Got a Question?     Call 1800-8892-877

Junos Layer 2 VPNs (JL2V)

This three-day course is designed to provide students with the knowledge to configure and troubleshoot MPLS-based Layer 2 virtual private networks (VPN). The course includes an overview of MPLS Layer 2 VPN concepts, such as BGP Layer 2 VPNs, LDP Layer 2 circuits, forwarding equivalence class (FEC) 129, virtual private LAN service (VPLS), Ethernet VPN (EVPN), and Inter-AS MPLS VPNs. This course also covers Junos OS specific implementations of Layer 2 VPN instances, VPLS, and EVPNs. This course is based on the Junos OS Release 21.2R1.10.

Virtual Classroom Live

Prerequisites

• Intermediate-level networking knowledge; • An understanding of OSPF, IS-IS, BGP, and Junos routing policy; • Experience configuring MPLS label-switched paths using Junos; • Completion of the following courses, or equivalent knowledge • Introduction to the Junos Operating System • Junos Service Provider Switching • Junos Intermediate Routing • Junos MPLS Fundamental

Target Audience

  • This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.
What You’ll Learn
  • • Define the term virtual private network.
  • • Describe the business drivers for MPLS VPNs.
  • • Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
  • • List advantages for the use of MPLS Layer 3 VPNs and Layer 2 VPNs.
  • • Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN.
  • • Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN.
  • • Configure a BGP Layer 2 VPN and describe the benefits and requirements of over-provisioning.
  • • Monitor and troubleshoot a BGP Layer 2 VPN.
  • • Explain the BGP Layer 2 VPN scaling mechanisms and route reflection.
  • • Describe the Junos OS BGP Layer 2 VPN CoS support.
  • • Describe the flow of control and data traffic for an LDP Layer 2 circuit.
  • • Configure an LDP Layer 2 circuit.
  • • Monitor and troubleshoot an LDP Layer 2 circuit.
  • • Describe the operation of FEC 129 BGP autodiscovery for Layer 2 VPNs.
  • • Configure a FEC 129 BGP autodiscovery Layer 2 VPN.
  • • Monitor and troubleshoot a FEC 129 BGP autodiscovery for Layer 2 VPNs.
  • • Describe the difference between Layer 2 MPLS VPNs and VPLS.
  • • Explain the purpose of the PE device, the CE device, and the P device.
  • • Explain the provisioning of CE and PE routers.
  • • Describe the signaling process of VPLS.
  • • Describe the learning and forwarding process of VPLS.
  • • Describe the potential loops in a VPLS environment.
  • • Configure BGP, LDP, and FEC 129 BGP autodiscovery VPLS.
  • • Troubleshoot VPLS.
  • • Describe the purpose and features of Ethernet VPN.
  • • Configure Ethernet VPN.
  • • Monitor and troubleshoot Ethernet VPN.
  • • Describe the Junos OS support for hierarchical VPN models.
  • • Describe the Junos OS support for Carrier-of-Carriers VPN Option C.
  • • Configure the interprovider VPN Option C.
  • • Describe the Junos OS support for multisegment pseudowire for FEC 129.
  • • Describe and configure circuit cross-connect (CCC).
Course Outline
Labs Outline
Related Certifications

• Describe some of the different kinds of VPNs, their mechanics, and their use cases.
• Describe the types of MPLS VPN that operate at layer 2.
• Describe the mechanics of BGP-signaled pseudowires, also known as L2VPNs.
• Configure BGP-signaled L2VPNs with Ethernet and Ethernet-VLAN encapsulations.
• Demonstrate how to troubleshoot some of the most common BGP-signaled  L2VPNconfiguration problems.
• Describe how BGP-signaled L2VPNs use a block of labels to bring efficiency to huband- spoke advertisements.
• Configure advanced BGP-signaled L2VPN features, such as multihoming, VLAN
normalization, and route target constraint.
• Describe the mechanics of LDP-signaled pseudowires, also known as Layer 2
Circuits.
• Describe the causes and solutions of some of the most common L2Circuit
configuration problems.
• Configure advanced LDP-signaled L2Circuit features, such as multihoming and local
switching.
• Explain how the FEC 129 pseudowire method combines BGP for autodiscovery and
LDP for signaling.
• Describe the purpose and mechanics of a VPLS.
• Create a VPLS instance that is signaled using BGP and demonstrate the commands
that verify its status.
• Create VPLS instances that are signaled using LDP and FEC 129 and demonstrate
the commands available to verify their status.
• Describe how mismatched VLAN tags are handled in a default VPLS configuration.
• Configure a VPLS to swap mismatched VLAN tags automatically, and to create
multiple bridge domains inside a single VPLS instance.
• Configure the most important VPLS traffic management features, including flood
protection, MAC limiting, IRB interfaces, and automated Site IDs.
• Configure hub-and-spoke VPLS topologies.
• Configure multihomed sites in a VPLS.
• Describe the features of Ethernet VPN, and the enhancements that EVPN brings over VPLS.
• Explain how EVPNs advertise MAC addresses, and how they request to receive flooded traffic within a bridge domain.
• Configure and verify a single-homed VLAN-based EVPN instance.
• Configure and verify a single-homed VLAN-aware bundle EVI.
• Configure a multihomed EVPN and explain the purpose of the EVPN Type 4 route.
• Describe the features provided by EVPN Type 1 routes.
• Describe how to use MAC Mobility and IRB interfaces in an EVPN.
• Explain how EVPNs can tightly integrate themselves into MPLS Layer 3 VPNs to provide highly efficient forwarding.

• Describe and configure various solutions that create MPLS VPNs between service providers.
• Describe the circuit-cross connect pseudowire method and explain how this old method can still have value in modern networks.
• Describe how multisegment pseudowires can create layer 2 VPNs across autonomous system boundaries.