Recent from talks
Nothing was collected or created yet.
Virtual Private LAN Service
View on Wikipedia
This article includes a list of general references, but it lacks sufficient corresponding inline citations. (August 2012) |
Virtual Private LAN Service (VPLS) is a virtual private network (VPN) technology that provides Ethernet-based multipoint-to-multipoint communication over IP or MPLS networks. It allows geographically dispersed sites to share an Ethernet broadcast domain by connecting sites (including both servers and clients) through pseudowires.[1] The technologies that can be used as pseudo-wire can be Ethernet over MPLS, L2TPv3 or even GRE. There are two IETF standards-track RFCs (RFC 4761[2] and RFC 4762)[3] describing VPLS establishment. In contrast to L2TPv3, which allows only point-to-point OSI layer 2 tunnels, VPLS allows any-to-any (multipoint) connectivity.
Since VPLS emulates a LAN, full mesh connectivity is required. In a VPLS, the local area network (LAN) at each site is extended to the edge of the provider network. The provider network then emulates a switch or bridge to connect all of the customer LANs to create a single bridged LAN. There are two methods for full mesh establishment for VPLS: using Border Gateway Protocol (BGP) and using Label Distribution Protocol (LDP). BGP mechanisms used are very similar to those used in establishing OSI layer 3 MPLS VPNs and provide both auto-discovery and signalling; each provider edge (PE) router configured to participate in a given VPLS, through the use of BGP, simultaneously discovers all other PEs in the same VPLS, establishing a full mesh of pseudowires. With LDP, each PE router must be given the addresses of other PEs participating in the same VPLS. A full mesh of LDP sessions is then established, before LDP is used to create an equivalent mesh of pseudowires.
Benefits of VPLS include flexible bandwidth, sophisticated service level agreements, simplicity, and cost-effectiveness. VPLS users can also connect all of their sites to an Ethernet VPN that provides a secure, high speed and homogenous network.
Terminology and overview
[edit]- The "control plane" is the means by which provider edge (PE) routers communicate for auto-discovery and signalling.
- Auto-discovery refers to the process of finding other PE routers participating in the same VPN or VPLS.
- Signalling is the process of establishing pseudowires (PW).
- The PWs constitute the "data plane", whereby PEs send customer VPN/VPLS traffic to other PEs.
An advantage to using PWs as the underlying technology for the data plane is that in the event of failure, traffic will automatically be routed along available backup paths in the service provider's network. Failover will be much faster than could be achieved with e.g. Spanning Tree Protocol (STP). VPLS is thus a more reliable solution for linking together Ethernet networks in different locations than simply connecting a WAN link to Ethernet switches in both locations.
VPLS MPLS packets have a two-label stack. The outer label is used for normal MPLS forwarding in the service provider's network. If BGP is used to establish the VPLS, the inner label is allocated by a PE as part of a label block. If LDP is used, the inner label is a virtual circuit ID assigned by LDP when it first established a mesh between the participating PEs. Every PE keeps track of assigned inner label, and associates these with the VPLS instance.
Ethernet emulation
[edit]PEs participating in a VPLS-based VPN must appear as an Ethernet bridge to connected customer edge (CE) devices. Received Ethernet frames must be treated in such a way as to ensure CEs can be simple Ethernet devices.
When a PE receives a frame from a CE, it inspects the frame and learns the CE's MAC address, storing it locally along with LSP routing information. It then checks the frame's destination MAC address. If it is a broadcast frame, or the MAC address is not known to the PE, it floods the frame to all PEs in the mesh.
Ethernet does not have a time to live (TTL) field in its frame header, so loop avoidance must be arranged by other means. In regular Ethernet deployments, Spanning Tree Protocol is used for this. In VPLS, loop avoidance is arranged by the following rule: A PE never forwards a frame received from a PE to another PE. The use of a full mesh combined with split horizon forwarding guarantees a loop-free broadcast domain.
