Download presentation
Presentation is loading. Please wait.
Published byMelvyn Small Modified over 9 years ago
1
21.11.2013 Petteri Sirén
2
Content Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary 28/11/2013Petteri Sirén2
3
28/11/2013Petteri Sirén3
4
Preface Why this study is done Reasons for the development of LISP Separation of location and identity EIDs and RLOCs 28/11/2013Petteri Sirén4
5
28/11/2013Petteri Sirén5
6
Locator/ID Separation Protocol Hosts operate the same way as before Core routers operate the same way as before Tunnel routers (CE/PE) perform tunneling Mapping system stores the EID-RLOC pairs Tunnel routers have map cache for EID-RLOC pairs Proxy tunnel routers are used between LISP sites and non-LISP sites 28/11/2013Petteri Sirén6
7
28/11/2013Petteri Sirén7
8
Host B 10.0.0.2 How LISP works Host A 10.1.0.11 Core B? -> Sent IP packet Src 10.1.0.11 Dst 10.0.0.2 ITR 1.1.1.1 From ITR to MS Where is 10.0.0.2? Mapping System From MS to ITR 10.0.0.2/24 is behind 2.2.2.2 28/11/2013Petteri Sirén8
9
Tunnel router EID table eid-table vrf Customer_A instance-id 101 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 100 database-mapping 10.1.0.0/16 x.t.r.2priority 2 weight 100 eid-table vrf Customer_B instance-id 102 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 50 database-mapping 10.1.0.0/16 x.t.r.2 priority 1 weight 50 eid-table default instance-id 0 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 100 28/11/2013Petteri Sirén9 LISP site xTR1 xTR2
10
28/11/2013Petteri Sirén10
11
Methods used to study LISP Tunnel routers were Cisco 800 series routers Mapping system and Proxy Tunnel router was Cisco ASR1000 Control messages were studied Map Request, Map Reply, Map Register LISP Security 28/11/2013Petteri Sirén11
12
28/11/2013Petteri Sirén12
13
Services tested Internet access IPv6 service Multihoming VPNs Back-up connection (Multi-attached) 28/11/2013Petteri Sirén13
14
LISP in VPN 28/11/2013Petteri Sirén14
15
28/11/2013Petteri Sirén15
16
Results Easy way to offer IPv6 services VPN works fine No renumbering needed when changing the location of the virtual machines SP core does not need to know the customers Adding new site is simple, only one tunnel router must be configured 28/11/2013Petteri Sirén16
17
28/11/2013Petteri Sirén17
18
Summary LISP devices: Tunnel routers, Proxy Tunnel routers & Mapping system Hosts utilize EIDs, routers use RLOCs Use cases: multihoming, no renumbering and a simple VPN solution Doesn’t solve the IPv4 address problem 28/11/2013Petteri Sirén18
19
More information RFC 6830-6836 www.lisp4.net 28/11/2013Petteri Sirén19
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.