Draft-ietf-l3sm-l3vpn-service-model S. Litkowski R. Shakir L. Tomotaki K. D’Souza.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
Advertisements

Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Draft-bogdanovic-netmod-yang- model-classification-03 IETF 92 Dallas NETMOD WG B. Claise, C. Moberg, Cisco Systems D. Bogdanovic Juniper Networks.
Kae Hsu Communication Network Dept. Redundant Internet service provision - customer viewpoint.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Announcements List Lab is still under construction Next session we will have paper discussion, assign papers,
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Kenji Kumaki KDDI, Editor Raymond Zhang BT Nabil Bitar Verizon
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
72nd IETF Dublin July 2008 Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-01.txt Yuji.
Status of Work Feb 2, What and how fits? (option 1) Network Manager Network Elements (routers, switches, etc) RESTCONF / NETCONF Service Management.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Lecture 4: BGP Presentations Lab information H/W update.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
Multiple Interfaces (MIF) WG IETF 79, Beijing, China Margaret Wasserman Hui Deng
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
73rd IETF Minneapolis Nov Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-02.txt.
Introduction to Active Directory
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
Draft-li-rtgwg-igp-ext-mrt-frr-00IETF 85 RTGWG1 Applicability of LDP Multi-Topology for Unicast Fast-reroute Using Maximally Redundant Trees draft-li-rtgwg-ldp-mt-mrt-frr-01.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to Multiple Service.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Inter-domain SLA Exchange
MBGP and Customer Routes
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
Subscriptions for Event Notification + Yang-push IETF NETCONF WG Contributors Call 26 - May
Automatic attachment of end stations and network devices Dan Romascanu Paul Unbehagen (draft-romascanu-opsawg-auto-attach-framework-00)draft-romascanu-opsawg-auto-attach-framework-00.

MPLS Virtual Private Networks (VPNs)
1.4 wired and wireless networks lesson 1
Barracuda NG Firewall ™
CE Based Membership Verification for L3VPN
Creating Rules and Rule Sets Configuration Example
Network Overview.
Use Case for Distributed Data Center in SUPA
Examples based on draft-cheng-supa-applicability-00.txt
Virtual Local Area Networks or VLANs
Instructor Materials Chapter 6: VLANs
draft-ietf-l3sm-l3vpn-service-model IETF 94 - Yokohama
IEEE 802 OmniRAN Study Group: SDN Use Case
Wireless ATM & Congestion Control
Securing the Network Perimeter with ISA 2004
SUPA/YMCA (Yang Models for Configuration and topology Abstraction)
IP (slides derived from past EE122 sections)
P802.11aq Waiver request regarding IEEE RAC comments
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Chapter 1: WAN Concepts Connecting Networks
IS3120 Network Communications Infrastructure
SDN use case 1: VPN Fengkai Li.
IPv6-only in an Enterprise Network
Implement Inter-VLAN Routing
IPv6 VPN Based Address Format draft-lee-l3vpn-ipv6-vpn-00.txt
Routing and Switching Essentials v6.0
Server-to-Client Remote Access and DirectAccess
IS4680 Security Auditing for Compliance
Zhenbin Li, Shunwan Zhuang Huawei Technologies
Kireeti Kompella Juniper Networks
Spanning Tree Protocol (STP)
Implement Inter-VLAN Routing
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Implement Inter-VLAN Routing
P802.11aq Waiver request regarding IEEE RAC comments
BPSec: AD Review Comments and Responses
Global One Communications
Layer 2 VPN (L2VPN) Service Model L2SM Working Group
Pseudo-Wire Protection
Presentation transcript:

draft-ietf-l3sm-l3vpn-service-model S. Litkowski R. Shakir L. Tomotaki K. D’Souza

Context A lot of YANG models for network elements and protocols are in progress Need also service models Let’s start with Layer 3 VPN « famous » service L3SM WG set up to follow the work (short live WG)

A service model, not a configuration model Service model provides an abstraction of customer requirements to build the service No bits and bytes regarding protocol and element detailed configuration Focus : what the customer wants in abstracted terms

Service model and config models working together

Note … We started from PE-Based L3VPN service … The model may need to be extended/modified to support all types of L3VPN.

