CH A P T E R 2 Technology Overview This chapter describes the Network Activation wizards that allow you to provision Carrier Ethernet activations. The wizards also allow you to provision elements that allow activations to be created and activated, such as Ethernet flow points, QoS policies, and ACLs. This chapter also provides an overview to the activations and technologies activated or provisioned by Network Activation. Topics include: • Carrier Ethernet Overview, page 2-1 • Carrier Ethernet Technologies, page 2-2 • MToP, page 2-9 Carrier Ethernet Overview A Carrier Ethernet activation includes activation elements that exist on an Ethernet subnetwork domain. Components include: • User Network Interface (UNI)—A UNI is a physical interface that marks the boundary between service provider, cable operator, or carrier and the subscriber. The UNI is located at the edge of the subnetwork domain. • Network to Network Interface (NNI)—An interface that marks the boundary between carrier Ethernet networks operated by one or more carrier networks to network interface. • Ethernet Virtual Connection (EVC)—A logical representation of an Ethernet activation as defined by the association between two or more UNIs. Note EVCs are not supported in this Network Activation release. • Ethernet Flow Point (EFP)—an Ethernet activation endpoint. • QoS Policy—Defines bandwidth profiles at the UNI and EFP levels. • MAC Layer Security Policy—If MAC security is enabled, defines a subset of MAC address for inclusion or exclusion. • Layer 2 Access Control Lists—Are similar to Layer 3 (router) ACLs but are supported on physical interfaces and configured on switch Layer 2 interfaces. Cisco Prime Network 3.8 Activation User Guide OL-24645-01 2-1 Chapter 2 Technology Overview Carrier Ethernet Technologies Carrier Ethernet Technologies The following sections provide an overview to Carrier Ethernet technologies supported by Network Activation: • E-Line Activation, page 2-2 • E-LAN Activation, page 2-3 • VPLS and H-VPLS, page 2-3 • Layer 3 VPN, page 2-6 • QoS, page 2-8 • Layer 2 Access Control Lists, page 2-8 • MToP, page 2-9 E-Line Activation An E-Line Ethernet activation (Figure 2-1), is based on a point-to-point Ethernet Virtual Connection (EVC). An E-Line activation can be used to create a broad range of point-to-point activations. E-Line point-to-point activations include Ethernet Private Line (EPL) and Ethernet Virtual Private Line (EVPL). • Ethernet Private Line—Uses a point-to-point EVC between two UNIs. EPLs provide high service frame transparency between interconnected UNIs such that the service frame header and payload are identical at both the source and destination UNI. • Ethernet Virtual Private Line—Creates a point-to-point EVC similar to the EPL. However, the EVPL allows for service multiplexing at the UNI, which means the EVPL can support more than one EVC at the UNI. The EVPL also does not require full service frame transparency. Figure 2-1 E-Line Activation Point-to-Point EVC UNI Metro Ethernet Network 247868 UNI Network Activation provides the following E-Line wizards: • E-Line Point-to-Point Activation, page 3-21. • E-Line Local Connect Activation, page 3-28. Cisco Prime Network 3.8 Activation User Guide 2-2 OL-24645-01 Chapter 2 Technology Overview Carrier Ethernet Technologies E-LAN Activation An E-LAN activation is a multipoint-to-multipoint EVC that delivers service frames to a UNI in an EVC following rules that are defined for the activation. Figure 2-2 displays the E-LAN activation that is a multipoint-to-multipoint EVC. A single broadcast or multicast ingress service frame (as determined from the destination MAC address) at a given UNI is replicated in the Carrier Ethernet Network and a single copy is delivered to each of the other UNIs in the EVC. Figure 2-2 E-LAN Activation Multipoint-to-Multipoint EVC UNI UNI Metro Ethernet Network 247867 UNI UNI Network Activation provides E-LAN activations combined with VPLS and H-VPLS. See VPLS and H-VPLS, page 2-3. VPLS and H-VPLS Virtual Private LAN Service (VPLS) offers multipoint Ethernet LAN activation over MPLS networks. A VPLS offers the same connectivity as a network element attached to an Ethernet switch. The VPLS architecture that links virtual switch instances (VSIs) using MPLS pseudowires form an emulated Ethernet switch. Figure 2-3 shows the basic VPLS configuration component. Cisco Prime Network 3.8 Activation User Guide OL-24645-01 2-3 Chapter 2 Technology Overview Carrier Ethernet Technologies Figure 2-3 VPLS Configuration N-PE N-PE Tunnel LSP CE CE PW PW PW CE CE CE CE Red VSI Red VSI Blue VSI Blue VSI Green VSI Green VSI CE CE Legend Customer Edge Device Network Facing Provider Edge