Recent Progress in Routing Standardization An IETF update for UKNOF 23 Old Dog Consulting Adrian

Slides:



Advertisements
Similar presentations
All Rights Reserved © Alcatel-Lucent 2009 Enhancing Dynamic Cloud-based Services using Network Virtualization F. Hao, T.V. Lakshman, Sarit Mukherjee, H.
Advertisements

Application-Based Network Operations (ABNO) IETF 88 – SDN RG
The Impact of SDN On MPLS Networks Adrian Farrel Juniper Networks
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Problem Statement and Architecture for Information Exchange Between Interconnected Traffic Engineered Networks draft-farrel-interconnected-te-info-exchange-03.txt.
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Vpn service Ericsson.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
L3vpn end-system draft Pedro Marques. Overview Defines a mechanism to associate an end- system virtual interface to an L3VPN. – Co-located forwarder:
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
Gap Analysis of Simplified Use of Policy Abstractions (SUPA) Presenter: Jun Bi draft-bi-supa-gap-analysis-02 IETF 92 SUPA BoF Dallas, TX March 23, 2015.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Copyright © 2012, QoS-aware Network Operating System for Software Defined Networking with Generalized OpenFlows Kwangtae Jeong, Jinwook Kim.
BGP L3VPN Virtual PE draft-fang-l3vpn-virtual-pe-01
A Survey on Interfaces to Network Security
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
IETF-82 draft-bitar-datacenter-vpn-applicability-01.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-datacenter-vpn-applicability-01.txt.
Abstraction and Control of Transport Networks (ACTN) BoF
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
ITU-T Study Group 13 Communications to IETF CCAMP Working Group Marco Carugi ITU-T SG13 Liaison Officer to IETF CCAMP
Additional SugarCRM details for complete, functional, and portable deployment.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Data Center Network Redesign using SDN
Networking in the cloud: An SDN primer Ben Cherian Chief Strategy Midokura.
IETF-84 (29 July – 3 Aug. 2012) Cloud Computing, Networking, and Service (CCNS) Update for GISFI-10, New Delhi, India Sept Monday-10-September-20121IETF84.
Interface to the Routing System
Lucy Yong Susan Hares September 20, 2012 Boston
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu IETF82, TAIWAN.
MDC417 Follow me on Working as Practice Manager for Insight, he is a subject matter expert in cloud, virtualization and management.
Virtual Topologies for Service Chaining in BGP IP/MPLS VPNs draft-rfernando-bess-service-chaining-00 (previously draft-rfernando-l3vpn-service-chaining-04)
CON Software-Defined Networking in a Hybrid, Open Data Center Krishna Srinivasan Senior Principal Product Strategy Manager Oracle Virtual Networking.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
IETF 81 Quebec City1 Requirements and Framework of VPN-oriented Data Center Services Ning
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
ARMD – Next Steps Next Steps. Why a WG There is a problem People want to work to solve the problem Scope of problem is defined Work items are defined.
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Interface to The Internet Routing System (IRS) draft-atlas-irs-problem-statement-00 draft-ward-irs-framework-00 Alia Atlas Thomas Nadeau David Ward IETF.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Network Virtualization Overlay Use Cases Lucy Yong, Mehmet Toy, Aldrin Isaac, Vishwas Manral, Linda Dunbar September 20, 2012 Boston draft-mity-nvo3-use-case.
Nov. 8, 2006IDR WG Meeting1 IPv6 Next Hop for IPv4 Prefix In BGP Updates, NH not necessarily of same address family as NLRI Currently deployed examples:
Moving towards an IRS WG Charter Ross Callon IETF 85, Atlanta.
Network Virtualization Overlays Use Cases draft-timy-nvo3-use-case-01 Lucy Yong Mehmet Toy Aldrin Isaac Vishwas Manral Linda Dunbar Vancouver July 31,
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
67th IETF San Diego November 2006 Applicability analysis of Generalized Multiprotocol Label Switching (GMPLS) protocols for the Layer 1 Virtual Private.
The Application of the Path Computation Element Architecture to the Determination of a Sequence of Domains in MPLS & GMPLS draft-king-pce-hierarchy-fwk-01.txt.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
I2RS Overlay usecase 1 Fangwei hu Bhumip Khasnabish.
BGP Validation Russ White Rule11.us.
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
IP/MPLS VPN Protocol GAP Analysis For NVO3 draft-hy-nvo3-vpn-protocol-gap-analysis-02 Lucy Yong Susan Hares March 2013 Orlando FL.
Draft-fm-bess-service-chaining-01 Prague, July 2015 Rex Fernando Stuart Mackie Dhananjaya Rao Bruno Rijsman Maria Napierala.
CERTIFICATION EXAM QUESTIONS DESIGNING CISCO NETWORK SERVICE ARCHITECTURE (ARCH) V 2.1 Presented By : com.
Network Virtualization Ben Pfaff Nicira Networks, Inc.
draft-patel-raszuk-bgp-vector-routing-01
Applicability Statement for Layer 1 Virtual Private Networks (L1VPNs) Basic Mode draft-takeda-l1vpn-applicability-basic-mode-00.txt Deborah Brungard (AT&T)
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Goals of soBGP Verify the origin of advertisements
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Interface to Routing System (I2RS)
ACTN Information Model
NTHU CS5421 Cloud Computing
Cloud-Enabling Technology
Presentation transcript:

