Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial
Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions contained herein.
Acknowledgements
Microsoft®, Windows®, Windows® XP, Windows NT, ® and SQL Server® are U.S. registered trademarks of Microsoft Corporation.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
MySQL® and Oracle® are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
Warranty
WARRANTY STATEMENT: To obtain a copy of the warranty for this product, see the warranty information website:
The four MVM modules covered in this book are L2VPN Manager, MPLS Manager, and MPLS TE
Manager. Each module contains an overview of capabilities and applications followed by a
detailed explanation of each function and associated devices.
7
2 L2VPN Manager
L2VPN Manager is used to manage the Layer 2 VPN networks, including MPLS-based VPLS networks
and link layer-based PBB networks.
The L2VPN Manager provides four functions: VPN devices, VPN resources, VPN deployment, and
automatic discovery. For more information about these functions, see Operation Guide.
L2VPN Manager allows administrators to assign operation rights to operators. For further details,
see VPN Privilege Management.
To quick start with the L2VPN Manager, refer to L2VPN User Guide.
L2VPN Manager Overview
L2VPN Manager is used to manage the Layer 2 VPN networks, including MPLS-based VPLS networks
and link layer-based PBB networks.
Virtual Private LAN Service (VPLS), also called Transparent LAN Service (TLS) or Virutal Private
Switched Network Service, can deliver a point-to-multipoint Layer 2 VPN (L2VPN) service over
public networks. With VPLS, geographically-dispersed sites can interconnect and communicate
over Metropolitan Area Network (MAN) or Wide Area Network (WAN) as if they were on the
same Local Area Network (LAN).
VPLS supports multipoint services, rather than the point-to-point services that traditional VPN supports.
With VPLS, service providers can create on the PEs a series of virtual switches for customers,
allowing customers to build their LANs across the MAN or WAN.
Basic concepts of VPLS
The figure shown above illustrates a typical VPLS networking scenario, which involves the following
basic concepts:
•CE (Customer Edge): Customer edge device that is directly connected with the service provider
network.
•PE (Provider Edge): Provider edge device that connects one or more CEs to the service provider
network, mainly for access to VPN services.
•VSI (Virtual Switch Instance): Virtual switch instance that maps actual VPLS access links to
virtual links. As shown in the above figure, to ensure connectivity between devices, PE 1 and
PE 2 are configured with a VSI respectively, and the VSI ID is 1.
•PW (Pseudo Wire): A pseudo wire is the bidirectional virtual connection between two VSIs.
A pseudo wire consists of two unidirectional virtual circuits (VCs).
•AC (Attachment Circuit): Attachment circuit that connects a CE to a PE. It can use physical
interfaces or virtual interfaces.
•Tunnel: A tunnel, usually an MPLS tunnel, used to carry one or more PWs. It is a direct channel
between a local PE and the peer PE for transparent transmission in-between.
8L2VPN Manager
The figure shown above illustrates a typical H-VPLS network, which involves the following basic
concepts:
•UPE (User Facing-Provider Edge): User facing provider edge device that functions as the user
access convergence device.
•NPE (Network Provider Edge): Network provider edge device that functions as the network
core PE. An NPE resides at the edge of a VPLS network core domain and provides transparent
VPLS transport services between core networks.
•U-PW: PW link between a UPE and an NPE.
•N-PW: PW link between two NPEs.
VPLS VPN Types
•LDP VPN: Uses the Label Distribution Protocol (LDP) to establish virtual circuits by establishing
point-to-point sessions between a pair of PEs.
•BGP VPN: Uses the Border Gateway Protocol (BGP) to establish signaling sessions through
route reflectors (RRs) and supports networking across ASs.
Operation of VPLS
The icon descriptions for the data forwarding flowchart shown above are:
•L2-pdu: Data link layer packet.
•Dmac: MAC address of the next hop device.
•Smac: MAC address of the local device.
•L: Public network label.
•V: Private network label.
•L': Public network label after the packet is forwarded along the LSP.
The data forwarding procedure is as follows:
1.A PE receives a data packet from a CE through the AC. According to the VSI, the PE pushes
its own MAC address, the next hop's MAC address, the public network label, and the private
network label into the packet and then forwards the packet to the core network according to
the next hop's MAC address.
2.After receiving the packet, the core network encapsulates the packet with the new public
network label and the MAC address of the new next hop device, and then forwards the packet
to the specified PE accordingly.
3.The PE sends the packet to the right CE through the AC according to the private network label.
L2VPN Manager Overview9
Basic VLL concepts
VLL(Virtual Leased Line): VLL provides point-to-point L2VPN services over the public network. With
VLL, two sites can communicate as if they were directly connected. VLL is a form of MPLS L2VPN.
It uses inner labels to identify virtual lines (Layer 2 tunnels), hereinafter referred to as virtual circuits
(VCs), and uses outer labels to identify public tunnels. The network devices of the service provider
do not need to maintain any Layer 2 information but perform MPLS forwarding on the public
neworks based on MPLS labels. In VLL, a Forwarding Equivalence Class (FEC) is about the VC
indentifier and some Layer 2 information.
The above figure shows a typical VLL networking scenario. With the existing technologies, VLL can
be implemented mainly in two methods, which use different signaling protocols to exchange VC
information. One method is called Martini (the L2VPN Manager only support this method). The
Martini method uses a standard two-layer label stack. The inner labels (VC labels) are exchanged
through the extended LDP. The Martini draft extends the standard LDP, adding a new FEC type,
the VC FEC, for exchanging VC labels. A VC FEC identifies a VC by VC Type and VC ID. VC Type
indicates the link layer encapsulation type and VC ID uniquely indentifies a VC of the same type
on a PE. The PEs that connect two CEs switch VC labels through LDP and bind the corresponding
CEs by the VC ID. A VC between the two CEs are then established and the two CEs can transport
Layer 2 data over the VC. The Martini method does not provide the local switching function. Outer
labels will be used to transport VCs' data over the service provider network. Because PEs can
identify data of different VCs by inner label, multiple VCs can share the public tunnel.
