Private Network Laid Over ThinCPEs routing area related work

Slides:



Advertisements
Similar presentations
L3vpn end-system draft Pedro Marques. Overview Defines a mechanism to associate an end- system virtual interface to an L3VPN. – Co-located forwarder:
Advertisements

Draft-ni-l3vpn-bgp-ext-sd-co-lsp-00IETF 87 L3VPN1 BGP Extensions for Setup Service-Driven Co-Routed LSP in L3VPN draft-ni-l3vpn-bgp-ext-sd-co-lsp-00 Hui.
Network based IP VPN Architecture using Virtual Routers Jessica Yu CoSine Communications, Inc. Feb. 19 th, 2001.
V1.1 VPLS Principle. Objectives Understand the basics of mpls layer 2 VPN Understand VPLS principle.
Draft-boutros-bess-evpn-vpws-service-edge-gateway-00 Sami Boutros Ali Sajassi Patrice Brissette [Cisco Systems] Daniel Voyer [Bell Canada] IETF 92,
GVPNs: Generalized VPNs using BGP and GMPLS Toolkit draft-ouldbrahim-ppvpn-gvpn-bgpgmpls-06.txt Hamid Ould-Brahim Yakov Rekhter
Lucy Yong Susan Hares September 20, 2012 Boston
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Networks Warren Toomey. Available WAN Links.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
IETF 81 Quebec City1 Requirements and Framework of VPN-oriented Data Center Services Ning
1 Requirements for IPv6 prefix delegation for IETF-55 th at Atlanta, Nov.2002 Shin Miyakawa NTT Communications / WIDE Project
Network Virtualization Overlay Use Cases Lucy Yong, Mehmet Toy, Aldrin Isaac, Vishwas Manral, Linda Dunbar September 20, 2012 Boston draft-mity-nvo3-use-case.
IP Transitioning in CE Routers Mark Townsley, Ole Troan.
IP/MPLS VPN Protocol GAP Analysis For NVO3 draft-hy-nvo3-vpn-protocol-gap-analysis-02 Lucy Yong Susan Hares March 2013 Orlando FL.
GRE.
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
Automatic attachment of end stations and network devices Dan Romascanu Paul Unbehagen (draft-romascanu-opsawg-auto-attach-framework-00)draft-romascanu-opsawg-auto-attach-framework-00.
MPLS Virtual Private Networks (VPNs)
Virtual Private Network Access for Remote Networks
Routing and Addressing in Next-Generation EnteRprises (RANGER)
Chapter 1 Introduction to Networking
Virtual Private Networks
Use Case for Distributed Data Center in SUPA
Virtual Private Networks
Examples based on draft-cheng-supa-applicability-00.txt
Applicability Statement for Layer 1 Virtual Private Networks (L1VPNs) Basic Mode draft-takeda-l1vpn-applicability-basic-mode-00.txt Deborah Brungard (AT&T)
Gateway-Initiated 4over6 Deployment
The sign of success.
Virtual Private Networks
draft-white-i2rs-use-case-02
Network Fundamentals – Chapter 5
A Framework for Service-Driven Co-Routed MPLS Traffic Engineering LSPs draft-li-mpls-serv-driven-co-lsp-fmwk-01 Zhenbin Li, Shunwan Zhuan, Jie Dong Huawei.
Chapter 18 IP Security  IP Security (IPSec)
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Cisco Want to Pass SPEDGE
Presenter: Jeffrey Zhang
Hector Avalos Technical Director-Southern Europe
L1VPN Working Group Scope
Enterprise vCPE use case requirement
Requirements for IPv6 prefix delegation for IETF-55th at Atlanta, Nov.2002 Shin Miyakawa NTT Communications.
ACTN Clarifications and proposed update
TRILL MPLS-Based Ethernet VPN
Multicast in Virtual Router-based IP VPNs
Performance Monitoring Analysis for L3VPN
Requirements for supporting Customer RSVP and RSVP-TE over a BGP/MPLS IP-VPN draft-ietf-l3vpn-e2e-rsvp-te-reqts-01.txt Kenji Kumaki KDDI R&D Labs,
SDN use case 1: VPN Fengkai Li.
CISCO Implementing Cisco IP Routing (ROUTE v2.0) Dumps VCE
SRv6 for Mobile User-Plane
ESS Mesh Deployment Usage Model
Qin Wu Roni Even Ying Cheng IETF 103 Bangkok, Tailand Oct 12, 2018
The Business Value of MPLS VPNs
Zhenbin Li, Shunwan Zhuang Huawei Technologies
Michale Wang Qin Wu Roni Even Wen Bin IETF 103 Bangkok, Tailand
Extending MPLS/BGP VPNs to End-Systems
MPLS VPNs by Richard Bannister.
Kireeti Kompella Juniper Networks
ESS Mesh Deployment Usage Model
SRv6 for Mobile User-Plane
Aijun Wang China Telecom Nov 2017
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
EVPN multi-homing port-active load-balancing IETF-101 [London]
Private Networks.
EVPN multi-homing port-active load-balancing IETF-103 [Bangkok]
BGP VPN service for SRv6 Plus IETF 105, Montreal
Applying CIM to SD-WAN Weiqiang Cheng, Feng Yang(CMCC)
OCI – VPN Connect Internet Customer Premises
Presentation transcript:

Private Network Laid Over ThinCPEs routing area related work draft-dunbar-opsawg-private-networks-over-thin-cpe Linda Dunbar, Lucy Yong, XiaoLin Song

More than SD-WAN Like SD-WAN But different from SD-WAN IP tunnels are automatically established among Thin-CPEs, But different from SD-WAN there are interactions with the underlay network (even though the interaction to underlay network is transparent to users),   there are gateways (for private networks) instantiated in the underlay network to establish secure connections between Thin-CPEs and the gateways, and Virtual Functions instantiated in the underlay networks to guarantee policies on Security, QoS, and other Value Added service.

Key Differences from L3VPN, L2VPN SD-WAN L3SM WAN/POP site site L3VPN, L2VPN SD-WAN Provider network, PE<-> CE protocol PE <-> PE protocols Number of VPNs are much larger, thousands or even 10s of thousands Underlay network can be IP, MPLS, L3VPN, L2 or L0 No visibility to CE<-> PE, or PE<->PE protocol in underlay networks

Needed Work in Routing Area Massive jungle of on the wire encaps Lack of standardized control plane For dynamic discovery between Overlay and the underlay For controlling the desired policies and QoS Fault isolation/identification (control plane, data plane, management plane) Some of the protocol work described by https://datatracker.ietf.org/doc/draft-templin-aerolink/ applicable, such as: Interface Characteristics, Relay Behavior, Interface Forwarding Algorithm, Router Discovery, Prefix Delegation and Autoconfiguration, Interface Route Optimization, etc. (not to say the protocols described are 100% correct & applicable). Some items described in "draft-kanugovi-intarea-mams-protocol-01" are applicable too, such as Access technology agnostic interworking Independent Access path selection for Uplink and Downlink IP anchor selection independent of uplink and downlink access Adaptive network path selection Configuring network middleboxes based on negotiated protocols CE Based VPN?

Next Step: Solicit input, comments, and co-authors from the community Is there any interest to work on this domain?

Suggestions?