ACX Series Universal Access Router Configuration Guide
Part 5
Chapter 15
Chapter 18
Chapter 20
Chapter 21
Chapter 22
Chapter 23
Part 6
Chapter 25
Chapter 26
xlii
Configuring Protocols on ACX Series Routers
Configuring Internet Group Management Protocol Snooping . . . . . . . . . . 473
Configuring Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Figure 26: Install Default Route to Nearest Routing Device That Operates at
Both Level 1 and Level 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
Figure 27: OSPF Three-Way Handshake . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Configuring MPLS and Pseudowires . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Figure 30: TTL Processing on Incoming MPLS Packets . . . . . . . . . . . . . . . . . . . . 590
Figure 31: Pseudowire Redundancy Mobile Backhaul Sample Topology . . . . . . . 623
Figure 32: Pseudowire Redundancy Mobile Backhaul Solution . . . . . . . . . . . . . . 625
Configuring Virtual Router Redundancy Protocol (VRRP) . . . . . . . . . . . . . 651
Configuring Multicast Listener Discovery and Protocol-Independent
Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
Figure 35: Rendezvous Point As Part of the RPT and SPT . . . . . . . . . . . . . . . . . . 678
Configuring Path Computation Element Protocol (PCEP) . . . . . . . . . . . . . 691
Figure 36: PCEP Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Figure 37: Example MPLS Traffic Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Figure 38: PCC and RSVP-TE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Figure 39: Example PCE for MPLS RSVP-TE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
Configuring Layer 2 and Layer 3 Features on ACX Series Routers
Configuring Layer 2 and Layer 3 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773
Figure 43: Connection Protection Using a Pseudowire Configured through Router
Figure 44: Simple Load Balancing Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 790
Configuring Layer 3 VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Figure 45: VPN Attributes and Route Distribution . . . . . . . . . . . . . . . . . . . . . . . . . 815
Figure 47: Route Distinguishers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
Figure 48: VRF Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
Figure 49: Route Distribution Within a VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
Figure 50: Distribution of Routes from CE Routers to PE Routers . . . . . . . . . . . . 823
Figure 52: Distribution of Routes from PE Routers to CE Routers . . . . . . . . . . . . 826
Figure 53: Using MPLS LSPs to Tunnel Between PE Routers . . . . . . . . . . . . . . . . 827
Copyright © 2017, Juniper Networks, Inc.