Network Configuration Management Nick Feamster CS 6250: Computer Networking Fall 2011 (Some slides on configuration complexity from Prof. Aditya Akella)

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

MPLS VPN.
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Deployment of MPLS VPN in Large ISP Networks
Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Routing Overlays and Virtualization (Nick Feamster) February 13, 2008.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
MPLS-VPN/BGP Approach Hari Rakotoranto Technical Marketing Engineer
Author : Martín Casado, Teemu Koponen, Scott Shenker, Amin Tootoonchian Publisher : Presenter : Pei-Hua Huang Date : 2013/10/02 Fabric: A Retrospective.
Understanding and Mitigating the Complexity in Network Configuration and Management Aditya Akella UW-Madison Joint work with Theo Benson (UW-Madison) and.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
1 Problems and Solutions in Enterprise Network Control: Motivations for a 4D Architecture David A. Maltz Microsoft Research Joint work with Albert Greenberg,
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Routing and Routing Protocols
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—4-1 Implement an IPv4-Based Redistribution Solution Assessing Network Routing Performance and.
Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Mike Freedman Teaching Assistants: Wyatt.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
MPLS-based Virtual Private Networks Khalid Siddiqui CS 843 Research Paper Department of Computer Science Wichita State University Wichita, KS
COS 420 Day 16. Agenda Assignment 3 Corrected Poor results 1 C and 2 Ds Spring Break?? Assignment 4 Posted Chap Due April 6 Individual Project Presentations.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5#-1 MPLS VPN Implementation Configuring OSPF as the Routing Protocol Between PE and CE Routers.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
MPLS VPN Security assessment
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
Theophilus Benson Aditya Akella David A Maltz
Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
MPLS and VPNs (David Andersen) (Nick Feamster) February 18, 2008.
1 Theophilus Benson*, Aditya Akella*, Aman Shaikh + *University of Wisconsin, Madison + ATT Labs Research.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
Module 1: Configuring Routing by Using Routing and Remote Access.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
Routing and Routing Protocols
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
MPLS VPNs by Richard Bannister. The Topology The next two slides display both the physical and logical topology of our simple example network –Please.
MPLS Label Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
Module 2 MPLS Concepts.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Tunneling Continued/ End-to-End Principle CS 4251: Computer Networking II Nick Feamster Spring 2008.
Multi-protocol Label Switching
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
MPLS Virtual Private Networks (VPNs)
Advanced Computer Networks
Presenter: Jeffrey Zhang
Chapter 4 Data Link Layer Switching
Chapter 4: Routing Concepts
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
Using MPLS/VPN for Policy Routing
Chapter 3 VLANs Chaffee County Academy
Presentation transcript:

Network Configuration Management Nick Feamster CS 6250: Computer Networking Fall 2011 (Some slides on configuration complexity from Prof. Aditya Akella)

The Case for Management Typical problem –Remote user arrives at regional office and experiences slow or no response from corporate web server Where do you begin? –Where is the problem? –What is the problem? –What is the solution? Without proper network management, these questions are difficult to answer Corp Network Regional Offices WWW Servers Remote User

Corp Network Regional Offices WWW Servers Remote User The Case for Management With proper management tools and procedures in place, you may already have the answer Consider some possibilities What configuration changes were made overnight? Have you received a device fault notification indicating the issue? Have you detected a security breach? Has your performance baseline predicted this behavior on an increasingly congested network link?

An accurate database of your network’s topology, configuration, and performance A solid understanding of the protocols and models used in communication between your management server and the managed devices Methods and tools that allow you to interpret and act upon gathered information Response Times High Availability Predictability Security Problem Solving

Network Configuration 5

Configuration Changes Over Time Many security-related changes (e.g., access control lists) Steadily increasing number of devices over time 6

Configuration Changes Over Time 7

Modern Networks are Complex Intricate logical and physical topologies Diverse network devices –Operating at different layers –Different command sets, detailed configuration Operators constantly tweak network configurations –New admin policies –Quick-fixes in response to crises Diverse goals –E.g. QOS, security, routing, resilience 8 Complex configuration

Interface vlan901 ip address ip access-group 9 out ! Router ospf 1 router-id network ! access-list Interface vlan901 ip address ip access-group 9 out ! Router ospf 1 router-id network ! access-list Changing Configuration is Tricky Adding a new department with hosts spread across 3 buildings (this is a “simple” example!) 9 Interface vlan901 ip address ip access-group 9 out ! Router ospf 1 router-id network ! access-list Department1 Opens up a hole

Getting a Grip on Complexity Complexity  misconfiguration, outages Can’t measure complexity today –Ability to predict difficulty of future changes Benchmarks in architecture, DB, software engineering have guided system design Metrics essential for designing manageable networks No systematic way to mitigate or control complexity Quick fix may complicate future changes –Troubleshooting, upgrades harder over time Hard to select the simplest from alternates 10 Options for making a change or for ground-up design Complexity of n/w design #1 #2 #3