PBB overview
PBB Overview PBB is proposed to satisfy the Metro Ethernet Network (MEN) requirements. In the
MEN service hierarchy model, PBB is at the carrier level, used to establish MAC tunnels to separate
services of different customers on the backbone. A network employs 802.1ah is called a Provider
Backbone Bridge Network (PBBN).
Basic concepts of PBB
10L2VPN Manager
The above figure shows a typical PBB networking scenario. In a typical PBBN, there are two types
of devices, BEB and BCB.
•BEB (Backbone Edge Bridge): Like a PE in an MPLS network. It performs MAC-in-MAC
encapsulation for the incoming packets and then delivers the encapsulated packets to
subsequent devices, which will forward the packets according to the B-MAC and B-VID. It also
de-encapsulates the received MAC-in-MAC packets to standard Ethernet packets and then
looks up the forwarding table and sends the packets from the corresponding outgoing
interfaces.
•BCB (Backbone Core Bridge): Like a P device in an MPLS network. It forwards the received
MAC-in-MAC packets according to the outer B-MAC and B-VID. A BCB only performs packet
bridging, learning the MAC addresses on the backbone. It does not need to learn the huge
number of MAC addresses in the customer networks. This reduces the network deployment
expenses and provides better expansibility for the PBBN.
Usage Summary
The L2VPN Manager mainly provides two operation flows: service flow and deployment flow.
Through this user guide, you can quickly get started with the L2VPN Manager.
Service flow
NOTE:Select imported PE devices and perform automatic discovery. Then, the L2VPN Manager
will find out the VPNs and AC links newly configured on the devices and display them visually in
the topology diagram.
Usage Summary11
Deployment flow
NOTE:You can add PEs and CEs to a VPN through VPLS deployment, VLL deployment, and PBB
deployment. You can also remove the PEs and CEs from a VPN or remove a whole VPN through
the function.
VPN privilege management
The system allows administrators to authorize different operators to manage different VPNs. When
adding or modifying an operator account, an administrator can authorize the operator to manage
certain VPNs or change which VPNs the operator can manage. Then, after logging on, the operator
can view information about only the VPNs the operator is authorized to manage.
Typical Applications
VPLS Instance Configuration
Application scenario
Company H locates in city B and uses PE 1 and CE 1; company Z locates in city N and uses PE
2 and CE 2. PE 1 and PE 2 are enabled with MPLS and L2VPN, and each configured with an LSR
ID. The two companies are going to undertake corporate restructuring through merge into a new
group for the need of business development. The new group decides to use the VPN access service
provided by the server provider to implement network connectivity, so that information and data
can be transferred within the group fast and correctly.
Scenario analysis
Create a VPN using the L2VPN Manager, and then add all network devices in city B and city N
of the group company into the VPN for management.
Operation procedure
1.Add devices to the platform.
a.Select the Homepage tab, and then click Add Devices in the navigation tree.
b.Enter the IP addresses of the devices (PE 1, PE 2, CE 1, and CE 2) to be managed, specify
12L2VPN Manager
the corresponding Telnet and SNMP parameters, and then click OK to add these devices
to the platform.
2.Import PE devices to the L2VPN Manager.
a.Select the Service tab to enter the L2VPN manager system.
b.Select VPN Devices > PE Devices from the navigation tree to enter the PE device list page.
c.Click Import PE to enter the page for importing PE devices.
d.Click Select Device. On the pop-up page, select PE 1 and PE 2. You can query the devices
by specifying the device label, IP, or status.
e.Click OK to return to the page for importing PE devices.
f.Click OK.
3.Import CE devices to the L2VPN Manager.
a.Select VPN Devices > CE Devices from the navigation tree to enter the CE device list page.
b.Click Import CE to enter the page for importing CE devices.
c.Click Select Device. On the pop-up page, select CE 1 and CE 2. You can query the devices
by specifying the device label, IP, status, or CE type.
d.Click OK to return to the page for importing CE devices.
e.Click OK.
4.Set up a VPN.
a.Select VPN Deployment > VPLS Deployment in the navigation tree to enter the VPLS VPN
deployment guide page.
b.Select PE as the PE type.
c.Input VPN name VPN1, audit interval, description, and contact person in the basic VPN
information area.
d.Input the VSI ID, and select the PW transfer mode.
e.Click Next to enter the PE configuration page.
5.Configure PE interface.
a.On the PE configuration page, click Select PE and then select a PE device (PE 1) on the
pop-up page.
b.Click the Modify icon to enter the UNI configuration page.
c.Click the Select button behind the UNI Interface text box. On the pop-up page, select a
PE device interface.
d.Input the service instance and encapsulation VLAN for the UNI interface.
e.Click the Select button behind the CE Device text box. On the pop-up page, select a CE
device (CE 1).
f.Click OK to finish the PE configuration.
g.Click Next to enter the configuration summary page.
6.View configuration summary.
a.On the configuration summary page, to immediately deploy the configuration commands
to the devices, click Deploy Immediately.
b.Click OK to enter the deployment task list page. Add the link between PE 2 and CE 2 in
the same way.
7.View the topology.
a.Select VPN Resources > VPN List in the navigation tree to enter the VPN list page.
b.Click the VPN Topology icon of VPN1 to view the topology information of the VPN.
Configuration guidelines
On the configuration summary page, you can deploy the configuration to the devices immediately.
Otherwise, the links will appear only on the topology diagram, with the status being Undeployed.
Typical Applications13
VLL Instance Configuration
Application scenario
Company H locates in city B and uses PE 1 and CE 1; company Z locates in city N and uses PE
2 and CE 2. PE 1 and PE 2 are enabled with MPLS and MPLS L2VPN, and each configured with
an LSR ID. The two companies are going to undertake corporate restructuring through merge into
a new group for the need of business development and strategic planning. The new group decides
to establish a VPN through VLL to implement network connectivity, so that information and data
can be transferred within the group fast and correctly.
