DAY 1
1. Course Introduction
2. Refresher—VPNs and MPLS
- Explain the basic function and purpose of a VPN
- Describe how MPLS uses labels to forward traffic
- Explain the differences between MPLS layer 3 VPNs and MPLS layer 2 VPNs
3. The Different Flavors of Layer 2 VPN
- Describe the purpose and creation of pseudowires
- Define the different technical terms relating to pseudowires
- Describe the purpose and creation of VPLS
- Describe the purpose, creation, and advantages of EVPN
4. L2VPN, aka BGP-Signaled Pseudowires
- Define the concept of an attachment circuit, and of pseudowire encapsulation
- Explain the importance of route targets, route distinguishers, and Site IDs
- Explain the control plane and data plane of an L2VPN
- Describe the contents of an L2VPN BGP packet capture
5. L2VPN—Configuration
- Configure an L2VPN that accepts all Ethernet traffic
- Configure an L2VPN that accepts specific VLAN tags
6. L2VPN—Troubleshooting
- Diagnose and fix L2VPN problems caused by missing LSPs, mismatched site information, and incorrect configuration
7. L2VPN—Site IDs, the Label Base, and Overprovisioning
- Explain the purpose of the Site ID and the VPN label base
- Configure an overprovisioned L2VPN with explicit remote Site IDs
- Configure an overprovisioned L2VPN with implicit remote Site IDs
Lab 1: BGP-Signaled Layer 2 VPNs
8. L2VPN—Advanced Concepts
- Configure and verify L2VPN multihoming
- Explain the purpose of Martini encapsulation
- Configure VLAN normalization in an L2VPN
- Configure out-of-band route reflection and route target constraint
Lab 2: L2VPNs—Advanced Concepts
9. L2Circuit—LDP-Signaled Pseudowires
- Explain the concept of targeted LDP sessions, and the elements that L2Circuits have in common with L2VPNs
- Configure and verify an L2Circuit
- Describe the contents of an LDP advertisement packet capture
10. L2Circuit—Troubleshooting
- Configure the Pseudowire Status TLV
- Explain the meaning of the most frequent L2Circuit error codes
DAY 2
11. L2Circuit—Advanced Concepts
- Describe the purpose and benefits of virtual circuit connectivity verification
- Configure multihoming, local switching, and interworking
Lab 3: LDP-Signaled L2Circuits
12. FEC 129 Pseudowires
- Explain the way that FEC 129 autodiscovers remote PEs and signals pseudowires
- Configure and verify a FEC 129 pseudowire
Lab 4: FEC 129 Pseudowires (Optional)
13. Virtual Private LAN Service—Introduction
- Describe how a VPLS is built, and how it compares to a regular pseudowire
- Explain how VPLS forwards traffic between multiple sites
- Describe the BGP and LDP methods of signaling a VPLS
14. VPLS—BGP Configuration and Verification
- Configure a BGP-signaled VPLS
- Verify a BGP-signaled VPLS
15. VPLS—LDP and FEC 129 Configuration and Verification
- Configure and verify an LDP-signaled VPLS
- Configure and verify a FEC 129 VPLS
16. VPLS—The Default VLAN Mode
- Define the four VLAN modes for VPLS
- Define the concept of a bridge domain, and verify the default VPLS VLAN mode
17. VPLS—VLAN Normalization, VLAN-Aware Instances, and Dual-Stacked VLANs
- Configure and verify VLAN-Aware mode
- Configure and verify VLAN-Normalizing mode and NoVLAN mode
- Configure and verify dual-stacked VLAN tags in VPLS
18. VPLS—Advanced Features and Troubleshooting
- Deploy automated BGP VPLS Site IDs
- Configure flood protection, MAC flap protection, and MAC limiting
- Explain how to add IRB interfaces to a VPLS, and configure efficient traffic flooding using multicast LSPs
- Describe the most important VPLS-specific troubleshooting techniques
19. VPLS—Multihoming
- Configure multihomed sites in a BGP-signaled VPLS
- Configure multihomed sites and single sites on the same PE in a BGP-signaled VPLS
- Configure best-site multihoming in a BGP-signaled VPLS
- Configure multihomed sites in an LDP-signaled VPLS
Lab 5: VPLs
Days 3
20. EVPN—Introduction
- Explain the main disadvantages of a VPLS solution
- Explain how EVPN overcomes these disadvantages, and enables extra features
21. EVPN—Using BGP to Advertise MACs and to Flood Traffic
- Explain the meaning of an EVPN Instance
- Describe how EVPN Type 2 routes advertise MAC addresses and MAC/IP bindings
- Describe how EVPN Type 3 routes request to receive flooded traffic within a bridge domain
22. EVPN—Configuring a Single-Homed VLAN-Based EVI
- Configure a service provider network to host EVPN services
- Configure a single-homed VLAN-based EVI
- Verify a VLAN-based EVI
23. EVPN—Configuring a Single-Homed VLAN-Aware Bundle EVI
- Configure a VLAN-aware bundle EVI
- Verify a VLAN-aware bundle EVI
24. EVPN—Multihoming Configuration and Type 4 Routes
- Configure a CE and two PEs to take part in a multihomed EVPN
- Describe the contents of the Type 4 Ethernet Segment route
- Explain how the Type 4 route prevents layer 2 loops, using the designated forwarder election
25. EVPN—Multihoming Features Using Type 1 Routes
- Describe Type 1 Ethernet Auto-Discovery Per-Ethernet Segment routes
- Explain how Type 1 Per-Ethernet Segment routes prevent layer 2 loops
- Describe how Type 1 Per-EVI routes are different from Per-ES routes
26 EVPN—MAC Mobility and IRB Interfaces
- Configure and verify the EVPN MAC Mobility feature
- Configure and verify Automatic Gateway MAC-IP Synchronization
- Configure and verify Manual Gateway MAC-IP Synchronization
- Configure and verify EVPN Virtual Gateway Addresses
Lab 6: EVPN
SELF-STUDY MATERIALS
A EVPN—Integration with L3VPNs
- Describe the basic functionality of an L3VPN
- Explain how EVPNs and L3VPNs integrate for optimal routing
- Describe how chained composite next hop brings efficiency to EVPN in the Packet Forwarding Engine B Inter-AS MPLS VPNs
- Describe the functionality of Interprovider Options A, B, and C
- Configure and verify the Interprovider Option C method
- Describe and configure carrier-of-carriers VPNs C Circuit Cross-Connect
- Use circuit cross-connect to stitch pseudowires together, and to signal pseudowires that have their own pair of dedicated RSVP LSPs D Multisegment Pseudowires
- Explain how a multisegment pseudowire is signaled
- Configure and verify a multisegment pseudowire
Lab 7: Inter-AS L2VPNs
E VPLS—Hub-and-Spoke Topologies
- Configure a hub-and-spoke BGP VPLS using route targets
- Configure a hub-and-spoke BGP VPLS using site ranges
- Configure a hub-and-spoke LDP VPLS using hierarchical VPLs