You are on page 1of 4

MPLS

MPLS Overview

 Unicast IP Forwarding in Traditional IP Networks


 Overview of MPLS Forwarding
 MPLS Terminology
 MPLS Control and DATA Plane Components
 MPLS operation
 Penultimate Hop Popping (PHP)
 Frame Mode MPLS

MPLS Architecture and LDP Configuration

 Introducing MPLS Labels and Label Stacking


 Label Switch Router and LSP
 Label Distribution Protocols
 LDP Operation and Configurations
 Targeted LDP Session
 LDP Autoconfiguration and LDP-IGP Synchronization
 IP Lookup versus Label Lookup
 Implicit and Explicit NULL Label
 TTL Behavior of Labeled Packets
 MPLS MTU

Basic MPLS VPN Overview and Configuration

 Introduction to MPLS VPN


 Overlay and Peer to Peer VPN Model
 Architectural Overview of MPLS VPN
 Virtual Routing and Forwarding (VRF)
 Route Distinguisher (RD )
 BGP Extended Community
 Route Target Export and Import (RT)

PE-CE Routing- Static & RIP

 Static PE-CE Routing Overview


 Static PE-CE routing configuration and Verification
 RIP v2 PE-CE Routing Configuration and Verification

PE-CE Routing Protocol- OSPF

 Traditional OSPF Routing Model


 MPLS VPN or OSPF super backbone Concept
 OSPF Route propagation using MPLS VPN super backbone
 OSPF Down bit and Domain Tag
 OSPF Backdoor and Sham Link
 Configuration and Verification

PE-CE Routing Protocol- EIGRP

 EIGRP Route Propagation


 Routing Loops and Suboptimal Routing
 BGP cost Community Feature
 EIGRP Site of Origin (SoO) Attribute
 Configurations and Verification

Implementing BGP in MPLS VPN

 BGP PE-CE Routing Protocol Overview


 Implementing Route Reflectors in MPLS VPN Networks
 Hub and Spoke MPLS VPN sites using Unique AS Numbers
 Hub and Spoke MPLS VPN sites using Same AS Numbers
 Configuration and Verification

Inter-Provider VPN (Inter AS)

 Overview of Inter-Provider VPN


 Inter-Provider VPN using Back to Back VRF Method
 Inter-Provider VPN using VPNV4 exchange
 Inter-Provider VPN using Multi Hop VPNv4 Exchange

Carrier Supporting Carriers (CSC)

 Carrier Supporting Carrier Overview


 Deployment Scenarios with CSC

Internet Access from MPLS VPN

 VPN Internet Access Topologies


 Internet Access Implementation Methods
 Internet Access through the Global Routing Table
 Internet Access Through a Central VRF Site

Any Transport over MPLS (ATOM)

 Introduction to Layer 2 VPN


 Understanding the need for ATOM
 Pseudo Wire Reference Model
 Transporting Layer 2 Frames
 Label Exchange in ATOM
 Configuration and Verification

Implementing VPN with L2TPv3

 Layer 2 Tunneling protocol Overview


 Configuring L2TPv3 Tunnel for Layer2 VPN

Troubleshooting MPLS Networks

 Verifying Label switched path


 Traceroute in MPLS networks
 TTL Behavior in MPLS networks
 Label Aware ICMP
 MPLS ip TTL-Expiration pop command
 Debug MPLS Packets

Quality of Service (QoS)


Introduction to QoS

 The Need for QoS


 Understanding QoS
 Implementing QoS

The Building Blocks of QoS

 Models for Implementing


 Integrated Services Model
 Differentiated Services Model
 QoS Mechanisms

MQC and Cisco AutoQoS

 MQC
 Cisco AutoQoS VoIP
 Cisco AutoQoS for the Enterprise

Classification and Marking

 Using MQC for Classification


 Using MQC for Class-Based Marking
 Using NBAR for Classification
 Configuring QoS Preclassify
 Configuring QoS Policy Propagation via BGP
 Configuring LAN Classification and Marking
 QoS in the Life of a Packet

Congestion Management

 Queuing
 Queuing Implementations
 Configuring FIFO and WFQ
 Configuring CBWFQ and LLQ
 Configuring LAN Congestion Management

Congestion Avoidance

 RED
 Configuring Class-Based Weighted RED
 Configuring Explicit Congestion Notification

Traffic Policing and Shaping

 Configuring Class-Based Policing


 Configuring Class-Based Shaping
 Configuring Class-Based Shaping on Frame Relay Interfaces
 Frame Relay Voice-Adaptive Traffic Shaping and Fragmentation

Link Efficiency Mechanisms

 Configuring Class-Based Header


 Compression
 Configuring Link Fragmentation and Interleaving

QoS Best Practices

 Traffic Classification Best Practices


 Deploying End-to-End QoS
 Providing QoS for Security

You might also like