MPLS over L2TPv3 Encapsulation IETF 61. 01234567890123456789012345678901 VersionIHLTOSTotal length IdentificationFlagsFragment offset TTL Protocol ==

Slides:



Advertisements
Similar presentations
IP security over ATM CS 329 Hwajung Lee Computer and Communications Security The George Washington University.
Advertisements

Identifying MPLS Applications
Leading Edge Routing MPLS Enhancements to Support Layer 2 Transport Services Jeremy Brayley
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
IPv6 The New Internet Protocol Integrated Network Services Almerindo Graziano.
IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
IPv6. Major goals 1.support billions of hosts, even with inefficient address space allocation. 2.reduce the size of the routing tables. 3.simplify the.
IPv4 - The Internet Protocol Version 4
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
W. Mark Townsley Pseudowires and L2TPv3 W. Mark Townsley
MPLS over L2TPv3 for support of RFC 2547-based BGP/MPLS IP VPNs
Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.
K. Salah1 Security Protocols in the Internet IPSec.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
TDRE Filtering and QoS TDRE Version The first choice for the mile p.2 IP filtering >With extended access lists >define in router/trafficPolicy.
MPLS Evan Roggenkamp. Introduction Multiprotocol Label Switching High-performance Found in telecommunications networks Directs data from one network node.
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Data Link Layer Network Fundamentals – Chapter 7.
1 © 2002, Cisco Systems, Inc. All rights reserved. draft-nadeau-pwe3-vccv-00.txt IETF #56 San Francisco, CA USA Thomas D. Nadeau Monique.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Internet Protocol (IP)
11-01-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 4.2 IPv4 and Other Networks.
Softwires Hub & Spoke with L2TP
1 Extensions to CRTP RTP Multiplexing using Tunnels Bruce Thompson Tmima Koren Cisco Systems Inc.
MPLS Forwarder Preliminary 1 Outline MPLS Overview MPLS Overview MPLS MRD MPLS Data Path HLD 48K MPLS Fwder HLD IPE MPLS Fwder HLD Issues Summary.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
1 IPFIX Protocol Specifications IPFIX IETF-59 March 3, 2004 Benoit Claise Mark Fullmer Reinaldo Penno Paul Calato Stewart Bryant Ganesh Sadasivan.
1 RTP Multiplexing using Tunnels (TCRTP) Bruce Thompson Tmima Koren Cisco Systems Inc.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
L2TP Chapter 7. Motivation Sometimes we want to tunnel one protocol over another protocol –Maybe the network does not understand how to forward that protocol.
Stateless Transport Tunneling draft-davie-stt-01.txt Bruce Davie, Jesse Gross, Igor Gashinsky et al.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Stein-67 Slide 1 PWsec draft-stein-pwe3-pwsec-00.txt PWE3 – 67 th IETF 7 November 2006 Yaakov (J) Stein.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
IP Traffic Engineering RSP draft-shen-ip-te-rsp-01.txt Naiming Shen Albert Tian Jun Zhuang
1 Figure 3-5: IP Packet Total Length (16 bits) Identification (16 bits) Header Checksum (16 bits) Time to Live (8 bits) Flags Protocol (8 bits) 1=ICMP,
PWE3 Control Word Mandate: draft-delregno-pwe3-mandatory-control-word Nick DelRegno PWE3 WG IETF 79.
IP Pseudowire Florin Balus August, PG 1Florin BalusIETF60 – San Diego Requirements - Existing topology FR/ATM VPNs ATM Network Frame Relay Access.
November 6, 2006Softwire WG Meeting1 Softwires “Mesh” Scenario Problem: –pass AF1 routing and data over the AF1-free core, –while obeying certain constraints.
Network Access for Remote Users Dr John S. Graham ULCC
1 Use of PE-PE IP/GRE/IPsec for MPLS PWs draft-raggarwa-pwe3-pw-over-ip- 00.txt Rahul Aggarwal
K. Salah1 Security Protocols in the Internet IPSec.
After 7.1 Last modified
GRE.
A Fragmentation Strategy for Generic Routing Encapsulation (GRE)
MPLS Virtual Private Networks (VPNs)
RFC 3775 IPv6 Mobility Support
Virtual Private Network (VPN)
IP - The Internet Protocol
OSPFv3 over IPv4 for IPv6 Transition
Internet and Intranet Fundamentals
Advertising Encapsulation Capability Using OSPF
Softwires Hub & Spoke using L2TPv3
Network Fundamentals – Chapter 5
IP - The Internet Protocol
Internet Protocol (IP)
Virtual Private Network (VPN)
What does this packet do?
IP - The Internet Protocol
Advanced Computer Networks
PW Control Word Stitching
PW Control Word Stitching
How OAM Identified in Overlay Protocols draft-mirsky-rtgwg-oam-identify Greg Mirsky IETF-104 March 2019, Prague.
draft-ietf-bier-ipv6-requirements-01
Editors: Bala’zs Varga, Jouni Korhonen
Packet Switch Architectures
Presentation transcript:

MPLS over L2TPv3 Encapsulation IETF 61

VersionIHLTOSTotal length IdentificationFlagsFragment offset TTL Protocol == 0x73 (L2TP) Header checksum Source IP address (Local address on PE router) Destination IP address (Local address on PE router) Session ID (32 bits) Cookie (32 or 64 bits, Optional) L2TPv3 – Multiservice Tunneling L2TPv3 Encapsulation defined in RFC 3931 (draft-ietf-l2tpext-l2tp-base-14.txt) MPLS over L2TPv3 encapsulation defined in draft-townsley-l2tpv3-mpls-02.txt Payload Frame Relay HDLC Ethernet (VPWS or VPLS) ATM (Cell or Packet) TDM MPLS PPP

L2TPv3 Encapsulation Session ID and Cookie (if present) may be signaled, or manually configured. Session ID is used during decapsulation to identify service or session context for L2TPv3. Before processing the L2TPv3 payload, the Cookie returned via the Session ID context lookup and the Cookie in the received packet header are compared to ensure they match. Session ID (32 bits) Cookie (32 or 64 bits, Optional)

VersionIHLTOSTotal length IdentificationFlagsFragment offset TTLProtocol == 0x73 (L2TP)Header checksum Source IP address (Local address on PE router) Destination IP address (Local address on PE router) Session ID (32 bits) Tunnel IP Cookie (32 or 64 bits, Optional) L2TPv3 LabelExpSTTL MPLS over L2TPv3 MPLS PDU MPLS Stack + PDU

Alignment with other MPLS tunneling methods Draft-ietf-mpls-in-gre-or-ip-08.txt defines: 1.MPLS over IP 2.MPLS over GRE with “full” header 3.MPLS over GRE with “simplified” header 4.MPLS over IP with IPsec transport mode 5.MPLS over GRE with IPsec transport mode There are a number of common issues when encapsulating MPLS over IP, GRE or L2TPv3 which should continue to be defined in a single location.

MPLS over L2TPv3 Specification Any specification defining the MPLS over L2TPv3 encapsulation should include an applicability section similar to that for MPLS over IP vs. MPLS over GRE vs. MPLS over IPsec. For example, –Two routers may already be “adjacent” over an L2TPv3 tunnel for other services outside of MPLS- based services –Implementation considerations may dictate the use of MPLS over L2TPv3. For example, a hardware device might be better equipped to handle L2TPv3, utilize the L2TPv3 Session ID to aid in distributed processing of different services, etc. –L2TPv3 Cookie allows a decapsulating PE to perform a context lookup validation based on the L2TPv3 session or service

Next Steps? Add L2TPv3 to the list of methods for tunneling MPLS traffic Create a short and concise (5 pages or less!) MPLS over L2TPv3 WG draft with an appropriate applicability statement and reference to draft-ietf-mpls-in-gre-or-ip-08.txt for common IP encapsulation issues draft-townsley-l2tpv3-mpls-02.txt could be a start.

End.