How Mce Works; Using Mce In Tunneling Applications - H3C S5500-HI Series Mpls Configuration Manual

Hide thumbs Also See for S5500-HI Series:
Table of Contents

Advertisement

How MCE works

Figure 3
shows how an MCE maintains the routing entries of multiple VPNs and how an MCE exchanges
VPN routes with PEs.
Figure 3 Network diagram for the MCE function
VPN 1
Site 1
VPN 2
Site 2
On the left-side network, there are two VPN sites, both of which are connected to the MPLS backbone
through the MCE device. VPN 1 and VPN 2 on the left-side network must establish a tunnel with VPN 1
and VPN 2 on the right-side network, respectively.
With MCE enabled, routing tables can be created for VPN 1 and VPN 2 individually, VLAN-interface 2
can be bound to VPN 1, and VLAN-interface 3 can be bound to VPN 2. When receiving a piece of
routing information, MCE determines the source of the routing information according to the number of
the interface receiving the information. It then maintains the corresponding routing table accordingly.
You must also bind the interfaces to the VPNs on PE 1 in the same way as those on the MCE device. The
MCE device is connected to PE 1 through a trunk, which permits packets of VLAN 2 and VLAN 3 with
VLAN tags carried. In this way, PE 1 can determine the VPN a received packet belongs to according to
the VLAN tag of the packet and passes the packet to the corresponding tunnel.

Using MCE in tunneling applications

In addition to MPLS L3VPN, tunneling technologies can also be used to implement other types of VPNs.
The MCE function provided by the switch can be applied in VPN applications based on tunneling.
Figure 4 Network diagram for using MCE in a tunneling application (1)
PE1
VLAN-int2
VLAN-int7
VLAN-int8
VLAN-int3
MCE
P
P
PE
5
VPN 2
Site 1
CE
PE2
CE
Site 2
VPN 1

Advertisement

Table of Contents
loading

This manual is also suitable for:

S10500 series

Table of Contents