Académique Documents
Professionnel Documents
Culture Documents
Presentation_ID
Cisco Confidential
Agenda
MPLS Concepts Labels Assignments and Distribution Frame-mode and Cell-mode MPLS MPLS L3VPN Any Transport over MPLS Traffic Engineering Inter AS / CsC
Presentation_ID
Cisco Confidential
Why MPLS?
Needed a single infrastructure that supports multitude of applications in a secure manner Provide a highly scalable mechanism that was topology driven rather than flow driven Load balance traffic to utilize network bandwidth efficiently Allow core routers/networking devices to switch packets based on some simplified header Leverage hardware so that simple forwarding paradigm can be used
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Objectives
Upon completion of this section, you will be able to perform the following tasks: ? Examine MPLS and L3 routing limitations: L3 routing limitations MPLS architecture Control plane and data plane Label headers Frame mode Label switched router types The process of MPLS forwarding
Presentation_ID
Cisco Confidential
L3 Routing Limitations
Traditional IP Forwarding
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
MPLS Architecture
What Is MPLS?
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
10
Frame-Mode
MPLS Modes of Operation
Presentation_ID
Cisco Confidential
11
Label Headers
MPLS Label Format
Presentation_ID
Cisco Confidential
12
Presentation_ID
Cisco Confidential
13
Presentation_ID
Cisco Confidential
14
Presentation_ID
Cisco Confidential
15
Topic Summary
?Service providers and enterprises can benefit from MPLS:
Enables many new services Optimizes resource utilization Simplifies backbone routing Makes networks more resilient to failures
?Simple labels are used to forward frames (or cells). ?Complex control-plane mechanisms are used to implement various MPLS services.
Presentation_ID
Cisco Confidential
16
Presentation_ID
Cisco Confidential
17
Presentation_ID
Cisco Confidential
18
Presentation_ID
Cisco Confidential
19
Presentation_ID
Cisco Confidential
20
Some traffic from the upper (overutilized) path should be moved to the lower path.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
21
Presentation_ID
Cisco Confidential
22
Presentation_ID
Cisco Confidential
23
Presentation_ID
Cisco Confidential
24
Presentation_ID
Cisco Confidential
25
Presentation_ID
Cisco Confidential
26
Summary
Many types of applications make use of MPLS label s switching technology:
Each MPLS application may use a different routing protocol and a different label exchange protocol. All of the applications use one single label-forwarding engine.
Presentation_ID
Cisco Confidential
27
Presentation_ID
Cisco Confidential
28
Objectives
Upon completion of this section, you will be able to perform the following tasks: ? You will describe how Label-switched Paths (LSPs) are established: LDP/TDP Role in MPLS Label-switched Paths in MPLS LDP/TDP Neighbor Discovery Differences Between LDP and TDP The Process of Establishing Label-switched Paths
Presentation_ID
Cisco Confidential
29
LDP binds labels to networks learned via a routing protocol. TDP and LDP are functionally equivalent but not compatible.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
30
Presentation_ID
Cisco Confidential
31
Presentation_ID
Cisco Confidential
32
Presentation_ID
Cisco Confidential
33
Hello messages are targeted at all routers reachable through an interface. LDP uses well-known User Datagram Protocol (UDP) and TCP port number 646 (711 fot TDP) . Source address used for LDP session can be set by adding the Transport Address Type-Length-Value (TLV) to the Hello message. 6-byte LDP Identifier TLV identifies the router (first four bytes) and label space (last two bytes).
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
34
35
?Peers first exchange initialization messages. ?The session is ready to exchange label mappings after receiving the first keepalive.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
36
?One LDP session is established for each announced LDP identifier (router ID + label space). ?The number of LDP sessions is determined by the number of different label spaces.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
37
?TDP uses UDP and TCP port number 711, and LDP uses UDP and TCP port number 646. ?TDP is used by default on Cisco devices - it may be necessary to enable LDP for non-Cisco peering routers.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
38
Presentation_ID
Cisco Confidential
39
Topic Summary
LDP
LDP is the standard protocol used between MPLSenabled routers to negotiate labels.
