Course Summary
Day 1
Course Introduction
Refresher—VPNs and MPLS
• Explain the basic function and purpose of a VPN
• Describe how MPLS uses labels to forward traffic
• Explain the differences between MPLS layer 3 VPNs and MPLS layer 2 VPNs
The Different Flavors of Layer 2 VPN
• Describe the purpose and creation of pseudowires
• Define the different technical terms relating to pseudowires
• Describe the purpose and creation of VPLS
• Describe the purpose, creation, and advantages of EVPN
L2VPN, aka BGP-Signaled Pseudowires
• Define the concept of an attachment circuit, and of pseudowire encapsulation
• Explain the importance of route targets, route distinguishers, and Site IDs
• Explain the control plane and data plane of an L2VPN
• Describe the contents of an L2VPN BGP packet capture
L2VPN—Configuration
• Configure an L2VPN that accepts all Ethernet traffic
• Configure an L2VPN that accepts specific VLAN tags
L2VPN—Troubleshooting
• Diagnose and fix L2VPN problems caused by missing LSPs, mismatched site information, and incorrect configuration
L2VPN—Site IDs, the Label Base, and Overprovisioning
• Explain the purpose of the Site ID and the VPN label base
• Configure an overprovisioned L2VPN with explicit remote Site IDs
• Configure an overprovisioned L2VPN with implicit remote Site IDs
L2VPN—Advanced Concepts
• Configure and verify L2VPN multihoming
• Explain the purpose of Martini encapsulation
• Configure VLAN normalization in an L2VPN
• Configure out-of-band route reflection and route target constraint
L2Circuit—LDP-Signaled Pseudowires
• Explain the concept of targeted LDP sessions, and the elements that L2Circuits have in common with L2VPNs
• Configure and verify an L2Circuit
• Describe the contents of an LDP advertisement packet capture
L2Circuit—Troubleshooting
• Configure the Pseudowire Status TLV
• Explain the meaning of the most frequent L2Circuit error codes
DAY 2
L2Circuit—Advanced Concepts
• Describe the purpose and benefits of virtual circuit connectivity verification
• Configure multihoming, local switching, and interworking
FEC 129 Pseudowires
• Explain the way that FEC 129 autodiscovers remote PEs and signals pseudowires
• Configure and verify a FEC 129 pseudowire
Virtual Private LAN Service—Introduction
• Describe how a VPLS is built, and how it compares to a regular pseudowire
• Explain how VPLS forwards traffic between multiple sites
• Describe the BGP and LDP methods of signaling a VPLS 14
VPLS—BGP Configuration and Verification
• Configure a BGP-signaled VPLS
• Verify a BGP-signaled VPLS 15
VPLS—LDP and FEC 129 Configuration and Verification
• Configure and verify an LDP-signaled VPLS
• Configure and verify a FEC 129 VPLS 16
VPLS—The Default VLAN Mode
• Define the four VLAN modes for VPLS
• Define the concept of a bridge domain, and verify the default VPLS VLAN mode 17
VPLS—VLAN Normalization, VLAN-Aware Instances, and Dual-Stacked VLANs
• Configure and verify VLAN-Aware mode
• Configure and verify VLAN-Normalizing mode and NoVLAN mode
• Configure and verify dual-stacked VLAN tags in VPLS 18
VPLS—Advanced Features and Troubleshooting
• Deploy automated BGP VPLS Site IDs
• Configure flood protection, MAC flap protection, and MAC limiting
• Explain how to add IRB interfaces to a VPLS, and configure efficient traffic flooding using multicast LSPs
• Describe the most important VPLS-specific troubleshooting techniques 19
VPLS—Multihoming
• Configure multihomed sites in a BGP-signaled VPLS
• Configure multihomed sites and single sites on the same PE in a BGP-signaled VPLS
• Configure best-site multihoming in a BGP-signaled VPLS
• Configure multihomed sites in an LDP-signaled VPLS
DAY 3
EVPN—Introduction
• Explain the main disadvantages of a VPLS solution
• Explain how EVPN overcomes these disadvantages, and enables extra features
EVPN—Using BGP to Advertise MACs and to Flood Traffic
• Explain the meaning of an EVPN Instance
• Describe how EVPN Type 2 routes advertise MAC addresses and MAC/IP bindings
• Describe how EVPN Type 3 routes request to receive flooded traffic within a bridge domain
EVPN—Configuring a Single-Homed VLAN-Based EVI
• Configure a service provider network to host EVPN services
• Configure a single-homed VLAN-based EVI • Verify a VLAN-based EVI
EVPN—Configuring a Single-Homed VLAN-Aware Bundle EVI
• Configure a VLAN-aware bundle EVI
• Verify a VLAN-aware bundle EVI
EVPN—Multihoming Configuration and Type 4 Routes
• Configure a CE and two PEs to take part in a multihomed EVPN
• Describe the contents of the Type 4 Ethernet Segment route
• Explain how the Type 4 route prevents layer 2 loops, using the designated forwarder election
EVPN—Multihoming Features Using Type 1 Routes
• Describe Type 1 Ethernet Auto-Discovery Per-Ethernet Segment routes
• Explain how Type 1 Per-Ethernet Segment routes prevent layer 2 loops
• Describe how Type 1 Per-EVI routes are different from Per-ES routes
EVPN—MAC Mobility and IRB Interfaces
• Configure and verify the EVPN MAC Mobility feature
• Configure and verify Automatic Gateway MAC-IP Synchronization
• Configure and verify Manual Gateway MAC-IP Synchronization
• Configure and verify EVPN Virtual Gateway Addresses
Course Objectives
After successfully completing this course, you should be able to:
Define the term virtual private network.
Describe the business drivers for MPLS VPNs.
Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
List advantages for the use of MPLS Layer 3 VPNs and Layer 2 VPNs.
Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN.
Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN.
Configure a BGP Layer 2 VPN and describe the benefits and requirements of over-provisioning.
Monitor and troubleshoot a BGP Layer 2 VPN.
Explain the BGP Layer 2 VPN scaling mechanisms and route reflection.
Describe the Junos OS BGP Layer 2 VPN CoS support.
Describe the flow of control and data traffic for an LDP Layer 2 circuit.
Configure an LDP Layer 2 circuit.
Monitor and troubleshoot an LDP Layer 2 circuit.
Describe the operation of FEC 129 BGP autodiscovery for Layer 2 VPNs.
Configure a FEC 129 BGP autodiscovery Layer 2 VPN.
Monitor and troubleshoot a FEC 129 BGP autodiscovery for Layer 2 VPNs.
Describe the difference between Layer 2 MPLS VPNs and VPLS.
Explain the purpose of the PE device, the CE device, and the P device.
Explain the provisioning of CE and PE routers.
Describe the signaling process of VPLS.
Describe the learning and forwarding process of VPLS.
Describe the potential loops in a VPLS environment.
Configure BGP, LDP, and FEC 129 BGP autodiscovery VPLS.
Troubleshoot VPLS.
Describe the purpose and features of Ethernet VPN.
Configure Ethernet VPN.
Monitor and troubleshoot Ethernet VPN.
Describe the Junos OS support for hierarchical VPN models.
Describe the Junos OS support for Carrier-of-Carriers VPN Option C.
Configure the interprovider VPN Option C.
Describe the Junos OS support for multisegment pseudowire for FEC 129.
Describe and configure circuit cross-connect (CCC).
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM