W. Mark Townsley townsley@cisco.com Pseudowires and L2TPv3 W. Mark Townsley townsley@cisco.com.

Slides:



Advertisements
Similar presentations
IP security over ATM CS 329 Hwajung Lee Computer and Communications Security The George Washington University.
Advertisements

Leading Edge Routing MPLS Enhancements to Support Layer 2 Transport Services Jeremy Brayley
IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
H. 323 Chapter 4.
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Layer 2 Tunneling Protocol (L2TP)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
Softwires Hub & Spoke using L2TPv3
WAN Technologies Dial-up modem connections Cheap Slow
MPLS over L2TPv3 for support of RFC 2547-based BGP/MPLS IP VPNs
5: DataLink Layer5-1 Asynchronous Transfer Mode: ATM r 1990’s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service.
1 Why Carriers Like Pseudowires… Payload (IP, L2 data, voice) PseudoWires Layer-2 (Ethernet, ATM…) Physical (Optical, Wireless) User Applications Payload.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
11-01-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 4.2 IPv4 and Other Networks.
WAN Technologies Dial-up modem connections
Chapter 18. Virtual-Circuit Networks: Frame Relay and ATM
Softwires Hub & Spoke with L2TP
L2tpd - L2TP for Unix Land of confusion.
Asynchronous Transfer Mode: ATM r 1980s/1990’s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture.
IPv6 and IPv4 Coexistence Wednesday, October 07, 2015 IPv6 and IPv4 Coexistence Motorola’s Views for Migration and Co-existence of 3GPP2 Networks to Support.
MPLS Forwarder Preliminary 1 Outline MPLS Overview MPLS Overview MPLS MRD MPLS Data Path HLD 48K MPLS Fwder HLD IPE MPLS Fwder HLD Issues Summary.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
PWE3 WG Document Status IETF-62 Danny McPherson Stewart Bryant
TCP/IP Protocols Contains Five Layers
1 RTP Multiplexing using Tunnels (TCRTP) Bruce Thompson Tmima Koren Cisco Systems Inc.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
TDM over PSN-MIB Orly Nicklass IETF 59 RAD Data Communications.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
PWE3 Agenda – Monday 8 th Nov 15 min - Agenda bash, WG Agenda and Status - Andy Malis and Matthew Bocci 5 min - Dynamic Placement of Multi Segment Pseudo.
L2TP Chapter 7. Motivation Sometimes we want to tunnel one protocol over another protocol –Maybe the network does not understand how to forward that protocol.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
August 2004draft-bocci-2vpn-pnni-mpls-iw-01.txt Signalling Interworking for ATM VPWS draft-bocci-l2vpn-pnni-mpls-iw-01 Matthew Bocci, Mustapha Aissaoui,
Teacher:Quincy Wu Presented by: Ying-Neng Hseih
MPLS over L2TPv3 Encapsulation IETF VersionIHLTOSTotal length IdentificationFlagsFragment offset TTL Protocol ==
Lecture 1: Introduction to WAN
Encapsulation Methods for Transport of Fibre Channel Over MPLS draft-roth-pwe3-fc-encap-01.txt PWE3 IETF-64 November 2005 Ronen Solomon
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
IP Pseudowire Florin Balus August, PG 1Florin BalusIETF60 – San Diego Requirements - Existing topology FR/ATM VPNs ATM Network Frame Relay Access.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
IETF 57, July 16, 2003Mustapha AïssaouiSlide 1 Extended MPLS/PW PID Mustapha Aïssaoui, Matthew Bocci, David Watkinson, Alcatel Andrew G. Malis, Tellabs.
K. Salah1 Security Protocols in the Internet IPSec.
Data Link Protocols Relates to Lab 2.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
IPSecurity.
Virtual Private Networks
PPP Protocol.
Lecture (2).
Asynchronous Transfer Mode
DetNet Data Plane Discussion
IT443 – Network Security Administration Instructor: Bo Sheng
OSI Protocol Stack Given the post man exemple.
Point-to-Multipoint Pseudo-Wire Encapsulation draft-raggarwa-pwe3-p2mp-pw-encaps-00.txt R. Aggarwal (Juniper)
Softwires Hub & Spoke using L2TPv3
PPP PROTOCOL The First semester
Hubs Hubs are essentially physical-layer repeaters:
Hubs Hubs are essentially physical-layer repeaters:
Lecture 1: Introduction to WAN
Virtual Private Networks (VPNs)
PPP Protocol.
Virtual Private Network zswu
Presentation transcript:

W. Mark Townsley townsley@cisco.com Pseudowires and L2TPv3 W. Mark Townsley townsley@cisco.com

Goals Define the term“Pseudowire” and its relation to an “L2VPN” Discuss motivations for a converged network Overview of the IETF PWE3 framework Overview of L2TP as a tunneling protocol for PWE3 over IP

Pseudowire Defined by the IETF PWE3 (Pseudowire Edge to Edge Emulation) WG Emulates the essential attributes of a (typically layer 2) service, such as Frame Relay, PPP, T1, Ethernet, ATM, etc. over a packet switched network. The packet switched network could be an IP network or an MPLS network (this talk will focus more on IP)

L2VPN A collection of pseudowires carrying emulated data links over a converged network. For operation over an IP network, an important building block is an interoperable tunneling protocol for carrying each link to the participating edge routers.

Sample L2VPN Using Pseudowires IP Network Tunnelled LAN Tunnelled serial interface Pseudowire (Layer 2 Tunnel) R3 R4 R1 R2 LAN1 LAN2 tu1 tu2 e1 e2 pos1 pos2 pos3 pos4

Network Convergence Before: Parallel Networks Duplication of international links Separate equipment in the PoPs for each distinct service Paris Miami IP PoP IP PoP Global IP Backbone FR PoP FR PoP Global FR Backbone Milan IP PoP FR PoP

Network Convergence After: Unified Network Single set of backbone links for the IP network FR and IP services from the same set of platforms in the IP + FR PoP L2TPv3 tunnels across the IP backbone for FR services Paris Miami IP + FR PoP Global IP Backbone IP + FR PoP Milan IP + FR PoP

Other Examples of Convergence Frame Relay over ATM networks [FRF.5] T1, E1 and T3 circuits over ATM networks [ATMCES]. Voice over ATM (AAL2), Frame Relay [FRF.11], IP (VoIP) and MPLS networks. PPP is carried over IP, ATM and Frame Relay networks [L2TP].

Tunneling Protocol Requirements for PWE3 over IP An efficient layer 2 tunneling and multiplexing encapsulation Explicit configuration or signaled negotiation of service specific parameters between edge routers Method for signaling, timing, order or other aspects of the service between edge routers Light and heavy duty security options

PWE3 Encapsulation Layering Focus of PWE3 - above a PSN specific multiplexing layer Payload (circuit/cell/packet) Bit type specific Cell type specific Packet type specific PWE3 Payload encapsulation definition Optional RTP/Sequencing PWE3 IP convergence definition L2TPv3 Fragmentation Length PWE3 MPLS convergence Definition based on draft-martini Inner Label IPv4 IPv6 MPLS MAC/Data-Link Physical [PWE3LYR]

L2TPv3 Encapsulation [L2TPv3] Payload IP 20 Bytes L2TPv3 Header int3 int2 L2TPv3 Tunneled LAN IP Network L2TPv3 L2 Tunnel Payload IP L2TP IP 20 Bytes L2TPv3 Header 4 - 12 Bytes Payload Session Identifier 4 Bytes Cookie 0,4,8 Bytes [L2TPv3]

Tunneling Protocol Requirements for PWE3 over IP An efficient layer 2 tunneling and multiplexing encapsulation Easy tunnel setup, and negotiation of service specific parameters between edge routers Method for signaling, timing, order or other aspects of the service between edge routers Light and heavy duty security options

L2TP Control Plane L2TP has an in-band, reliable, control plane used for tunnel setup and maintenance Control plane operates its own reliable datagram protocol, documented as a part of RFC2661 By design, it is not TCP, though it borrows from TCP with adapted windowing, congestion control, and slow start methods.

L2TP Control Connection Three message handshake establishes the reliable Control Connection and advertises capabilities between peers. SCCRQ SCCRP SCCCN

L2TP Control Connection Once a Control Connection is established, multiple tunnels (sessions) may be setup “automagically” as needed Includes optional Challenge/Handshake mutual peer authentication method (a “light-duty” security choice) 3-way handshake is used to establish identity, advertise, and negotiate capabilities between peers.

