the PE adds a VLAN tag expected by the peer PE (the tag value might be 0), and then adds a PW label and an outer tag into the packet.
¡ For a packet to a CE:
- If the access mode is configured as VLAN by using the ac interface command, the PE rewrites or retains the P-tag before forwarding the packet.
- If the access mode is configured as Ethernet by using the ac interface command, the PE removes the P-tag before forwarding the packet.
Examples
# Configure the PW type as Ethernet.
<Sysname> system-view
[Sysname] pw-class pw100
[Sysname-pw-pw100] pw-type ethernet
Related commands
· ac-interface
· display l2vpn pw-class
revertive
Use revertive to specify whether to switch traffic from the backup PW to the primary PW when the primary PW recovers, and set the wait time for the switchover.
Use undo revertive wtr to restore the default wait time of 0.
Use undo revertive never to restore the default.
Syntax
revertive { wtr wtr-time | never }
undo revertive { wtr | never }
Default
When the primary PW recovers, traffic is immediately switched from the backup PW to the primary PW.
Views
Cross-connect view
Predefined user roles
network-admin
Parameters
wtr wtr-time: Sets the wait time in the range of 0 to 180 seconds. When the primary PW recovers, the PE waits for the specified time before switching traffic from the backup PW to the primary PW.
never: Disables backup to primary switchover.
Examples
# Set the switchover wait time to 120 seconds for the cross-connect ac2pw in the cross-connect group vpn1.
<Sysname> system-view
[Sysname] xconnect-group vpn1
[Sysname-xcg-vpn1] connection ac2pw
[Sysname-xcg-vpn1-ac2pw] revertive wtr 120
Related commands
display l2vpn pw
route-distinguisher
Use route-distinguisher to configure a route distinguisher (RD) for a BGP cross-connect group.
Use undo route-distinguisher to remove the RD for a BGP cross-connect group.
Syntax
route-distinguisher route-distinguisher
undo route-distinguisher
Default
No RD is configured in auto-discovery cross-connect group view.
Views
Auto-discovery cross-connect group view
Predefined user roles
network-admin
Parameters
route-distinguisher: Specifies an RD, a string of 3 to 21 characters. An RD can be in one of the following formats:
· 16-bit AS number:32-bit user-defined number. For example, 101:3.
· 32-bit IP address:16-bit user-defined number. For example, 192.168.122.15:1.
· 32-bit AS number:16-bit user-defined number, where the AS number must be equal to or greater than 65536. For example, 65536:1.
Usage guidelines
MPLS L2VPN uses RDs to differentiate the sites that reside in different VPNs and have the same site ID.
BGP adds the configured RD before the site ID. The RD and the site ID uniquely identify a VPN site.
You cannot configure the same RD for different BGP cross-connect groups.
To change the RD, you must use the undo route-distinguisher to remove the old RD. Then use the route-distinguisher command to configure the new RD.
Examples
# Configure the RD 22:2 for the BGP cross-connect group bbb.
<Sysname> system-view
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] auto-discovery bgp
[Sysname-xcg-bbb-auto] route-distinguisher 22:2
rr-filter
Use rr-filter to create a route reflector (RR) reflection policy so that only the L2VPN information that contains the specified extended community number is reflected.
Use undo rr-filter to restore the default.
Syntax
rr-filter extended-community-number
undo rr-filter
Default
An RR does not filter reflected L2VPN information.
Views
BGP L2VPN address family view
Predefined user roles
network-admin
Parameters
extended-community-number: Specifies an extended community number in the range of 1 to 199.
Usage guidelines
By configuring different RR reflection policies on RRs in a cluster, you can implement load balancing among the RRs.
Examples
# Configure the RR to reflect only the BGP L2VPN information that contains the extended community number 10.
<Sysname> system-view
[Sysname] bgp 100
[Sysname-bgp] address-family l2vpn
[Sysname-bgp-l2vpn] rr-filter 10
service-instance
Use service-instance to create an Ethernet service instance on an interface and enter Ethernet service instance view.
Use undo service-instance to delete an Ethernet service instance on an interface.
Syntax
service-instance instance-id
undo service-instance instance-id
Default
No Ethernet service instance is created on an interface.
Views
Layer 2 Ethernet interface view, Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
instance-id: Specifies the ID of the Ethernet service instance, in the range of 1 to 4096.
Examples
# Create Ethernet service instance 1 on the Layer 2 Ethernet interface FortyGigE 1/1/1, and enter Ethernet service instance 1 view.
<Sysname> system-view
[Sysname] interface fortygige 1/1/1
[Sysname-FortyGigE1/1/1] service-instance 1
[Sysname-FortyGigE1/1/1-srv1]
Related commands
display l2vpn service-instance
shutdown
Use shutdown to disable a cross-connect group.
Use undo shutdown to restore the default.
Syntax
shutdown
undo shutdown
Default
A cross-connect group is enabled.
Views
Cross-connect group view
Predefined user roles
network-admin
Usage guidelines
After you disable a cross-connect group, all cross-connects in the group cannot provide L2VPN services.
Use the shutdown command when you want to temporarily disable L2VPN. After a cross-connect group is disabled, you can still configure the cross-connect group. After the configuration, use the undo shutdown command to enable the cross-connect group. The cross-connect group will provide L2VPN services using the new settings.
Examples
# Disable the cross-connect group vpn2.
<Sysname> system-view
[Sysname] xconnect-group vpn2
[Sysname-xcg-vpn2] shutdown
Related commands
display l2vpn xconnect-group
site
Use site to create a local site and enter site view.
Use undo site to delete a local site.
Syntax
site site-id [ range range-value ] [ default-offset default-offset ]
undo site site-id
Default
No site is created.