Design of the model Two main blocks : – vpn-svc : Describe a VPN and its associated services (Cloud, multicast …) – sites : Describe a VPN site VPN#1 Site#1 Site#2 Site#3

VPNs are identified by a unique name We also provide an optional ID We cannot use the customer-name as a key, as a customer may have multiple VPNs A VPN has a specific topology : – Anytoany, Hub&Spoke, Hub&Spoke disjoint Design of the model : vpn-svc

Services can be added on the VPN : – Cloud access : Access to any Cloud service Provider CSP identified by an internal ID (local administrative identificator) Some sites can be registered to access to the CSP NAT to CSP is possible – Multicast : Allow to enable multicast traffic on the VPN Some strong coordination with customer parameters required (type of tree …) Design of the model : vpn-svc

Site parameters : – ID – Type of site (in the VPN topology) -> Hub, Spoke … – Possibility to schedule site enabling – Location of the site (address) – Diversity parameters : Do I need to have sites not connected on the same provider edge ? – Security parameters (encryption …) – Availability parameters : do I need a backup ? Or loadsharing ? – Type of attachment (bearer, IP layer, routing …) – Services : QoS, Bandwidth, MTU, protection … – Management : Is it a comanaged site ? – VPN policy – Customer specific information Design of the model : sites

Site location The address of the site would permit to the SP OSS to find the appropriate provider edge to place the customer access.

Site diversity When placing accesses onto network elements, customer may want to avoid some sites to share fate. Two proposed options : PoP diversity, PE diversity

Site availability Increase availability of the site access Three options : – Single : no redundancy (basic) – Primary-backup : dual homing scenario, with traffic primarly going to one site – Loadsharing : multihoming scenario Each access has a function in the availability scenario through the « access-type » : single-access, primary-access,backup-access,loadsharing-access

Site attachment Attachment = customer connection to the SP Required parameters from the customer or external systems : – Some physical parameters (bearer) – IP address allocation – Type of routing – Fast failure detection or not

Site services Defining QoS requirements : customized or SP profile Defining BW (may be asymetric) Defining if protection is required Defining if MPLS or multicast forwarding is required

VPN policy A site can be part of multiple VPNs Moreover some LANs of a site can be part of some VPNs, while some other LAN can be part of others. VPN policy is something complex …  Site#1 Site#2 Site#3 LAN#31 LAN#32 LAN#11 LAN#12 LAN#21 LAN#22 ???? LAN#31 can talk with LAN#11 and LAN#21 but not LAN#12 and #22 LAN#32 can talk with LAN#22 only

We introduce the notion of native VPN A site belongs to ONLY one native VPN : this does not mean that the site belongs to only one VPN ! Base behavior : – All prefixes of the site will be able to reach other prefixes of other sites in the native VPN according to the VPN topology (any to any, hub & spoke …) More complex scenarios are created by using vpn- policy VPN policy

Why not multiple native VPNs ? – This is causing issues if two « native » VPNs have different topologies and the site has a different role in those topologies. – Example : site #1 belongs to VPN A (H&S) and is a Hub, and belongs to VPN B (H&S) and is a spoke  Native VPN does not prevent a site to belongs to multiple VPN … see next slide … VPN policy

VPN policy defines a set of communication rules No need of VPN policy if only communication rules of the VPN native are used. VPN policy is there to create more complex rules Today we use import/export concept but maybe not enough abstracted or do we need to rely on policy model in RTGWG ? VPN policy

Customer specific information To ensure proper configuration through the config models, some parameters from the customers may be required

Mapping service model to config model Example : – We want to create Spoke_site#1 in this VPN :

Mapping service model to config model

Site templates VPNs may have many sites, and some sites may share the same description We can use templates to refer to some shared configuration

Template definition : – Create a site with « template=true » No need to detail all the parameters, just describe the ones you want to inherit – Apply template : Template can be applied at : top level of the site (inherit all the config from the template) Security section (only security section is inherited) Attachment section Service section A parameter defined in a real site must override inherited parameter Site templates

Not finished … next steps … We still need to work on : – Comments from the list : Do we need externalize Cloud accesses and multicast from VPN ? Some wordings to be changed … – Security parameters – VPN policy ? – Need to review if the current proposal fits any L3VPN rather than PE-Based only Operational states ? What about interAS consideration ? – In my mind, nothing to do … but need to be discussed ! What about Hybrid VPNs (public+private sites) ? What about value added services ? (DDoS, antivirus, DPI, …) Anything else ?