LSP
LSPs must be established through the exchange of routing information and labels between adjacent routers.
Presentation_ID
Cisco Confidential
40
Topic Summary
TDP and LDP will automatically try to find neighbors by multicasting Hello messages and will establish a TCP session with discovered neighbors. Functionally, TDP and LDP are almost equivalent but not compatible.
LDP supports several features, such as explicit null label and Path Vector TLV, which are not supported in TDP.
LDP and TDP are introduced into MPLS-enabled networks to exchange labels assigned to IP destination networks.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
41
Presentation_ID
Cisco Confidential
42
Objectives
Upon completion of this section, you will be able to perform the following tasks: ? Configure Frame-mode MPLS Label Allocation, Distribution and Retention Penultimate Hop Popping Convergence in Frame-mode MPLS Using CEF for MPLS Label Switching How to Configure Frame-mode MPLS
Presentation_ID
Cisco Confidential
43
? IP routing protocols are used to build IP routing tables on all label switched routers (LSRs). ? Forwarding tables (FIB) are initially built based on IP routing tables with no labeling information.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
44
? Every LSR locally allocates a label for every destination in the IP routing table. ? Label allocations are asynchronous. ? LIB and LFIB structures have to be initialized on the LSR allocating the label.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
45
?Benefits: Smaller LIB, LFIB and Quicker label exchange. ?Drawbacks: Insecure any neighbor LSR can send packets with any label in LFIB.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
46
?The allocated label is advertised to all neighbor LSRs, regardless of whether the neighbors are upstream or downstream LSRs for the destination. ?Independent Control. (don have to wait to get de nextt hop label from their downstream neighbor)
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
47
?Forwarded IP packets are labeled only on the path segments where the labels have already been assigned.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
48
49
?Router B has already assigned label to X and created an entry in LFIB. ?The outgoing label is inserted in LFIB after the label is received from the next-hop LSR. ?Liberal retention mode (frame-mode): every LSR keeps all labels received from LDP peers even if they are not from their DW peers. This improves convergence speed in case of link failure
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
50
Presentation_ID
? Double lookup is not an optimal way of forwarding labeled packets. ? label can be removed one hop earlier. A
2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
51
? label is removed on the router before the last hop A within an MPLS domain.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
52
? Routing protocol neighbors and LDP neighbors are lost after a link failure. ? LFIB and labeling information in FIB are rebuilt immediately after the routing protocol convergence, based on labels stored in LIB (liberal retention mode).
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
53
? Link recovery requires that an LDP session be reestablished and new labels be exchanged, which adds to the convergence time of LDP. ? End-to-End LSP is temporarily broken, which might cause malfunctioning of certain MPLS applications.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
54
Presentation_ID
Cisco Confidential
55
Presentation_ID
Cisco Confidential
56
Presentation_ID
Cisco Confidential
57
Presentation_ID
Cisco Confidential
58
This command starts CEF switching and creates FIB. All CEF-capable interfaces are enabled for CEF switching. Distributed keyword configures distributed CEF (running on VIP or linecards).
This command disables or re-enables CEF switching on an interface. CEF must be first globally enabled.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
59
Presentation_ID
Cisco Confidential
60
Presentation_ID
Cisco Confidential
61
Presentation_ID
Cisco Confidential
62
Topic Summary
Label allocation and distribution in a packet-mode MPLS environment includes:
IP routing protocols build the IP routing table. Each LSR assigns a label to every destination in the IP routing table independently. LSRs announce their assigned labels to all other LSRs. Every LSR builds its LIB, LFIB and FIB data structures based on received labels.
