cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2156
Views
0
Helpful
6
Replies

Q-in-Q UNI-ENNI Service Provider Restrictions

salmanitci
Level 1
Level 1

Hi,

We have 800 Customer Sites to design for Q-in-Q. I need to know which line of product would be able to do this we will be putting multiple 10G Fiber links each 10G will be able to run 13 to 15 Customer Sites.

I did the test using ASR 9001. The issue is the Wholesale provider is saying that for each site there will be a Separate Outer VLAN so that means for 800 sites the INNER VLANS remain same (5 to 6 VLANS) but for OUTER Vlan's there will be 800 vlans.

 

ASR 9001 is only allowing one Outer VLAN is there be any product which I use to accomplish this task or what will be the topology looks like I spend so much time reading and understating Q-in-Q for SP but still unable to figure it out.

We are also Service Provider so the Circuit is:

Customer(UNI-Trunk with 6 vlans) ----> SP (ENNI) -----> SP-My Site) it's an EVPL/OVC circuit

 

Your expert advice is required.

 

Thanks in advance.

Salman

 

 

 

2 Accepted Solutions

Accepted Solutions

ASR9010/9022 should be able to those VLAN rewrite operations. The following link explains this very clearly:

https://supportforums.cisco.com/document/59741/asr9000xr-flexible-vlan-matching-evc-vlan-tag-rewriting-irbbvi-and-defining-l2

View solution in original post

Shouldn't you be bridging sub-interface? Try the following:

l2vpn
 bridge group F780
  bridge-domain F780
   interface TenGigE0/0/2/1.780
   !
   routed interface BVI780

Also provide output of "sh l2vpn bridge-domain bd-name F780 detail", before and after the sub-interface.

View solution in original post

6 Replies 6

sreenivasgajula
Level 1
Level 1

Assuming you want to reach all the 800 customer sites through the E-NNI, the 800 VLAN's are just used to distinguish your customer sites at E-NNI. What kind of transport will you be providing on your network (MPLS, Q-in-Q)?

You will need more than 50 10G ports to serve all 800 locations, I would suggest to look at ASR9010 with high density 10G line cards (36 ports).

Thanks, the transport will be Q-in-Q the 800 sites will be plan accordingly in next 15 to 18 months period of time and yes you are rite we are and will be using multiple 10 G links. The main concern is which line of product and IOS/NX-OS/ or XR will support multiple outer VLAN's strip off at our Data Center site. the scenario is like this;

Customer Site = 1 GB dedicated link = UNI = 802.1Q with 5 to 7 vlan's for multiple services

Data Center Site: 10 GB link = ENNI = 802.1ad

Transport: Q-in-Q

The Service Provider said for each site there will be a seperate outer VLAN which we have to strip off the tag at our site so that means if 800+ sites there will be 800+ outer vlans coming in and the Multiservice Switch/Router should be support the different Outer VLAN's.

 

Which Line of product will support this type of configuration I tried with ASR 9001 and worked with Cisco Techs but unfortunately it can only support one Outer VLAN to strip and not multiple.

Your expert advice will be much appreciated.

 

Thanks,

Sal

 

 

 

 

ASR9010/9022 should be able to those VLAN rewrite operations. The following link explains this very clearly:

https://supportforums.cisco.com/document/59741/asr9000xr-flexible-vlan-matching-evc-vlan-tag-rewriting-irbbvi-and-defining-l2

I went over the link and did my config as per the document from xander but I am unable to bring up the BVI interface or interfces. Here's the configuration I don't know what I am missing. I am trying with BVI780 first if this works rest of the BVI's should work.

 

interface TenGigE0/0/2/1.300 l2transport
 encapsulation dot1q 300 second-dot1q any
 rewrite ingress tag pop 1 symmetric

!

interface BVI780
 ipv4 address 192.168.1.100 255.255.255.0
!
interface BVI781
 ipv4 address 192.168.2.100 255.255.255.0
!
interface BVI782
 ipv4 address 192.168.3.100 255.255.255.0
!
interface BVI783
 ipv4 address 192.168.4.100 255.255.255.0
!
interface BVI784
 ipv4 address 192.168.5.100 255.255.255.0

!

l2vpn
 bridge group F780
  bridge-domain F780
   interface TenGigE0/0/2/1
   !
   routed interface BVI780
  !
 !
 bridge group F781
  bridge-domain F781
   routed interface BVI781
  !
 !
 bridge group F782
  bridge-domain F782
   routed interface BVI782
  !
 !
 bridge group F783
  bridge-domain F783
   routed interface BVI783
  !
 !
 bridge group F784
  bridge-domain F784
   routed interface BVI784

!