Scalability
[edit]Hierarchical VPLS
[edit]VPLS requires a full mesh in both the control and data planes; this can be difficult to scale. For BGP, the control plane scaling issue has long been addressed, through the use of route reflectors (RRs). RRs are extensively used in the context of Internet routing, as well as for several types of VPNs. To scale the data plane for multicast and broadcast traffic, there is work in progress to use point-to-multipoint LSPs as the underlying transport.
For LDP, a method of subdividing a VPLS VPN into two or three tiered hierarchical networks was developed. Called hierarchical VPLS (HVPLS), it introduces a new type of MPLS device: the multi-tenant unit (MTU) switch. This switch aggregates multiple customers into a single PE, which in turn needs only one control and data plane connection into the mesh. This can significantly reduce the number of LDP sessions and LSPs, and thus unburden the core network, by concentrating customers in edge devices.
HVPLS (LDP) may also be used to join two VPLS mesh structures together. Without using HVPLS, every node in each VPLS mesh must become meshed with all nodes in the other VPLS mesh. However, with HVPLS, the two meshes can essentially be joined together at certain locations. Techniques such as redundant pseudowires can provide resiliency in case of failures at the interconnection points.
MAC addresses
[edit]Since VPLS links multiple Ethernet broadcast domains together, it effectively creates a much larger broadcast domain. Since every PE must keep track of all MAC addresses and associated LSP routing information, this can potentially result in a large amount of memory being needed in every PE in the mesh.
To counter this problem, sites may use a router as the CE device. This hides all MAC addresses on that site behind the CE's MAC address.
PE devices may also be equipped with content-addressable memory (CAM), similar to high-end Ethernet switches.
An alternative mechanism is using MAT (MAC Address Translation).[4] However, at the time of writing this, there are no vendors providing MAT functionality.
PE auto-discovery
[edit]In a VPLS-based VPN with a large number of sites, manually configuring every participating PE does not scale well. If a new PE is taken into service, every existing PE needs to have its configuration adjusted to establish an LDP session with the new PE. Standardisation work is in progress to enable auto-discovery of participating PEs. Three implementations are being worked on:
LDP
[edit]The LDP method of PE auto-discovery is based on that used by the Label Distribution Protocol to distribute labels across P and PE routers within a single autonomous system.
BGP
[edit]The BGP method of PE auto-discovery is based on that used by Layer-3 MPLS VPNs to distribute VPN routes among PEs participating in a VPN. The BGP4 Multi-Protocol (BGP-MP) extensions are used to distribute VPN IDs and VPN-specific reachability information. Since IBGP requires either a full mesh of BGP sessions or the use of a route reflector, enabling the VPN ID in a participating PEs existing BGP configuration provides it with a list of all PEs in that VPN. Note that this method is for auto-discovery alone; LDP is still used for signaling. The method of establishing VPLS with BGP described above accomplishes both auto-discovery and signalling.
RADIUS
[edit]This method requires all PEs to be configured with one or more RADIUS servers to use. When the first CE router in a particular VPLS VPN connects to the PE, it uses the CE's identification to request authentication from the RADIUS server. This identification may be provided by the CE or may be configured into the PE for that particular CE. In addition to a username and password, the identification string also contains a VPN name and an optional provider name.
The RADIUS server keeps track of all PEs that requested authentication for a particular VPN and returns a list of them to the PE requesting authentication. The PE then establishes LDP sessions to every PE in the list.
See also
[edit]- Multiprotocol Label Switching (MPLS)
- Virtual leased line (VLL)
- IEEE 1355, which does something broadly similar via hardware.
- Virtual private network (VPN)
- Virtual LAN (VLAN)
- Virtual Extensible LAN (VXLAN)
- Virtual network
- Carrier Ethernet
- Ethernet VPN
External links
[edit]References
[edit]- ^ H. Shah (Cisco Systems) (January 2015). "RFC 7436: IP‑Only LAN Service (IPLS)". IETF. Retrieved 2025-08-07.
- ^ Rekhter, Yakov; Kompella, Kireeti (January 2007). Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling (Report). Internet Engineering Task Force.
- ^ Lasserre, Marc; Kompella, Vach (January 2007). Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling (Report). Internet Engineering Task Force.
- ^ MAC Address Translation for Enabling Scalable Virtual Private LAN Services
Virtual Private LAN Service
View on GrokipediaFundamentals
Definition and Purpose
Virtual Private LAN Service (VPLS) is a Layer 2 virtual private network (VPN) technology that emulates an Ethernet local area network (LAN) across a provider's multiprotocol label switching (MPLS) or IP-based wide area network, enabling multiple customer sites to function as a single broadcast domain.[3] As defined in RFC 4761 and RFC 4762, VPLS delivers multipoint-to-multipoint Ethernet connectivity through pseudowires, where provider edge (PE) routers perform MAC address learning, forwarding, and flooding of frames, including broadcast, multicast, and unknown unicast traffic, to replicate the behavior of a traditional Ethernet switch.[3][4] This service integrates with MPLS for efficient tunneling and label-based forwarding, allowing seamless extension of customer LANs without modifications to customer edge (CE) devices.[4] The primary purpose of VPLS is to provide transparent, geographically dispersed Ethernet connectivity that supports latency-sensitive and protocol-dependent applications, such as Voice over IP (VoIP), video conferencing, and data center interconnects (DCI), while insulating customers from the complexities of the underlying provider network.[5] By maintaining full transparency for customer Layer 2 protocols like Address Resolution Protocol (ARP) and Spanning Tree Protocol (STP), VPLS ensures that end-user applications operate as if all sites are on the same physical LAN, facilitating resource sharing and workload migration across locations.[3] Unlike point-to-point services, VPLS's multipoint architecture supports efficient collaboration among multiple sites, reducing the need for customer-managed overlays and lowering operational costs for enterprises.[5] VPLS was developed by the Internet Engineering Task Force (IETF) in the early 2000s as an evolution of point-to-point Layer 2 VPNs like Virtual Private Wire Service (VPWS), with initial draft specifications emerging in 2003 to address the demand for scalable multipoint Ethernet services.[5][6] Standardization occurred through RFC 4761 (using BGP for auto-discovery and signaling) and RFC 4762 (using Label Distribution Protocol for signaling) in 2007, building on earlier MPLS frameworks to enable service providers to offer LAN-like extensions over packet-switched networks.[3][4] This progression from VPWS's limited point-to-point model to VPLS's broadcast domain emulation marked a key advancement in Layer 2 VPN technologies, prioritizing scalability and protocol transparency for modern enterprise needs.[5]Architectural Components
The architecture of Virtual Private LAN Service (VPLS) comprises several key components that enable the emulation of a multipoint Ethernet LAN across a provider's packet-switched network, ensuring transparent Layer 2 connectivity for customer sites.[7] These elements include customer-facing devices, provider edge functions, core transit capabilities, virtual interconnections, and logical switching instances, all operating to bridge customer traffic without altering its Ethernet framing.[4] Customer Edge (CE) devices serve as the demarcation point between the customer's local area network and the service provider's domain. These are typically customer-owned routers or switches that interface directly with Provider Edge (PE) devices via attachment circuits (ACs), such as Ethernet links, and remain unaware of the underlying VPLS mechanisms.[3] From the customer's perspective, the CE connects to a single virtual LAN, with no need for special configuration related to the provider's tunneling or bridging processes.[8] Provider Edge (PE) routers form the core of the VPLS implementation, acting as the intelligent boundary devices that connect multiple CE devices and manage the service's forwarding logic. Each PE encapsulates and decapsulates customer Ethernet frames into pseudowires for transit across the provider network, while also performing MAC address learning and maintaining per-VPLS forwarding tables to enable efficient bridging.