Scenario analysis
Create a VLL VPN by using the L2VPN manager, and then add all network devices in city B and
city N of the group company into the VPN for management. VLL VPN is suitable for point-to-point
links. For point-to-multipoint links, you are recommended to use VPLS VPN.
Operation procedure
1.Add devices to the platform.
a.Select the Homepage tab, and then click Add Devices in the navigation tree.
b.Enter the IP addresses of the devices (PE 1, PE 2, CE 1, and CE 2) to be managed, specify
the corresponding Telnet and SNMP parameters, and then click OK to add these devices
to the platform.
2.Import PE devices to the L2VPN Manager.
a.Click the Service tab on the navigation bar.
b.Select VPN Devices > PE Devices in the navigation tree.
c.Click Import PE to enter the page for importing PE devices.
d.Click Select Device. On the pop-up page, select PE 1 and PE 2. You can query the devices
by specifying the device label, IP, or status.
e.Click OK to return to the page for importing PE devices.
f.Click OK.
3.Import CE devices to the L2VPN manager.
a.Select VPN Devices > CE Devices in the navigation tree.
b.Click Import CE to enter the page for import CE devices.
c.Click Select Device. On the pop-up page, select CE 1 and CE 2. You can query the devices
by specifying the device label, IP, status, or CE type.
d.Click OK to return to the page for importing CE devices.
e.Click OK.
4.Set up a VPN.
a.Select VPN Deployment > VLL Deployment in the navigation tree.
b.Type the basic VPN information, such as VPN name VPN1, audit interval, description,
contact person, and PW ID, and select the PW transport mode.
c.Click Next to enter the local PE configuration page.
5.Configure the local PE (PE1).
14L2VPN Manager
a.On the local PE configuration page, click the Select button behind the UNI Interface text
box. On the pop-up page, select the PE interface connecting CE 1.
b.Type the service instance and encapsulation VLAN for the UNI interface, and select the
encapsulation type.
c.Click the Select button behind the CE Device text box. On the pop-up page, select a CE
device (CE 1).
d.Click Next to enter the remote PE configuration page.
6.Configure the remote PE (PE2).
a.On the remote PE configuration page, click the Select button behind the UNI Interface
text box. On the pop-up page, select the PE interface connecting CE 2.
b.Select an encapsulation type for the UNI interface.
c.Click the Select button behind the CE Device text box. On the pop-up page, select a CE
device (CE 2).
d.Click Next to enter the configuration summary page.
7.View configuration summary.
a.On the configuration summary page, to immediately deploy the configuration commands
to the devices, click Deploy Immediately.
b.Click OK to enter the deployment task list page.
8.View the topology.
a.Select VPN Resources > VPN List in the navigation tree.
b.Click the VPN Topology icon of VPN1 to view the topology information of the VPN.
Precautions
On the configuration summary page, you can configure to deploy the configuration to the devices
immediately. Otherwise, the links will appear only on the topology diagram, with the status being
Undeployed.
PBB Instance Configuration
Application scenario
Company H locates in city B and uses PE 1 and CE 1; company Z locates in city N and uses PE
2 and CE 2. PE 1 and PE 2 are enabled with L2VPN. The two companies are going to undertake
corporate restructuring through merge into a new group for the need of business development and
strategic planning. The new group decides to establish a VPN through PBB to implement network
connectivity, so that information and data can be transferred within the group fast and correctly.
Scenario analysis
Create a PBB VPN by using the L2VPN manager, and then add all network devices in city B and
city N of the group company into the VPN for management.
Operation procedure
1.Add devices to the platform.
Typical Applications15
a.Select the Homepage tab, and then click Add Devices in the navigation tree.
b.Enter the IP addresses of the devices (PE 1, PE 2, CE 1, and CE 2) to be managed, specify
the corresponding Telnet and SNMP parameters, and then click OK to add these devices
to the platform.
2.Import PE devices to the L2VPN Manager.
a.Click the Service tab on the navigation bar.
b.Select VPN Devices > PE Devices in the navigation tree.
c.Click Import PE to enter the page for importing PE devices.
d.Click Select Device. On the pop-up page, select PE 1 and PE 2. You can query the devices
by specifying the device label, IP, or status. Click OK to return to the page for importing
PE devices.
e.Click OK.
3.Import CE devices to the L2VPN manager.
a.Select VPN Devices > CE Devices in the navigation tree.
b.Click Import CE to enter the page for import CE devices.
c.Click Select Device. On the pop-up page, select CE 1 and CE 2. You can query the devices
by specifying the device label, IP, status, or CE type. Click OK to return to the page for
importing CE devices.
d.Click OK.
4.Set up a VPN.
a.Select VPN Deployment > PBB Deployment in the navigation tree.
b.Type the basic VPN information, such as VPN name VPN1, audit interval, description,
contact person, I-SID, and B-VLAN, and select the PW transport mode.
c.Click Next to enter the PE configuration page.
5.Configure PE interface.
a.On the PE configuration page, click Select PE and then select a PE device (PE 1) on the
pop-up page.
b.Click the icon to enter the UNI and NNI configuration page.
c.Click the Select button behind the UNI Interface text box. On the pop-up page, select a
PE interface.
d.Type the service instance and encapsulation VLAN for the UNI interface, and select the
encapsulation type.
e.Click the Select button behind the CE Device text box. On the pop-up page, select a CE
device (CE 1).
f.Click the Select button behind the Uplink Interface text box. On the pop-up page, select
one or more PE interfaces.
g.Click OK.
h.Click Next to enter the configuration summary page.
6.View configuration summary.
a.On the configuration summary page, to immediately deploy the configuration commands
to the devices, click Deploy Immediately.
b.Click OK to enter the deployment task list page.
c.Add the link between PE 2 and CE 2 in the same way.
7.View the topology.
a.Select VPN Resources > VPN List in the navigation tree.
b.Click the icon of VPN1 to view the topology information of the VPN.
