3.4 Configuring Basic BGP/MPLS IP VPN..........................................................................................................3-9
3.4.1 Establishing the Configuration Task....................................................................................................3-10
3.4.2 Configuring a VPN Instance................................................................................................................3-11
3.4.3 Binding an Interface to the VPN Instance............................................................................................3-11
3.4.4 Configuring Routing Exchange Between PEs.....................................................................................3-12
3.4.5 Configuring Routing Exchange Between PE and CE..........................................................................3-13
3.4.6 Checking the Configuration.................................................................................................................3-21
3.5 Configuring Hub&Spoke..............................................................................................................................3-21
3.5.1 Establishing the Configuration Task....................................................................................................3-22
3.5.2 Creating a VPN Instance......................................................................................................................3-22
3.5.3 Configuring the Route Attributes of a VPN Instance..........................................................................3-24
3.5.4 Associating an Interface with the VPN Instance..................................................................................3-25
3.5.5 Configuring Routing Exchange Between Hub-PE and Spoke-PE.......................................................3-26
3.5.6 Configuring Routing Exchange Between CE and PE..........................................................................3-27
3.5.7 Checking the Configuration.................................................................................................................3-27
3.6 Configuring Inter-AS VPN Option A...........................................................................................................3-28
3.6.1 Establishing the Configuration Task....................................................................................................3-28
3.6.2 Configuring Inter-AS VPN Option A..................................................................................................3-29
3.6.3 Checking the Configuration.................................................................................................................3-30
3.7 Configuring the HoVPN................................................................................................................................3-30
3.7.1 Establishing the Configuration Task....................................................................................................3-30
3.7.2 Specifying the U-PE.............................................................................................................................3-31
3.7.3 Advertising Default Routes of a VPN Instance...................................................................................3-32
3.7.4 Checking the Configuration.................................................................................................................3-32
3.8 Configuring the OSPF Sham Link................................................................................................................3-33
3.8.1 Establishing the Configuration Task....................................................................................................3-33
3.8.2 Configuring End Addresses of a Sham Link........................................................................................3-34
3.8.3 Advertising Routes of the End Addresses on a Sham Link.................................................................3-34
3.8.4 Creating a Sham Link...........................................................................................................................3-35
3.8.5 Checking the Configuration.................................................................................................................3-36
3.9 Configuring the Multi-VPN-Instance CE.....................................................................................................3-37
3.9.1 Establishing the Configuration Task....................................................................................................3-37
3.9.2 Configuring the OSPF Multi-Instance on the PE.................................................................................3-38
3.9.3 Configuring the OSPF Multi-Instance on the Multi-VPN-Instance CE..............................................3-39
3.9.4 Disabling Loop Detection on the Multi-VPN-Instance CE.................................................................3-39
3.9.5 Checking the Configuration.................................................................................................................3-40
3.10 Configuring VPN FRR................................................................................................................................3-40
3.10.1 Establishing the Configuration Task..................................................................................................3-40
3.10.2 Configuring a Routing Policy............................................................................................................3-41
3.10.3 Enabling VPN FRR............................................................................................................................3-41
3.10.4 Checking the Configuration...............................................................................................................3-42
3.11 Configuring Route Reflection to Optimize the VPN Backbone Layer.......................................................3-43
Quidway S9300 Terabit Routing Switch
Configuration Guide - VPN Contents
Issue 03 (2009-08-20) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
iii