Copyright © 2000, Juniper Networks, Inc. Virtual Private Networks: Progress and Challenges Panel Session
Slide 2Copyright © 2000, Juniper Networks, Inc. Panel Objectives Introduce Virtual Private Network concepts and technologies Introduce Virtual Private Network concepts and technologies Describe some potential service provider VPN offerings Describe some potential service provider VPN offerings List challenges faced by service providers in offering VPN services List challenges faced by service providers in offering VPN services List and describe some of the proposals for addressing VPN challenges List and describe some of the proposals for addressing VPN challenges
Slide 3Copyright © 2000, Juniper Networks, Inc. Panel Participants Paul Ferguson – Cisco Systems Paul Ferguson – Cisco Systems David O’Leary – Juniper Networks David O’Leary – Juniper Networks Keerti Melkote – Nortel Networks Keerti Melkote – Nortel Networks NANOG audience (Question and Answer) NANOG audience (Question and Answer)
Copyright © 2000, Juniper Networks, Inc. Virtual Private Networks: Progress and Challenges David O’Leary Director, Consulting Engineering
Slide 5Copyright © 2000, Juniper Networks, Inc. What is a VPN? Virtual Virtual Emulation of a private network facilities over a shared network infrastructure Emulation of a private network facilities over a shared network infrastructure Private Private Minimally: no mixing with traffic outside the VPN, and support for private address space(s) Minimally: no mixing with traffic outside the VPN, and support for private address space(s) Possibly encryption and protected traffic class Possibly encryption and protected traffic class Network – two or more users or sites Network – two or more users or sites
Slide 6Copyright © 2000, Juniper Networks, Inc. How Virtual is Virtual? The only true non-virtual private network are customer-owned physical plant, like copper and fiber, transport and switching equipment The only true non-virtual private network are customer-owned physical plant, like copper and fiber, transport and switching equipment Leasing TDM circuits from a carrier means that the customer gets a “virtual” slice of the carrier’s transmission network Leasing TDM circuits from a carrier means that the customer gets a “virtual” slice of the carrier’s transmission network Leasing some kind of layer 2 circuits (ATM, Frame Relay) from a carrier means that the customer gets a “virtual” slice of the carrier’s layer 2 network Leasing some kind of layer 2 circuits (ATM, Frame Relay) from a carrier means that the customer gets a “virtual” slice of the carrier’s layer 2 network Statistical multiplexing here means that it’s cheaper for both the provider and (in theory) the customer Statistical multiplexing here means that it’s cheaper for both the provider and (in theory) the customer
Slide 7Copyright © 2000, Juniper Networks, Inc. Focus on “IP VPNs” VPNs over an IP backbone that supports multiple services (e.g., public Internet, VoIP)VPNs over an IP backbone that supports multiple services (e.g., public Internet, VoIP) Exploit economies of scale through use of common backbone facilities Exploit economies of scale through use of common backbone facilities Reduce inefficiencies of separate networks Reduce inefficiencies of separate networks Shared local loops for internal corporate network and Internet access Shared local loops for internal corporate network and Internet access Service providers add value by allowing customers (enterprises networks) to “outsource” their routing (complexity) to the carrier Service providers add value by allowing customers (enterprises networks) to “outsource” their routing (complexity) to the carrier
Slide 8Copyright © 2000, Juniper Networks, Inc. Four models of VPNs Remote User accessRemote User access CPE BasedCPE Based MPLS-based Layer2MPLS-based Layer2 Provider-Based Layer 3Provider-Based Layer 3
Slide 9Copyright © 2000, Juniper Networks, Inc. Remote User Access Variety of protocols developed in mid-90’s to tunnel remote user traffic to a fixed site on the IP network Variety of protocols developed in mid-90’s to tunnel remote user traffic to a fixed site on the IP network ATMP, PPTP, ATMP ATMP, PPTP, ATMP Functions consolidated in IETF L2TP protocol Functions consolidated in IETF L2TP protocol Documented in RFC 2661, with various drafts for extensions Documented in RFC 2661, with various drafts for extensions Dynamic, authenticated tunnels Dynamic, authenticated tunnels Deployments are becoming quite common Deployments are becoming quite common