 

RP/0/RSP0/CPU0:EDGE2.151#show interfaces TenGigE0/0/2/1
Fri May  8 05:05:35.933 UTC
TenGigE0/0/2/1 is up, line protocol is up
  Interface state transitions: 1

!

RP/0/RSP0/CPU0:EDGE2.151#show inter bvi 780
Fri May  8 05:06:03.023 UTC
BVI780 is down, line protocol is down
  Interface state transitions: 0
  Hardware is Bridge-Group Virtual Interface, address is e4c7.2256.55b5
  Internet address is 192.168.1.100/24
  MTU 1514 bytes, BW 10000000 Kbit (Max: 10000000 Kbit)
     reliability 255/255, txload 0/255, rxload 0/255
  Encapsulation ARPA,  loopback not set,
  ARP type ARPA, ARP timeout 04:00:00
  Last input never, output never
  Last clearing of "show interface" counters never
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     0 packets input, 0 bytes, 0 total input drops
     0 drops for unrecognized upper-level protocol
     Received 0 broadcast packets, 0 multicast packets
     0 packets output, 0 bytes, 0 total output drops
     Output 0 broadcast packets, 0 multicast packets

Shouldn't you be bridging sub-interface? Try the following:

l2vpn
 bridge group F780
  bridge-domain F780
   interface TenGigE0/0/2/1.780
   !
   routed interface BVI780

Also provide output of "sh l2vpn bridge-domain bd-name F780 detail", before and after the sub-interface.

Thanks it worked.

l2vpn
 bridge group F780
  bridge-domain F780
   interface TenGigE0/0/2/1.780
   !
   routed interface BVI780

 

RP/0/RSP0/CPU0:EDGE2.151#show l2vpn bridge-domain bd-name F780 detail
Fri May  8 21:36:50.334 UTC
Legend: pp = Partially Programmed.
Bridge group: F780, bridge-domain: F780, id: 0, state: up, ShgId: 0, MSTi: 0
  Coupled state: disabled
  MAC learning: enabled
  MAC withdraw: enabled
    MAC withdraw for Access PW: enabled
    MAC withdraw sent on: bridge port up
    MAC withdraw relaying (access to access): disabled
  Flooding:
    Broadcast & Multicast: enabled
    Unknown unicast: enabled
  MAC aging time: 300 s, Type: inactivity
  MAC limit: 4000, Action: none, Notification: syslog
  MAC limit reached: no
  MAC port down flush: enabled
  MAC Secure: disabled, Logging: disabled
  Split Horizon Group: none
  Dynamic ARP Inspection: disabled, Logging: disabled
  IP Source Guard: disabled, Logging: disabled
  DHCPv4 snooping: disabled
  IGMP Snooping: enabled
  IGMP Snooping profile: none
  MLD Snooping profile: none
  Storm Control: disabled
  Bridge MTU: 1500
  MIB cvplsConfigIndex: 1
  Filter MAC addresses:
  P2MP PW: disabled
  Create time: 08/05/2015 03:36:17 (18:00:32 ago)
  No status change since creation
  ACs: 2 (2 up), VFIs: 0, PWs: 0 (0 up), PBBs: 0 (0 up)
  List of ACs:
    AC: BVI780, state is up
      Type Routed-Interface
      MTU 1514; XC ID 0x80000001; interworking none
      BVI MAC address:
        e4c7.2256.55b5
    AC: TenGigE0/0/2/1.780, state is up
      Type VLAN; Num Ranges: 1
      VLAN ranges: [780, 780]
      MTU 1582; XC ID 0x108000a; interworking none
      MAC learning: enabled
      Flooding:
        Broadcast & Multicast: enabled
        Unknown unicast: enabled
      MAC aging time: 300 s, Type: inactivity
      MAC limit: 4000, Action: none, Notification: syslog
      MAC limit reached: no
      MAC port down flush: enabled
      MAC Secure: disabled, Logging: disabled
      Split Horizon Group: none
      Dynamic ARP Inspection: disabled, Logging: disabled
      IP Source Guard: disabled, Logging: disabled
      DHCPv4 snooping: disabled
      IGMP Snooping: enabled
      IGMP Snooping profile: none
      MLD Snooping profile: none
      Storm Control: disabled
      Static MAC addresses:
      Statistics:
        packets: received 0, sent 1
        bytes: received 0, sent 46
      Storm control drop counters:
        packets: broadcast 0, multicast 0, unknown unicast 0
        bytes: broadcast 0, multicast 0, unknown unicast 0
      Dynamic ARP inspection drop counters:
        packets: 0, bytes: 0
      IP source guard drop counters:
        packets: 0, bytes: 0
  List of Access PWs:
  List of VFIs:
RP/0/RSP0/CPU0:EDGE2.151#