{"id":420,"date":"2020-04-23T10:30:32","date_gmt":"2020-04-23T02:30:32","guid":{"rendered":"https:\/\/cciedump.spoto.net\/blog\/?p=420"},"modified":"2024-11-06T13:17:36","modified_gmt":"2024-11-06T05:17:36","slug":"mpls-vpn-architecture-1","status":"publish","type":"post","link":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html","title":{"rendered":"MPLS VPN Architecture-1"},"content":{"rendered":"\n<p>Today this article will describe the entire system of MPLS in a series of forms. The first one is to tell you the defects of the traditional network and why we need the technical integration form of MPLS + BGP.<br>Existing VPN technology basically meets the requirements of customer private network interconnection through public infrastructure, but it also has some inherent defects. Typically, the coverage model and the peer model are not compatible. But customers often require their VPN networks to have the advantages of both.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-421\" src=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/1-11.jpg\" alt=\"MPLS VPN Architecture\" width=\"601\" height=\"177\" srcset=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/1-11.jpg 601w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/1-11-300x88.jpg 300w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/1-11-600x177.jpg 600w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/figure>\n\n\n\n<p>Requirements as shown in the figure: VPN clients on both the yellow site and the green site require the use of private addresses (the private addresses of different VPNs can be duplicated), and tunnels can be dynamically established like peer-to-peer VPNs. The current VPN technology (overlay type, peer-to-peer type) cannot meet this demand, so new technology is urgently needed to integrate the advantages of these two VPN models to meet customer needs. MPLS VPN technology perfectly integrates multiple VPN models and promotes the continued development of VPN.<\/p>\n\n\n\n<p><strong>Background<\/strong><br>The emergence of MPLS VPN is mainly to solve some inherent defects of traditional VPN technology, which has many technical problems to be solved, the most important one is the problem of address overlap. There must be a technology to ensure that different users VPN can use the same private address space, and can exchange data without affecting each other on the public backbone network.<br>To solve the problem of overlapping address spaces, there are the following problems:<br>\u25a0 The problem of local route conflict, that is: how to distinguish the same route of different VPNs on the same PE;<br>\u25a0 The problem of route propagation in the network, two identical routes are propagated in the network, how to distinguish the receiver;<br>\u25a0 The problem of packet forwarding, even if the routing table conflict is successfully resolved, but when the PE receives an IP packet, how can it know which VPN to send to? Because the only information available in the IP header is the destination address. This address may exist in many VPNs.<\/p>\n\n\n\n<p><strong>Technology fusion<\/strong><br>From the technical difficulties mentioned above, the main problems exist in the characteristics related to routing, so to solve these problems must be considered from the routing protocol. However, none of the existing routing protocols have the conditions to solve these problems, so they must be implemented by transforming the existing routing protocols. Choosing a suitable routing protocol to achieve transformation becomes the first solution to Resolved issues. <br>As a candidate routing protocol, it must be able to adapt to a huge number of VPN routes, and the protocol must have good scalability. Qualified agreements must be based on TLV elements (easy to expand). Analysis of existing routing protocols, OSPF is the most widely used routing protocol, but the scalability of this protocol is relatively poor, and it is a link-like The dynamic routing protocol requires a lot of calculations on the received LSA, and it is difficult to adapt to the huge number of VPN routes on the public network. From the perspective of expansion, RIP is based on TLV architecture. <br>The scalability should be okay, but the operation mechanism of RIP is not suitable for large networks. Other routing protocols also have corresponding unsuitable places, and ultimately this heavy responsibility falls to the existing BGP, the backbone routing protocol used by the Internet. BGP has many characteristics that make it very suitable for transformation to meet the problem of overlapping addresses on the VPN network. Its characteristics are as follows:<br>\u25a0 The number of VPN routes in the public network is very large, BGP is currently the only routing protocol that supports a large number of routes;<br>\u25a0 BGP is also designed to exchange information between routers that are not directly connected, which eliminates the