© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.

Slides:



Advertisements
Similar presentations
EIGRP FOR MANAGED SERVICES FUNCTIONALITY PRESENTATION
Advertisements

Virtual Trunk Protocol
Chapter 1 The Study of Body Function Image PowerPoint
OSPF 1.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Multihoming and Multi-path Routing
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
MPLS VPN.
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Complex MPLS VPNs Introducing Central Services VPNs.
Chapter 1: Introduction to Scaling Networks
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS TE Overview Configuring MPLS TE on Cisco IOS Platforms.
ABC Technology Project
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Frame-Mode MPLS Implementation on Cisco IOS Platforms Troubleshooting Frame-Mode MPLS on Cisco.
What is access control list (ACL)?
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Subnetting IP Networks Network Fundamentals.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Configuring and Troubleshooting ACLs
IPv6 Routing.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
Route Optimisation RD-CSY3021.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLANs LAN Switching and Wireless – Chapter 3.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
BGP Overview Processing BGP Routes.
06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
Chapter 9: Subnetting IP Networks
25 seconds left…...
Multihoming and Multi-path Routing CS 7260 Nick Feamster January
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-5-1 WAN Connections Enabling RIP.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Understanding MPLS TE Components.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 Module Summary The VRF table is a virtual routing and forwarding instance separating sites.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: EIGRP Advanced Configurations and Troubleshooting Scaling.
Chapter 9: Access Control Lists
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Troubleshooting MPLS VPNs.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—7-1 Optimizing BGP Scalability Limiting the Number of Prefixes Received from a BGP Neighbor.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2009 Cisco Systems, Inc. All rights reserved.ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Configuring and Verifying Basic BGP Operations.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5#-1 MPLS VPN Implementation Configuring OSPF as the Routing Protocol Between PE and CE Routers.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—7-1 Integrating Internet Access with MPLS VPNs Implementing Internet Access as a Separate VPN.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring Small-Scale Routing Protocols Between PE and CE Routers.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—3-1 Frame-Mode MPLS Implementation on Cisco IOS Platforms Configuring Frame-Mode MPLS on Cisco.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network BGP Attributes and Path Selection Process.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Chapter 9. Implementing Scalability Features in Your Internetwork.
© 2001, Cisco Systems, Inc. A_BGP_Confed BGP Confederations.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Filtering with Prefix-Lists.
Route Selection Using Policy Controls
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Outbound Route Filtering.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—7-1 Optimizing BGP Scalability Implementing BGP Peer Groups.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—2-1 BGP Transit Autonomous Systems Forwarding Packets in a Transit AS.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Understanding BGP Path Attributes.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Module Summary The multihomed customer network must exchange BGP information with both ISP.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to Multiple Service.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Introducing Confederations.
Instructor Materials Chapter 7: EIGRP Tuning and Troubleshooting
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
Module Summary BGP is a path-vector routing protocol that allows routing policy decisions at the AS level to be enforced. BGP is a policy-based routing.
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-2 Outline Overview Configuring a per-VRF BGP Routing Context What Are the Reasons for Limiting the Number of Routes in a VRF? Limiting the Number of Prefixes Received from a BGP Neighbor Limiting the Total Number of VRF Routes Identifying AS-Override Issues Identifying Allowas-in Issues Implementing SOO for Loop Prevention Summary

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-3 router bgp as-number address-family ipv4 vrf vrf-name... Per-VRF BGP definitions... Router(config)# Select per-VRF BGP context with the address-family command. Configure CE EBGP neighbors in the VRF context, not in the global BGP configuration. CE neighbors have to be activated with the neighbor activate command. Configuring per-VRF BGP Routing Context

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-4 Configuring per-VRF BGP Routing Context (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-5 Limiting the Number of Routes in a VRF SPs offering MPLS VPN services are at risk of denial-of-service attacks similar to those aimed at SPs offering BGP connectivity: –Any customer can generate any number of routes, using resources in the PE routers. Therefore, resources used by a single customer have to be limited. Cisco IOS software offers two solutions: –It can limit the number of routes received from a BGP neighbor. –It can limit the total number of routes in a VRF.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-6 neighbor ip-address maximum-prefix maximum [threshold] [warning-only] Router(config-router-af)# Controls how many prefixes can be received from a neighbor Optional threshold parameter specifies the percentage where a warning message is logged (default is 75 percent) Optional warning-only keyword specifies the action on exceeding the maximum number (default is to drop peering) Limiting the Number of Prefixes Received from a BGP Neighbor

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-7 Limiting the Total Number of VRF Routes The VRF maximum routes limit command limits the number of routes that are imported into a VRF: –Routes coming from CE routers –Routes coming from other PE routers (imported routes) The route limit is configured for each VRF. If the number of routes exceeds the route limit: –A syslog message is generated. –The Cisco IOS software can be configured to reject routes (optional).

