MPLS on UW System Network Michael Hare. Purpose of presentation As I didn't really understand MPLS going in, I thought it would be useful to share what.

Slides:



Advertisements
Similar presentations
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Advertisements

MPLS VPN.
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS TE Overview Configuring MPLS TE on Cisco IOS Platforms.
Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 9: Static Routes & Routing Table Groups.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Deployment of MPLS VPN in Large ISP Networks
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP Diverse Paths draft-ietf-grow-diverse-bgp-paths-dist-02 Keyur Patel.
IEEE HPSR IP Network Background and Strategy Milestones  Started as a Internet backbone/IGW  Expansion with MAN networks  Tripleplay and multimedia,
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
RIP V2 W.lilakiatsakun.  RFC 2453 (obsoletes –RFC 1723 /1388)  Extension of RIP v1 (Classful routing protocol)  Classless routing protocol –VLSM is.
IPv6 Routing IPv6 Workshop Manchester September 2013
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
MPLS H/W update Brief description of the lab What it is? Why do we need it? Mechanisms and Protocols.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
PTX Use Cases Chris Whyte
Seamless MPLS for Mobile Backhaul draft-li-mpls-seamless-mpls-mbh-00
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
MPLS VPN Security assessment
Fundamentals of Networking Discovery 2, Chapter 6 Routing.
MPLS Evan Roggenkamp. Introduction Multiprotocol Label Switching High-performance Found in telecommunications networks Directs data from one network node.
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
Lab MPLS Basic Configuration Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Juniper update Michael Hare 2015/09/23 UW System Network.
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
Protection and Restoration Definitions A major application for MPLS.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
6: Routing Working at a Small to Medium Business.
MPLS VPNs by Richard Bannister. The Topology The next two slides display both the physical and logical topology of our simple example network –Please.
IP Routing Principles. Network-Layer Protocol Operations Each router provides network layer (routing) services X Y A B C Application Presentation Session.
1 | © 2015 Infinera Open SDN in Metro P-OTS Networks Sten Nordell CTO Metro Business Group
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
MPLS on UW System Network Michael Hare. Purpose of presentation As I didn't really understand MPLS going in, I thought it would be useful to share what.
E-VPN on UW System Network Michael Hare. Purpose of presentation A high level introduction to E-VPN A simple lab demonstration For our documentation,
Module 2 MPLS Concepts.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—2-1 BGP Transit Autonomous Systems Forwarding Packets in a Transit AS.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Routing Protocols Internal and External Routing 6DEPLOY. IPv6 Deployment and Support.
Computer Networks 0110-IP Gergely Windisch
Global Table Multicast with BGP-MVPN Protocol

MPLS Virtual Private Networks (VPNs)
Advanced Computer Networks
Kapitel 19: Routing. Kapitel 21: Routing Protocols
MPLS VPN Implementation
BGP-Based SPF RTGWG - Jan 2017
OpenDaylight BGP Use-Cases
Single-Area OSPF 1 Cisco Networking Academy program Routing Protocols
Using MPLS/VPN for Policy Routing
MPLS VPNs by Richard Bannister.
Kireeti Kompella Juniper Networks
Dynamic Routing and OSPF
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
BGP-Based SPF IETF 98, Chicago
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Computer Networks Protocols
Presentation transcript:

MPLS on UW System Network Michael Hare

Purpose of presentation As I didn't really understand MPLS going in, I thought it would be useful to share what I've learned in logical order [vs chronological order, which would leave you with a jumbled mess]. Note: My experience is Juniper specific so there may not be a 1:1 match in Cisco land.

Overview Prepare your IGP for MPLS Prepare BGP for MPLS Enable MPLS Deploy services Keeping it running

Preparing your IGP for MPLS The MPLS layer is built upon your IGP, so you should take steps to make it robust. Steps include: Collapsing your IGP Improving convergence in your IGP Securing your IGP

Collapsing your IGP Carry IPv4/IPv6 a single IGP protocol such as ISIS or carry IPv4 routes inside of OSPFv3. less room for topology error [ passive/active -> metrics/mtu ] less cpu/resources to converge, run BFD, etc full disclosure: in uwsys.net, I still run separate OSPFv2 and OSPFv3 sessions

Improving convergence in your IGP The faster your IGP converges, the more robust your MPLS services will be. Minimize devices in an area Enable loop free alternate routes. An alternative route is calculated and installed in the forwarding table, moving convergence to near sonet levels. LFA route will not be able to calculate backups for 100% of LSA's: more on this later alternate-routes.html Eliminate/reduce links between routers that are not directly connected. If you can't, BFD is required. full disclosure: I run area 0 everywhere in uwsys.net.

Securing your IGP Keep your IGP rock solid ISIS does not use IP, it uses CLNS. Not being world reachable adds a layer of security Use routing engine filters to protect protocols, not just your IGP. Do not run IGP protocols with your customers [sorry guys, its true].