need for P routers to include VPN routing information;<br>\u25a0 BGP can carry any information appended to the route. As optional BGP attributes, any BGP router that does not understand these attributes will forward them transparently (of course these attributes are all transferable), which makes the Propagation routing is very simple. The main consideration here is that you can identify the same in different VPNs by extending attributes Route. <br>Because BGP has the above advantages, the task of solving the technical difficulties mentioned above falls on it. Through the transformation of the existing BGP protocol, the aforementioned problems that need to be solved can basically be solved, the solution is as follows:<br>\u25a0 The problem of local routing conflict can be solved by creating different routing tables on the same router, and different interfaces can belong to different routing tables, which is equivalent to simulating a shared PE into multiple dedicated PEs;<br>\u25a0 You can add another logo to this route during the route transfer to distinguish different VPNs;<br>\u25a0 Since the format of the IP packet cannot be changed, but some information can be added to the IP header, and the originating VPN will mark it, so that the PE can forward the packet according to this mark when receiving the packet.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-422\" src=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-10-1024x439.jpg\" alt=\"MPLS VPN Architecture\" width=\"1024\" height=\"439\" srcset=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-10-1024x439.jpg 1024w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-10-300x129.jpg 300w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-10-768x329.jpg 768w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-10.jpg 1386w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In the article \u300ampls VPN architecture-2\u300b, I will introduce the specific solution to the first problem<\/p>\n\n\n\n<p>The problem of local routing conflict, that is, how to distinguish the same route of different VPNs on the same PE;<\/p>\n\n\n\n<p>The solution is&nbsp;You can create different VRF routing tables on the same router, and different interfaces can belong to different VRF routing tables. This is equivalent to simulating a shared PE into multiple dedicated PEs; while combining BGP groups The attribute is used to mark the route for distinction. If you want to know more information, you can check the Mpls VPN architecture-2 document.<\/p>\n\n\n\n<p>By the way, our<strong><em><a href=\"https:\/\/cciedump.spoto.net\/?hxt\"> SPOTO <\/a><\/em><\/strong>offers 100% latest and real Cisco Certification Practice Exams to all candidates. Simulated exam experiences to help you prepare for the real exam easily. If you are interested, you can enter our group chat by leaving your email information<\/p>\n<div class='sfsi_Sicons' style='width: 100%; display: inline-block; vertical-align: middle; text-align:left'><div style='margin:0px 8px 0px 0px; line-height: 24px'><span>Please follow and like us:<\/span><\/div><div class='sfsi_socialwpr'><div class='sf_fb_share sf_icon' style='text-align:left;vertical-align: middle;'><a href='https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fcciedump.spoto.net%2Fblog%2Fmpls-vpn-architecture-1_420.html' style='display:inline-block;'  > <img class='sfsi_wicon'  data-pin-nopin='true' width='auto' height='auto' alt='fb-share-icon' title='Facebook Share' src='https:\/\/cciedump.spoto.net\/blog\/wp-content\/plugins\/ultimate-social-media-icons\/images\/visit_icons\/fbshare_bck.png'  \/><\/a><\/div><div class='sf_twiter sf_icon' style='display: inline-block;vertical-align: middle;width: auto;margin-left: 7px;'>\r\n\t\t\t\t\t\t<a target='_blank' href='https:\/\/twitter.com\/intent\/tweet?text=MPLS+VPN+Architecture-1+https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html'style='display:inline-block' >\r\n\t\t\t\t\t\t\t<img data-pin-nopin= true width='auto' class='sfsi_wicon' src='https:\/\/cciedump.spoto.net\/blog\/wp-content\/plugins\/ultimate-social-media-icons\/images\/visit_icons\/en_US_Tweet.svg' alt='Tweet' title='Tweet' >\r\n\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div><div class='sf_pinit sf_icon' style='text-align:left;vertical-align: middle;float:left;line-height: 33px;width:auto;margin: 0 -2px;'><a href='#'  onclick='sfsi_pinterest_modal_images(event,\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html\",\"MPLS VPN Architecture-1\")' style='display:inline-block;'  > <img class='sfsi_wicon'  data-pin-nopin='true' width='auto' height='auto' alt='fb-share-icon' title='Pin Share' src='https:\/\/cciedump.spoto.net\/blog\/wp-content\/plugins\/ultimate-social-media-icons\/images\/share_icons\/Pinterest_Save\/en_US_save.svg'  \/><\/a><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The first one is to tell you the defects of the traditional network and why we need the technical integration form of MPLS + BGP.