Benefits include:
Smaller LFIB Quicker label exchange
Drawbacks include:
Insecure any neighbor LSR can send packets with any label in LFIB.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
63
Presentation_ID
Cisco Confidential
64
Presentation_ID
Cisco Confidential
65
Objectives
Upon completion of this section, you will be able to perform the following tasks: ? Configure Cell-mode MPLS Specifics of Cell-mode MPLS Label allocation, distribution, and retention Cell interleaving and VC merging Control VC MPLS over pre-established ATM Virtual Paths How to configure cell-mode MPLS
Presentation_ID
Cisco Confidential
66
Presentation_ID
Cisco Confidential
67
IP routing protocols are used to build IP routing tables on all Label Switch Routers (LSRs). The routing tables are built as if the ATM switches were regular routers.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
68
Presentation_ID
Cisco Confidential
69
Presentation_ID
Cisco Confidential
70
Ingress ATM edge LSR requesting a label inserts the received label in its LIB, FIB and (optionally) LFIB.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
71
LFIB on an ATM switch (ATM switching matrix) always contains the incoming interface. The same label can be reused (with a different meaning) on different interfaces.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
72
Per-interface label allocation is secure labeled packets (or ATM cells) are only accepted from the interface where the label was actually assigned.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
73
If an ATM LSR reuses a downstream label, cells from several upstream LSRs might become interleaved.
Presentation_ID
Cisco Confidential
74
ATM egress router has to allocate a unique label for every ATM ingress router for every destination.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
75
?VC Merge is a solution in which incoming cells are not forwarded until the last cell in a frame arrives. ?All buffered cells are then forwarded to the next-hop ATM LSR.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
76
VC Merge is enabled by default on all ATM switches that support VC Merge functionality. This command disables VC Merge.
Presentation_ID
Cisco Confidential
77
Control VC
LDP Sessions Between ATM LSRs
Configures control VC between LC-ATM peers Default value is 0/32 The setting has to match between LC-ATM peers
Configures the Virtual Path values that can be used for label allocation - default value for VPI is 1-1
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
78
79
Presentation_ID
Cisco Confidential
80
Presentation_ID
Cisco Confidential
81
Creates an LC-ATM subinterface By default, this subinterface uses VC 0/32 for label control protocols and VP=1 for label allocation
Presentation_ID
Cisco Confidential
82
Enables the LDP optional Router-ID based loop detection mechanism Not supported by TDP
Enables the optional hop-count based loop detection mechanism for LDP/TDP
Presentation_ID
Cisco Confidential
83
Enables LC-ATM control on an ATM interface Starts LDP or TDP on the interface Default control VC=0/32, label allocation uses VP=1
Presentation_ID
Cisco Confidential
84
Presentation_ID
Cisco Confidential
85
Presentation_ID
Cisco Confidential
86
Presentation_ID
Cisco Confidential
87
Topic Summary
In cell-mode MPLS, IP routing protocols are used to build the IP routing tables on all LSRs. VC merging can be used to minimize the number of required labels. ATM LSRs establish an LDP/ TDP session through the use of a control Virtual Circuit. ATM Virtual Path was designed to establish switch-toswitch connectivity between parts of a private ATM network over a public ATM network.
Presentation_ID
Cisco Confidential
88
Presentation_ID
Cisco Confidential
89
Objectives
Upon completion of this section, you will be able to perform the following tasks:
Presentation_ID
Cisco Confidential
90
91
?All core routers are required to run BGP. ?All core routers require full Internet routing information (more than 140,000 networks) to be able to forward IP packets between ISP1 and ISP2.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
92
?Only border routers are required to run BGP. ?Core routers run an IGP to learn about BGP next-hop addresses. ?Core routers run label/tag distribution protocol (LDP/TDP) to learn about labels for next-hop addresses.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
93
?All routers are capable of forwarding packets to external destinations: ?Border (edge) routers label and forward IP packets. ?Core routers forward labeled packets.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
94
Presentation_ID
Cisco Confidential
95
By default, labels for all destinations are announced to all LDP/TDP neighbors. This command enables you to selectively advertise some labels to selected LDP/TDP neighbors. Conditional label advertising can be configured per VPN. Conditional label advertisment only works over framemode interfaces.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
96
Presentation_ID
Cisco Confidential
97
Note that the tag-switching advertise-tags version of the command is actually entered into the configuration for backward compatibility.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
98
Presentation_ID
Cisco Confidential
99
Topic Summary
Unicast IP forwarding in MPLS networks: It assigns a unique label to every entry found in the main routing table. Selective label distribution: A router selectively advertises labels to neighboring routers.