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-8 maximum routes limit {warn-threshold | warn-only} Router(config-vrf)# This command configures the maximum number of routes accepted into a VRF: –The limit parameter is the route limit for the VRF. –The warn-threshold parameter is the percentage value over which a warning message is sent to syslog. –The warn-only option creates a syslog error message when the maximum number of routes exceeds the threshold. Syslog messages generated by this command are rate-limited. Limiting the Total Number of VRF Routes (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-9 Limiting the Total Number of VRF Routes (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-10 The customer wants to reuse the same AS number on several sites: CE-BGP-A1 announces network /16 to PE-Site-X. The prefix announced by CE-BGP-A1 is propagated to PE-Site-Y as an internal route through MP-BGP. PE-Site-Y prepends AS to the AS path and propagates the prefix to CE-BGP-A2. CE-BGP-A2 drops the update because AS is already in the AS path. AS-Override: The Issue

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-11 AS-Override: Implementation New AS path update procedures have been implemented to reuse the same AS number on all VPN sites. The procedures allow the use of private and public AS numbers. The same AS number may be used for all sites.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-12 AS-Override: Implementation (Cont.) With AS-override configured, the AS path update procedure on the PE router is as follows: –If the first AS number in the AS path is equal to the neighboring AS, it is replaced with the provider AS number. –If the first AS number has multiple occurrences (because of AS path prepend), all occurrences are replaced with the provider AS number. –After this operation, the provider AS number is prepended to the AS path.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-13 neighbor ip-address as-override Router(config-router-af)# This command configures the AS-override AS path update procedure for the specified neighbor. AS-override is configured for CE EBGP neighbors in the VRF address family of the BGP process. AS-Override: Command

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-14 AS-Override: Example PE-Site-Y replaces AS with AS in the AS path, prepends another copy of AS to the AS path, and propagates the prefix.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-15 PE-Site-Y replaces all occurrences of AS with AS in the AS path, prepends another copy of AS to the AS path, and propagates the prefix. AS-Override: AS-Path Prepending

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-16 Allowas-in: The Issue Customer site links two VPNs Not a usual setup (traffic between VPNs should not flow over the customer site) Sometimes used for enhanced security

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-17 Allowas-in: The Issue (Cont.) VPN perspective: VPN-A is connected to VPN-B via CE-AB. Physical topology: The CE-AB router is dual-connected to the PE routers. MPLS VPN perspective: The CE-AB router has two links into the P- network. BGP perspective shows issue: The CE-AB router has two connections to AS

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-18 Allowas-in: The Issue (Cont.) PE-1 announces network /16 to CE-AB. CE-AB prepends its AS number to the AS path and propagates the prefix to PE-2. PE-2 drops the update because its AS number is already in the AS path. AS-override is needed on CE-AB, which may require a Cisco IOS software upgrade on the CE router.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-19 Allowas-in: Implementation The allowas-in BGP option disables the AS path check on the PE router: The number of occurrences of the PE router AS number is limited to suppress real routing loops. The limit has to be configured. The PE router will reject the update only if its AS number appears in the AS path more often than the configured limit.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-20 neighbor allowas-in number Router(config-router)# This command disables the traditional BGP AS path check. An incoming update is rejected only if the AS number of the PE router appears in the AS path more often than the configured limit. Allowas-in: Command

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-21 AS path-based BGP loop prevention is bypassed with the AS ‑ override and allowas-in features. Implementing SOO for Loop Prevention

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-22 The SOO attribute (extended BGP community) can be used to prevent loops in these scenarios. The SOO attribute is needed only for multihomed sites. When EBGP is run between PE and CE routers, the SOO attribute is configured through a route-map command. For other routing protocols, the SOO attribute can be applied to routes learned through a particular VRF interface during the redistribution into BGP. Implementing SOO for Loop Prevention (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-23 route-map name permit seq match conditions set extcommunity soo extended-community-value Router(config)# Creates a route map that sets the SOO attribute neighbor ip-address route-map name in Router(config-router-af)# Applies an inbound route map to the CE EBGP neighbor Inbound EBGP Update Implementing SOO for Loop Prevention (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-24 ip vrf sitemap route-map-name Router(config-if)# Applies a route map that sets the SOO extended community attribute to inbound routing updates received from this interface Other Inbound Routing Updates Implementing SOO for Loop Prevention (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-25 ip extcommunity-list number permit soo value ! route-map name deny seq match extcommunity number ! route-map name permit 9999 Router(config)# Defines a route map that discards routes with the desired SOO value neighbor ip-address route-map name out Router(config-router-af)# Applies the route map to outbound updates sent to the EBGP CE neighbor Implementing SOO for Loop Prevention (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-26 Summary Use the address-family ipv4 vrf vrf-name command in the BGP routing process to configure a per-VRF BGP routing context. SPs offering MPLS VPN services are at risk of denial-of-service attacks. Limiting VRF tables is one method to prevent such attacks. Use the neighbor maximum-prefix command to limit the number of prefixes received from a BGP neighbor. Use the maximum routes command to limit the total number of VRF routes.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-27 BGP loop detection prevents customers from reusing their AS number. The neighbor ip-address as-overide command prevents this issue by replacing the customer AS number with the ISP AS number. By default, a customer site cannot link two VPN sites of the same AS number because of BGP loop detection. The neighbor allowas-in number command disables the BGP path check and permits routing updates. The SOO extended BGP community is used as a loop prevention mechanism for multihomed customer sites. Summary (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-28