Network-based IP VPNs using Virtual Routers Tim Hubbard.

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
MPLS VPN.
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Deployment of MPLS VPN in Large ISP Networks
Provider Provisioned Virtual Private Networks Wing C. Lau Performance Analysis Department Bell Labs, Lucent Technologies Holmdel, New Jersey Dec
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 Module Summary The VRF table is a virtual routing and forwarding instance separating sites.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
MPLS-VPN/BGP Approach Hari Rakotoranto Technical Marketing Engineer
Pseudowire Edge to Edge Emulation FROM THE SERVICE PROVIDER POINT OF VIEW
Virtual Private Networks Network Based IP VPN 03/10/2002.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 Integration of IPv6 Services. 2 Integration of IPv6 Services The Ubiquitous Internet Large Address Space Auto-Configuration Enhanced Mobility.
MPLS / VPN Connectivity between VPNs JET 2004/03/15.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
© 2009 Cisco Systems, Inc. All rights reserved.ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Planning the Enterprise-to-ISP Connection.
C 2001 NTT, All rights reserved. IP&MEDIACOM WORKSHOP IP-VPN standardization overview 2. BGP/MPLS VPN approach 3. Virtual Router approach 1 4.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Copyright © 2000, Juniper Networks, Inc. Virtual Private Networks: Progress and Challenges Panel Session.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Network based IP VPN Architecture using Virtual Routers Jessica Yu CoSine Communications, Inc. Feb. 19 th, 2001.
MPLS VPN Security assessment
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
C 2001 NTT, All rights reserved. IP&MEDIACOM WORKSHOP2001 IP5/IP6 : IP-VPN April 27, 2001 Session coordinator : Yoichi Maeda (Vice-chairman of ITU-T SG-13,
1 © 1999, Cisco Systems, Inc _05F9_c2 1 NW’99 Vienna © 1999, Cisco Systems, Inc. MPLS VPNs Peter Tomsu Senior Consultant EMEA
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
27 th of SeptemberAgnes PouelePage 1 MPLS Next Generation Networking September 2000 TF-TANT MPLS TESTING.
GVPNs: Generalized VPNs using BGP and GMPLS Toolkit draft-ouldbrahim-ppvpn-gvpn-bgpgmpls-06.txt Hamid Ould-Brahim Yakov Rekhter
Virtual Private Networks Juha Heinänen Song Networks.
Lucy Yong Susan Hares September 20, 2012 Boston
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
MPLS Forwarder Preliminary 1 Outline MPLS Overview MPLS Overview MPLS MRD MPLS Data Path HLD 48K MPLS Fwder HLD IPE MPLS Fwder HLD Issues Summary.
1 © 2004 Cisco Systems, Inc. All rights reserved. L2VPN RADIUS - IETF 62 L2VPN RADIUS Auto-discovery and provisioning draft-ietf-l2vpn-radius-pe-discovery-01.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Virtual Private Networks Warren Toomey. Available WAN Links.
IPv6 for ISP Industry Sify Technologies Ltd Somasundaram Padmanabhan Network Engineering IPv6 Awareness Workshop.
Different Address Family Transit (DAFT) using Encapsulation and BGP-MP Extension Tsinghua University Feb 23, 2006 Contact: ----A.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
1 MPLS: Progress in the IETF Yakov Rekhter
MPLS VPNs by Richard Bannister. The Topology The next two slides display both the physical and logical topology of our simple example network –Please.
1 Using VPLS for VM mobility cern.ch cern.ch HEPIX Fall 2015.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
Support for RSVP in Layer 3 VPNs draft-davie-tsvwg-rsvp-l3vpn-01.txt Bruce Davie François le Faucheur Ashok Narayanan Cisco Systems.
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
OSPF Version 2 as the Customer Edge/Customer Protocol for BGP/MPLS IP VPNs
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Routing Protocols Internal and External Routing 6DEPLOY. IPv6 Deployment and Support.
MBGP and Customer Routes
MPLS Virtual Private Networks (VPNs)
Multicast in Virtual Router-based IP VPNs
The Business Value of MPLS VPNs
Kireeti Kompella Juniper Networks
An Update on Multihoming in IPv6 Report on IETF Activity
EVPN a very short introduction
Label Switched VPNs – Scalability and Performance Analysis
Experiences with Implementing MPLS/VPN Services
Presentation transcript:

