Got it


590 0 1 0 1


Traditional VPNs transmit private network data over the public network using tunneling protocols, such as the Generic Routing Encapsulation (GRE), Layer 2 Tunneling Protocol (L2TP) and Point to Point Tunneling Protocol (PPTP). MPLS LSPs are set up by swapping labels, and data packets are not encapsulated or encrypted. Therefore, MPLS is an appropriate technology for VPN implementation.

MPLS VPNs can build a private network with security similar to a Frame Relay (FR) network. On MPLS VPN networks, customer devices do not need to set up tunnels such as GRE and L2TP tunnels, so the network delay is minimized.

As shown in Figure 1, the MPLS VPN connects private network branches through LSPs to form a unified network. The MPLS VPN also controls the interconnection between VPNs.Figure 1 shows the devices on an MPLS VPN network:

1. a customer edge (CE) is deployed on the edge of a customer network. It can be a router, a switch, or a host;

2. a provider edge (PE) is deployed on the edge of an IP/MPLS backbone network;

3. a provider (P) device on an IP/MPLS backbone network is not directly connected to CEs. The provider device only needs to provide basic MPLS forwarding capabilities and does not maintain VPN information.

Figure 1. MPLS VPN 


An MPLS VPN has the following characteristics:

a) PEs manage VPN users, set up LSPs between PEs, and advertise routing information between users in a VPN;

b) PEs use MP-BGP to advertise VPN routing information;

c) the MPLS-based VPN supports IP address multiplexing between sites as well as the interconnection of different VPNs.

  • x
  • convention:


You need to log in to comment to the post Login | Register

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits


Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Please bind your phone number to obtain invitation bonus.
Information Protection Guide
Thanks for using Huawei Enterprise Support Community! We will help you learn how we collect, use, store and share your personal information and the rights you have in accordance with Privacy Policy and User Agreement.