Views
Auto-discovery cross-connect group view
Predefined user roles
network-admin
Parameters
site-id: Specifies a local site ID in the range of 0 to 32.
range range-value: Specifies the maximum number of remote sites to which the local site can connect. The value range is 2 to 33, and the default is 10.
default-offset default-offset: Specifies the start site ID, 0 or 1. The default value is 0.
Usage guidelines
The range range-value and default-offset default-offset options determine the label block of the site.
If you execute the site command with the range-value of range1, a label block with LR of range1 and LO of default-offset is assigned to the site. If you execute another site command with range-value of range2 (range2 is larger than range1), a second label block with LR of range2 to range1 and LO being range1 + default-offset is assigned to the site.
For example, if you execute the following commands, three label blocks B1/0/10, LB2/10/12, and LB3/22/14 are assigned to site 1. LB1, LB2, and LB3 are automatically selected.
site 1 range 10 default-offset 0
site 1 range 22
site 1 range 36
You can create multiple local sites for a cross-connect group.
You can use the site command to increase the range value for an existing site without changing the site-id and default-offset. You cannot decrease the range value for an existing site with the site command. To decrease the value range, you must delete the site and re-create the site with the new range value.
Select a large range value to reduce future modifications for VPN expansion.
You cannot modify the default-offset for a site with the site command. To modify it, you must delete the site and re-create the site with the new default-offset.
Examples
# Create site 1, configure the VPN to contain a maximum of 30 sites, set the start site ID to 0 for the cross-connect group bbb, and enter site view.
<Sysname> system-view
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] auto-discovery bgp
[Sysname-xcg-bbb-auto] site 1 range 30 default-offset 0
[Sysname-xcg-bbb-auto-1]
Related commands
· display l2vpn pw
· display l2vpn xconnect-group
tunnel-policy
Use tunnel-policy to specify a tunnel policy for an auto-discovery cross-connect.
Use undo tunnel-policy to remove the configuration.
Syntax
tunnel-policy tunnel-policy-name
undo tunnel-policy
Default
No tunnel policy is specified.
Views
Auto-discovery cross-connect view
Predefined user roles
network-admin
Parameters
tunnel-policy-name: Specifies a tunnel policy by its name, a case-sensitive string of 1 to 19 characters.
Usage guidelines
The PWs on the auto-discovery cross-connect use the specified tunnel policy to select public tunnels.
If you do not specify a tunnel policy or specify a nonexistent tunnel policy, the default policy applies. The default tunnel policy selects only one public tunnel for a PW in this order: LSP tunnel, CRLSP tunnel.
Examples
# Specify the tunnel policy policy1 for the auto-discovery cross-connect in the cross-connect group bbb.
<Sysname> system-view
[Sysname] tunnel-policy policy1
[Sysname-tunnel-policy-policy1] quit
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] auto-discovery bgp
[Sysname-xcg-bbb-auto] site 2 range 10 default-offset 0
[Sysname-xcg-bbb-auto-2] connection remote-site-id 3
[Sysname-xcg-bbb-auto-2-3] tunnel-policy policy1
Related commands
tunnel-policy
vpn-target
Use vpn-target to configure route targets for a cross-connect group.
Use undo vpn-target to remove the specified or all route targets for a cross-connect group.
Syntax
vpn-target vpn-target&<1-8> [ both | export-extcommunity | import-extcommunity ]
undo vpn-target { vpn-target&<1-8> | all } [ both | export-extcommunity | import-extcommunity ]
Default
No route targets are configured for a cross-connect group.
Views
Auto-discovery cross-connect group view
Predefined user roles
network-admin
Parameters
vpn-target&<1-8>: Specifies a space-separated list of up to eight route targets.
A route target is a string of 3 to 21 characters in one of the following formats:
· 16-bit AS number:32-bit user-defined number. For example, 101:3.
· 32-bit IP address:16-bit user-defined number. For example, 192.168.122.15:1.
· 32-bit AS number:16-bit user-defined number, where the AS number must be equal to or greater than 65536. For example, 65536:1.
both: Uses the specified route targets as both import targets and export targets. The both keyword is used when you do not specify any of both, export-extcommunity, and import-extcommunity.
export-extcommunity: Uses the specified route targets as export targets.
import-extcommunity: Uses the specified route targets as import targets.
all: Removes all route targets.
Usage guidelines
A local PE sets the route targets as export targets in BGP update messages when it advertises L2VPN information through the update messages to a remote peer. The peer uses its import targets to match the received export targets. If a match is found, the peer accepts the L2VPN information.
Examples
# Configure import route targets as 10:1 100:1 1000:1 and export route targets as 20:1 200:1 2000:1 for the BGP cross-connect group bbb.
<Sysname> system-view
[Sysname] xconnect-group bbb
[Sysname-xcg-bbb] auto-discovery bgp
[Sysname-xcg-bbb-auto] vpn-target 10:1 100:1 1000:1 import-extcommunity
[Sysname-xcg-bbb-auto] vpn-target 20:1 200:1 2000:1 export-extcommunity
xconnect-group
Use xconnect-group to create a cross-connect group and enter cross-connect group view. If the specified group has been created, this command places you into cross-connect group view.
Use undo xconnect-group to delete a cross-connect group.
Syntax
xconnect-group group-name
undo xconnect-group group-name
Default
No cross-connect group is created.
Views
System view
Predefined user roles
network-admin
Parameters
group-name: Specifies the name of the cross-connect group, a case-sensitive string of 1 to 31 characters excluding hyphens.
Usage guidelines
L2VPN can create multiple LDP, BGP, and static PWs for a cross-connect group.
Examples
# Create a cross-connect group named vpn1 and enter cross-connect group view.
<Sysname> system-view
[Sysname] xconnect-group vpn1
[Sysname-xcg-vpn1]
Related commands
display l2vpn xconnect-group