Presentation_ID
Cisco Confidential
100
Presentation_ID
Cisco Confidential
101
Objectives
Upon completion of this section, you will be able to perform the following tasks: Monitor and Fine-tune Loop Detection: Loop Detection in MPLS
Presentation_ID
Cisco Confidential
102
Presentation_ID
Cisco Confidential
103
Cisco routers have TTL propagation enabled by default. On ingress: TTL is copied from IP header to label header. On egress: TTL is copied from label header to IP header.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
104
Presentation_ID
Cisco Confidential
105
By default, IP TTL is copied into label header at label imposition and label TTL is copied into IP TTL at label removal. This command disables IP TTL and label TTL propagation: TTL value of 255 is inserted in the label header. The TTL propagation has to be disabled on ingress and egress edge Label Switch Router (LSR).
Presentation_ID
Cisco Confidential
106
The first traceroute packet (ICMP or UDP) that reaches the network is dropped on Router A. An ICMP Time-to-Live exceeded message is sent to the source from Router A.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
107
The second traceroute packet that reaches the network is dropped on Router D. An ICMP TTL exceeded message is sent to the source from Router D.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
108
Selectively disables IP TTL propagation for: Forwarded traffic (traceroute does not work for transit traffic labeled by this router) Local traffic (traceroute does not work from the router but works for transit traffic labeled by this router)
Presentation_ID
Cisco Confidential
109
Presentation_ID
Cisco Confidential
110
The first traceroute packet that reaches the network is dropped on Router A. An ICMP Time-to-live exceeded message is sent to the source from Router A.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
111
The second traceroute packet that reaches the network is dropped on Router A. An ICMP TTL exceeded message is sent to the source from Router A.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
112
The third traceroute packet that reaches the network is dropped on Router A. An ICMP TTL exceeded message is sent to the source from Router A.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
113
The fourth traceroute packet that reaches the network is dropped on Router D An ICMP TTL exceeded message is sent to the source from Router D
Presentation_ID
Cisco Confidential
114
Presentation_ID
Cisco Confidential
115
The LDP update is dropped because it contains the router ID of Router C in the Path Vector TLV.
Presentation_ID
Cisco Confidential
116
Summary
Loop detection in MPLS-enabled network relies on more than one mechanism. If a routing loop does occur, MPLS label headers also contain a TTL that prevents packets from looping indefinitely. TTL propagation can be disabled to hide the core routers from the end users. Cell-mode MPLS uses the VPI/VCI fields in the ATM header to encode labels. The Path Vector TLV is another loop prevention mechanism that is used to prevent loops within LDP for downstream-on-demand label label allocation in cell mode MPLS.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
117
Presentation_ID
Cisco Confidential
118
Objectives
Upon completion of this section, you will be able to perform the following tasks: Monitor and Troubleshoot an MPLS Network:
Label/Tag Distribution Protocol (LDP/TDP) Session Verification Monitor Label Switching Monitor Cisco Express Forwarding (CEF) Switching and Label Imposition Debug Label Switching and LDP/TDP Common Frame-mode MPLS Symptom Troubleshooting
Presentation_ID
Cisco Confidential
119
Presentation_ID
Cisco Confidential
120
Presentation_ID
Cisco Confidential
121
Presentation_ID
Cisco Confidential
122
Presentation_ID
Cisco Confidential
123
Presentation_ID
Cisco Confidential
124
Presentation_ID
Cisco Confidential
125
Presentation_ID
Cisco Confidential
126
Presentation_ID
Cisco Confidential
127
Presentation_ID
Cisco Confidential
128
Displays Label Information Base (LIB). MPLS version of command offers additional options.
