mheusing Sun, 05/04/2008 - 03:30
User Badges:
  • Cisco Employee,


Likely the document "L2VPN Pseudowire Redundancy" will answer your question. Links:

Those two documents contain the technical details, configuration examples and restrictions/requirements.

In case you need additional information, could you please provide more details about your environment and what your challenge is?

Hope this helps! Please use the rating system.

Regards, Martin


This Discussion