[4] PEs are typically edge routers equipped with MPLS capabilities, ensuring that customer traffic is transparently forwarded based on Layer 2 headers without the CE devices requiring awareness of the provider's infrastructure.[7] Provider (P) routers reside in the core of the service provider's network and handle the transit of encapsulated VPLS traffic between PEs, without any specific knowledge of the VPLS service itself. These routers forward packets using standard MPLS label switching or IP routing over transport tunnels, relying on the outer labels provided by PEs to route frames efficiently through the backbone.[3] By design, P routers operate transparently to the VPLS emulation, focusing solely on high-speed packet transport.[7] Pseudowires (PWs) represent the virtual point-to-point connections that link PEs, emulating dedicated Ethernet links to carry customer frames across the provider's network. In VPLS, PWs utilize MPLS labels (or alternative tunneling mechanisms like IP) for demultiplexing and transport, with each PW terminating on a PE to preserve the original Ethernet payload.[4] This encapsulation allows for the seamless extension of the customer's LAN, as frames are bridged across PWs without modification to their Layer 2 content.[3] The Forwarding Instance, often termed the Virtual Switching Instance (VSI), operates on each PE as a logical entity dedicated to a specific VPLS service, functioning like a distributed segment of an Ethernet switch. Each VSI maintains a separate forwarding information base (FIB) populated through MAC learning from incoming ACs and PWs, enabling unicast forwarding, flooding of unknown frames, and broadcast/multicast distribution within the emulated LAN.[8] VSIs ensure isolation between different VPLS services on the same PE, with capabilities for dynamic or static FIB management to support scalable Layer 2 bridging.[3] At the network level, VPLS employs a full-mesh topology of pseudowires interconnecting all participating PEs, creating a loop-free multipoint domain that transparently bridges customer traffic as if all CEs were attached to a single Ethernet broadcast domain.[7] This mesh requires each PE to establish a PW to every other PE in the service, with techniques like split-horizon forwarding preventing loops while maintaining the illusion of a flat LAN.[4] Customer Ethernet frames are thus forwarded across the PWs by the VSIs, emulating native LAN behavior over the provider's routed backbone.[3]Operational Mechanisms
Mesh and Pseudowire Establishment
In Virtual Private LAN Service (VPLS), the mesh topology is established by creating a full-mesh of point-to-point pseudowires between all Provider Edge (PE) routers participating in a given service instance. This logical full-mesh ensures that customer Ethernet frames can be flooded for broadcast, multicast, and unknown unicast traffic across the emulated LAN, mimicking the behavior of a single broadcast domain without requiring physical connectivity between customer sites. Each PE maintains pseudowires to every other PE in the instance, enabling direct frame forwarding and avoiding intermediate hops within the provider network.[2][1] Pseudowires in VPLS can be implemented using MPLS-based encapsulation, which is preferred for its label-switching efficiency and scalability in large networks, or IP-based encapsulation such as Layer 2 Tunneling Protocol version 3 (L2TPv3) or Generic Routing Encapsulation (GRE). For MPLS-based pseudowires, signaling occurs via Label Distribution Protocol (LDP) in a full-mesh of targeted LDP sessions or Border Gateway Protocol (BGP) for auto-discovery and label exchange, with LDP operating in downstream unsolicited label allocation mode to assign unique labels per pseudowire. IP-based options like L2TPv3 use session identifiers for demultiplexing, but they are less common due to higher overhead compared to MPLS.[2][1] The establishment process begins with signaling protocols initiating pseudowire setup between PEs, where each PE allocates and exchanges labels or session identifiers to form the full mesh. Upon receiving an unknown unicast, broadcast, or multicast frame from a customer attachment circuit (AC), the ingress PE floods it across all pseudowires in the mesh, learning MAC addresses along the way to enable subsequent unicast forwarding. This dynamic learning and flooding mechanism, combined with label or identifier state exchange during signaling, ensures connectivity without prior knowledge of all destinations.