Configuring MPLS and VRF -- Cisco CCIP MPLS certification: Lesson 6

This tip is sixth in a series designed to help you learn skills required for the MPLS portion of the Cisco CCIP certification. These skills are tested in the CCIP 642-611 - Implementing Cisco MPLS Exam.


Read the entire CCIP MPLS certification series
MPLS and Cisco CCIP certification -- an introduction by Ed Tittel

Cisco CCIP MPLS certification, introduction

Lesson 1: Understanding MPLS

Lesson 2: Routing and control architecture

Lesson 3: Distribution of labels

Lesson 4: Label imposition

Lesson 5: Configuring MPLS

Lesson 6: Configuring MPLS and VRF>>


In the last tip on  MPLS configuration, I discussed how to turn on MPLS service on the router and how to bind the labels to the IP packets. Here, I am going to focus on the creation and configuration of the Virtual Routing and Forwarding (VRF) delivered by Layer 3 MPLS VPNs.

    Requires Free Membership to View

The concept of virtual routing is an important aspect of MPLS. It enables PE routers to appear to be many routers to the customer edge (CE) routers. The provider edge (PE) router will maintain separate and distinct routing tables for each customer. Each PE builds these unique routing tables with their own routing table mechanisms for each customer that is connected to the PE. This unique separation of routing tables allows PE routers to store routes and forward packets even if the customers are using identical addressing.

The Cisco components of the VRF are as follows:

  • A routing table specific to each VRF
  • The associated customer interfaces for each VRF
  • A CEF table
  • Routing protocols for exchange of routing information per customer

The key components of the VRF configuration are the VRF name and the route distinguisher. Remember that the route distinguisher is used to distinguish between overlapping addresses in the VRF. The route distinguisher can be of two forms:

16-bit:32-bit (recommended)

When designing your MPLS backbone, it is very important to have a well thought-out VPN naming scheme and route distinguisher numbering. A good way to do the route distinguisher name is to utilize Autonomous System Numbers (ASN) for the 16 bit address and the second 32 bits something specific to customers (customer ASN numbers will work if they are using BGP). Think of the operational support teams when assigning names and route distinguishers. Use a nomenclature that allows identification of the customer or the customer's entry point into the network.

Let's assume the customers have the following network addressing scheme:
Customer 1:
Customer 2:

The following commands will illustrate how to create the VRF on the PE routers for two customers, "Customer A" and "Customer B."

P1# config t
P1(config)# ip vrf VPN_1
P1(config-vrf)# rd 1:1
P1(config-vrf)# exit
P1(config)# ip vrf VPN_2
P1(config-vrf)# rd 1:2

The VRF commands must be configured on each PE that interconnects Customer 1 and Customer 2 CE routers.

What this configuration does is create a VRF table that the PEs utilize to exchange the customer routes. The customer routes are identical except for the route distinguisher. This allows the PE to distinguish the, Customer 1 routes from the, Customer 2 routes. These are called IP-VPN routes and are exchanged between the PE routers using Multiprotocol BGP (MP-IBGP).

About the author:
Robbie Harrell (CCIE#3873) is the National Practice Lead for Advanced Infrastructure Solutions for SBC Communications. He has more than 10 years of experience providing strategic, business, and technical consulting services to clients. Robbie resides in Atlanta, and is a graduate of Clemson University. His background includes positions as a Principal Architect at International Network Services, Lucent, Frontway and Callisma.

This was first published in July 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.