Measuring and Mitigating Complexity Metrics for layer-3 static configuration [NSDI 2009] –Succinctly describe complexity Align with operator mental models, best common practices –Predictive of difficulty Useful to pick among alternates –Empiricial study and operator tests for 7 networks Network-specific and common Network redesign (L3 config) –Discovering and representing policies [IMC 2009] Invariants in network redesign –Automatic network design simplification [Ongoing work] Metrics guide design exploration Options for making a change or for ground-up design Complexity of n/w design #1 #2 #3 Many routing process with minor differences Few consolidated routing process (2) Ground-up simplification (1) Useful to pick among alternates Metrics

Services VPN: Each customer gets a private IP network, allowing sites to exchange traffic among themselves VPLS: Private Ethernet (layer-2) network DDoS Protection: Direct attack traffic to a “scrubbing farm” Virtual Wire: Point-to-point VPLS network VoIP: Voice over IP 12

13 MPLS Overview Main idea: Virtual circuit –Packets forwarded based only on circuit identifier Destination Source 1 Source 2 Router can forward traffic to the same destination on different interfaces/paths.

14 Circuit Abstraction: Label Swapping Label-switched paths (LSPs): Paths are “named” by the label at the path’s entry point At each hop, label determines: –Outgoing interface –New label to attach Label distribution protocol: responsible for disseminating signalling information A A 2D Tag Out New D

15 Layer 3 Virtual Private Networks Private communications over a public network A set of sites that are allowed to communicate with each other Defined by a set of administrative policies –determine both connectivity and QoS among sites –established by VPN customers –One way to implement: BGP/MPLS VPN mechanisms (RFC 2547)

16 Building Private Networks Separate physical network –Good security properties –Expensive! Secure VPNs –Encryption of entire network stack between endpoints Layer 2 Tunneling Protocol (L2TP) –“PPP over IP” –No encryption Layer 3 VPNs Privacy and interconnectivity (not confidentiality, integrity, etc.)

17 Layer 2 vs. Layer 3 VPNs Layer 2 VPNs can carry traffic for many different protocols, whereas Layer 3 is “IP only” More complicated to provision a Layer 2 VPN Layer 3 VPNs: potentially more flexibility, fewer configuration headaches

18 Layer 3 BGP/MPLS VPNs Isolation: Multiple logical networks over a single, shared physical infrastructure Tunneling: Keeping routes out of the core VPN A/Site 1 VPN A/Site 2 VPN A/Site 3 VPN B/Site 2 VPN B/Site 1 VPN B/Site 3 CE A1 CE B3 CE A3 CE B2 CE A2 CE 1 B1 CE 2 B1 PE 1 PE 2 PE 3 P1P1 P2P2 P3P3 10.1/ / / / / /16 BGP to exchange routes MPLS to forward traffic

19 High-Level Overview of Operation IP packets arrive at PE Destination IP address is looked up in forwarding table Datagram sent to customer’s network using tunneling (i.e., an MPLS label-switched path)

20 BGP/MPLS VPN key components Forwarding in the core: MPLS Distributing routes between PEs: BGP Isolation: Keeping different VPNs from routing traffic over one another –Constrained distribution of routing information –Multiple “virtual” forwarding tables Unique addresses: VPN-IP4 Address extension

21 Virtual Routing and Forwarding Separate tables per customer at each router /24 RD: Green /24 RD: Blue /24 Customer 1 Customer 2 Customer 1 Customer 2

22 Routing: Constraining Distribution Performed by Service Provider using route filtering based on BGP Extended Community attribute – BGP Community is attached by ingress PE route filtering based on BGP Community is performed by egress PE Site 1Site 2Site 3 Static route, RIP, etc. RD: /24 Route target: Green Next-hop: A A /24 BGP

23 BGP/MPLS VPN Routing in Cisco IOS ip vrf Customer_A rd 100:110 route-target export 100:1000 route-target import 100:1000 ! ip vrf Customer_B rd 100:120 route-target export 100:2000 route-target import 100:2000 Customer ACustomer B

24 Forwarding PE and P routers have BGP next-hop reachability through the backbone IGP Labels are distributed through LDP (hop-by-hop) corresponding to BGP Next-Hops Two-Label Stack is used for packet forwarding Top label indicates Next-Hop (interior label) Second level label indicates outgoing interface or VRF (exterior label) IP Datagram Label 2 Label 1 Layer 2 Header Corresponds to LSP of BGP next-hop (PE) Corresponds to VRF/interface at exit

25 Forwarding in BGP/MPLS VPNs Step 1: Packet arrives at incoming interface –Site VRF determines BGP next-hop and Label #2 IP Datagram Label 2 Step 2: BGP next-hop lookup, add corresponding LSP (also at site VRF) IP Datagram Label 2 Label 1

Measuring Complexity 26

Two Types of Design Complexity Implementation complexity: difficulty of implementing/configuring reachability policies –Referential dependence: the complexity behind configuring routers correctly –Roles: the complexity behind identifying roles (e.g., filtering) for routers in implementing a network’s policy Inherent complexity: complexity of the reachability policies themselves –Uniformity: complexity due to special cases in policies –Determines implementation complexity High inherent complexity  high implementation complexity Low inherent complexity  simple implementation possible 27