16L2VPN Manager
Precautions
On the configuration summary page, you can configure to deploy the configuration to the devices
immediately. Otherwise, the links will appear only on the topology diagram, with the status being
Undeployed.
Using L2VPN Manager
The L2VPN Manager provides four functions: VPN devices, VPN resources, VPN deployment, and
automatic discovery.
•VPN Devices—VPN devices include PE devices and CE devices. CE devices include managed
CEs and non-managed CEs. The PEs and non-managed CEs can be directly imported from
the platform to the L2VPN manager. For non-managed CEs, however, you need to add them
to the L2VPN Manager manually.
•VPN Resources—The L2VPN Manager allows you to add VPNs manually or use the automatic
discovery function to construct VPNs automatically. VPN resources include VPN list and VC
list. On the VPN list page, you can add, delete, and audit a VPN, and view the detailed
information, audit information, and topology information of a VPN. On the AC list page, you
can query and delete ACs, and view the detailed information of a VC.
•VPN Deployment—VPN Deployment includes VPLS deployment, VLL deployment, PBB
deployment, undeployment, and deployment task management. You can deploy configuration
one by one or in a batch. The L2VPN Manager provides a simple, visual deployment operation
guide, which can release you from remembering bald command lines and reduce your
workload tremendously. After the deployment, you can view the deployment details (by clicking
the Details icon) to see the configuration commands deployed to the devices.
•Automatic Discovery—The L2VPN Manager can find the newly configured VPNs and AC links
on devices through the automatic discovery function and then add them to the L2VPN Manager
for management. The L2VPN Manager can discover the entire VPN network. No manual
interference is needed during automatic discovery.
VPN devices
VPN devices include PEs and CEs. A PE is a service provider edge device, which is the core of
VPN service processing in a network. A CE is an edge device of a VPN site network, representing
a customer subnet.
A device can be managed by the L2VPN Manager only after the device is added to the platform.
That is, the related device should be managed by the platform before it can be added to the L2VPN
Manager as a PE or CE resource. Each device can be imported as only one type of VPN device
at a time. VPN resources allows for such operations as querying, adding, deleting, and editing
managed devices.
Due to the deployment variety of CEs, some CEs cannot be managed. You can create non-managed
CEs in the L2VPN Manager to substitute the real CEs. A non-managed CE also represents a customer
site. Non-managed CEs help to represent the connectivity between PEs and actual customer sites
in the network topology.
PE devices
PEs are the most important device resources in the L2VPN Manager. The system discovers VPNs
and VPN links by obtaining information on PEs. VPLS VPN network deployment is also performed
on PEs.
You can import, query, synchronize, and delete PEs, and view detailed information about a PE.
The information displayed on a PE details page varies with the VPN type you selected during VPN
deployment. For example, if you have deployed a VLL VPN, the PE details page displays VLL
information.
Using L2VPN Manager17
Import PE
Use this function to import one or more PEs from the platform to the L2VPN Manager. For VPLS
and VLL networking, a device can be imported as a PE only if it is enabled with MPLS and MPLS
L2VPN and configured with an LSR ID. For PBB networking, a device can be imported as a PE if
it is enabled with L2VPN.
Operation procedure
1.Click the Service tab on the top navigation bar, and then select VPN Devices > PE Devices in
the navigation tree to enter the PE list page.
2.Click Import PE to enter the device import page.
3.Click the Select Device button. On the pop-up page, select the devices to be imported and
click OK to return to the device import page.
4.Click OK.
Precautions
•The L2VPN Manager allows only one device import operation (CE or PE import) at a time.
•Each device can be imported as one type at a time. For example, if a device is imported as
a PE, you can import the device as a CE only after you remove the device from the PE device
list.
Query PE
Use this function to query PE devices based on device label, device IP address, or device status.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN Devices > PE Devices in
the navigation tree to enter the PE list page.
2.Enter query criteria.
3.Click Query. The queried PEs are displayed on the PE device list. To display all the PEs, click
Reset.
Precautions
•All the query criteria support fuzzy match.
Delete PE
Use this function to delete existing PEs in the L2VPN Manager. When this operation succeeds, the
corresponding PEs and links are deleted from the L2VPN Manager.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN Devices > PE Devices in
the navigation tree to enter the PE list page.
2.Select one or more PEs you want to delete.
3.Click Delete.
Precautions
•You can delete a PE from the L2VPN Manager without affecting the corresponding device in
the platform. If a PE is deleted in the platform, the device is also deleted in the L2VPN Manager.
•If a PE is deleted from the platform or the L2VPN Manager, all the VSI, VLL, and AC information
related to the PE are also deleted.
18L2VPN Manager
Synchronize PEs immediately
Use this function to synchronize the configuration of a PE to that on the L2VPN Manager. From the
PE device list, check the last synchronization time and synchronization status of a PE to determine
whether the current configuration of the PE is valid.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN Devices > PE Devices in
2.Enter query criteria.
3.Click Query. The queried PEs are displayed on the PE device list. To display all the PEs, click
Precautions
•During PE device synchronization, the information on the device is read to the L2VPN Manager.
•If the VPN target information of different VSIs on a PE is the same, synchronization of the PE
CE devices
CEs are important device resources in the L2VPN Manager. Depending on management status,
CEs fall into two categories: manageable CE and non-managed CE.
Managed CEs can be imported directly from the platform, while non-managed CEs need to be
created in the L2VPN Manager manually.
the navigation tree to enter the PE list page.
Reset.
This may take some time.
will fail.
Query CE device
Use this function to query managed CE devices and non-managed CE devices based on such query
criteria as device label and device IP address.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN DevicesCE Devices in the
navigation tree to enter the CE list page.
2.Enter query criteria.
3.Click Query. The queried devices are displayed on the CE device list. To display all the
managed CEs and non-managed CEs, click Reset.
Precautions
All the query criteria support fuzzy match.
