Sangfor Cloud Security Pool, The First-ever NSH Use Case

Slides:



Advertisements
Similar presentations
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks or: How to Provide Security Monitoring as a Service in Clouds? Seungwon.
Advertisements

L3 + VXLAN Made Practical
L. Alchaal & al. Page Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA.
DOT – Distributed OpenFlow Testbed
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Outlines Backgrounds Goals Implementation Performance Evaluation
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Report of Interconnectivity Testing of Service Function Chaining by Six Companies NTT Alaxala Networks Cisco Systems Hitachi Alcatel-Lucent Japan et al.
Keith Wiles DPACC vNF Overview and Proposed methods Keith Wiles – v0.5.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
K. Salah1 Security Protocols in the Internet IPSec.
A Survey of Network Orchestration in Cloud
Connecting LANs, Backbone Networks, and Virtual LANs
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
Data Center Network Redesign using SDN
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Networking in the cloud: An SDN primer Ben Cherian Chief Strategy Midokura.
Chapter 4: Managing LAN Traffic
IEEE 802.1q - VLANs Nick Poorman.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Software-Defined Networks Jennifer Rexford Princeton University.
Brent Salisbury CCIE#11972 Network Architect University of Kentucky 9/22/ OpenStack & OpenFlow Demo.
Programmable Networks: Active Networks + SDN. How to Introduce new services Overlays: user can introduce what-ever – Ignores physical network  perf overhead.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
TeraPaths TeraPaths: Establishing End-to-End QoS Paths through L2 and L3 WAN Connections Presented by Presented by Dimitrios Katramatos, BNL Dimitrios.
1 | © 2015 Infinera Open SDN in Metro P-OTS Networks Sten Nordell CTO Metro Business Group
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Introduction to Mininet, Open vSwitch, and POX
K. Salah1 Security Protocols in the Internet IPSec.
Why Fabric? 1 Complicated technology/vendor/device specific provisioning for networks, especially heterogeneous network DC Network – STP, TRILL, SPB, VXLAN,
SDN and Beyond Ghufran Baig Mubashir Adnan Qureshi.
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
Virtual Local Area Networks In Security By Mark Reed.
Network Virtualization Ben Pfaff Nicira Networks, Inc.
Only Use FD.io VPP to Achieve high performance service function chaining Yi Intel.
Shaopeng, Ho Architect of Chinac Group
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Ready-to-Deploy Service Function Chaining for Mobile Networks
Xin Li, Chen Qian University of Kentucky
Service Function Chaining
Overlay Network Engine (ONE)
Security Methods and Practice CET4884
Optimising Streaming Systems with SDN/P4/NetFPGA
Programmable Overlays with VPP
HELLO WORLD!!! Run Project 2: WELCOME Subject: Virtual LAN’s
ODL SFC, Implementing IETF SFC November 14, 2016
Networking Devices.
of Dynamic NFV-Policies
Chapter 6: Network Layer
Introduction to Networking
NSH_SFC Performance Report FD.io NSH_SFC and CSIT Team
The good, the bad and the ugly…
CS 457 – Lecture 10 Internetworking and IP
ONOS Drake Release September 2015.
Network base Network base.
Service Function Chaining-Enabled
NTHU CS5421 Cloud Computing
Open vSwitch HW offload over DPDK
Implementing an OpenFlow Switch on the NetFPGA platform
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
Top #1 in China Top #3 in the world
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
NetCloud Hong Kong 2017/12/11 NetCloud Hong Kong 2017/12/11 PA-Flow:
An MPLS-Based Forwarding Plane for Service Function Chaining
Flow Processing for Fast Path & Inline Acceleration
Tokyo OpenStack® Summit
An Introduction to Software Defined Networking and OpenFlow
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

Sangfor Cloud Security Pool, The First-ever NSH Use Case in Service Function Chaining Product XiaoFan Chen, Sangfor, Senior Technical Expert on SDN/NFV. Yi Yang, Inspur and Intel Make IT more simple, safe and valuable