Naïve Metrics Don’t Work NetworksMean file size Number of routers Univ Univ Univ Univ Enet Enet Enet Size or line count not a good metric –Complex –Simple Need sophisticated metrics that capture configuration difficulty 28

Referential Complexity: Dependency Graph An abstraction derived from router configs Intra-file links, e.g., passive-interfaces, and access-group Inter-file links –Global network symbols, e.g., subnet, and VLANs 29 1 Interface Vlan901 2 ip ip access-group 9 in 4 ! 5 Router ospf 1 6 router-id passive-interface default 8 no passive-interface Vlan901 9 no passive-interface Vlan network distribute-list in redistribute connected subnets 13 ! 14 access-list 9 permit any 15 access-list 9 deny any 16 access-list 12 permit Interface Vlan901 2 ip ip access-group 9 in 4 ! 5 Router ospf 1 6 router-id passive-interface default 8 no passive-interface Vlan901 9 no passive-interface Vlan network distribute-list in redistribute connected subnets 13 ! 14 access-list 9 permit any 15 access-list 9 deny any 16 access-list 12 permit ospf1 Vlan901 Access-list 9 Access-list 12 Subnet 1 ospf 1 Vlan30 Access-list 11 Access-list 10 Route-map 12

Referential Dependence Metrics Operator’s objective: minimize dependencies –Baseline difficulty of maintaining reference links network-wide –Dependency/interaction among units of routing policy Metric: # ref links normalized by # devices Metric: # routing instances –Distinct units of control plane policy Router can be part of many instances Routing info: unfettered exchange within instance, but filtered across instances –Reasoning about a reference harder with number/diversity of instances Which instance to add a reference? Tailor to the instance 30

Empirical Study of Implementation Complexity 31 No direct relation to network size –Complexity based on implementation details –Large network could be simple

Metrics  Complexity 32 Task: Add a new subnet at a randomly chosen router Enet-1, Univ-3: simple routing  redistribute entire IP space Univ-1: complex routing  modify specific routing instances –Multiple routing instances add complexity Metric not absolute but higher means more complex

Inherent Complexity Reachability policies determine a network’s configuration complexity –Identical or similar policies All-open or mostly-closed networks Easy to configure –Subtle distinctions across groups of users Multiple roles, complex design, complex referential profile Hard to configure Not “apparent” from configuration files –Mine implemented policies –Quantify similarities/consistency 33

Reachability Sets Networks policies shape packets exchanged –Metric: capture properties of sets of packets exchanged Reachability set (Xie et al.): set of packets allowed between 2 routers –One reachability set for each pair of routers (total of N 2 for a network with N routers) –Affected by data/control plane mechanisms Approach –Simulate control plane –Normalized ACL representation for FIBs –Intersect FIBs and data plane ACLs 34 FIB  ACL

Inherent Complexity: Uniformity Metric Variability in reachability sets between pairs of routers Metric: Uniformity –Entropy of reachability sets –Simplest: log(N)  all routers should have same reachability to a destination C –Most complex: log(N 2 )  each router has a different reachability to a destination C 35 A A B B C C D D E E R(A,C) R(D,C) R(B,C) R(C,C) ABCDE A B C D E ABCDE A B C D E

Empirical Results Simple policies –Entropy close to ideal Univ-3 & Enet-1: simple policy –Filtering at higher levels Univ-1: –Router was not redistributing local subnet 36 BUG!

Insights Studied networks have complex configuration, But, inherently simple policies Network evolution –Univ-1: dangling references –Univ-2: caught in the midst of a major restructuring Optimizing for cost and scalability –Univ-1: simple policy, complex config –Cheaper to use OSPF on core routers and RIP on edge routers Only RIP is not scalable Only OSPF is too expensive 37

(Toward) Mitigating complexity – Mining policy 38

Policy Units Policy units: reachability policy as it applies to users Equivalence classes over the reachability profile of the network –Set of users that are “treated alike” by the network –More intuitive representation of policy than reachability sets Algorithm for deriving policy units from router-level reachability sets (Akella et al., IMC 2009) –Policy unit  a group of IPs 39 Host 1Host 2Host 3 Host 4 Host 5

Policy Units in Enterprises Name# Subnets# Policy Units Univ Univ Univ Enet-1981 Enet Policy units succinctly describe network policy Two classes of enterprises Policy-lite: simple with few units Mostly “default open” Policy-heavy: complex with many units

Policy units: Policy-heavy Enterprise Dichotomy: –“Default-on”: units 7—15 –“Default-off”: units 1—6 Design separate mechanisms to realize default-off and default-off network parts –Complexity metrics to design the simplest such network [Ongoing] 41

Conclusion 42

Deconstructing Network Complexity Metrics that capture complexity of network configuration –Predict difficulty of making changes –Static, layer-3 configuration –Inform current and future network design Policy unit extraction –Useful in management and as invariant in redesign Empirical study –Simple policies are often implemented in complex ways –Complexity introduced by non-technical factors –Can simplify existing designs 43

Many open issues… Comprehensive metrics (other layers) Simplification framework, config “remapping” Cross-vendor? Cross-architecture? ISP networks vs. enterprises Application design informed by complexity 44