Import CE
Use this function to import one or more CEs from the platform to the L2VPN Manager.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN DevicesCE Devices in the
navigation tree to enter the CE list page.
2.Click Import CE to enter the device import page.
3.Click the Select Device button. On the pop-up page, select the devices to be imported and
click OK to return to the device import page
4.Click OK.
Using L2VPN Manager19
Delete CE
Use this function to delete existing CE devices in the L2VPN Manager, including managed CE
devices and non-managed CE devices. When this operation succeeds, the corresponding managed
CEs, non-managed CEs, and links are deleted from the L2VPN Manager.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN DevicesCE Devices in the
navigation tree to enter the CE list page.
2.Select one or more CEs you want to delete.
3.Click Delete.
Precautions
You can delete a managed CE from the L2VPN Manager without affecting the corresponding
device in the platform. If a device is deleted in the platfom, the device is also deleted in the L2VPN
Manager.
If a CE is deleted from the platform or L2VPN Manager, all AC information related to the CE is
also deleted.
Add non-managed CE
Use this function to identify the CEs that do not need to be managed by the L2VPN Manager but
whose connections need to be represented in the topology. This function allows you to add
non-managed CEs to the L2VPN Manager.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN DevicesCE Devices in the
navigation tree to enter the CE list page.
2.Click Add VCE to enter the page for adding non-managed CEs.
3.Enter a device label and MAC address.
4.Click OK.
Precautions
Device labels and MAC addresses must be unique.
Use this function to modify the device label and MAC address of a CE.
Modify non-managed CE
Use this function to modify the device label and MAC address of a CE.
Operation procedure
1.Click the Service tab on the top navigation bar, and then select VPN DevicesCE Devices in the
navigation tree to enter the CE list page.
2.Click the Modify icon corresponding to the non-managed CE device to be modified to enter
the page for modifying a non-managed CE.
3.Modify the device label and MAC address.
4.Click OK.
Precautions
A device label and MAC address must be unique.
Query VLAN mapping
Use this function to query the VLAN mapping relation for all interfaces of a CE.
20L2VPN Manager
Operation procedure
1.Click the Servicetab on the top navigation bar, and then select VPN Devices > CE Devices in
the navigation tree to enter the CE list page.
2.Click the VLAN Mapping icon of a CE to enter the page for VLAN mapping list.
Add VLAN mapping
Use this function to add the VLAN mapping relation for all interfaces of a CE.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN DevicesCE Devices in the
navigation tree to enter the CE list page.
2.Click the VLAN Mapping icon of a CE to enter the page for VLAN mapping list.
3.Click Add to enter the page for add VLAN mapping.
4.Click Select and on the pop-up page, select an interface, and then click OK.
5.Click Add in the VLAN mapping list.
6.In the pop-up window, type the source VLAN ID and Destination VLAN ID, and then click OK.
7.Repeat procedures 5 and 6 to add more relations.
8.Click OK on the add VLAN mapping page
Delete VLAN mapping
Use this function to delete the VLAN mapping relation for all interfaces of a CE.
Operation Procedure
1.Click the Service tab on the top navigation bar, and then select VPN DevicesCE Devices in the
navigation tree to enter the CE list page.
2.Click theicon of a CE to enter the page for VLAN mapping list.
3.Select one or more VLAN mapping relations you want to delete.
4.Click OK.
VPN deployment
The L2VPN Manager provides the VPN deployment function that allows for simple and user-friendly
operations. You do not need to go to different labs or use command lines to configure a VPN. This
greatly reduces the time and working load for maintenance.
VPN deployment consists of VPLS deployment, VLL deployment, PBB deployment, undeployment,
and deployment task management. VPLS/VLL/VBB deployments allow you to conveniently add PE
devices to a VPN in different ways and connect PEs with CEs. Undeployment allows you to remove
PEs from a VPN or remove links between PEs and CEs. Deployment task management allows you
to view the deployment tasks, modify a deployment task, and deploy the configuration in a task
to devices.
This function cannot be used when BGP VPN is selected on the global parameter configuration
page.
VPLS deployment
This function helps you configure and deploy a VPN of VPLS type. After you configure a VPLS VPN,
if you do not deploy the VPN configuration immediately, a deployment task in state of "undeployed"
is added on the deployment task list. If you deploy the VPN configuration immediately, a deployment
task in state of "deploying" is added on the deployment task list. After the deployment, you can
view the deployment result.
Using L2VPN Manager21
Configuration procedure
1.Define VPN.
This function allows you to configure a VPN's basic information, including VPLS VPN networking
type (PE Type), VPN name, VSI ID, PW transport mode, audit interval, VPN description, and
contact information.
Precautions
•Valid characters in a VPN name are letters, digits, and underscores.
•VSI ID is generated randomly. You can modify it in the range 1 to 4294967295.
•PW transport mode can be VLAN or Ethernet. VLAN is the default.
•Audit interval ranges from 0 to 24 and defaults to 24. A value of 0 means no audit.
•Contact is the current login user by default.
•If you select PE for the PE type, skip step 3 and go to step 4 directly after you finish the
PE interface configuration.
2.PE or NPE configuration.
This function allows you to configure the PE information and AC information for a VPLS VPN.
The PE information includes PE name. The AC information includes UNI interface, service
instance, bandwidth, encapsulation type, encapsulation VLAN, access type, and CE device.
Steps to configure AC information
a.Click Add in the AC list area, and then on the pop-up page, select a PE interface.
b.Type the service instance, encapsulation VLAN and bandwidth, and select the
encapsulation type and access type.
c.Click Select behind the CE Device text box, and then on the pop-up page, select a CE
device.
d.Click OK.
•To configure the PE information, click Add in the PE device list, and then on the pop-up
page, select one or multiple PE devices.
Precautions
•You can only type a number in the range 1 to 4094 in the service instance text box.
•You can only type a number in the range 1 to 1000 in the bandwidth text box.
