Configuring a PBB-EVPN Instance

Provider edges (PEs) use provider backbone bridge Ethernet VPN (PBB-EVPN) instances to interconnect private networks with the public network.

Context

A B-EVPN instance connects to the public network and manages EVPN routes received from other PEs. An I-EVPN instance connects to a private network through a PE interface connecting to a CE. After an I-EVPN instance receives a data packet from a CE, the I-EVPN instance encapsulates a PBB header into the packet.

Procedure

  • Configure a B-EVPN instance.
    1. Run system-view

      The system view is displayed.

    2. Run evpn vpn-instance vpn-instance-name b-evpn

      A B-EVPN instance is created, and its view is displayed.

    3. (Optional) Run description description-information

      A description is configured for the B-EVPN instance.

      Similar to a host name or an interface description, a B-EVPN instance description helps you memorize the B-EVPN instance.

    4. Run route-distinguisher route-distinguisher

      A route distinguisher (RD) is configured for the B-EVPN instance.

      A B-EVPN instance takes effect only after the RD is configured. The RDs of different B-EVPN instances on a PE must be different.

      After being configured, an RD cannot be modified, but can be deleted. After you delete the RD of a B-EVPN instance, the VPN targets of the B-EVPN instance will also be deleted.

    5. Run vpn-target vpn-target &<1-8> [ both | export-extcommunity | import-extcommunity ]

      VPN targets are configured for the B-EVPN instance.

      A VPN target is a BGP extended community attribute used to control the receiving and advertisement of EVPN routes. A maximum of eight VPN targets can be configured using a vpn-target command. To configure more VPN targets for an EVPN instance address family, run the vpn-target command several times.

    6. (Optional) Run tnl-policy policy-name

      The B-EVPN instance is associated with a tunnel policy.

      This configuration enables PEs to use TE tunnels to transmit data packets. Currently, B-EVPN instances can be associated with tunnel binding policies only.

    7. Run commit

      The configuration is committed.

  • Configure an I-EVPN instance.
    1. Run system-view

      The system view is displayed.

    2. Run evpn vpn-instance vpn-instance-name i-evpn

      An I-EVPN instance is created, and its view is displayed.

    3. (Optional) Run description description-information

      A description is configured for the I-EVPN instance.

      Similar to a host name or an interface description, an I-EVPN instance description helps you memorize the I-EVPN instance.

    4. Run pbb i-tag i-tag

      A service instance identifier (I-SID) is configured for the I-EVPN instance.

      After being configured, an I-SID cannot be modified, but can be deleted. After you delete the I-SID of an I-EVPN instance, the binding between this I-EVPN instance and a B-EVPN instance will also be deleted.

    5. Run pbb binding b-evpn vpn-instance-name

      The I-EVPN instance is bound to the B-EVPN instance.

    6. Run commit

      The configuration is committed.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
Next topic >