Ethernet Flow Point: VLAN tag manipulation for the VPLS service
We continue one of my previous VPLS topology: this time we're going to take a look at what happens from the perspective of the service…
Read more →This is my blog, I've been preparing for my CCNP exam, so I mostly write posts about networking stuff recently: Routing/switching, BGP, OSPF, Multicast, MPLS VPNs, Security, QoS etc. Currently I have the CCNP ENARSI, the CCNA and the Linux+ certifications, I also have a degree in telecommunication.
I sometimes create educational videos, check out my YouTube Channel: Networking Explained
We continue one of my previous VPLS topology: this time we're going to take a look at what happens from the perspective of the service…
Read more →In the previous post I created the VPN tunnel between the two sites with a crypto map. This implementation is very static, the ACLs define…
Read more →We continue the previous IPsec lab with basic troubleshooting. If you haven't read part 1, read that post first before you continue. So what are…
Read more →In this lab we're going to establish secure communication between two private subnets located at two different sites over an unsecure network (the internet for…
Read more →After going through how we can configure Profile 0, this time we're going to take a look at two other profiles which both require mLDP.
Read more →Previously I wrote a few posts about how multicast works but only within an enterprise environment without MPLS. This time we're going to take a…
Read more →This time we're going to configure OSPF, but not with the CLI, we're going to use a network automation tool called Ansible. I'm going to…
Read more →After going through inter-AS Option A, B and C, this time we take a look at the CSC implementation. This is very similar to the…
Read more →How can a router detect when a BGP neighbor, or just any kind of IGP neighbor device goes down? If the two devices are directly,…
Read more →We're going to continue the previous inter-AS L3VPN Option C lab, and in this post we're going to be focusing on customer GREEN who runs…
Read more →We finish the inter-AS L3VPN series with Option C: As I foreshadowed in the end of the of the Option B post, Option C is…
Read more →In the previous post we've seen how we can set up an inter-AS L3VPN with Option A. We continue this lab, but this time we'll…
Read more →What if a single customer wants to have an MPLS L3VPN service, but he has to connect with his CE routers to two different service…
Read more →I've been learning BGP on IOS-XR recently. Configuring inbound or outbound BGP policies on IOS-XR is quite different than on IOS-XE or regular IOS. On…
Read more →The issue of the previous Route Reflector (RR) design is that it is not protected from a single point of failure: if a RR goes…
Read more →If we have many iBGP routers within an AS, to solve the scalability issue of the full-mesh requirement we can deploy one (or more) iBGP…
Read more →We extend our previous topology with a few new routers to demostrate how the PIM Assert mechanism work. This time we configure PIM with dense-mode…
Read more →In the previous multicast post we configured the RP statically. If we have a lot of routers this solution is not going to be scalable…
Read more →We continue the previous multicast lab. This time we take a look at how RPF check works, how we can prevent RPF failures, and how…
Read more →These features allow us copy the traffic of a switchport or an entire VLAN and send the copied frames to another switchport. This destination port…
Read more →