Slide 10Copyright © 2000, Juniper Networks, Inc. CPE Based VPNs Tunnels configured between CPE devicesTunnels configured between CPE devices Options are GRE, IPSEC, IP-in-IP, PPTP, L2TPOptions are GRE, IPSEC, IP-in-IP, PPTP, L2TP Topology of the VPN is configured into the CPE devicesTopology of the VPN is configured into the CPE devices The provider does not have to do anything to their network (they may not even know it is happening)The provider does not have to do anything to their network (they may not even know it is happening) VPN traffic may be marked and prioritizedVPN traffic may be marked and prioritized The service provider may bundle and manage the CPE devices used to create the VPN service The service provider may bundle and manage the CPE devices used to create the VPN service Provides “value add” beyond best effort Internet connectivity Provides “value add” beyond best effort Internet connectivity This model is already being aggressively deployed by providers around the world This model is already being aggressively deployed by providers around the world
Slide 11Copyright © 2000, Juniper Networks, Inc. CPE Based VPNs Tradeoffs Provider network configuration Provider network configuration Potentially no more than required for Internet access Potentially no more than required for Internet access CoS or managed service adds provider complexity CoS or managed service adds provider complexity Customer (CPE) configuration Customer (CPE) configuration Every tunnel is a separate virtual interface that must be configured, including for routing Every tunnel is a separate virtual interface that must be configured, including for routing Scalability Scalability Provider network – excellent Provider network – excellent Customer – depends on number of tunnels and routing topology/complexity Customer – depends on number of tunnels and routing topology/complexity
Slide 12Copyright © 2000, Juniper Networks, Inc. Layer-2 VPNs A subscriber leases VCs between the sites that need to be connected A subscriber leases VCs between the sites that need to be connected Topologies are hub and spoke, full or partial mesh Topologies are hub and spoke, full or partial mesh The subscriber and provider think of these VCs as “dumb” pipes not at all involved in Layer 3 issues such as routing, packet filtering, etc. The subscriber and provider think of these VCs as “dumb” pipes not at all involved in Layer 3 issues such as routing, packet filtering, etc. Subscriber outsources the Layer 3 management to the provider in a “Managed Router” service Subscriber outsources the Layer 3 management to the provider in a “Managed Router” service Mature support for commitments about service (e.g., bandwidth, availability, etc.) Mature support for commitments about service (e.g., bandwidth, availability, etc.) At least in the business/SLA sense At least in the business/SLA sense Virtual Circuit model eases capacity planning Virtual Circuit model eases capacity planning
Slide 13Copyright © 2000, Juniper Networks, Inc. Layer-2 VPN Tradeoffs Provider configuration Provider configuration A lot in theory, but it’s mostly automated in practice A lot in theory, but it’s mostly automated in practice Subscriber configuration Subscriber configuration Every VC is a separate virtual interface that must be configured, including for routing Every VC is a separate virtual interface that must be configured, including for routing Large, complex topologies yield complex configurations Large, complex topologies yield complex configurations Scalability Scalability Provider -- number of VCs and stability of core Provider -- number of VCs and stability of core Subscriber -- number of interfaces and routing Subscriber -- number of interfaces and routing Other Other Leverages existing investment Leverages existing investment
Slide 14Copyright © 2000, Juniper Networks, Inc. MPLS-Based Layer-2 VPNs Looks identical to “traditional layer 2 VPNs” from the subscriber perspective Looks identical to “traditional layer 2 VPNs” from the subscriber perspective Provider carries the layer 2 circuits over an IP/MPLS backbone Provider carries the layer 2 circuits over an IP/MPLS backbone Provides the ability for multiple services (public IP, private IP, VoIP, etc) over a single access circuit Provides the ability for multiple services (public IP, private IP, VoIP, etc) over a single access circuit
Slide 15Copyright © 2000, Juniper Networks, Inc. MPLS-Based Layer-2 VPNs Provider 1 Subscriber A ATM Access Internet Traffic: ATM VC1 terminated, IP packets delivered to provider 2 Provider 2 VPN Traffic: ATM VC2 mapped to MPLS LSP “tunnel” Termination of ATM PVCs (layer 3 lookup) and support Layer-2 pass- through on the same port.
