MPLS Virtual Private Networks (VPNs)

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

MPLS VPN.
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
Deployment of MPLS VPN in Large ISP Networks
Routing Basics.
Internetworking II: MPLS, Security, and Traffic Engineering
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
MPLS-VPN/BGP Approach Hari Rakotoranto Technical Marketing Engineer
Introducing MPLS Labels and Label Stacks
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
CS Summer 2003 Lecture 6. CS Summer 2003 Hierarchical LSP LSP1 LSP2 LSP3 Ingress LSR for LSP1 Egress LSR for LSP1 Ingress LSR for LSP3 Hierarchical.
MPLS H/W update Brief description of the lab What it is? Why do we need it? Mechanisms and Protocols.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
COS 420 Day 16. Agenda Assignment 3 Corrected Poor results 1 C and 2 Ds Spring Break?? Assignment 4 Posted Chap Due April 6 Individual Project Presentations.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
MPLS VPN Security assessment
V1.1 VPLS Principle. Objectives Understand the basics of mpls layer 2 VPN Understand VPLS principle.
1 © 1999, Cisco Systems, Inc _05F9_c2 1 NW’99 Vienna © 1999, Cisco Systems, Inc. MPLS VPNs Peter Tomsu Senior Consultant EMEA
SMUCSE 8344 Lecture 9 Mark E. Allen SMU SMUCSE 8344 Agenda Summarize MPLS –Discussion from Cisco Presentation Discuss QoS in MPLS –Chapter 6 in.
EVC Atahar Khan CCIE SP Cisco Systems.
Router and Routing Basics
MPLS Forwarder Preliminary 1 Outline MPLS Overview MPLS Overview MPLS MRD MPLS Data Path HLD 48K MPLS Fwder HLD IPE MPLS Fwder HLD Issues Summary.
Inter AS option D (draft-mapathak-interas-option-d-00) Manu Pathak Keyur Patel Arjun Sreekantiah November 2012.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
MPLS Label Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
Mr. Mark Welton.  WAN transportation method that formats data into frames and sent over a network controlled by a service provider  Frame Relay is often.
Module 2 MPLS Concepts.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
1 Overview of VPN. 2 Private Networks Leased Lines Organization A Site 1 Organization A Site 2 Organization A Site 3 Organization B Site 1 Organization.
Virtual Private LAN Service
MBGP and Customer Routes
MPLS Introduction Computer Networks 2007 Week 9 Lecture 1 by Donald Neal.
Study and Review Notes Presented By Duane Bodle Keys2Texas, Inc.
Advanced Computer Networks
Performance Measurements of MPLS Traffic Engineering and QoS
Multiprotocol Label Switching
Requirements for LER Forwarding of IPv4 Option Packets
Virtual Private Networks
Virtual Private Networks
MPLS VPN Implementation
Virtual Private Network (VPN)
Implementing Secure Converged Wide Area Networks (ISCW)
Presenter: Jeffrey Zhang
Hector Avalos Technical Director-Southern Europe
Multi Protocol Label Switching (MPLS)
Virtual Private Network (VPN)
MPLS Basics 2 2.
MPLS - How does it work ?.
Chapter 2: Static Routing
MPLS VPNs by Richard Bannister.
Kireeti Kompella Juniper Networks
VPN: Virtual Private Network
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
COMP/ELEC 429/556 Introduction to Computer Networks
Ch 17 - Binding Protocol Addresses
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Experiences with Implementing MPLS/VPN Services
Chapter 1 Introduction Networking Architecture Overview.
Presentation transcript:

MPLS Virtual Private Networks (VPNs) SMU CSE 8344

When VPN? Internet as your own private network Communicate securely between various corporate sites (Intranet) Communicate securely between partner sites (Extranet) Connect remote dial-up users securely to corporate networks SMU CSE 8344

Advantages Flexible and cost effective Better business-to-business connectivity business partners, service providers, contractors, and customers Advances in security SMU CSE 8344

Layer2 vs. Layer3 VPNs Layer 3 VPNs Layer 2 VPNs Provider devices forward customer packets based on Layer 3 information (e.g., IP) Provider devices forward customer packets based on Layer 2 information Tunnels, circuits, LSPs, MAC address SP involvement in routing MPLS/BGP VPNs (RFC 2547), GRE, virtual router approaches “pseudo-wire” concept SMU CSE 8344