Displays contents of Label Forwarding Information Base (LFIB). MPLS version includes additional vrf option.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
129
Presentation_ID
Cisco Confidential
130
Presentation_ID
Cisco Confidential
131
Presentation_ID
Cisco Confidential
132
Displays label or labels attached to a packet during label imposition on edge LSR.
Presentation_ID
Cisco Confidential
133
Presentation_ID
Cisco Confidential
134
Presentation_ID
Cisco Confidential
135
Debugs Label Forwarding Information Base (LFIB) events: label creations, removals, rewrites.
Debugs labeled packets switched by the router. Disables fast or distributed tag switching.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
136
Presentation_ID
Cisco Confidential
137
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
139
Presentation_ID
Cisco Confidential
140
141
Presentation_ID
Cisco Confidential
142
?Diagnosis:
There are problems with conditional label distribution.
?Verification:
Debug label distribution with debug mpls ldp advertisements. Examine the neighbor LDP router ID with show mpls ldp discovery. Verify that the neighbor LDP router ID is matched by the access list specified in mpls ldp advertise-labels command. 143
2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID
Presentation_ID
Cisco Confidential
144
Presentation_ID
Cisco Confidential
145
?Diagnosis:
MPLS MTU issues or switches with no support for jumbo frames in the forwarding path.
?Verification:
Trace the forwarding path; identify all LAN segments in the path. Verify MPLS MTU setting on routers attached to LAN segments. Check for low-end switches in the transit path.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
146
Presentation_ID
MPLS MTU is increased to 1512 to support 1500-byte IP packets and MPLS stack up to three levels deep. 147
2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID
Cisco Confidential
148
Summary
There are two sets of commands for MPLS troubleshooting that generally create the same output. The MPLS set offers a wider range of commands and some commands offer additional parameters. There are several commands used for label switching related MPLS monitoring. MPLS LDP debugging commands: debug tag-switching tdp debug tag-switching tfib debug tag-switching packets
Presentation_ID
Cisco Confidential
149
Summary (Cont.)
Common Frame-mode MPLS Symptom Troubleshooting: LDP/TDP session does not start. Labels are not allocated or distributed. Packets are not labeled although the labels have been distributed. MPLS intermittently breaks after an interface failure. Large packets are not propagated across the network.
150
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
151
Objectives
Upon completion of this section, you will be able to perform the following tasks: Determine the state of an LSP MPLS operation, administration, and maintenance (OAM) for Layer 3 IP Traceroute with MPLS extensions ITU MPLS OAM - Y.1711 IETF MPLS OAM
Presentation_ID
Cisco Confidential
152
Presentation_ID
Cisco Confidential
153
Presentation_ID
Cisco Confidential
154
Presentation_ID
Cisco Confidential
155
Presentation_ID
Cisco Confidential
156
Presentation_ID
Cisco Confidential
157
Presentation_ID
Cisco Confidential
158
Presentation_ID
Cisco Confidential
159
IP uses shortest path routing. Traffic can be split across multiple shortest paths. Most deployed label switching boxes use the bottom-most label in their ECMP algorithm. Adding an OAM label at the bottom may change the behavior that is being measured.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
160
Presentation_ID
Cisco Confidential
161
Label Switch Router does aa than two. Label Switch Router efficient One lookup is moredoes Swapoperation to send packet Pop operation to send packet Label is no longer available for LSP to another LSR Router to a Label Edge
162
Presentation_ID
Cisco Confidential
163
Presentation_ID
Cisco Confidential
164
Presentation_ID
Cisco Confidential
165
Presentation_ID
Cisco Confidential
Label assigned to the next hop of IP address B (label assigned to IP address of PE2) is used for forwarding. ICMP TTL expiredmessage could simply be returned. That could work, since PE1 has knowledge about prefixes received from ISP1, and is therefore able to properly forward ICMP TTL expiredmessage to IP address A. BUT 166
P2 has no knowledge about prefixes received from ISP1 and therefore is not able to properly forward ICMP TTL expired message to IP address A. P1 has no knowledge about IP address A, either.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
167
P2 could eventually use label switching paradigm to forward ICMP TTL expired message to IP address A. What label should be used?