•Encapsulation VLAN IDs are in the range 1 to 4094. You can specify one or more VLAN
IDs or VLAN ID ranges. To specify a VLAN range, use a hyphen (-) between the start and
end VLAN IDs of the range. To specify multiple VLAN ranges, use a dot (,) to separate
two VLAN ranges. The specified VLAN ID(s) and VLAN ID range(s) must be in the
ascending order. For example: 2, 4-6, 8-10
•The access type can be VLAN or Ethernet. VLAN is the default.
•If you do not select a CE device, the system automatically adds a VCE.
•If the encapsulation type is S-VID or S-VID Only Tagged, you must enter the encapsulation
•If the PE device you select when you configure AC information is not in the PE device list,
3.UPE configuration.
This function allows you to configure the UPE information and AC information for a VPLS VPN.
The PE information includes PE name, Main NPE and Backup NPE. The AC information includes
22L2VPN Manager
VLAN IDs.
the system automatically adds the PE to the PE device list.
UNI interface, service instance, bandwidth, encapsulation type, encapsulation VLAN, access
type, and CE device.
Steps to configure AC information
a.Click Add in the AC list area, and then on the pop-up page, select a PE interface.
b.Type the service instance, encapsulation VLAN and bandwidth, and select the
encapsulation type and access type.
c.ClickSelect behind the CE Device text box, and then on the pop-up page, select a CE
device.
d.Click OK.
Steps to configure PE information
a.Click Add in the PE device list area, and then on the pop-up page, select one or multiple
PE devices.
b.On the PE device list, select one or multiple PE devices, click the Main NPE button, and
then on the pop-up page, select one PE device.
c.On the PE device list, select one or multiple PE devices, click the Backup NPE button, and
then on the pop-up page, select one PE device.
Precautions
•You can only type a number in the range 1 to 4094 in the service instance text box.
•You can only type a number in the range 1 to 1000 in the bandwidth text box.
•Encapsulation VLAN IDs are in the range 1 to 4094. You can specify one or more VLAN
IDs or VLAN ID ranges. To specify a VLAN range, use a hyphen (-) between the start and
end VLAN IDs of the range. To specify multiple VLAN ranges, use a dot (,) to separate
two VLAN ranges. The specified VLAN ID(s) and VLAN ID range(s) must be in the
ascending order. For example: 2, 4-6, 8-10
•The access type can be VLAN or Ethernet. VLAN is the default.
•If you do not select a CE device, the system automatically adds a VCE.
•If the encapsulation type is S-VID or S-VID Only Tagged, you must enter the encapsulation
VLAN IDs.
•If the PE device you select when you configure AC information is not in the PE device list,
the system automatically adds the PE to the PE device list.
4.Configuration summary.
This function displays the configuration commands to be deployed to PE devices.
a.Select Deploy Immediately, and click OK.
Precautions
•The configuration commands are generated by the system automatically. You cannot
modify them.
•If you do not select Deploy Immediately, the system only creates the VPN and adds an
"Undeployed" deployment task to the deployment task list. You can deploy the
configuration later. If you select Deploy Immediately, the system deploys the configuration
to the devices immediately. A CE device and a link between the CE device and PE device
are added on the L2VPN Manager and the deployed configuration is recorded on the
related devices.
Using L2VPN Manager23
VLL Deployment
This function helps you configure and deploy a VPN of VLL type. After you configure a VLL VPN,
if you do not deploy the VPN configuration immediately, a deployment task in state of "undeployed"
is added on the deployment task list. If you deploy the VPN configuration immediately, a deployment
task in state of "deploying" is added on the deployment task list. After the deployment, you can
view the deployment result.
Configuration procedure
1.Define VPN.
This function allows you to configure a VPN's basic information, including VPN name, PW
ID, PW transport mode, audit interval, VPN description, and contact information.
Precautions
•Valid characters in a VPN name are letters, digits, and underscores.
•PW ID is generated randomly. You can modify it in the range 1 to 4294967295.
•PW transport mode can be VLAN or Ethernet. VLAN is the default.
•Audit interval ranges from 0 to 24 and defaults to 24. A value of 0 means no audit.
•Contact is the current login user by default.
2.Local PE configuration.
This function allows you to configure the local PE and interface information for a VLL VPN,
including PE name, UNI interface, service instance, bandwidth, encapsulation type,
encapsulation VLAN, access type, and CE device.
a.For PE configuration, click Select following the interface description, and then on the
b.For CE configuration, click Select following the device label, and then select a CE device.
pop-up page, select a PE and an interface. If you select a Layer 2 interface, you must
select the encapsulation type and enter the service instance ID and bandwidth.
If you do not select a CE device, the system automatically adds a VCE.
Precautions
•You can only type a number in the range 1 to 4094 in the service instance text box.
•You can only type a number in the range 1 to 1000 in the bandwidth text box.
•Encapsulation VLAN IDs are in the range 1 to 4094. You can specify one or more VLAN
IDs or VLAN ID ranges. To specify a VLAN range, use a hyphen (-) between the start and
end VLAN IDs of the range. To specify multiple VLAN ranges, use a dot (,) to separate
two VLAN ranges. The specified VLAN ID(s) and VLAN ID range(s) must be in the
ascending order. For example: 2, 4-6, 8-10
•The access type can be VLAN or Ethernet. VLAN is the default.
•If the encapsulation type is S-VID or S-VID Only Tagged, you must enter the encapsulation
VLAN IDs.
3.Remote PE configuration.
This function allows you to configure the peer PE and interface information for a VLL VPN,
including PE name, UNI interface, service instance, bandwidth, encapsulation VLAN,
24L2VPN Manager
encapsulation type, and CE device. Refer to the "local PE configuration" part for the operation
procedure and precautions.
4.Configuration summary.
This function displays the configuration commands to be deployed to PE devices.
a.On the remote PE configuration page, click Next to enter the summary page.