Step #1 Workstation A sends packet destined for Server B Layer2 Example Step #2 R1 takes Ethernet frame and encapsulates it in L2TP and routes it to tunnel destination Step #3 R2 receives IP/L2TP/Ethernet Packet and removes the IP/L2TPv3 headers. The remaining Ethernet frame is forwarded to Server B. IP or MPLS Core IP Core Step #1 Workstation A sends packet destined for Server B R1 R2 IP L2TP Ethernet Ethernet Ethernet L2TPv3 Tunnel Server B Workstation A SMU CSE 8344

Overlay Model Each site has a router connected via P-T-P links to routers on other sites Leased lines Frame relay ATM circuit Connectivity Fully connected Hub-and-spoke SMU CSE 8344

Limitations of Overlay Customers need to manage the back-bones Mapping between Layer2 Qos and IP QoS Scaling problems Cannot support large number of customers (n-1) peering requirement SMU CSE 8344

The Peer Model Aims to support large-scale VPN service Key technologies Constrained distribution of routing info. Multiple forwarding tables VPN-IP addresses MPLS switching SMU CSE 8344

Terminology CE router PE router P router Customer Edge router Provider Edge router. Part of the P-Network and interfaces to CE routers P router Provider (core) router, without knowledge of VPN SMU CSE 8344

Terminology (cont’d) Route Distinguisher VPN-IPv4 addresses VRF Attributes of each route used to uniquely identify prefixes among VPNs (64 bits) VPN-IPv4 addresses Address including the 64 bits Route Distinguisher and the 32 bits IP address VRF VPN Routing and Forwarding Instance Routing table and FIB table SMU CSE 8344

Connection Model The VPN backbone is composed by MPLS LSRs PE routers (edge LSRs) P routers (core LSRs) PE routers are faced to CE routers and distribute VPN information through BGP to other PE routers P routers do not run BGP and do not have any VPN knowledge SMU CSE 8344

Model (cont’d) P and PE routers share a common IGP PE and CE routers exchange routing information through: EBGP, OSPF, RIP, Static routing CE router run standard routing software SMU CSE 8344

Routing The routes the PE receives from CE routers are installed in the appropriate VRF The routes the PE receives through the backbone IGP are installed in the global routing table By using separate VRFs, addresses need NOT to be unique among VPNs SMU CSE 8344

Forwarding PE and P routers have BGP next-hop reachability through the backbone IGP Labels are distributed through LDP (hop-by-hop) corresponding to BGP Next-Hops Label Stack is used for packet forwarding Top label indicates Next-Hop (interior label) Second level label indicates outgoing interface or VRF (exterior label) SMU CSE 8344

Forwarding (cont’d) The upstream LDP peer of the BGP next-hop (PE router) will pop the first level label The egress PE router will forward the packet based on the second level label which gives the outgoing interface (and VPN) SMU CSE 8344

Forwarding Example CE1 PE1 CE2 P1 P2 PE2 CE3 SMU CSE 8344 IP packet PE2 receives the packets with the label corresponding to the outgoing interface (VRF) One single lookup Label is popped and packet sent to IP neighbour IGP Label(PE2) VPN Label IP packet P routers switch the packets based on the IGP label (label on top of the stack) CE1 VPN Label IP packet Penultimate Hop Popping P2 is the penultimate hop for the BGP next-hop P2 remove the top label This has been requested through LDP by PE2 IP packet PE1 CE2 IGP Label(PE2) VPN Label IP packet PE1 receives IP packet Lookup is done on site VRF BGP route with Next-Hop and Label is found BGP next-hop (PE2) is reachable through IGP route with associated label P1 P2 PE2 CE3 SMU CSE 8344

Scalability Existing BGP techniques can be used to scale the route distribution Each edge router needs only the information for the VPNs it supports Directly connected VPNs Easy to add new sites configure the site on the PE connected to it, the network automatically does the rest SMU CSE 8344

QoS Support Pipe model Hose Model Similar to int-serv Unidirectional as opposed to bi-directional model in ATMs Hose Model Similar to diff-serv SMU CSE 8344