Network-based IP VPNs using Virtual Routers Tim Hubbard

Backbone(s) VPN AVPN CVPN BVPN DVPN AVPN BVPN CVPN D PE CE P P P P Network based VPN Network Reference Model CE - Customer Edge Router PE - Provider Edge Router P - Provider Router CE

Network Based VPN Services Provider Edge Router (PE) VPN A VPN B VPN C Provider Edge Router (PE) VPN Service 1 VPN Service 2 VPN Service 3 VPN Service 1 VPN Service 2 VPN Service 3 VPN A VPN B VPN C Backbone(s)

Architecture Design Goals Flexibility –solution architected around choices Scalability –backbone, VPN, PE, etc. Resiliency –NB-VPN services resilient to failures, smooth migration, Manageability –multiple levels of control while reducing NB-VPN service, and network management complexity Reusability –existing management aspects, network mechanisms and tools Security –VPN service, VPN information (routing and data)

Architecture Requirements Per VPN routing and forwarding. No routing/forwarding based on private addresses in the backbone. Any routing protocol can be used in the VPN domain and in the backbone. Overlapping of VPN addresses. Not limited to a single tunneling mechanism. Accommodates different backbone deployment scenarios. Not limited to a single backbone technology

What is a Virtual Router? A virtual router (VR) is an emulation of physical router. A VR has the same mechanisms and functionality as physical routers. Each virtual router maintains separate routing and forwarding tables. Each virtual router can run any routing protocols (OSPF, RIP, BGP-4, etc).

VPN Tunneling Network-based VPNs are implemented through some form of tunneling mechanism. Different tunneling mechanisms can be used (MPLS, IPSec, GRE, L2TP, etc). The architecture allows per VPN tunnels, or using VPN shared tunnels across the backbone.

Scenario 1: - VR to VR Direct Connectivity VR-C VR-A VR-B VPN A VPN B VPN C PE VR-C VR-A VR-B Backbone (ATM, FR, MPLS, etc) PE VPN A VPN B VPN C

Virtual Router Backbone Aggregation Virtual router (called Backbone Virtual Router) for routing in the backbone used at the PE level only. IP or MPLS based tunnels between VRs for transport of VPN information across the backbone.

Scenario 2: - VPNs with Backbone VRs PE Backbone Routing SpaceVPN Routing Space The backbone virtual router is not functionally different than other virtual routers. Backbone VR Backbone VR-C VR-A VR-B VPN A VPN B VPN C

Scenario 3: - Combination of VR Deployment Scenarios VR-B VR-C Backbone VR VPN B VPN C Backbone(s) VR-A VPN A PE

Scenario 4: - Multiple Backbones VR-C VR-A VR-B Backbone VR-1 VPN A VPN B VPN C Backbone-1 VR-D VR-E Backbone VR-2 Backbone-2 VPN E VPN D PE

Scenario 5: - VPNs with Backdoor Links VR-C VR-A VR-B Backbone VR-1 VPN A VPN B VPN C Backbone-1 VR-C VR-A VR-B Backbone VR-1 VPN A VPN B VPN C

Scenario 6: - Outsourcing/Management of the PE VR-C VR-A VR-B Backbone VR-1 VPN A VPN B VPN C Backbone-1 VR-D VR-E Backbone VR-2 Backbone-2 VPN E VPN D PE Service Provider-1 Service Provider-2

Scenario 7: - Multi-protocol VPNs VR-C VR-A VR-B Backbone VR-1 VPN A IPv6 VPN B IPv4 VPN C IPv6 Backbone-1 IPv4/IPv6 PE

