Figures
Figure 1-1 Networking diagram of the VPN tunnel binding................................................................................1-4
Figure 1-2 Networking diagram for configuring the tunnel policy for the L3VPN...........................................1-26
Figure 1-3 Networking diagram for configuring the L2VPN tunnel binding....................................................1-39
Figure 2-1 Multiprotocol local network communication over single-protocol backbone network......................2-2
Figure 2-2 Enlarging the operating range on the network....................................................................................2-3
Figure 2-3 Connecting discontinuous subnets through a tunnel.......................................................................... 2-3
Figure 2-4 GRE tunnel supporting Keepalive....................................................................................................2-11
Figure 2-5 Networking diagram for configuring static routes............................................................................2-15
Figure 2-6 Networking diagram for configuring dynamic routing protocol......................................................2-20
Figure 2-7 Networking diagram in which CEs access a VPN through the GRE tunnel of the public network
.............................................................................................................................................................................2-24
Figure 2-8 Networking diagram of configuring the Keepalive function on two ends of a GRE tunnel............2-32
Figure 3-1 BGP/MPLS IP VPN model................................................................................................................ 3-3
Figure 3-2 Networking of sham link....................................................................................................................3-4
Figure 3-3 Networking diagram for configuring BGP/MPLS IP VPN..............................................................3-57
Figure 3-4 Networking diagram of BGP/MPLS IP VPN...................................................................................3-69
Figure 3-5 Networking diagram for configuring BGP ASN substitution..........................................................3-80
Figure 3-6 Networking diagram for configuring Hub&Spoke...........................................................................3-87
Figure 3-7 Networking diagram for configuring inter-AS VPN Option A........................................................3-97
Figure 3-8 Networking diagram for configuring the HoVPN..........................................................................3-107
Figure 3-9 Networking diagram for configuring the OSPF sham link.............................................................3-115
Figure 3-10 Networking diagram for configuring multi-VPN-instance CE....................................................3-127
Figure 3-11 Networking diagram for configuring VPN FRR..........................................................................3-138
Figure 3-12 Networking diagram for configuring double reflectors to optimize VPN backbone layer..........3-147
Figure 4-1 VLL model......................................................................................................................................... 4-4
Figure 4-2 VLL label processing..........................................................................................................................4-4
Figure 4-3 Asymmetrically connected CEs..........................................................................................................4-7
Figure 4-4 Networking diagram for configuring local CCC connection...........................................................4-37
Figure 4-5 Networking diagram for configuring remote CCC connection........................................................4-41
Figure 4-6 Networking diagram for configuring SVC VLL..............................................................................4-47
Figure 4-7 Networking diagram for configuring the Martini VLL....................................................................4-53
Figure 4-8 Networking diagram for configuring a local Kompella VLL...........................................................4-59
Figure 4-9 Networking diagram for configuring a remote Kompella VLL.......................................................4-62
Figure 4-10 Networking diagram for configuring the inter-AS Martini VLL Option A...................................4-69
Quidway S9300 Terabit Routing Switch
Configuration Guide - VPN Figures
Issue 03 (2009-08-20) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
ix