Ethernet Flow Point: VLAN tag manipulation for the VPLS service
We continue one of my previous VPLS topology: this time we're going to take a look at what happens from the perspective of the service…
Read more →We continue one of my previous VPLS topology: this time we're going to take a look at what happens from the perspective of the service…
Read more →In the previous post I created the VPN tunnel between the two sites with a crypto map. This implementation is very static, the ACLs define…
Read more →We continue the previous IPsec lab with basic troubleshooting. If you haven't read part 1, read that post first before you continue. So what are…
Read more →In this lab we're going to establish secure communication between two private subnets located at two different sites over an unsecure network (the internet for…
Read more →After going through how we can configure Profile 0, this time we're going to take a look at two other profiles which both require mLDP.
Read more →Previously I wrote a few posts about how multicast works but only within an enterprise environment without MPLS. This time we're going to take a…
Read more →