.NODE

Designing and Implementing AToM-Based Layer 2 VPNs

Any Transport over MPLS (AToM) allows the transport of Layer 2 protocols and connections over a Multiprotocol Label Switching (MPLS) backbone network. Transport over the MPLS backbone network is provided by encapsulating frames, cells, or Service Data Units (SDU), and transmitting them over a pseudowire.

If you have read Chapter 2, "Designing and Deploying L2TPv3-Based Layer 2 VPNs (L2VPN)," and you are thinking that all of this seems rather familiar, then you would be rightAToM pseudowires do a similar job to L2TPv3 pseudowires. The major difference is that L2TPv3 can transport Layer 2 protocols and connections over an IP backbone network, whereas AToM transports Layer 2 protocols and connections over an MPLS network.

Figure 3-1 illustrates the transport of Layer 2 protocols and connections over AToM pseudowires.

Figure 3-1. Transport of Layer 2 Protocols and Connections over AToM Pseudowires

In Figure 3-1, ATM traffic is transported over an AToM pseudowire between VectorIT.LA.ATM.Switch and VectorIT.SJ.ATM.Switch; PPP traffic is transported over an AToM pseudowire between mjlnet.Los.Angeles.CE and mjlnet. Seattle.CE; and Ethernet traffic is transported over an AToM pseudowire between cisco.Seattle.CE and cisco.San.Jose.CE.

This chapter describes the design and implementation of AToM-based, pseudowire-based L2VPNs. But before looking at design and implementation, it is important to understand AToM pseudowire operation.


Part I: Understanding VPN Technology

What Is a Virtual Private Network?

Part II: Site-to-Site VPNs

Designing and Deploying L2TPv3-Based Layer 2 VPNs

Designing and Implementing AToM-Based Layer 2 VPNs

Designing MPLS Layer 3 Site-to-Site VPNs

Advanced MPLS Layer 3 VPN Deployment Considerations

Deploying Site-to-Site IPsec VPNs

Scaling and Optimizing IPsec VPNs

Part III: Remote Access VPNs

Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs

Designing and Deploying IPsec Remote Access and Teleworker VPNs

Designing and Building SSL Remote Access VPNs (WebVPN)

Part IV: Appendixes

Designing and Building SSL Remote Access VPNs (WebVPN)

Appendix B. Answers to Review Questions

show all menu





Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis
Similar book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net