[2][9] To prevent bridging loops in the emulated LAN, VPLS integrates with customer Spanning Tree Protocol (STP) by transparently tunneling STP Bridge Protocol Data Units (BPDUs) across pseudowires, allowing the customer's STP to handle loop resolution at the edge. Provider-side mechanisms, such as the split-horizon rule, further enforce loop-free forwarding by prohibiting frames received on one pseudowire from being sent out another pseudowire within the same Virtual Switching Instance (VSI), ensuring the full-mesh topology remains stable.[2][1] Configuration basics for mesh and pseudowire establishment involve creating a VPLS service instance, or VSI, on each participating PE router, where customer ACs—typically Ethernet ports or VLANs—are associated with the VSI to delineate the service boundary. PEs are manually provisioned with peer addresses and service identifiers (e.g., VPLS-ID encoded as an Attachment Group Identifier), after which signaling protocols automate pseudowire creation; for example, LDP requires configuring targeted sessions, while BGP uses route targets for peer discovery. This setup ensures all pseudowires align with matching maximum transmission unit (MTU) values to avoid fragmentation.[2][9]Label Stack and Forwarding
In Virtual Private LAN Service (VPLS), the MPLS label stack encapsulates Ethernet frames for transport across the provider's core network, consisting of an outer transport label and an inner virtual circuit (VC) label. The outer transport label directs the packet along a label-switched path (LSP) to the remote provider edge (PE) router, while the inner VC label uniquely identifies the specific VPLS service instance or pseudowire (PW) to which the frame belongs.[10] The forwarding process begins at the ingress PE router, where an incoming Ethernet frame from a customer edge (CE) device is classified into a VPLS service instance (VSI) based on the access interface. The ingress PE performs a MAC address lookup in its forwarding database (FDB); if the destination MAC is known and associated with a remote PE, it imposes the corresponding VC label to demultiplex the frame to the appropriate PW, followed by the outer transport label for tunnel encapsulation. If the destination MAC is unknown, the frame is flooded by imposing VC labels for all remote PEs in the service, each paired with a transport label. In the core network, provider (P) routers forward the packet by swapping the outer transport label based on their MPLS forwarding tables, remaining unaware of the inner VC label or VPLS-specific details. Upon reaching the egress PE, the outer transport label is popped, exposing the VC label, which identifies the target VSI; the egress PE then strips the VC label, performs another FDB lookup, and delivers the frame to the appropriate local CE interface or floods it locally if necessary.[10][11] Label imposition follows rules outlined in RFC 4761 for BGP-based VPLS and RFC 4762 for LDP-based VPLS, where the VC label is assigned per PW during signaling to ensure service isolation. An optional control word may be inserted immediately after the VC label and before the Ethernet payload; this 32-bit field provides sequence numbering to maintain packet order, and when used, the VC label's S-bit is set to 0, as specified in pseudowire encapsulation standards. The control word is signaled via the C-bit in LDP or BGP extended communities and is typically disabled for Ethernet PWs unless required for fragmentation or reassembly.[12][13] For tunnel selection, VPLS relies on MPLS LSPs established via protocols like LDP or RSVP-TE to carry the labeled packets, with the outer label binding to these tunnels for efficient core forwarding. Alternative transports, such as IP/MPLS or GRE tunnels, may be used in certain implementations for flexibility, particularly in non-MPLS cores. To enhance resilience, fast reroute (FRR) mechanisms can be applied to the transport LSPs, enabling sub-50ms protection against link or node failures by detouring traffic via backup paths.[10] A representative example of the VPLS label stack for an Ethernet frame is as follows:Ethernet Header + Payload | [Optional Control Word] | VC Label (S=1, [BoS](/page/Bos)=1) | Transport Label (S=0, [BoS](/page/Bos)=0)
Ethernet Header + Payload | [Optional Control Word] | VC Label (S=1, [BoS](/page/Bos)=1) | Transport Label (S=0, [BoS](/page/Bos)=0)