L2TP Session Establishment In L2TP, each tunnel between the same endpoints is referred to as a “session”. A similar 3 message exchange is used to establish each session. ICRQ ICRP ICCN

L2TP Control Messages Control plane is designed to easily accept new messages for reliable delivery Standard methods for “vendor specific” message type number space, as well as IETF number space Attribute-value pair (AVP) message construction

Tunneling Protocol Requirements for PWE3 over IP An efficient layer 2 tunneling and multiplexing encapsulation Explicit configuration or signaled negotiation of service specific parameters between edge routers Method for signaling, timing, order or other aspects of the service between edge routers Light and heavy duty security options

L2TP Maintenance Messages are sent over the in-band reliable control plane to signal all line events, advertise a state changes, establish and teardown new sessions, etc. Single keepalive operates for all sessions between two endpoints Sequencing and TDM emulation operates above the tunnel

Tunneling Protocol Requirements for PWE3 over IP An efficient layer 2 tunneling and multiplexing encapsulation Explicit configuration or signaled negotiation of service specific parameters between edge routers Method for signaling, timing, order or other aspects of the service between edge routers Light and heavy duty security options

L2TP Security “Heavy Duty” choice: RFC 3193 “Securing L2TP with IPsec” IPSec operates in Transport Mode, L2TP is responsible for tunneling Gives operator the option of turning security on or off at will, decoupling the tunneling system from the security method

L2TP Security Light duty options: Control Connection Authentication L2TPv3 “Cookie field” random 64 bit value in each data packet associated with session to protect against a malicious blind attack, or inadvertent insertion of data into the tunnel stream.

Blind Insertion Attack Blind – The attacker as no access to any data flowing on the provider’s network, only the ability to insert spoofed data at will. In order for the packet to not be dropped, the attacker will have to guess a 64-bit random value.

Brute Force Insertion Goal, to get one 40 byte spoofed packet inserted onto a VPN at OC48 20 bits – 130 ms 32 bits – Under 10 min 64 bits – 75K years

Brute Force Insertion Goal, to get one 40 byte spoofed packet inserted onto a VPN at OC192 20 bits – 34 ms 32 bits – Under 3 min 64 bits – 18K years

What’s new in L2TPv3? Majority of functionality unchanged Tunnel setup, control channel, maintenance… New encapsulation for IP, resurrection of Cookie field Separation of the base tunneling protocol from PPP draft-ietf-l2tpext-l2tp-base-01.txt draft-ietf-l2tpext-l2tp-ppp-01.txt

L2TP Timeline August 1996 - First version of L2TP Internet Draft published May 1997 - First multivendor interoperability workshop (“bakeoff”) at Pacific Bell Nov 1997 - First version of L2TP over IPsec Internet Draft submitted Aug 1999 – RFC2661 published

L2TP Timeline Jun 2000 – Ethernet over L2TP Internet draft submitted July 2001 – First version of “l2tp-base” a.k.a. L2TPv3 submitted to WG Aug 2001 – First PWE3 WG Meets at 51st IETF in London

Summary Pseudowires provide network convergence by emulating a variety of data links over a common packet switched network Pseudowires may be operated over IP without modification of IP core routers L2TPv3 is a tunneling protocol that has a large base of operational experience and standardization in the IETF that is being used for pseudowire tunneling

References [PWE3] draft-ietf-pwe3-framework-00.txt [PWE3LYR] draft-bryant-pwe3-protocol-layer-00.txt [L2TPv3]draft-ietf-l2tpext-l2tp-base-01.txt [L2TP] RFC2661 [ATMCES] ATM Forum, "Circuit Emulation Service Interoperability Specification Version 2.0" (af-vtoa-0078-000), January 1997. [FRF.5] O'Leary et al, "Frame Relay/ATM PVC Network Interworking Implementation Agreement", Frame Relay Forum FRF.5, December 20, 1994. ITU Recommendation Q.933, Annex A, Geneva, 1995. [FRF.11] R. Kocen and T. Hatala, "Voice over frame relay implementation agreement", Implementation Agreement FRF.11, Frame Relay Forum, Foster City, California, Jan. 1997.

End