5.9.1 Configuration algorithm .............................................................................................. 173
5.9.2 Configuration example ................................................................................................ 182
6 MPLS technology management......................................................................................... 184
6.1 LDP configuration ............................................................................................................... 184
6.1.1 Configuration algorithm .............................................................................................. 185
6.1.2 Configuration example ................................................................................................ 186
6.2 Configuring session parameters in LDP............................................................................ 189
6.2.1 Algorithm for setting Hello holdtime and Hello interval in the global LDP
configuration ................................................................................................................ 191
6.2.2 Algorithm for setting Hello holdtime and Hello interval for address family............. 191
6.2.3 Algorithm for setting Keepalive holdtime parameter in the global LDP
configuration ................................................................................................................ 191
6.2.4 Algorithm for setting Keepalive holdtime parameter for the specific neighbor ...... 192
6.2.5 Configuration example ................................................................................................ 192
6.3 Configuring session parameters in targeted-LDP............................................................. 193
6.3.1 Algorithm for setting Hello holdtime, Hello interval and Keepalive holdtime for the
LDP process ................................................................................................................. 195
6.3.2 Algorithm for setting Hello holdtime, Hello interval and Keepalive holdtime for the
specific neighbor ......................................................................................................... 195
6.3.3 Configuration example ................................................................................................ 196
6.4 LDP tag filtering configuration........................................................................................... 197
6.4.1 Configuration algorithm .............................................................................................. 197
6.4.2 Configuration example ................................................................................................ 198
6.5 L2VPN Martini mode configuration................................................................................... 199
6.5.1 L2VPN VPWS configuration algorithm....................................................................... 199
6.5.2 L2VPN VPWS configuration example......................................................................... 201
6.5.3 L2VPN VPLS configuration algorithm ........................................................................ 204
6.5.4 L2VPN VPLS configuration example .......................................................................... 205
6.6 L2VPN Kompella mode configuration............................................................................... 209
6.6.1 L2VPN VPLS configuration algorithm ........................................................................ 209
6.6.2 L2VPN VPLS configuration example .......................................................................... 212
6.7 L3VPN configuration .......................................................................................................... 227
6.7.1 Configuration algorithm .............................................................................................. 227
6.7.2 Configuration example ................................................................................................ 229
6.8 MPLS traffic balancing ....................................................................................................... 242
6.8.1 Configuration example ................................................................................................ 243
6.9 Operation with the bridge domain within MPLS ............................................................... 243
6.10 Assignment of MTU when operating with MPLS.............................................................. 246
7 Security management......................................................................................................... 252