<\/p>\n","protected":false},"author":1,"featured_media":423,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[29],"tags":[138,170],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MPLS VPN Architecture-1 - SPOTO Official Blog<\/title>\n<meta name=\"description\" content=\"Discover the comprehensive MPLS VPN architecture, addressing the limitations of traditional VPNs. Learn how MPLS integrates with BGP to resolve address overlap issues, ensuring seamless private network interconnection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MPLS VPN Architecture-1 - SPOTO Official Blog\" \/>\n<meta property=\"og:description\" content=\"Discover the comprehensive MPLS VPN architecture, addressing the limitations of traditional VPNs. Learn how MPLS integrates with BGP to resolve address overlap issues, ensuring seamless private network interconnection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html\" \/>\n<meta property=\"og:site_name\" content=\"SPOTO Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-23T02:30:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-06T05:17:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/20_gaitubao_-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"642\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SPOTO Club\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#website\",\"url\":\"https:\/\/cciedump.spoto.net\/blog\/\",\"name\":\"SPOTO Official Blog\",\"description\":\"Focus on Online IT Training for 20+ Years\",\"publisher\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cciedump.spoto.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/20_gaitubao_-1.jpg\",\"contentUrl\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/20_gaitubao_-1.jpg\",\"width\":960,\"height\":642},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#webpage\",\"url\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html\",\"name\":\"MPLS VPN Architecture-1 - SPOTO Official Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#primaryimage\"},\"datePublished\":\"2020-04-23T02:30:32+00:00\",\"dateModified\":\"2024-11-06T05:17:36+00:00\",\"description\":\"Discover the comprehensive MPLS VPN architecture, addressing the limitations of traditional VPNs. Learn how MPLS integrates with BGP to resolve address overlap issues, ensuring seamless private network interconnection.\",\"breadcrumb\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cciedump.spoto.net\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MPLS VPN Architecture-1\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#webpage\"},\"author\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638\"},\"headline\":\"MPLS VPN Architecture-1\",\"datePublished\":\"2020-04-23T02:30:32+00:00\",\"dateModified\":\"2024-11-06T05:17:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#webpage\"},\"wordCount\":987,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638\"},\"image\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/20_gaitubao_-1.jpg\",\"keywords\":[\"MPLS VPN\",\"VPN networks\"],\"articleSection\":[\"Cisco Technologies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#respond\"]}]},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638\",\"name\":\"SPOTO Club\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/03\/spoto-facemask-96x96.jpg\",\"contentUrl\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/03\/spoto-facemask-96x96.jpg\",\"caption\":\"SPOTO Club\"},\"logo\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#personlogo\"},\"description\":\"SPOTO is an excellent leader in IT certification training for 20+ years. We offer 100% real Cisco CCNA, CCNP exam dumps, CCIE Lab study materials, PMP, CISA, CISM, AWS, Palo Alto, and other IT exam dumps. We have helped thousands of candidates around the world to pass their IT exams on the first try! As the first-class online IT training organization in China, SPOTO cooperates with many giant Internet companies in China like Tencent, Baidu, and Alibaba. What\u2019s more, we have won lots of awards in IT education training such as \u201cTop Ten Influential Brands In Online Education Industry\u201d given by Baidu, \u201cOfficial IT Online Training Organization\u201d awarded by Tencent Class, etc. Join us: https:\/\/cciedump.spoto.net\/ Contact us: E-mail: support@spoto.net Phone \/ WhatsApp: +86 18344981205\",\"sameAs\":[\"https:\/\/cciedump.spoto.net\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MPLS VPN Architecture-1 - SPOTO Official Blog","description":"Discover the comprehensive MPLS VPN architecture, addressing the limitations of traditional VPNs. Learn how MPLS integrates with BGP to resolve address overlap issues, ensuring seamless private network interconnection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html","og_locale":"en_US","og_type":"article","og_title":"MPLS VPN Architecture-1 - SPOTO Official Blog","og_description":"Discover the