Scenario 8: - Backbone Migration Example VR-C VR-A VR-B Backbone VR-1 VPN A VPN B VPN C Backbone IPv4 Backbone VR-2 (MPLS) Backbone MPLS PE VPN services are migrated one at a time

Provider Edge Router 1 Virtual Router B Virtual Router A Virtual Router C Provider Edge Router 2 Virtual Router A Virtual Router C Virtual Router B Routing Instance Routing Instance Routing Update Routing Update Routing Update Backbone Per VPN Reachability Info Virtual Virtual Router Reachability Scheme Each routing instance is independent of each other. Routing Instance Routing Instance Routing Update Routing Update Routing Update Routing Instance Routing Instance Routing Update Routing Update Routing Update VPN A VPN B VPN C VPN A VPN B VPN C

Membership and Topology Determination Different mechanisms can be used (not mutually exclusives): Directory server approach. Explicit configuration Using a VPN auto-discovery mechanism

What can be discovered? VPN Auto-Discovery Tunnel Mechanism (optionally Tunnel endpoints) Membership Information Topology Information VPN Reachability Information (draft RFC2547) The virtual router architecture doesn’t require piggybacking VPN reachability information onto the backbone routing instance.

Discovering VPN Information Provider Edge Router (PE1) VPN A VPN B VPN C Backbone BGP BGP UPDATE BGP UPDATE VPN Information (membership, etc.) Provider Edge Router (PE2) BVR VR-C VR-A VR-B VR-C VR-A VR-B VPN A VPN B VPN C

Discovering Membership Information Provider Edge Router (PE1) VPN A VPN B VPN C Backbone VPN A VPN B VPN C BGP BGP UPDATE BGP UPDATE (VPN-IDs,PE-BVR) Provider Edge Router (PE2) BVR VPN-ID=1:1 VPN-ID=1:2 VPN-ID=1:3 VPN-ID=1:1 VPN-ID=1:2 VPN-ID=1:3 VR-C VR-A VR-B VR-C VR-A VR-B

Discovering Tunnel Endpoints Provider Edge Router (PE1) Backbone BGP BGP UPDATE BGP UPDATE (VPN-IDs, , PE- BVR) Provider Edge Router (PE2) BVR VPN-ID=1:1 VPN-ID=1:2 VPN-ID=1:3 VPN-ID=1:1 VPN-ID=1:2 VPN-ID=1:3 VR-C VR-A VR-B VR-C VR-A VR-B IPsec Tunnel VPN A VPN B VPN C VPN A VPN B VPN C

Discovering VPN Topology Information Provider Edge Router (PE1) Backbone BGP BGP UPDATE BGP UPDATE (1:1, hub, PE BVR) Provider Edge Router (PE2) BVR VPN-ID=1:1 VPN-ID=1:2 VPN-ID=1:3 VPN-ID=1:1 VPN-ID=1:2 VPN-ID=1:3 VR-C VR-A VR-B VR-C VR-A VR-B VPN A VPN B VPN C VPN A VPN B VPN C

BGP based Auto-Discovery Mechanism (for layer-3 VPNs) “Using BGP as an Auto-Discovery Mechanism for Network-based VPNs” Hamid Ould-Brahim, Bryan Gleeson, Peter Ashwood-Smith, Eric Rosen, Yakov Rekhter draft-ouldbrahim-bgpvpn-auto-00.txt

Conclusion Virtual Routers allow Service Providers to build differentiated network-based VPN services. The architecture is highly flexible and accommodates different tunneling mechanisms, and different backbone technologies.

Contacts Hamid Ould-Brahim Nortel Networks P. O. Box 3511 Station C Ottawa, ON, K1Y 4H7 Canada Phone: +1 (613) Bryan Gleeson Nortel Networks 2305 Mission College Blvd Santa Clara CA USA Phone: +1 (408)

Thank You