Content Background Solution Sangfor Cloud Security Pool and Traffic Steering PBR v.s. SDN based SFC Solution Deployment Framework & Workflow Flow Table Design Realization and Optimization of SFC proxy Some Patches and Test Results NSH

Cloud Security Pool (CSP) CSP: clusters of VNFs (Virtual Network Function). CSSP: Cloud Security Service Platform, i.e. the Management UI for Sangfor CSP. The VNFs in Sangfor CSP are as follows: vNGAF: Firewall, vSSL: SSL/IPSec VPN, vAC: Internet Access Management, vAD: Application Delivery, vWOC: WAN Optimization, vDAS: DB audit, virtual fortress machine, virtual honeypot. vNGAF: virtual next generation firewall vSSL: virtaul SSL/IPSec VPN vAC: virtaul access control vAD: virtual application delivery vWOC: virtual WAN optimization vDAS:virtual database auditor.

Service Function Chaining (SFC) Definition of SFC in Sangfor CSP: Steer the selected traffic passing through some VNFs in order. One example of SFC is show in the figure on the left: a) Traffic is generated from a VM of client; b) Traffic is steered to CSP in the PCR; c) Traffic is steered by SFC in CSP, and the traffic passes through vNGAF, vAC and vAD in order. d) Traffic is steered back to the PCR, and then is routed to the outside network.

Policy Based Routing (PBR)

PBR v.s. SDN based SFC PR: physical router CR: core router for all tenants PS: physical switch ER: edge router for each tenant PBR a) More hops; b) Throughput and latency is not good enough; c) Flexibility is bad. SDN based SFC with OVS+DPDK a) Less hops; b) Better throughput and latency; c) More Flexible in traffic steering and flow entry management.

Deployment of SFC CSP deployed in transparent mode. Traffic from outside network to inside. a) Traffic comes into CSP by WAN port, b) pass through all VNFs within the SFC, c) leaves CSP by LAN port, d) and comes into the client network. The SFC is vNGAF -> vAC -> vAD. No NSH for VNFs at the same host. E.x. vNGAF -> vAC. NSH only for VNFs at different hosts. E.x. vAC -> vAD. Flow classifier Five tuple + VLAN ID Different flow matches different SFC. Configuer: from ONOS to OVS by ovsdb Flow entry: from ONOS to OVS by openflow. CSP deployed in transparent mode. The traffic in the figure is from outside network to inside. The traffic comes into CSP by WAN port, pass through all NFVs within the SFC, leaves CSP by LAN port, and comes into the client network. The SFC is vNGAF -> vAC -> vAD. There is no NSH encap & decap if the next NFV is at the same host as the current NFV. This operation can reduce unnecessary cost of encap & decap. E.x. vNGAF -> vAC. If the next NFV is at other host, NSH will be used. E.x. vAC -> vAD. We used the five tuple, i.e. source ip, destination ip, source port, destination port and protocol, and VLAN ID as the flow classifier. It decides the SFC for each different flow. The SDN controller, ONOS, configures OVS by ovsdb and sends flow enties to OVS by openflow.

Sangfor SFC Framework User Management Plane UI Sangfor CSSP REST API Sangfor SDN controller Control Plane L2/L3 network fuction and SFC SFC APP ovsdb/openflow Data Plane support the newest standard NSH Sangfor dataplane

SFC APP workflow

Flow Table Design

SFC Proxy vNGAF proxy dataplane port 2 port 1 Function of SFC Proxy: Decap and Record: packet with nsh from port 1 -> NSH decap -> record the mapping of five tuple + VLAN ID and NSH (SPI, SI) in a hash table (2) Check and Encap: packet from port 2 -> hash(five tuple + VLAN ID) -> check the hash table -> find NSH (SPI, SI), and SI = SI – 1 -> NSH encap Realization of SFC Proxy: Way 1: Coding the function into OVS to maintain the hash table. Way 2: By flow entry. When controller generates flow entry, it knows the mapping of five tuple + VLAN ID + ingress port and NSH (SPI, SI) . vNGAF port 2 proxy port 1 dataplane

Different Ways to Realize SFC Proxy Advantage Disadvantage By coding OVS a) Classify the flow only once. b) Dataplane is responsible of the management of NSH. c) The generation of flow entry is easier and the flow entry is more simple. a) The stability and performance of proxy function. If proxy crashes, the dataplane doesn’t work. b) The solution rely on OVS with proxy function. c) The process of packet handling has to be change and it may not be merged into the open source code of OVS. By flow entry a) No need to coding OVS. b) If SFC APP in controller crashes, the SFC path in dataplane is still working. a) SFC flow entries are more hard to generate and complex. b) The performance may not as good as proxy function. c) Packets has to re-enter flow classifier when it arrive at OVS.

