IETF 85 Use cases for MAP-T draft-maglione-softwire-map-t-scenarios-01 R. Maglione.

Slides:



Advertisements
Similar presentations
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Advertisements

Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Deployment Considerations for Dual-stack Lite draft-lee-softwire-dslite-deployment-00 Yiu Lee, Roberta Magione, Carl Williams, Christian Jacquenet Mohamed.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists Accessing the WAN – Chapter 5.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Content Switch. Introduction of content web switch.. Some content switch products in the market.. Design of a content switch.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
DS-Lite for Point-to- Point Access Network IETF 78 Maastricht 2010 July 30.
Barracuda Load Balancer Server Availability and Scalability.
Association of Communications Engineers Corralling the Broadband Stampede May 7 – 9, 2012 Fort Worth, Texas.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
CS 5565 Network Architecture and Protocols
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
3.4: Using MQC for Implementing QoS
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Cisco Certified Network Associate CCNA Access the WAN Asst.Prof. It-arun.
TCOM 515 Lecture 6.
IPv6 Deployment Plan The Global IPv6 Summit 2001.
Service Function Chaining Use Cases draft-liu-service-chaining-use-cases IETF 89 London, March 3, 2014 Will Liu, Hongyu Li, Oliver Huang, Huawei Technologies.
NECP: the Network Element Control Protocol IETF WREC Working Group November 11, 1999.
Introduction to Network Address Translation
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Dean Cheng Jouni Korhonen Mehamed Boucadair
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Sharing a single IPv4 address among many broadband customers
Access Control List (ACL)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Dean Cheng Jouni Korhonen Mehamed Boucadair
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Radius Redirection draft-lior-radius-redirection-01.txt Avi Lior Bridgewater Systems Farid Adrangi Intel.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Firewalls and proxies Unit objectives
ACCESS CONTROL LIST.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Chapter 4: Implementing Firewall Technologies
Access Control Lists (ACL). Access-List Overview 4 A Filter through which all traffic must pass 4 Used to Permit or Deny Access to Network 4 Provides.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Dean Cheng 81 st IETF Quebec City RADIUS Extensions for CGN Configurations draft-cheng-behave-cgn-cfg-radius-ext
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
IETF66 PANA WG Problem Statement for a time-basis accounting in an "always-on“ Broadband scenario R. Maglione - Telecom Italia
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
CCNA4-1 Chapter 7-1 IP Addressing Services Scaling Networks With Network Address Translation (NAT)
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
CCNA4-1 Chapter 7-1 NAT Chapter 11 Routing and Switching (CCNA2)
1 © 2003, Cisco Systems, Inc. All rights reserved. VLAN Maps.
IETF 80 th Lightweight Address Family Transition for IPv6 draft-sunq-v6ops-laft6-01 Chongfeng Xie( China Telecom ) Qiong Sun( China Telecom)
Defining Network Infrastructure and Network Security Lesson 8.
IPv6-based Multihoming Standardization Activities April, 2008
IPv6 for the Network Edge
Securing the Network Perimeter with ISA 2004
Chongfeng. Xie(Presenter), Qiong Sun, Qi He, Cathy Zhou
Instructor Materials Chapter 9: NAT for IPv4
Routing and Switching Essentials v6.0
Chapter 4: Access Control Lists (ACLs)
Instructor Materials Chapter 9: NAT for IPv4
Firewalls Chapter 8.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Chapter 11: Network Address Translation for IPv4
Presentation transcript:

IETF 85 Use cases for MAP-T draft-maglione-softwire-map-t-scenarios-01 R. Maglione

IETF 85 Motivations  The purpose of this draft is to describe some use cases that would benefit from a translation based approach  The following scenarios are based on IPv4 services currently deployed in Broadband networks

IETF 85 Use cases  Access Control Lists  Layer4 Redirection  DPI and Cache devices

IETF 85 Access Control List  Access Control Lists matching TCP/UDP ports are used to identify different types of traffic  Use Cases/Applications:  to deny/permit specific flows  to define QoS bandwith profile  Per Subscriber Access Control Lists are dinamically applied to a PPP Subscriber Session via AAA/RADIUS interface AAA/RADIUS BNG 4V6 Gateway IPv4-Private Customer + IPv6 IPv4-Public IPv6 NAT44 +4V6 RG

IETF 85 Access Control List Translation ipv6 access-list extended ANTISPAM deny tcp any any eq smtp permit ip any any ipv6 access-list extended VIDEOACL permit tcp any eq 1755 any permit tcp any eq 554 any Works TODAY on IPv6 capable BNG’s with ACL applied via RADIUS interface Tunneling New BNG functionality necessary to process IPinIP traffic Requires to wait for vendors to implement new features and to upgrade the BNG AAA/RADIUS BNG 4V6 Gateway IPv4-Private Customer + IPv6 IPv4-Public IPv6 NAT44 +4V6 RG

IETF 85 Layer 4 Redirection  Layer 4/HTTP Redirect user’s traffic to SP’s Web Portal  Use Cases/Applications:  to inform the customer about new service offers  to allow the customer to re-charge his account after his credit has expired BNG 4V6 Gateway IPv4-Private Customer + IPv6 IPv4-Public IPv6 NAT44 +4V6 RG TCP Server

IETF 85 Layer 4 Redirection Translation server-group Provisioning-server server 2001:beef: 8094 ! redirect port-list WebPorts to Provisioning-server … Same service configuration for native IPv6 and 4V6 traffic Tunneling Redirection needs to happen at/after 4V6 Gateway IPv4 and IPv6 traffic redirection happen in different locations Change the service and/or architecture Server with IPinIP functionality Change the server IPv6 = 2001:beef: Port 8094 BNG 4V6 Gateway IPv4-Private Customer + IPv6 IPv4-Public IPv6 NAT44 +4V6 RG TCP Server

IETF 85 DPI and Cache devices  Use Cases/Applications:  DPI devices are used to classify traffic flows based on layer 4-7 identifiers. Classification is needed to provide different treatment for different traffic flows  Cache device are used to save bandwidth  DPI and cache devices are usually located at the edge of the network  DPI and cache devices available today in the market are not able to analyze encapsulated traffic like IPinIP DPICache BNG 4V6 Gateway IPv4-Private Customer + IPv6 IPv4-Public IPv6 NAT44 +4V6 RG

IETF 85 DPI and Cache devices Translation Works on IPv6 capable DPI/cache devices without any change to the architecture No need to add new DPI/cache devices in separate locations Tunneling New DPI/caching functionalities necessary to inspect IPinIP traffic Requires to wait for vendors to implement new features and to upgrade the DPI/cache devices Inspection/caching of IPv4 traffic needs to happen at/after 4V6 Gateway Change the architecture: separate DPI/cache devices for IPv4 and IPv6 traffic DPICache BNG 4V6 Gateway IPv4-Private Customer + IPv6 IPv4-Public IPv6 NAT44 +4V6 RG

IETF 85 Summary  Both encapsulation and translation can provide IPv4 connectivity to customers in an IPv6 only environment  However: in some cases translation can reduce operational costs by allowing the Service Provider to re- use currently deployed network architecture for both IPv4 and IPv6

IETF 85 Questions?