Remember, no IP address A in P2 routing s table.
Presentation_ID
Cisco Confidential
168
P routers forward the ICMP TTL expired message to the LSP tail-end using downstream label (implicit null POP in the example). The ICMP message is label switched to the egress LSR (PE2 in the example). PE2 performs L3 lookup for IP address A.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
169
There is LDP failure (for example due to wrong ACL on PE2). P2 expects LDP adjacency and label mapping from PE2, but no labels are distributed. P2 marks outgoing action for label 17 as Untagged,which causes L3 lookup for all packets received with label 17. Since IP address A is unknown to P2, the ICMP message is dropped.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
170
Follows closely ATM OAM (I.610) Three functions defined Connectivity Verification (CV) Forward Defect Indication (FDI) Backward Defect Indication (BDI) OAM alert label Reserved label value (14) Added at bottom of stack to identify OAM packet
Presentation_ID
Cisco Confidential
171
Presentation_ID
Cisco Confidential
172
Presentation_ID
Cisco Confidential
173
Presentation_ID
Cisco Confidential
174
Presentation_ID
Cisco Confidential
175
Presentation_ID
Cisco Confidential
176
UDP echo request (dest. IP from 127.0.0.0/8 address space) sent inside an LSP.
Packets are processed by router if LSP breaks. Packets are processed by egress LSR. Influences load-sharing algorithms in ECMP.
177
UDP echo requests (dest. IP from 127.0.0.0/8 address space) with increasing TTL sent inside an LSP.
Packets are processed by transit LSR (not simply dropped). TTL=0, BUT destination IP address is from local address space. Transit LSRs return valuable information about FEC being tested.
Presentation_ID
Cisco Confidential
178
Non-compliant routers
If TTL=0 no echo reply generated If TTL>0 echo request passed transparently IP reply uses router alert option to avoid LSPs
Presentation_ID
Cisco Confidential
179
Presentation_ID
Cisco Confidential
180
Performs LSP ping Three FECs supported in IOS 12.0(27)S IPv4, AToM, TE Two reply modes ipv4 echo reply is encapsulated in UDP router-alert echo reply is encapsulated in UDP and router alert option is used to force process switching of reply packets on every hop Experimental bits for echo reply might be set More standardping options are available
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
181
Performs LSP trace Two FECs supported in IOS 12.0(27)S IPv4, TE Two reply modes ipv4 echo reply is encapsulated in UDP router-alert echo reply is encapsulated in UDP and routeralert option is used to force process switching of reply packets on every hop Experimental bits for echo reply might be set More standardTraceroute options are available
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
182
Presentation_ID
Cisco Confidential
183
P1 contains the mapping for 1.1.1.2/32 it is a downstream router for that FEC but not an egress LSR. P2 has no mapping for 1.1.1.2/32 it is marked as unreachable, but LSP is not broken since LSP for 200.1.1.2/32 is borrowed. PE2 is the LSR for LSP for FEC 1.1.1.2/32. 184
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Topic Summary
MPLS OAM is important for monitoring the LSPs. There are two approaches to MPLS OAM: ITU Y.1711 IETF LSP ping IETF LSP ping is supported on Cisco IOS. Ping mpls command Trace mpls command
Presentation_ID
Cisco Confidential
185
Presentation_ID
Cisco Confidential
186