Operation Manual – MPLSH3C S9500 Series Routing Switches Table of Contentsii3.1.4 Hierarchical BGP/MPLS VPN Implementation ..........................................3-73.1.5 Introduction to OSPF Multi-instance.........................................................3-83.1.6 Introduction to Multi-Role Host................................................................. 3-93.2 BGP/MPLS VPN Configuration........................................................................................ 3-103.2.1 Configuring Various Kinds of Routers .................................................... 3-103.2.2 Configuring CE Router .......................................................................... 3-113.2.3 Configuring PE Router........................................................................... 3-123.2.4 Configuring P Router ............................................................................. 3-243.3 Displaying and Debugging BGP/MPLS VPN................................................................... 3-253.4 Typical BGP/MPLS VPN Configuration Example ............................................................ 3-273.4.1 Integrated BGP/MPLS VPN Configuration Example ................................ 3-273.4.2 Extranet Configuration Example............................................................. 3-333.4.3 Hub&Spoke Configuration Example ....................................................... 3-383.4.4 CE Dual-home Configuration Example ................................................... 3-433.4.5 Cross-domain BGP/MPLS VPN Configuration Example .......................... 3-493.4.6 Cross-Domain BGP/MPLS VPN Configuration Example — Option C ....... 3-543.4.7 Hierarchical BGP/MPLS VPN Configuration Example ............................. 3-623.4.8 OSPF Multi-instance Sham-link Configuration Example .......................... 3-653.4.9 Nested BGP/MPLS VPN Configuration Example..................................... 3-713.4.10 OSPF Multi-instance CE Configuration Example................................... 3-773.4.11 Multi-Role Host Configuration Example ................................................ 3-793.5 Troubleshooting ............................................................................................................... 3-84Chapter 4 MPLS L2VPN ................................................................................................................ 4-14.1 MPLS L2VP Overview ....................................................................................................... 4-14.1.1 Introduction to MPLS L2VP......................................................................4-14.1.2 Packet Forwarding ..................................................................................4-24.1.3 Implementation .......................................................................................4-34.2 CCC MPLS L2VPN Configuration ..................................................................................... 4-54.2.1 Configuring CCC MPLS L2VPN ...............................................................4-54.2.2 CCC MPLS L2VPN Configuration Example ..............................................4-64.3 Martini MPLS L2VPN Configuration ................................................................................ 4-104.3.1 Configuring Martini MPLS L2VPN .......................................................... 4-104.3.2 Martini MPLS L2VPN Configuration Example ......................................... 4-114.4 Kompella MPLS L2VPN Configuration ............................................................................ 4-154.4.1 Configuring Kompella MPLS L2VPN ...................................................... 4-154.4.2 Kompella MPLS L2VPN Configuration Example...................................... 4-174.5 Displaying and Debugging MPLS L2VPN ....................................................................... 4-214.6 Troubleshooting MPLS L2VPN........................................................................................ 4-21Chapter 5 Card Intermixing for MPLS Support .......................................................................... 5-15.1 Overview ............................................................................................................................ 5-15.1.1 Introduction to Card Intermixing ...............................................................5-15.1.2 Card Intermixing Mechanism ...................................................................5-1