comprehensive MPLS VPN architecture, addressing the limitations of traditional VPNs. Learn how MPLS integrates with BGP to resolve address overlap issues, ensuring seamless private network interconnection.","og_url":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html","og_site_name":"SPOTO Official Blog","article_published_time":"2020-04-23T02:30:32+00:00","article_modified_time":"2024-11-06T05:17:36+00:00","og_image":[{"width":960,"height":642,"url":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/20_gaitubao_-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SPOTO Club","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/cciedump.spoto.net\/blog\/#website","url":"https:\/\/cciedump.spoto.net\/blog\/","name":"SPOTO Official Blog","description":"Focus on Online IT Training for 20+ Years","publisher":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cciedump.spoto.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#primaryimage","inLanguage":"en-US","url":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/20_gaitubao_-1.jpg","contentUrl":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/20_gaitubao_-1.jpg","width":960,"height":642},{"@type":"WebPage","@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#webpage","url":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html","name":"MPLS VPN Architecture-1 - SPOTO Official Blog","isPartOf":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#primaryimage"},"datePublished":"2020-04-23T02:30:32+00:00","dateModified":"2024-11-06T05:17:36+00:00","description":"Discover the comprehensive MPLS VPN architecture, addressing the limitations of traditional VPNs. Learn how MPLS integrates with BGP to resolve address overlap issues, ensuring seamless private network interconnection.","breadcrumb":{"@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cciedump.spoto.net\/blog"},{"@type":"ListItem","position":2,"name":"MPLS VPN Architecture-1"}]},{"@type":"Article","@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#article","isPartOf":{"@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#webpage"},"author":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638"},"headline":"MPLS VPN Architecture-1","datePublished":"2020-04-23T02:30:32+00:00","dateModified":"2024-11-06T05:17:36+00:00","mainEntityOfPage":{"@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#webpage"},"wordCount":987,"commentCount":0,"publisher":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638"},"image":{"@id":"https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#primaryimage"},"thumbnailUrl":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/20_gaitubao_-1.jpg","keywords":["MPLS VPN","VPN networks"],"articleSection":["Cisco Technologies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cciedump.spoto.net\/blog\/mpls-vpn-architecture-1_420.html#respond"]}]},{"@type":["Person","Organization"],"@id":"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638","name":"SPOTO Club","image":{"@type":"ImageObject","@id":"https:\/\/cciedump.spoto.net\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/03\/spoto-facemask-96x96.jpg","contentUrl":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/03\/spoto-facemask-96x96.jpg","caption":"SPOTO Club"},"logo":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#personlogo"},"description":"SPOTO is an excellent leader in IT certification training for 20+ years. We offer 100% real Cisco CCNA, CCNP exam dumps, CCIE Lab study materials, PMP, CISA, CISM, AWS, Palo Alto, and other IT exam dumps. We have helped thousands of candidates around the world to pass their IT exams on the first try! As the first-class online IT training organization in China, SPOTO cooperates with many giant Internet companies in China like Tencent, Baidu, and Alibaba. What\u2019s more, we have won lots of awards in IT education training such as \u201cTop Ten Influential Brands In Online Education Industry\u201d given by Baidu, \u201cOfficial IT Online Training Organization\u201d awarded by Tencent Class, etc. Join us: https:\/\/cciedump.spoto.net\/ Contact us: E-mail: support@spoto.net Phone \/ WhatsApp: +86 18344981205","sameAs":["https:\/\/cciedump.spoto.net\/"]}]}},"_links":{"self":[{"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/posts\/420"}],"collection":[{"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/comments?post=420"}],"version-history":[{"count":3,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/posts\/420\/revisions"}],"predecessor-version":[{"id":22043,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/posts\/420\/revisions\/22043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/media\/423"}],"wp:attachment":[{"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/media?parent=420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/categories?post=420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/tags?post=420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}