8
FD 100/320Gbps NT and FX NT IHub Services Guide
3HH-11985-AAAA-TQZZA Issue: 13
5.4.6 VPLS IGMP Snooping (s,g) Flooding List ...............................................175
5.4.7 VPLS and Spanning Tree Protocol..........................................................175
5.4.7.1 Spanning Tree Operating Modes ............................................................176
5.4.7.2 Multiple Spanning Tree............................................................................177
5.4.7.3 Redundancy Access to VPLS..................................................................177
5.4.7.4 MSTP General Principles ........................................................................178
5.4.7.5 MSTP implementation .............................................................................178
5.4.7.6 Pseudowire Control Word........................................................................178
5.4.7.7 xSTP High Availability .............................................................................179
5.4.8 QoS Policies associated with v-VPLS/VPLS ...........................................179
5.4.8.1 Ingress SAP Classification ......................................................................179
5.4.8.2 Egress Network EXP Marking (only VPLS) .............................................179
5.4.8.3 Ingress Network Classification (only VPLS) ............................................180
5.4.9 VPLS management VRF .........................................................................180
5.4.10 PM Counters per SAP .............................................................................181
5.4.11 Per-service Configurable TPID................................................................181
5.4.12 External Packet Forwarding (EPF) ..........................................................183
5.4.12.1 Configuration Model ................................................................................184
5.5 Configuring a VPLS Service with CLI ......................................................185
5.6 Configuration Overview ...........................................................................186
5.7 Configuration Workflow ...........................................................................188
5.8 Configuring VPLS Components...............................................................189
5.8.1 Creating a VPLS Service.........................................................................189
5.8.2 Configuring v-VPLS/VPLS parameters....................................................192
5.8.2.1 FIB size....................................................................................................192
5.8.2.2 MFIB size.................................................................................................192
5.8.2.3 MAC learning and aging ..........................................................................193
5.8.2.4 IGMP snooping........................................................................................193
5.8.2.5 User-to-user communication ...................................................................194
5.8.2.6 Unrestricted MAC move ..........................................................................195
5.8.2.7 Service Dot1q Etype................................................................................195
5.8.2.8 External Packet Forwarding ....................................................................196
5.8.3 Configuring Spanning Tree Protocols on m-VPLS ..................................197
5.8.3.1 Configuring STP Bridge Parameters .......................................................198
5.8.4 Configuring VPLS SAPs..........................................................................202
5.8.4.1 Configuration Guidelines .........................................................................202
5.8.4.2 VPLS SAP configuration example ...........................................................203
5.8.5 Configuring VPLS SAP Parameters ........................................................205
5.8.5.1 Configuring egress and ingress filter policies on an SAP........................205
5.8.5.2 Configuring a static MAC on an SAP.......................................................205
5.8.5.3 Configuring SAP-Specific STP Parameters.............................................205
5.8.5.4 Configuring SAP-specific IGMP Parameters ...........................................208
5.8.5.5 Configuring “restricted-tagging” on an SAP.............................................210
5.8.5.6 Configuring Management Points (MEPs/MIPs) for Ethernet CFM on
SAPs........................................................................................................210
5.8.5.7 Enabling Statistics collection and PM collection on an SAP....................212
5.8.6 STP SAP Operational States...................................................................212
5.8.6.1 Operationally Disabled ............................................................................213
5.8.6.2 Operationally Discarding .........................................................................213