Virtual Switch Instance Pseudowire Tunnel Label Switch Path that provides PW transport Blue VSI Red VSI 242142 CE N-PE VSI PW Tunnel LSP VPLS offers two types of services: • Transparent LAN Service (TLS) • Ethernet Virtual Connection Service (EVCS) TLS and EVCS services are differentiated by the way that MAC addresses are learned and the way that bridging protocol data units (BPDU) are processed. TLS performs unqualified learning. All customer VLANs of a Layer 2 VPN are treated as if they are in the same broadcast domain. In EVCS, the outer VLAN tag on the Ethernet packet differentiates one customer VLAN instance from another. Each VLAN has its own MAC address space, which allows qualified learning. In qualified learning: • MAC addresses of different VLANs might overlap with one another • Each VLAN has a separate Layer 2 forwarding table. VPLS requires that the: • Edge network element supports MPLS • Network element participates in routing protocols and the Label Distribution Protocol (LDP). Hierarchical VPLS (H-VPLS) partitions the network into several edge domains that are interconnected using an MPLS core. The edge network elements only learn of their local N-PE network elements and therefore do not need large routing table support. The edge domain can also be built using Ethernet switches and techniques such as Q-in-Q. Cisco Prime Network 3.8 Activation User Guide 2-4 OL-24645-01 Chapter 2 Technology Overview Carrier Ethernet Technologies Network Activation provides the following VPLS and H-VPLS wizards: • E-LAN VPLS Hub, page 3-2 • E-LAN VPLS Neighbor, page 3-9 • E-LAN H-VPLS Hub Neighbor, page 3-13 • E-LAN H-VPLS Spoke, page 3-15 Ethernet Flow Points An Ethernet Flow Point (EFP) is a forwarding decision point in the PE router, which gives network designers flexibility to make many Layer 2 flow decisions within the interface itself. Many EFPs can be configured on a single physical port. (The number varies from one device to another.) EFPs are the logical demarcation points of an Ethernet virtual connection (EVC) on an interface. An EVC that uses two or more UNIs requires an EFP on the associated ingress and egress interfaces of every device that the EVC passes through. EFPs can be configured on any Layer 2 traffic port; however, they are usually configured on UNI ports. The following parameters can be configured on the EFP: • Match criteria—Defines the matching rules of the frames that should enter the EFP. The matching rules can be for: – Frames of a specific VLAN, a VLAN range, or a list of VLANs (100-150 or 100,103,110). – Frames with no tags (untagged). – Frames with the same double-tags (VLAN tags) as specified. – Frames with same Class of Service (CoS). A frame passes each configured match criteria until the correct matching point is found. If a frame does not fit any of the matching criteria, it is dropped. Default criteria can be configured to avoid dropping frames. • Rewrite commands—In each EFP, VLAN tag management can be specified with the following actions: Command Pop Push Translate • Action • Pops out a tag • Pops out two tags • Pushes in a tag • Pushes in two tags • 1 to 1— Changes a tag value • 1 to 2— Pops one tag and pushes two tags • 2 to 1— Pops two tags and pushes one tag • 2 to 2— Changes the value for two tags Forwarding commands—Each EFP specifies the forwarding command for the frames that enter it. Only one forwarding command can be configured per EFP. The forwarding options are: – Layer 2 Point-to-Point—Forwards to a pseudowire tunnel. Cisco Prime Network 3.8 Activation User Guide OL-24645-01 2-5 Chapter 2 Technology Overview Carrier Ethernet Technologies – Multipoint Bridging—Forwards to a bridge domain entity. – Local Switching—Switches between two different interfaces. • Feature commands—Change QoS parameters and update the ACL In addition, the direction of the configuration can be indicated. The symmetric option indicates whether or not this configuration is the same for the both ingress and egress traffic. EFPs are implemented as activation instances for Cisco 7600 Series Routers, or as subinterfaces for the Cisco ASR 9000 Aggregation Series Routers. These two implementations function identically. Prime Network displays EFP information on the port physical inventory, and on the VLAN bridge and link aggregation group logical inventories. Network Activation provides the following EFP wizard: • Activate Access, page 3-33 Layer 3 VPN MPLS Layer 3 VPNs use a peer-to-peer VPN Model that leverages BGP to distribute VPN-related information. This peer-to-peer model allows subscribers to outsource routing information to Service Providers. Service Providers can provide additional services, such as QoS