Enters the l2vpn configuration mode.
Step 3 bridge group bridge-group-name
Example:
RP/0/RSP0/CPU0:router(config-l2vpn)# bridge group csco
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain.
Step 4 bridge-domain bridge-domain-name
Example:
RP/0/RSP0/CPU0:router(config-l2vpn-bg)# bridge-domain abc
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode.
Step 5 mtu bytes
Example:
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# mtu 1000
Adjusts the maximum packet size or maximum transmission unit (MTU) size for the bridge domain.
• Use the bytes argument to specify the MTU size, in bytes. The range is from 64 to 65535.
Step 6 dynamic-arp-inspection { address-validation | disable | logging }
Example:
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# dynamic-arp-inspection
Enters the dynamic ARP inspection configuration submode. Ensures only valid ARP requests and responses are relayed.
You can configure dynamic ARP inspection under the bridge domain or the bridge port.
Note
Step 7 ip-source-guard logging
Example:
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# ip-source-guard logging
Enters the IP source guard configuration submode and enables source IP address filtering on a Layer 2 port.
You can enable IP source guard under the bridge domain or the bridge port. By default, bridge ports under a bridge inherit
the IP source guard configuration from the parent bridge.
By default, IP source guard is disabled on the bridges.
Step 8 Use the commit or end command.
commit - Saves the configuration changes and remains within the configuration session.
L2VPN and Ethernet Services Configuration Guide for Cisco ASR 9000 Series Routers, IOS XR Release 6.3.x
235
Implementing Multipoint Layer 2 Services
Configuring Bridge Domain Parameters