Precautions
•The configuration commands are generated by the system automatically. You cannot
•If you do not select Deploy Immediately, the system only creates the VPN and adds an
PBB deployment
This function helps you configure and deploy a VPN of PBB type. After you configure a PBB VPN,
if you do not deploy the VPN configuration immediately, a deployment task in state of "undeployed"
is added on the deployment task list. If you deploy the VPN configuration immediately, a deployment
task in state of "deploying" is added on the deployment task list. After the deployment, you can
view the deployment result.
1.Define VPN.
This function allows you to configure a VPN's basic information, including VPN name, I-SID,
B-VLAN, PW transport mode, audit interval, VPN description, and contact information.
modify them.
"Undeployed" deployment task to the deployment task list. You can deploy the
configuration later. If you select Deploy Immediately, the system deploys the configuration
to the devices immediately. A CE device and a link between the CE device and PE device
are added on the L2VPN Manager and the deployed configuration is recorded on the
related devices.
Precautions
•Valid characters in a VPN name are letters, digits, and underscores.
•I-SID is generated randomly. You can modify it in the range 1 to 16777215.
•B-VLAN is 1 by default. You can modify it in the range 1 to 4094.
•PW transport mode can be VLAN or Ethernet. VLAN is the default.
•Audit interval ranges from 0 to 24 and defaults to 24. A value of 0 means no audit.
•Contact is the current login user by default.
2.PE configuration.
This function allows you to configure the PE information and AC information for a PBB VPN.
The PE information includes PE device name and NNI interface. The AC information includes
UNI interface, service instance, bandwidth, encapsulation type, encapsulation VLAN, access
type, and CE device.
Steps to configure the AC information
a.Click the Add button in the AC list area, and then on the pop-up page, select a PE
interface.
b.Type the service instance ID, encapsulation VLAN ID and bandwidth, and select the
encapsulation type and access type.
c.Click the Select button behind the CE Device text box, and then on the pop-up page,
select a CE device.
d.Click OK.
Using L2VPN Manager25
Steps to configure the PE information
a.Click the Add button in the PE device list area, and then on the pop-up page, select one
or multiple PE devices.
b.Click the Modify icon in the Configuration column, and then on the pop-up page, select
one or multiple PE interfaces.
Precautions
•For service instance, you can only type a number in the range 1 to 4094.
•For bandwidth, you can only type a number in the range 1 to 1000.
•Encapsulation VLAN IDs are in the range 1 to 4094. You can specify one or more VLAN
IDs or VLAN ID ranges. To specify a VLAN range, use a hyphen (-) between the start and
end VLAN IDs of the range. To specify multiple VLAN ranges, use a dot (,) to separate
two VLAN ranges. The specified VLAN ID(s) and VLAN ID range(s) must be in the
ascending order. For example: 2, 4-6, 8-10
•The access type can be VLAN or Ethernet. VLAN is the default.
•If you do not select a CE device, the system automatically adds a VCE.
•If the encapsulation type is S-VID or S-VID Only Tagged, you must enter the encapsulation
VLAN IDs.
•If the PE device you select when you configure AC information is not in the PE device list,
the system automatically adds the PE to the PE device list.
3.Configuration summary.
This function displays the configuration information to be deployed to PE devices.
a.Select Deploy Immediately, and click OK.
Undeployment
This function is used to undeploy the configuration information from devices. Undeployment supports
three operations: undeploy VPNs, undeploy PEs, and undeploy AC links.
Undeploy an entire VPN
1.Select VPN.
Precautions
•The configuration commands are generated by the system automatically. You cannot
modify them.
•If you do not select Deploy Immediately, the system only creates the VPN and adds an
"Undeployed" deployment task to the deployment task list. You can deploy the
configuration later. If you select Deploy Immediately, the system deploys the configuration
to the devices immediately. A CE device and a link between the CE device and PE device
are added on the L2VPN Manager and the deployed configuration is recorded on the
related devices.
a.Click the Service tab on the top navigation bar, and then select VPN Deployment >
Undeploymentin the navigation tree to enter the undeployment page.
b.Click Select to select the VPN that you want to undeploy.
26L2VPN Manager
c.Select Undeploy VPN from the Undeploy Operation drop-down list.
d.Click Next.
2.Configuration summary.
This step displays the commands to be deployed to devices.
a.Click OK to deploy the commands to devices. If you also selected Also Delete VPN, the
VPN will be removed from the VPN list; If you do not select this option, the VPN will be
kept on the VPN list and only the devices and links in the VPN will be deleted.
Undeploy PEs
1.Select VPN.
a.Click the Service tab on the top navigation bar, and then select VPN Deployment >
Undeployment in the navigation tree to enter the undeployment page.
b.Click Select to select the VPN that you want to undeploy.
c.Select Undeploy PE from the Undeploy Operation drop-down list.
d.Click Next.
2.Select PE device.
This step allows you to select the PEs to be undeployed from the VPN. By default, all PEs are
listed.
a.Click Delete to remove the selected PEs from the list.
b.Click Add to add PEs in the VPN to the list.
c.After you select the PEs to be undeployed, click Next.
3.Configuration summary.
This step displays the commands to be deployed to devices.
a.Click OK to deploy the commands to devices.
Undeploy AC links
1.Select VPN.
a.Click the Service tab on the top navigation bar, and then select VPN Deployment >
Undeployment in the navigation tree to enter the undeployment page.
b.Click Select to select the VPN that you want to undeploy.
c.Select Undeploy AC from the Undeploy Operation drop-down list.
d.Click Next.
2.Select AC.
This step allows you to select the AC links to be undeployed from the VPN. By default, all AC
links in the VPN are listed.
a.Click Delete to remove the selected AC links from the list.
b.Click Add to add AC links to the VPN to the list.
c.After you select the AC links to be undeployed, click Next.
3.Configuration summary.
This step displays the commands to be deployed to devices.
a.Click OK to deploy the commands to devices.
Precautions
•If a VPN has a deployment task in the state of "undeployed", you cannot undeploy the VPN.
