MPLS VPN technology is a key point in the CCIE exam. Does it have practical uses in real networks? Can these technologies be implemented in practice? Can MPLS VPN technology improve your job search? Routing comes first, then data 1. Briefly explain what MPLS VPN is MPLS VPN technology has been deployed since 2002, but after decades of development, a set of methods have been formed to implement and maintain this technology. MPLS VPN can actually be divided into MPLS and VPN technologies. MPLS VPN refers to multi-protocol label switching technology. VPN is isolated at the routing level. MPLS VPN can be understood as multi-protocol label switching technology isolated by routing. 2. What effects can MPLS VPN achieve? On the premise of a set of physical hardware, the routing tables are separated according to different services, and the routing tables of each business network run independently. (1) MPLS VPN Design
(2) Address planning
The three types of addresses should not be repeated because they have different purposes. Knowledge point: Understand the differences between physical address, loopback address and business address;
(3) IGP routing planning Protocol Design Topology Network point: The network point design uses multi-area segmentation to reduce LSA flooding; Cities:
Knowledge point: OSPF design needs to take into account the SPF algorithm calculation problem caused by LSA flood prevention
(4) BGP Planning In BGP VPNV4 planning, we need to determine the roles, PE as the egress of traffic, P device as part of the pipeline, and RR device route reflection to neighbors;
Knowledge point: MPLS VPN planning, we need to know the role of each role
Routing in MPLS VPN goes through several processes:
3. Understanding MPLS VPN (1) Routing and data We need to discuss MPLS VPN from two aspects, the routing level and the data level; the routing tag is divided into rd and rt values, and the data level is divided into inner and outer labels; (2) How to understand rd and rt To split the routing table into several parts for transmission, first mark the corresponding routing table to distinguish the routing table;
(3) How to understand double-layer labels Labels are divided into inner and outer labels
|
<<: SD-WAN is about to dominate edge networks
>>: Although there are nearly 100 5G terminals, they are not even the tip of the iceberg.
DogYun is a Chinese hosting company founded in 20...
Different from the era from 3G to 4G, the evoluti...
[Shenzhen, China, April 17, 2019] "5G is dev...
Since the 1980s, mobile communications have seen ...
Recently, a netizen asked, how long will it take ...
[[421406]] Let me get straight to the point and f...
HTTP and HTTPS are two common network protocols, ...
1. Preface When we talk about the TCP protocol, t...
[[262734]] On April 16, at the 16th Global Analys...
The Internet of Things (IoT) is a term that is be...
In the past few years, innovative technologies su...
The global 5G in IoT market is experiencing signi...
[51CTO.com original article] Whenever people ment...
5G has three main advantages over 4G: high speed,...
IPv6 has been called for so many years, and final...