mheusing Sun, 05/04/2008 - 03:30

Hi,


Likely the document "L2VPN Pseudowire Redundancy" will answer your question. Links:

http://www.cisco.com/en/US/docs/ios/12_4t/mpls/configuration/guide/tpseudo.html

http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_l2vpn_pseudo_red_ps6922_TSD_Products_Configuration_Guide_Chapter.html

Those two documents contain the technical details, configuration examples and restrictions/requirements.


In case you need additional information, could you please provide more details about your environment and what your challenge is?


Hope this helps! Please use the rating system.


Regards, Martin

Actions

This Discussion