[c-nsp] Processing one VLAN received on a Q-in-Q port

Robert Williams Robert at CustodianDC.com
Mon Mar 25 07:28:28 EDT 2013


Hi – thanks,

Interestingly it states:


•These features are not supported on EVCs:

–QinQ tagging

Which is a bit unclear and maybe out of context, but we do need to apply a second tag to the existing traffic from the other service provider, so even if EVC is supported and we were running an ES or using a 2T it still reads (maybe) as if it’s not possible?...

Either way, I could do with knowing if this is possible on a 2T at all?

Thanks again!

From: Pete Lumbis [mailto:alumbis at gmail.com]
Sent: 25 March 2013 10:13
To: Robert Williams
Cc: Adam Vitkovsky; cisco-nsp at puck.nether.net
Subject: Re: [c-nsp] Processing one VLAN received on a Q-in-Q port

On the 6k I think EVC configuration can only be accomplishes on ES+ (maybe ES-20?) or with Sup2t

http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/15.1SY/config_guide/sup2T/ethernet_virtual_connection.html
On Mon, Mar 25, 2013 at 10:05 AM, Robert Williams <Robert at custodiandc.com<mailto:Robert at custodiandc.com>> wrote:
Hi Adam,

Many thanks for that, it reads like it would do exactly what we need, however the switch doesn't accept Ethernet encapsulation:

(config-if)#service instance 10 ethernet
(config-if-srv)#ethernet ?
  lmi  Configure ether lmi parameters
(config-if-srv)#?
Ethernet EFP configuration commands:
  default   Set a command to its defaults
  ethernet  Configure ether lmi parameters
  exit      Exit from ETHER EFP configuration mode
  no        Negate a command or set its defaults

It's running Version 12.2(33)SXJ3 / AdvIP Services and the line card is  a 6708-10GE with a DFC3CXL

Any other pointers or maybe suggestions as to IOS versions / Line cards with or without this feature?

Cheers!




Robert Williams
Custodian Data Centre
Email: Robert at CustodianDC.com<mailto:Robert at CustodianDC.com>
http://www.CustodianDC.com

Robert Williams
Custodian Data Centre
Email: Robert at CustodianDC.com
http://www.CustodianDC.com
-----Original Message-----
From: Adam Vitkovsky [mailto:adam.vitkovsky at swan.sk<mailto:adam.vitkovsky at swan.sk>]
Sent: 25 March 2013 08:42
To: Robert Williams; cisco-nsp at puck.nether.net<mailto:cisco-nsp at puck.nether.net>
Subject: RE: [c-nsp] Processing one VLAN received on a Q-in-Q port

Hi Robert,

I believe you should be able to use the following config for the VLAN 10.

interface Gi1/1
 service instance 10
 ethernet  encapsulation dot1q 10
 rewrite ingress tag pop 1 symmetric
 bridge-domain 40

interface Vlan 40
 ip address 1.1.1.1 255.255.255.0

check out the following series:
 http://ccie-in-3-months.blogspot.com/2009/09/evc-flexible-service-mapping.html
 http://ccie-in-3-months.blogspot.com/2009/06/evc-flexible-frame-matching.html
 http://ccie-in-3-months.blogspot.com/2009/06/evc-flexible-vlan-tag-rewrite.html


adam
-----Original Message-----
From: cisco-nsp-bounces at puck.nether.net<mailto:cisco-nsp-bounces at puck.nether.net> [mailto:cisco-nsp-bounces at puck.nether.net<mailto:cisco-nsp-bounces at puck.nether.net>] On Behalf Of Robert Williams
Sent: Sunday, March 24, 2013 10:24 AM
To: cisco-nsp at puck.nether.net<mailto:cisco-nsp at puck.nether.net>
Subject: [c-nsp] Processing one VLAN received on a Q-in-Q port

Hi Guys,

Hopefully someone here can assist with this, I need to process locally a VLAN which is received into our network from another service provider via one of our Q-in-Q ports.

Currently we use a Q-in-Q port to double-tag all traffic we receive from the other provider, then transport it across our network and give it back to them where they then break it out on their own switch at one of our other facilities. We do this across a series of 6500/720XL chassis.

This works fine, however, we now need to bring up an additional BGP session with the other provider, but the session has to be over the same physical port as we use for the Q-in-Q transport. To put it into a logical sentence, we need the port facing the other provider at the edge of our network to:

“Double-tag VLANs 1-9 and 11-4094 with SPvLAN ID 500 - but switch VLAN 10 locally without double-tagging it”

We will then bring up the BGP session on VLAN 10, but allow all the others to pass across our network with the additional double-tag.

All packets we receive from the other SP are single-tagged, including the VLAN on which we need to inject our BGP session.

I’m not sure what other information may be relevant so please just ask me anything. If this is not possible on the 720 platform, then we will consider deploying either a 2T or ASR9k at this location to meet the requirement (both are currently being looked at as options for upgrading our 720 units anyway). However, it would be nice if the 2T can do it as the ASR may be overkill considering the other requirements of the site.

Thanks in advance!



Robert Williams
Custodian Data Centre
Email: Robert at CustodianDC.com<mailto:Robert at CustodianDC.com>
http://www.CustodianDC.com
_______________________________________________
cisco-nsp mailing list  cisco-nsp at puck.nether.net<mailto:cisco-nsp at puck.nether.net> https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


_______________________________________________
cisco-nsp mailing list  cisco-nsp at puck.nether.net<mailto:cisco-nsp at puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-nsp/attachments/20130325/9aea312a/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image004.png
Type: image/png
Size: 168 bytes
Desc: image004.png
URL: <https://puck.nether.net/pipermail/cisco-nsp/attachments/20130325/9aea312a/attachment-0002.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image005.png
Type: image/png
Size: 167 bytes
Desc: image005.png
URL: <https://puck.nether.net/pipermail/cisco-nsp/attachments/20130325/9aea312a/attachment-0003.png>


More information about the cisco-nsp mailing list