Preparing BGP for MPLS MPLS VPNs use BGP as a database to distribute information. BGP/MPLS overview Preparing BGP for MPLS iBGP BFD

BGP/MPLS overview BGP is used as the database is used to distribute VPN information Each BGP family [AFI/SAFI] have different NLRI that describes each database row. NLRI are per AFI/SAFI. [E-VPN NLRI] note: point to point pseudowires can be built without BGP but multipoint layer 2 and layer 3 need BGP.

Preparing BGP for MPLS BGP requires a full mesh with each BGP speaker in an AS. Route reflectors simplifying device configuration by requiring a full mesh only with the route reflectors Use two [or more] devices as BGP route reflectors. Route reflectors can be inline or out of forwarding path Enable all of the BGP families you think you want, because adding an NLRI to a peer requires a BGP peer reset. flowspec, l3vpn, ipv6 l3vpn, evpn/l2vpn note: On uwsys.net I two inline core devices for this function and have been satisfied

iBGP BFD iBGP sessions are multihop, therefore require BFD Otherwise, a route reflector client could take 60 to 90 seconds to timeout if a route reflector becomes unreachable. This is very bad when iBGP has converged to a belief that the 'dead' route reflector is best path for a route. Know your platform. point to point BFD is often done in forwarding linecard whereas multihop BFD is sometimes done at control plane. Because it's done at control plane you may need longer timers if you are using nonstop routing. I use 3x500ms for point to point BFD and 4x2500 for multipoint. 10s is less than 60s.

Enable MPLS MPLS: Basic terminology Label distribution [LDP, RSVP] and tunneling

MPLS: Basic terminology MPLS forwards packets by switching labels [push, pop] based on a forwarding database Label A on interface X: pop label A, push label B, forward on interface Y: P: Provider core node. In some networks, the P device could be absent all customer routes, only using IGP and MPLS to forward packets. PE: Provider edge: Node that connects directly to a customer network CE: Customer edge: Outside of the service provider’s domain. Does not participate in P/PE MPLS protocols, but is serviced by it. Note: UW System Network does not have a pure ‘P’ node. The MX2010s are both P and PE nodes as customers directly connect

Label distribution [LDP, RSVP] and tunneling LDP and RSVP are used to distribute labels between P/PE devices Labels are distributed by sending LDP/RSVP control packets over IP. P/PE devices are numbered by their IP loopback addressing LDP and RSVP are commonly run on IPv4. However, LDP and RSVP do not forward packets, they setup MPLS routing databases. So, you can forward IPv6 but only run LDP/RSVP over IPv4. MPLS tunnel is just a fancy way of describing a signaled forwarding path between two P/PE devices.

LDP LDP mirrors your IGP. Juniper IGP LFA implementation extends to IGP, meaning a backup path between PE1 and PE2 can be precomputed and installed in forwarding table LDP can automatically signal a full mesh of paths between P/PE Simple to configure LDP neighbors are point to point but can be held up using their P/PE addressing. This feature is called session-protection. If point to point LDP session is interrupted but PE1 and PE2 are still unicast reachable, MPLS labels need not be discarded, improving convergence time upon restoration. As LDP is dependent on a converged IGP, consider ldp-synchronization to make sure the IGP isn’t active until LDP is active. (Possible) con: MPLS traffic will follow your IGP path

RSVP RSVP can steer MPLS traffic in a way other than IGP best path. Juniper IGP LFA implementation extends to IGP, meaning a backup path between PE1 and PE2 can be precomputed and installed in forwarding table RSVP can be configured as a dynamic backup to LDP for LDP paths that cannot calculate a LFA. In Juniper land, this is called “link- protection dynamic-rsvp-lsp” RSVP ‘fast reroute’ is like LDP LFA but on steroids as it consider path constaints. (Possible) con: RSVP requires more work from the operator to be useful

So do I use LDP or RSVP? LDP and RSVP can be run side by side. We are currently doing so, although I may make a change. LDP Pros: LDP keeps things simple with minimal config. A good place to start. Pros: Juniper implementation automatically uses RSVP to augment LDP LFA. Cons: Lots of needless labels is inefficient [label path BFD, signaling backups] RSVP Pros: can be used for specific traffic engineering needs Cons: Slightly more ‘by hand’ configuration

Deploy services Once IGP, BGP and MPLS is in place, deploy services While this is probably the most exciting portion, it is omitted. See me for details. I have deployed or tested L2circuit [pseudowire] L2 E-VPN I have not deployed L3 VPN but it is similar to L2 E-VPN in config I have not deployed MPLS multicast

Keeping it running Use routing engine filters to protect protocols, not just your IGP. [IGP: OSPF, ISIS. MPLS: LDP, RSVP. BGP, BFD, IGMP, MSDP, PIM, VRRP. DNS, NTP] Monitoring At a minimum, track BGP NLRI counts Configuration sanity management There are lots of config bits that need to align for this all to work

That’s all, folks FIN