•After you confirm your undeployment operation, the undeployment commands are applied to
devices immediately, and a task in the state of "deploying" is added to the deployment task
Using L2VPN Manager27
list. After the task is deployed, you can refresh the deployment task list to view the deployment
status.
Deployment task management
This function allows authorized operators to view all VPN deployment tasks, delete and modify
deployment tasks, view task details and task deployment failure reasons.
Query deployment task
This function allows you to query deployment tasks by VPN name, deployment status, VPN type,
and deployment operation type.
Configuration procedure
1.Click the Service tab on the top navigation bar, and then select VPN Deployment > Deployment
Tasks in the navigation tree to enter the deployment task list page.
2.Type the query parameters.
3.Click Query to display the matched deployment tasks. To display all deployment tasks, click
Reset.
Precautions
Fuzzy match is supported for query by VPN name.
Deploy deployment task
This function is used to deploy the configurations in the deployment tasks whose deployment status
is Undeployed and Failure.
Configuration procedure
1.Click the Service tab on the top navigation bar, and then select VPN Deployment > Deployment
Tasks in the navigation tree to enter the deployment task list page.
2.Select one or more deployment tasks to be deployed.
3.Click Deploy to Devices to deploy the configuration information to the devices.
Precautions
This function can be used to deploy only the deployment tasks whose deployment status is
Undeployed and Failure.
Delete deployment task
This function allows you to delete one or more deployment tasks at a time.
Configuration procedure
1.Click the Service tab on the top navigation bar, and then select VPN Deployment > Deployment
Tasks in the navigation tree to enter the deployment task list page.
2.Select one or more deployment tasks.
3.Click Delete and confirm your operation.
Precautions
Deleting a deployment task only removes the deployment task from the list, the corresponding
configuration deployed to the devices will not be deleted.
Modify deployment task
This function is used to modify the device and interface configurations of a deployment task.
28L2VPN Manager
Configuration procedure
1.Click the Service tab on the top navigation bar, and then select VPN Deployment > Deployment
Tasks in the navigation tree to enter the deployment task list page.
2.Click the Modify icon of the deployment task that you want to modify.
3.You will enter the deployment flow of the task and do the modifications. The deployment flow
may be VPLS DeploymentVLL DeploymentPBB Deployment or Undeployment, depending
on the deployment operation type of the task.
Precautions
•Deployment tasks with the deploy operation type of Add VPN or Modify VPN can be modified.
Deployment tasks with the deploy operation type of Undeploy VPN cannot be modified.
•Deployment tasks in the state of Undeployed and Failure can be modified. Deployment tasks
in the state of Success and Deploying cannot be modified, and the system does not provide
the modify link for such deployment tasks.
•The configuration for a VPN cannot be modified. To change the VPN name or description,
go to the VPN list. For more information, see Modify VPN.
•If a deployment task contains configuration for multiple devices, the initial configuration is
displayed on the deployment taks modification page. The configuration commands that have
been deployed to devices are grayed out. The configuration commands not deployed to
devices or failing to be deployed to devices can be modified.
Automatic Discovery
This function can discover VPNs that exist on devices but yet are not added to the L2VPN Manager,
and then add the VPNs to the L2VPN Manager.
Discover VPN
This function is used to find VPNs and links existing on the network according to the VSI information
of PE devices. If you repeat to perform the automatic discovery operation, this function also can
sense the changes of the VPN structure and synchronize the changes to the topology.
Operation Procedure
1.Select the Service tab, and then click Automatic Discovery in the navigation tree to enter the
VPN automatic discovery page.
2.Click Select PE and on the pop-up page, select one or more PE devices, and then click Start.
3.The system starts automatic discovery. After the system finishes the automatic discovery process,
click Next. All discovered VPNs (LDP or BGP VPNs) will be listed.
4.Select VPNs that need interface configuration, and then click Next to enter the Configure
Interface Binding Information page.
Configuration Guidelines
•For the PE devices selected, you can click Delete to delete them together.
•When you click Select PE again, the selected devices will not be listed in the pop-up device
selection page.
Using L2VPN Manager29
Parameters
•Synchronize PE devices before auto discovery: If you select this parameter, the system will
synchronize PE devices before performing automatic discovery, so that the automatic discovery
process can use the updated configuration.
•Status: Displays the status information of the discovered VPNs. The status can be one of the
following:
◦Existed: Indicates that system finds new links that belong to the VPN.
◦New VPN: Indicates that the VPN is newly discovered this time.
•VPN Name: Uses the VSI name on the device by default. If the VPN name conflicts with an
existing VPN, it uses this format: VPN name-auto incremental number. For example, VPN
name-1, VPN name-2, and so on.
•VPN-Target List: Displays the VPN-Target Extcommunity information about the BGP VPNs
automatically discovered.
•VPN Description: For existed VPNs, this parameter displays the VPN description specified in
the L2VPN Manager; for newly discovered VPNs, this parameter is null.
Configure interface binding information
This function allows you to select all AC links to be added to the L2VPN Manager, configure the
link information, and then add the links to the L2VPN Manager.
Operation procedure
•Method 1:
1.Select one or more VPNs that need to be configured with the interface binding information,
and then click Next.
2.Click the Modify icon of a link to be configured to enter the link configuration page.
3.Add or modify the CE information and then click OK.
•Method 2:
1.Select one or more VPNs that need to be configured with the interface binding information,
and then click Next.
2.Select all VPN links.
3.Select Create non-managed CE automatically.
4.Click Finish.
Configuration guidelines
•On the link configuration page mentioned in method 1, if there are no devices you want to
select in the pop-up device list, you can add them by clicking the Add Non-Managed CE link
at the right upper corner of the page.
Parameters
•Create non-managed CE automatically in method 2: After the automatic discovery, you need
to add links. You can select to create a non-managed CE automatically to ensure the finish of
the link configuration in case the CE device of a link cannot be found.
30L2VPN Manager
Loading...
+ 110 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.