
Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
SL-MPLS
Implementing Cisco MPLS
Description
This five-day course enables students to gather information from the basics to advanced VPN configuration. The focus of the course is on VPN technology issues of MPLS from the Service Providers` perspective and how to configure some of those features and functions in an existing routing environment.
Course Objectives:
After completing this course, students will be able to:
- Describe how the service provider infrastructure is attacked
- Describe the features of MPLS
- Describe how MPLS labels are assigned and distributed
- Identify the Cisco IOS task and command syntax necessary to implement MPLS on frame-mode Cisco IOS platforms
- Describe the MPLS peer-to-peer architecture and explain the routing and packet forwarding model in this architecture
- Identify the Cisco IOS command syntax required to successfully configure, monitor, and troubleshoot VPN operations
- Identify how the MPLS VPN model can be used to implement managed services and Internet access
- Describe the various Internet access implementations that are available and the benefits and drawbacks of each model
- Provide an overview of MPLS Traffic Engineering
Outline
Module 1: MPLS Concepts
Lesson 1: Introducing Basic MPLS Concepts
- What are the Foundations of Traditional IP Routing?
- Basic MPLS Features
- What are the MPLS Architecture Components?
- Network Characteristics (Bandwidth, Topology, Availability, etc.) Physical vs. Logical Topologies
- The Importance of Network Diagrams and Documentation
- What are the Labels
- What is the MPLS Label Format
- Where are MPLS Labels Inserted
- What is an MPLS Label Stack?
- What are MPLS Label Operations?
- Which Applications are used with MPLS?
- What is MPLS Unicast IP Routing?
- What is MPLS Multicast IP Routing?
- What are MPLS VPNs
- What is MPLS TE?
- What is MPLS QoS?
- What is AToM
- What are the Interactions between MPLS Applications?
- Establishing an Adjacent LDP Session
- What Are LDP Hello Messages?
- Negotiating Label Space
- Discovering LDP Neighbors
- Negotiating LDP Sessions
- Discovering Non-adjacent Neighbors
- Propagating Labels Across a Network
- What are LSPs?
- Propagating Labels Using PHP
- What is the Impact of IP Aggregation on LSPs
- Allocating Labels in a Frame-Mode MPLS Network
- Populating the LFIB
- Propagating Packets Across an MPLS network
- Detecting Frame-Mode Loops
- Allocating Per-Platform Labels
- What is the MPLS Steady-State Operation?
- What Happens in a Link Failure?
- What is the Routing Protocol Convergence After a Link Failure?
- What is the MPLS Convergence after a Link Failure?
- What Actions Occur in Link Recovery?
- Label Distribution Parameters
- Distributing Labels
- Allocating Labels
- Retaining labels
- What are Cisco IOS Platform-Switching Mechanisms?
- Using Standard IP Switching
- What is the CEF Switching Architecture?
- Configuring IP CEF
- Monitoring IP CEF
- What are MPLS Configuration Tasks
- Configuring the MPLS ID on a Router
- Configuring MPLS on a Frame- Mode Interface
- Configuring a Label-Switching MTU
- Configuration IP TTL Propagation
- Configuring Conditional Label Distribution
- Monitoring MPLS
- Monitoring LDP
- Monitoring Label Switching
- Debugging MPLS and LDP
- What are Common Frame-Mode MPLS Issues
- Solving LDP Session Startup Issues
- Solving Label Allocation Issues
- Solving Packet-Label Issues
- Solving Intermittent MPLS Failures
- Solving Packet Propagation Issues
- Traditional Router-Based Network Connectivity
- Advantages of VPNs
- What are the VPN Implementation Models?
- What are the Business Categories for VPNs
- What are Extranet VPNs?
- What are the Connectivity Categories for VPNs
- What is the Central Services Extranet?
- What is a Managed Network Implementation?
- What are the Drawbacks of Traditional Peer-to-Peer VPNs
- What is the MPLS VPN Architecture?
- What is the Architecture of PE Router in an MPLS VPN?
- What are RDs?
- What are RTs?
- How have Complex VPN Redefined the Meaning of VPNs
- What is the Impact of Complex VPN Topologies on virtual Routing Tables?
- MPLS VPN routing Requirements and Model
- Existing Internet Routing Support
- Routing Tables on PE Routers
- Identifying End-to-End Routing Upgrade Flow
- Route Distribution to CE Routers
- What are the End-to-End VPN Forwarding Mechanisms?
- What is VPN PHP?
- Propagating VPN Labels between PE Routers
- What are the Effects of MPLS VPNs on Label Propagation?
- What are the Effects of MPLS VPNs on Packet Forwarding?
- What is VRF Table?
- What is the Need for Routing Protocol Contexts?
- What are VPN-Aware Routing Protocols?
- How are VRF Tables Used?
- Propagating BGP Routes – Outbound
- Propagating BGP Routes – Outbound
- Propagating Non-BGP Routes – Outbound
- Propagating Non-BGP Routes - Inbound
- What are the VRF Configuring Tasks?
