cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
8241
Views
0
Helpful
4
Replies

xconnect pw between IOS XR & IOS XE

Julie Tupling
Level 1
Level 1

We have a small Service provider network with a combination of ASR 9006 and ASR 920 routers.  We have MPLS configured on the backbone network.  We have a customer that has an external Ethernet circuit from London that is connected to a port on the ASR 9006 - they want to use this circuit to transport 2 VLANS into our network.  One VLAN (VLAN 100) will go to an ASR 920 at location A and the other VLAN (VLAN 200) will go to an ASR 920 router at location B. At each location (A & B). I've uploaded a simplified drawing showing the pertinent routers and layout.

If we were going between 2 ASR 920s, I think it would be pretty easy, you can add multiple service instances to an interface. but since the interface that the external customer circuit connects to is on an ASR 9006 (IOS XR) I'm not sure how to configure the xconnect between the ASR 9006 and the ASR 920 routers. How do I get the ASR 9006 to support 2 VLANS and distribute them to the ASR 920s? 

Thanks in advance for any help - it is hard to find examples of configurations where there is a combination of IOS XR and IOS XE routers....

4 Replies 4

Olev Vallaste
Level 1
Level 1

I think you need to configure Bridge Group and Bridge-domains in that BG. And then stitching in this BDs xconnectx and dot1q subinterfaces. Or you can use local xconnect between PW and dot1q-subinterface.

For example:

ASR 9006
=========

method 1. local xconnect in the PW-group
------------------------
interface Gi 0/1/0/1.100 l2transport
 description CUST1-VLAN-100
 encapsulation dot1q 100
 rewrite ingress tag pop 1 symmetric

interface Gi 0/1/0/1.200 l2transport
 description CUST1-VLAN-200
 encapsulation dot1q 200
 rewrite ingress tag pop 1 symmetric
!
l2vpn
!
xconnect group CUST1
  p2p CUST1-VLAN-100
   interface Gi 0/1/0/1.100
   neighbor ipv4 <loopback ip-address ASR920 Location A> pw-id 100 (or those pw-id that used)
   !
  p2p CUST1-VLAN-200
   interface Gi 0/1/0/1.200
   neighbor ipv4 <loopback ip-address ASR920 Location B> pw-id 200 (or those pw-id that used)
Method 2. Bridge-group and Bridge-domains
interface Gi 0/1/0/1.100 l2transport
 description CUST1-VLAN-100
 encapsulation dot1q 100
 rewrite ingress tag pop 1 symmetric

interface Gi 0/1/0/1.200 l2transport
 description CUST1-VLAN-200
 encapsulation dot1q 200
 rewrite ingress tag pop 1 symmetric

l2vpn
!
 bridge group CUST1
  !
  bridge-domain CUST1-VLAN-100
    mtu 1600
    interface Gi 0/1/0/1.100
    !
    neighbor <loopback ip-address ASR920 Location A> pw-id 100 (or those pw-id that used)

  bridge-domain CUST1-VLAN-200
    mtu 1600
    interface Gi 0/1/0/1.200
    !
    neighbor <loopback ip-address ASR920 Location B> pw-id 200 (or those pw-id that used)

Config with BG and BDs is more preferred, if you for example use BGP autodiscovery for loopback addresses for targeted-ldp sessions buliding between PEs.