Optimization of SFC Proxy NSH encap & decap at the same time for local VNF vNGAF before optimization 6 5 NSH decap 1 Flow Classifier VxLan-GPE tunnel 4 2 7 Local VNF 9 3 NSH encap 8 remote VNF

Optimization of SFC Proxy Cut the unnecessary NSH encap & decap for VNFs at the same host vNGAF After optimization 4 3 VxLan-GPE tunnel 1 Flow Classifier 2 local VNF 7 Remote VNF 6 NSH encap 5

Changes on ONOS and OVS+DPDK ONOS 1.12 and OVS 2.8 do not work together: The change on ONOS: The match and set operation on NSH (spi, si) Make group table to support openflow 1.5 Change NSH actions from push/pop to encap/decap Fix the bug in packet_type supporting The change on OVS: Fix the bug of openflow 1.5 unsupporting on OVS Fix the bug of encaping NSH header twice The change on openflow: Code ONOS-loxi to make openflow to support the latest standard NSH, including actions and match fields Keep the OXM structure of NSH in OVS 2.8 unchange

Test Results ONOS 1.12, OVS 2.8 + DPDK 17.08. 3 physical hosts, > 6 NFVs, > 2 SFC chains. DPDK pktgen, iperf, netperf. Performance: ONOS + OVS + DPDK v.s. Original Item Result HA (High Availability) of VNFs It works, and the switch time is 1s~3s Dynamic change of SFC Chain The recovery time is in seconds Latency Reduced by 67%~79% Throughput 2.45 times of the original Cost of NSH (Throughput) Reduced by 28%~40%

Network Service Header (NSH) RFC 8300: https://datatracker.ietf.org/doc/rfc8300/ NSH encap & decap decrease about 20% performance. Only used for service function chains across compute nodes Overlay: VxLAN-GPE Overlay packet format UDP header Outer IP header Outer MAC header NSH VxLAN-GPE Header payload Inner Inner MAC header cloud.inspur.com

cloud.inspur.com Header Format VxLAN-GPE header: NSH MD type 1 header: VXLAN header VXLAN-gpe header cloud.inspur.com

cloud.inspur.com SPI and SI in NSH SF1: SPI = 10, SI = 255

NSH match fields and actions nsh_flags, nsh_ttl, nsh_mdtype, nsh_np, nsh_spi, nsh_si,nsh_c1, nsh_c2, nsh_c3, nsh_c4 dec_nsh_ttl encap(nsh(md_type=1)) encap(nsh(md_type=1)),set_field:0x1234->nsh_spi,set_field:0x11223344->nsh_c1 encap(ethernet),set_field:11:22:33:44:55:66->dl_dst encap(nsh(md_type=2,tlv(0x1000,10,0x12345678),tlv(0x2000,20,0xfedcba9876543210))) decap() Notes: You can’t match inner fields before decap NSH header cloud.inspur.com

cloud.inspur.com Known NSH issues in OVS Encap is done twice in group table (FIXED by Jan Scheurich) Performance issue (to be improved) VNFs can’t support NSH, NSH proxy will result in more performance loss VXLAN-gpe can’t work normally in some Linux versions (in-kernel vxlan and udp tunnel modules are used per OVS autoconfig but they are old and can’t handle VXLAN-gpe, to be fixed) Packet checksum issue when inner packet size is 1500 and overlay interface MTU is 1500. NSH MD type 2 support (TBD): if more metadata is needed. networking-sfc in openstack doesn’t support NSH yet. cloud.inspur.com

The End Thank You!