and Traffic Engineering, to enable voice, video, and data convergence. MPLS Layer 3 VPNs can be deployed with a MPLS TE and Fast Reroute to offer Tight SLAs. Layer 3 VPN QoS-based offerings range from two to five services classes. Layer 3 VPNs use roles to describe a specific job in the network system. The role describes what the element should do irrespective of any physical platform. Layer 3 VPN roles include: • Provider Edge (PE) • Provider (P) • Route Reflector (RR) • Autonomous System Boundary Router (ASBR). Figure 2-4 shows the Layer 3 VPN roles within a Carrier Ethernet network. Figure 2-4 Layer 3 VPN Roles Inter-AS (c) Multi-hop EBGP redistribution of VPNv4 MP-BGP MPLS (LDP) IGP (ISIS, OSPF) IP (Static, IGP, BGP) Inter-AS (b) EBGP redistribution of VPNv4 MP-BGP MPLS (LDP) IGP (ISIS, OSPF) IP (Static, IGP, BGP) Inter-AS (a) VRF-to-VRF RR P PE ASBR ASBR P PE Network Roles CE 190500 RR CE MPLS VPN functionality is enabled at the edge of a MPLS network. The PE router: • Exchanges routing updates with the Customer Edge (CE) router. Cisco Prime Network 3.8 Activation User Guide 2-6 OL-24645-01 Chapter 2 Technology Overview Carrier Ethernet Technologies • Translates the CE routing information into VPNv4 routes. • Exchanges VPNv4 routes with other PE routers through the Multiprotocol Border Gateway Protocol (MP-BGP) Each VPN is associated with one or more virtual routing and forwarding (VRF) instances. A VRF defines the VPN membership of a customer site attached to a PE router. A VRF consists of the following components: • An IP routing table. • A derived Cisco Express Forwarding (CEF) table. • A set of interfaces that use the forwarding table. • A set of rules and routing protocol parameters that control the information that is included in the routing table. A one-to-one relationship does not necessarily exist between customer sites and VPNs. A site can be a member of multiple VPNs. However, a site can associate with only one VRF. The VRF of a site contains all the routes available to the site from all the VPNs of which it is a member. Packet forwarding information is stored in the IP routing table and in the CEF table for each VRF. A separate set of routing and CEF tables is maintained for each VRF. These tables prevent information from being forwarded outside a VPN, and also prevent packets that are outside a VPN from being forwarded to a router within the VPN. The distribution of VPN routing information is controlled through the use of VPN route target communities, implemented by BGP extended communities. VPN routing information is distributed as follows: • When a VPN route that is learned from a CE router is injected into BGP, a list of VPN route target extended community attributes is associated with it. Typically the list of route target community extended values is set from an export list of route targets associated with the VRF from which the route was learned. • An import list of route target extended communities is associated with each VRF. The import list defines route target extended community attributes that a route must have in order for the route to be imported into the VRF. For example, if the import list for a particular VRF includes route target extended communities A, B, and C, then any VPN route that carries any of those route target extended communities—A, B, or C—is imported into the VRF. A PE router can learn an IP prefix from the following sources: • A CE router by static configuration. • A BGP session with the CE router. • A Routing Information Protocol (RIP) exchange with the CE router. The IP prefix is a member of the IPv4 address family. After the PE router learns the IP prefix, the PE converts it into a VPN-IPv4 prefix by combining it with an eight-byte route distinguisher (RD). The generated prefix is a member of the VPN-IPv4 address family. It uniquely identifies the customer address, even if the customer site is using globally non-unique (unregistered private) IP addresses. The route distinguisher used to generate the VPN-IPv4 prefix is specified by a configuration command associated with the VRF on the PE router. BGP distributes reachability information for VPN-IPv4 prefixes for each VPN. BGP communication takes place at two levels: • Within IP domains, known as an autonomous system (interior BGP [IBGP]). • Between autonomous systems (external BGP [EBGP]). Cisco Prime Network 3.8 Activation User Guide OL-24645-01 2-7 Chapter 2 Technology Overview Carrier Ethernet Technologies PE-PE or PE-RR (route reflector) sessions are IBGP sessions, and PE-CE sessions are EBGP sessions. BGP propagates reachability information for VPN-IPv4 prefixes among PE routers by means of the BGP multiprotocol extensions (refer to RFC 2283, Multiprotocol Extensions for BGP-4), which define support for address families other than IPv4. Using the extensions ensures that the routes for a given VPN are learned only by other members of that VPN, enabling members of the VPN to communicate with each other. Network Activation provides the following Layer 3 VPN wizards: • Layer 3 VPN, page 3-37 QoS Quality of Service (QoS) refers to the capability of a network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and IP-routed networks that might use any or all of these underlying technologies. The primary goal of QoS is to provide a prioritization methodology, including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic), and improved loss characteristics. A secondary goal is to ensure that providing priority for one or more flows does not cause other flows to fail. QoS technologies provide the elemental building blocks. Network Activation provides the following QoS wizards: • QoS Policy, page 3-77 Layer 2 Access Control Lists Access lists filter network traffic by controlling whether the routed packets are forwarded or blocked at the router interfaces. The router examines each packet to determine whether to forward or drop the packet, based on the criteria specified within the access lists. Access list criteria can be the source address of the traffic, the destination address of the traffic, the upper-layer protocol, or any other information. Layer 2 (port) ACLs are similar to Layer 3 (router), ACLs but are supported on physical interfaces and configured on switch Layer 2 interfaces. Layer 2 ACLs support only inbound traffic filtering. The Layer 2 ACL can be configured as one of three access type lists— standard, extended, and MAC-extended. Processing of the Layer 2 ACL is similar to that of the router ACLs; the switch examines ACLs associated with features configured on a given interface and permits or denies packet forwarding based on packet-matching criteria in the ACL. When applied to a trunk port, the ACL filters traffic on all VLANs present on the trunk port. When applied to a port with voice VLAN, the ACL filters traffic on both data and voice VLANs. The main benefit of the Layer 2 ACL is that it can filter IP traffic (using IP access lists) and non-IP traffic (using MAC access list). Both types of filtering can be achieved—that is, a Layer 2 interface can have both an IP access list and a MAC access list applied to it at the same time. Cisco Prime Network 3.8 Activation User Guide 2-8 OL-24645-01 Chapter 2 Technology Overview MToP MToP Cisco Mobile Transport over Packet (MToP) extends Cisco IP network intelligence from the network core to the edge by preparing Radio Access Network (RAN) traffic for transport on the packet network. MToP establishes a common backbone for migration from traditional, disparate networks to a converged IP/Multiprotocol Label Switching (MPLS) mobile architecture. MToP uses pseudowires to extend the packet-based core closer to the edge of the network. It flattens the multiple layers of the RAN onto a single MPLS network by encapsulating and transporting time-division multiplexing (TDM), Frame Relay, and ATM traffic over MPLS. MToP builds a MPLS cloud between the distribution nodes (between access and aggregation) and the aggregation nodes on the network edge. The MPLS network is also extended over point-to-point links from the distribution nodes through Ethernet, serial, microwave, or a Layer 2 access network. The CEoPs and STM-1c/OC-3c ATM SPAs on aggregation Cisco 7600 Series routers terminate the pseudowire connections at the RNC/BSC site. CEoPS SPAs collect ATM/TDM native traffic at the distribution nodes and encapsulates them in pseudowires and transports the traffic to the aggregation nodes using MPLS. MToP activations include: • Using MPLS technology to extend the packet-based core to the edge of the network. • Employing pseudowires, which are MPLS virtual circuit tunnels, aggregate and transport time-division multiplexing (TDM), IP, Ethernet, and ATM traffic, as well as clock synchronization, from the RAN to the network core. • Converting RAN voice and data frames into IP packets at the cell site and transporting them seamlessly over a backhaul network. At the central site, extracting the frames from the IP packets rebuilding the ATM or TDM streams. Network Activation provides the following MToP wizards: • MToP ATM Pseudowire, page 3-43 • MToP TDM Clock Pseudowire, page 3-49 • MToP TDM Pseudowire, page 3-53 • MToP Clocking Synchronization, page 3-58 Cisco Prime Network 3.8 Activation User Guide OL-24645-01 2-9 Chapter 2 Technology Overview MToP Cisco Prime Network 3.8 Activation User Guide 2-10 OL-24645-01