- Creating VRF Tables and Assigning RDs
- Specifying Export and Import RTs
- Using VPN IDs
- Assigning an Interface to a VRF Table
- Typical Configuration to Enable VRFs
- Configuring BGP Address Families
- Enabling BGP Neighbors
- Configuring MP-BGP
- Configuring MP-IBGP
- Configuring MP-BGP Community Propagation
- Disabling IPv4 Route Exchange
- Configuring PE-CE Routing Protocols
- Selecting the VRF Routing Context for BGP
- Configuring Per-VRF Static Routes
- Configuring RIP PE-CE Routing
- Configuring EIGRP PE-CE Routing
- Monitoring VRFs
- Monitoring VRF Routing
- Monitoring MP-BGP Sessions
- Monitoring an MP-BGP VPNv4 Table
- Monitoring Per-VRF CEF and LFIB Structures
- Monitoring Labels Associated with VPNv4 Routes
- Identifying Other MPLS VPN Monitoring Commands
- What is the Enhanced OSPF Hierarchical Model?
- Propagating OSPF Customer Routes
- Implementing MPLS VPNs as an OSPF Superbackbone
- Configuring OSPF PE-CE Routing
- Optimizing Packet Forwarding Across the MPLS VPN Backbone
- Using the OSPF Tag Field
- What is a Sham Link?
- Configuring a Sham Link
- Configuring a Per-VRF BGP Routing Context
- What are the Reasons for Limiting the Number of routes in a VRF?
- Limiting the Number of Prefixes Received from a BGP Neighbor
- Limiting the Total Number of VRF Routes
- Identifying AS-Override Issues
- Identifying Allowas-in Issues
- Implementing SOO for Loop Prevention
- Identifying Preliminary Steps in MPLS VPN Troubleshooting
- Verifying the Routing Information Flow
- Validating CE-to-PE Routing Information Flow
- Validating PE-to-PE Routing Information Flow
- Validating PE-to-CE Routing Information Flow
- Identifying the Issues When Verifying Data Flow
- Validating CEF Status
- Validating the End-to-End LSP
- Validating the LFIB Status
- What are Advanced VRF Features?
- Configuring Selective VRF Import
- Configuring Selective VRF Export
- Who are the Participants in Overlapping VPNs
- What are Typical Overlapping VPN Usages
- Overlapping VPN Routing
- Overlapping VPN Data Flow
- Configuring Overlapping VPNs
- What are Access Characteristics of a Central Services VPN?
- What are the Routing Characteristics of a Central Services VPN
- Identifying the Central Services VPN Data Flow Model
- Integrating a Central Services VPN with a Simple VPN
- Identifying the RD Requirement When Integrating Central Services and Simple VPNs
- Identifying the RT Requirements When Integrating Central Services and Simple VPNs
- What are the Requirements of Managed CE Routers?
- What are the VRF and RD Requirements?
- Customer Internet Connectivity Scenarios
- Internet Design Models for Service Providers
- Internet Access Through Global Routing
- Internet Access as a Separate VPN
- Disadvantages of Providing Internet Access Through Route Leaking
- Classical Internet Access for a VPN Customer
- Using Separate Subinterfaces
- Accessing the Internet from Every Customer Site
- Separate Internet Access Benefits and Limitations
- Internet Access as a Separate VPN
- Implementing Redundant Internet Access
- Implementing Classical Internet Access for a VPN Customer
- Implementing Internet Access from Every Customer Site
- Implementing Wholesale Internet Access
- Running an Internet Backbone in a VPN
- What is TE?
- Business Drivers for TE
- Congestion Avoidance and TE
- TE with a Layer 2 Overlay Model
- TE with a Layer 3 Model
- TE with the MPLS TE Model
- Traffic Tunnels: Concepts
- Traffic Tunnels: Characteristics
- Traffic Tunnels: Attributes
- Network Links and Link Attributes
- Constraint-Based Path Computation
- TE Processes
- Role of RSVP in Path Setup and Trunk Admission Control
- Forwarding Traffic to a Tunnel
- MPLS TE Configuration Road Map
- Enabling Device-Level MPLS TE Support
- Enabling MPLS TE Support in IS-IS
- Enabling MPLS TE Support in OSPF
- Enabling Basic MPLS TE in an Interface
- Creating and Configuring a Traffic Tunnel
- Mapping Traffic into Tunnels with Autoroute
- Monitoring MPLS TE Tunnels
- Monitoring MPLS TE
PreRequisites
To fully benefit from this course, students should have the following prerequisite skills and knowledge:
- CCNA certification or equivalent level of working knowledge
- Equivalent knowledge and skill that can be acquired by attending Cisco`s training courses
- BSCI
- Practical experience deploying and operating networks based on Cisco network devices and Cisco IOS. The QoS course is highly recommended because the QoS knowledge is assumed in several sections of the course
$3995.00
|
5 Days Course |