Slide 16Copyright © 2000, Juniper Networks, Inc. MPLS-Based Layer-2 VPN Tradeoffs Provider configuration Provider configuration Manual configuration of ingress and egress boxes (could be partially automated) Manual configuration of ingress and egress boxes (could be partially automated) Subscriber configuration Subscriber configuration Every VC is a separate virtual interface that must be configured, including for routing Every VC is a separate virtual interface that must be configured, including for routing Retains existing CPE and subscriber model Retains existing CPE and subscriber model Scalability Scalability Provider -- number of LSPs, stability of core Provider -- number of LSPs, stability of core Subscriber -- number of VCs and routing Subscriber -- number of VCs and routing
Slide 17Copyright © 2000, Juniper Networks, Inc. Provider-Based Layer-3 VPNs Concepts outlined in RFC 2547 and RFC 2764 Concepts outlined in RFC 2547 and RFC 2764 Subscriber treats access link as combined internet/VPN link Subscriber treats access link as combined internet/VPN link Except for multiply-connected sites, needs minimal configuration (i.e., Default) Except for multiply-connected sites, needs minimal configuration (i.e., Default) Provider’s edge router supports instances of routing protocols and multiple forwarding tables Provider’s edge router supports instances of routing protocols and multiple forwarding tables If a destination isn’t in a VPN-specific forwarding table then use Internet table If a destination isn’t in a VPN-specific forwarding table then use Internet table VPN site membership and VPN-specific routing information carried in BGP VPN site membership and VPN-specific routing information carried in BGP Supports overlapping private address space Supports overlapping private address space Topology is conceptually always a full mesh between PE’s Topology is conceptually always a full mesh between PE’s
Slide 18Copyright © 2000, Juniper Networks, Inc. Provider-based Layer-3 VPN tradeoffs Provider configurationProvider configuration Minimal static configuration in basic scenariosMinimal static configuration in basic scenarios More configuration needed for complex topologiesMore configuration needed for complex topologies Subscriber configurationSubscriber configuration Basic scenario is straightforwardBasic scenario is straightforward More complex config needed for security, multihoming, participation in multiple VPNs, etc.More complex config needed for security, multihoming, participation in multiple VPNs, etc. ScalabilityScalability ProviderProvider I-BGP possibly sees 100,000s of routes, (in)stability of multiple dynamic routing domains, multiple forwarding tablesI-BGP possibly sees 100,000s of routes, (in)stability of multiple dynamic routing domains, multiple forwarding tables Subscriber – allows shared local loop and CPE device for multiple services (intranet, Internet, voice, etc.)Subscriber – allows shared local loop and CPE device for multiple services (intranet, Internet, voice, etc.)
Slide 19Copyright © 2000, Juniper Networks, Inc. Where Does That Leave Us? Customer-centric tunneling are easier for the providerCustomer-centric tunneling are easier for the provider COS, traffic engineering, SLA’s, etc. are value-addsCOS, traffic engineering, SLA’s, etc. are value-adds For a provider implementing VPNs, scalability and value-add are fundamentally at oddsFor a provider implementing VPNs, scalability and value-add are fundamentally at odds MPLS-based layer-2 VPNs offer the benefits of an integrated/multi-service networkMPLS-based layer-2 VPNs offer the benefits of an integrated/multi-service network But the enterprise network has to handle the routingBut the enterprise network has to handle the routing Layer-3 VPNs allow the enterprise network to be almost unconcerned with routingLayer-3 VPNs allow the enterprise network to be almost unconcerned with routing Doesn’t support as many VPNs, sites per VPN, routes per VPN or customers per access box than MPLS-based layer 2 VPNsDoesn’t support as many VPNs, sites per VPN, routes per VPN or customers per access box than MPLS-based layer 2 VPNs Risk of the stability of the multi-service coreRisk of the stability of the multi-service core So what is the answer?So what is the answer?
Slide 20Copyright © 2000, Juniper Networks, Inc. Where Does That Leave Us? (cont.) The answer is: it depends The answer is: it depends Some subscribers may require the ability to outsource routing Some subscribers may require the ability to outsource routing Layer 3 VPNs or Layer 3 VPNs or MPLS-based layer 2 VPNs where “managed services” are provided and a device at the customer’s premises converts from pure IP to some number of layer 2 virtual circuits MPLS-based layer 2 VPNs where “managed services” are provided and a device at the customer’s premises converts from pure IP to some number of layer 2 virtual circuits Some subscribers may be capable of doing their own routing Some subscribers may be capable of doing their own routing MPLS-based layer 2 VPNs offer scalability for broad deployment as well as stability with less coupling MPLS-based layer 2 VPNs offer scalability for broad deployment as well as stability with less coupling Range of hybrid solutions is probably likely Range of hybrid solutions is probably likely Remote access user VPNs Remote access user VPNs CPE-based VPNs CPE-based VPNs MPLS-based layer 2 VPNs MPLS-based layer 2 VPNs Layer 3 VPNs Layer 3 VPNs
Slide 21Copyright © 2000, Juniper Networks, Inc. Summary There is no one-size-fits-all solution for VPNs There is no one-size-fits-all solution for VPNs Tradeoffs between value add and scalability/stability Tradeoffs between value add and scalability/stability Tradeoffs between customer requirements Tradeoffs between customer requirements Desire to outsource routing, security, etc. Desire to outsource routing, security, etc. Size and complexity of network Size and complexity of network