Recent Progress in Routing Standardization An IETF update for UKNOF 23 Old Dog Consulting Adrian IETF Routing Area Director Daniel IETF Working Group Secretary (CCAMP, L3VPN, PCE, ROLL)

What Is Interesting and New?  Secure Inter-domain Routing (SIDR) –A long-standing effort making progress  Network Virtualization Overlays (NVO3) –A new working group starting to focus  Interface to the Routing System (IRS) –A new proposal with a meeting planned for IETF-85 in November 2

SIDR  Inter-domain routing is fragile –“99% of mis-announcements are accidental originations of someone else’s prefix” – Google –It is possible some mis-announcements are malicious!  SIDR aims to address –Is an AS authorized to originate an IP prefix? –Is the AS-Path represented in the route the same as the path through which the NLRI travelled? –Is the BGP protocol exchange secure?  Non-goal is to prevent all malicious attacks 3

Resource Public Key Infrastructure (RPKI)  Public and private key –Encrypt with one; decrypt with the other  Public key issued by certifying authority  X.509 certificates used –Tree of certification following address allocation –Address prefix is signed and announced with public key  Route Origin Authorization –A signed prefix and AS number –Some support for aggregation –BGP advertisement checked against signed ROAs  NB. Compute load much less than ACLs 4

SIDR Progress  Completed frameworks for RPKI and ROAs  Completed core infrastructure for RPKI/ROA  Mature/completed –Protocol for exchanging information between RPKI and routers –Advertisement validation mechanism  Work in progress –Security enhancements to BGP  Specifically secure the AS-PATH attribute 5

SIDR References  SIDR Working Group  RFC 6480 An Infrastructure to Support Secure Internet Routing  Endless presentations at nanog and ripe –  Search for SIDR – 6

Multi-tenant DC Networking IP/MPLS Network Storage DC FW LB VM-based Appliances NAT VMs on Server Blades VM VPN PE/GW VSw  Gateway to the outside world.  DC Interconnect and connectivity to Internet and VPN customers.  High capacity core node, usually a cost effective Ethernet switch; may support routing capabilities.  Top of Rack (ToR) hardware-based Ethernet switch; may perform IP routing.  Virtual Switch (VSw) software based Ethernet switch running inside the server blades. Top of rack Switch

NVO3 Overview  Multi-tenancy has become a core requirement of data centers –Including for Virtualized Machines (VMs) and VM multi-tenancy  Three key requirements needed to support multi-tenancy are –Traffic isolation –Address independence –Fully flexible VM placement and migration  NVO3 WG considers approaches to multi-tenancy that reside at the network layer rather than using traditional isolation (e.g., VLANs) –An overlay model to interconnect VMs distributed across a data center  NVO3 WG will determine which types of connectivity services. are needed by typical DC deployments (for example, IP and/or Ethernet) NV03 WG Will Not develop service provider solutions for wide-area interconnect of data centers

NVO3 WG Progress  NVO3 Working Group –First meeting IETF-84 July 2012 –  Problem Statement: Overlays for Network Virtualization –Describes issues associated with providing multi-tenancy that require an overlay-based network virtualization approach to addressing them –Adopted by working group September 2012 –  Framework for DC Network Virtualization –Provides a framework for NVO3. It defines a logical view of the main components with the intention of streamlining terminology and focusing the solution set –Adopted by working group September 2012 –

NVO3 has loads of buzz  Internet-Drafts include: –Data and Control Plane Requirements –Framework  Overlay Architecture  Addressing –Use Cases  VPN Applicability  Mobility Issues –Operational Requirements –Security Framework

IRS  Configuration access to routers tends to be –Non-dynamic –Granular –Non-standard  Existing programmatic interfaces target –Data plane –FIB  Need a way to provide high-level input to routing and to extract data –Make entries in RIBs –Control routing protocols –Set policies  For policy-based routing QoS, OAM, etc.  Security, firewalls, etc.  Route import/export –Read topology and routing information 11

IRS Framework 12 Data Plane FIB RIBs and RIB Manager Policy DB Routing and Signaling Protocols Topology DB OAM, Events and Measurement IRS Agent IRS Client Router Server Application IRS Protocol & Data Encoding

Questions to Be Answered  What is an IRS Application?  How does IRS interact with Configuration?  Are there already existing protocols and encoding languages?  How does this relate to OpenFlow?  What’s it all for? 13

IRS Use Cases  Core routing system manipulation –Injection of static routes –Control of RIB-to-FIB policy –Extraction of RIBs and other data  Topology manipulation –Extraction of topology and traffic engineering info –Creation of virtual links and tunnels  BGP policy –Import and export policies –Route reflector control –Flowspec definition and configuration  Firewalls –Injection of policies 14

IRS Plans  Post some Internet-Drafts and discuss the idea  BoF meeting IETF-85 in Atlanta (November) –Assess level of focus and support  Maybe form a working group –Start with framework, use cases, requirements –Write abstract information models –Continue to evaluate existing protocols and encoding languages –Maybe develop new protocols/languages –Write data models 15

IRS References  IETF-85 BoF Proposals  IRS discussion mailing list  IRS Problem Statement problem-statement/ problem-statement/  IRS Framework framework/ framework/ 16