当前位置:网站首页>Using ENSP to do MPLS pseudo wire test
Using ENSP to do MPLS pseudo wire test
2022-07-07 11:11:00 【Chenjijjn】
Recently, a project of a company conducted pseudo line function test in operators , As a rookie, they are all watching other people's configurations , The company also has no spare equipment for experiments , I found some information on the Internet to realize this function .
The scene is 2 individual A Equipment docking 2 platform B Equipment environment , The experiment I did was to take it directly 4 platform Router To do it , The on-site environment is connected through sub interfaces doltq, I don't need to connect directly through the port .
The routing method is OSPF Point to point , Then add BFD testing , Point to point switching without setting is slow ,
R3 To configure
sysname r3
bfd
mpls lsr-id 3.3.3.3
mpls
mpls l2vpn
mpls ldp
mpls ldp remote-peer 4.4.4.4
mpls ldp remote-peer 5.5.5.5
interface Ethernet0/0/0
mpls l2vc 4.4.4.4 100 control-word
mpls l2vpn pw bfd
mpls l2vc 5.5.5.5 200 control-word secondary
mpls l2vpn pw bfd secondary
mpls l2vpn stream-dual-receiving
interface GigabitEthernet0/0/0
ip address 192.168.1.1 255.255.255.252
ospf cost 100
ospf network-type p2p
ospf bfd enable
mpls
mpls ldp
interface GigabitEthernet0/0/1
ip address 192.168.2.1 255.255.255.252
ospf cost 100
ospf network-type p2p
ospf bfd enable
mpls
mpls ldp
interface LoopBack0
ip address 3.3.3.3 255.255.255.255
ospf 1 router-id 3.3.3.3
area 0.0.0.0
network 3.3.3.3 0.0.0.0
network 192.168.1.0 0.0.0.3
network 192.168.2.0 0.0.0.3
R4 To configure
sysname r4
bfd
mpls lsr-id 4.4.4.4
mpls
mpls l2vpn
mpls switch-l2vc 6.6.6.6 100 between 3.3.3.3 100 encapsulation ethernet control-
word-transparent
mpls switch-l2vc 6.6.6.6 200 between 3.3.3.3 200 encapsulation ethernet cont
rol-word-transparent
mpls ldp
mpls ldp remote-peer 3.3.3.3
mpls ldp remote-peer 6.6.6.6
interface GigabitEthernet0/0/0
ip address 192.168.1.2 255.255.255.252
ospf cost 100
ospf network-type p2p
ospf bfd enable
mpls
mpls ldp
interface GigabitEthernet0/0/1
ip address 192.168.3.1 255.255.255.252
ospf cost 100
ospf network-type p2p
ospf bfd enable
mpls
mpls ldp
interface LoopBack0
ip address 4.4.4.4 255.255.255.255
ospf 1 router-id 4.4.4.4
area 0.0.0.0
network 4.4.4.4 0.0.0.0
network 192.168.1.0 0.0.0.3
network 192.168.3.0 0.0.0.3
R5 To configure
sysname r5
bfd
mpls lsr-id 5.5.5.5
mpls
mpls l2vpn
mpls switch-l2vc 6.6.6.6 100 between 3.3.3.3 100 encapsulation ethernet control-
word-transparent
mpls switch-l2vc 6.6.6.6 200 between 3.3.3.3 200 encapsulation ethernet control-
word-transparent
mpls ldp
mpls ldp remote-peer 3.3.3.3
mpls ldp remote-peer 6.6.6.6
interface GigabitEthernet0/0/0
ip address 192.168.2.2 255.255.255.252
ospf cost 100
ospf network-type p2p
ospf bfd enable
mpls
mpls ldp
interface GigabitEthernet0/0/1
ip address 192.168.4.1 255.255.255.252
ospf cost 100
ospf network-type p2p
ospf bfd enable
mpls
mpls ldp
interface LoopBack0
ip address 5.5.5.5 255.255.255.255
ospf 1 router-id 5.5.5.5
area 0.0.0.0
network 5.5.5.5 0.0.0.0
network 192.168.2.0 0.0.0.3
network 192.168.4.0 0.0.0.3
R6 To configure
sysname r6
bfd
mpls lsr-id 6.6.6.6
mpls
mpls l2vpn
mpls ldp
mpls ldp remote-peer 4.4.4.4
mpls ldp remote-peer 5.5.5.5
interface Ethernet0/0/0
mpls l2vc 4.4.4.4 100 control-word
mpls l2vpn pw bfd
mpls l2vc 5.5.5.5 200 control-word secondary
mpls l2vpn pw bfd secondary
mpls l2vpn stream-dual-receiving
interface GigabitEthernet0/0/0
ip address 192.168.3.2 255.255.255.252
ospf network-type p2p
ospf bfd enable
mpls
mpls ldp
interface GigabitEthernet0/0/1
ip address 192.168.4.2 255.255.255.252
ospf cost 100
ospf network-type p2p
ospf bfd enable
mpls
mpls ldp
interface LoopBack0
ip address 6.6.6.6 255.255.255.255
ospf 1 router-id 6.6.6.6
area 0.0.0.0
network 6.6.6.6 0.0.0.0
network 192.168.3.0 0.0.0.3
network 192.168.4.0 0.0.0.3
Realize two computers PING through 
OSPF state 
BFD state 
VC state 

I don't know if it's done accurately , Only know through , adopt shutdown Ports can also realize fast link switching .
边栏推荐
- JS implementation chain call
- Unity script generates configurable files and loads
- [untitled]
- “梦想杯”2017 年江苏省信息与未来小学生夏令营 IT 小能手 PK 之程序设计试题
- 2021-04-23
- What is an intermediate network engineer? What is the main test and what is the use?
- SQL Server knowledge gathering 9: modifying data
- From pornographic live broadcast to live broadcast E-commerce
- Ffmpeg record a video command from RTSP
- How to play video on unityui
猜你喜欢

VR development optimization

uniCloud

The use of list and Its Simulation Implementation

I plan to take part in security work. How about information security engineers and how to prepare for the soft exam?
![[C #] the solution of WinForm operation zoom (blur)](/img/66/b70213c95acd4ad9fe2eb739bd46b5.png)
[C #] the solution of WinForm operation zoom (blur)

【OneNote】无法连接到网络,无法同步问题
![[actual combat] transformer architecture of the major medical segmentation challenges on the list --nnformer](/img/de/0cf12132216ffbde896a7b12022184.png)
[actual combat] transformer architecture of the major medical segmentation challenges on the list --nnformer

What are the test preparation materials and methods for soft exam information processing technicians?

Using tansformer to segment three-dimensional abdominal multiple organs -- actual battle of unetr

July 10, 2022 "five heart public welfare" activity notice + registration entry (two-dimensional code)
随机推荐
Long list performance optimization scheme memo
Which securities company is the best and safest to open an account for the subscription of new shares
Bookmarking - common website navigation for programmers
JSON format query of MySQL
Monai version has been updated to 0.9. See what new functions it has
QT document
Force buckle 1002 Find common characters
Is the gold content of intermediate e-commerce division in the soft exam high?
單調性約束與反單調性約束的區別 monotonicity and anti-monotonicity constraint
VR development optimization
Vscode 尝试在目标目录创建文件时发生一个错误:拒绝访问【已解决】
Typescript interface inheritance
Shardingsphere sub database and table examples (logical table, real table, binding table, broadcast table, single table)
I plan to take part in security work. How about information security engineers and how to prepare for the soft exam?
[untitled]
Différences entre les contraintes monotones et anti - monotones
BUUCTF---Reverse---reverse1
[installation system] U disk installation system tutorial, using UltraISO to make U disk startup disk
Introduction to shell programming
[C #] the solution of WinForm operation zoom (blur)