Network virtualization
|
|
|
- Brittany Ford
- 10 years ago
- Views:
Transcription
1 Martin Černý, Jan Fürman Department of Computer Systems Faculty of Information Technologies Czech technical university in Prague Martin Černý, Jan Fürman, Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti 1
2 Lecture content: 1) Virtualization basics 2) Virtual LAN 3) MPLS 4) Private networks and NAT 5) IP tunnels 6) Coexistence of IPv6 with IPv4 2
3 Virtualization basics One physical infrastructure several independent logical networks we have powerful HW, but we need several less powerful separate networks Historical evolve ability of switch-ports physical separation at first, and than trunks carrying several VLANs over one physical link 3
4 Virtual LAN Physical ports separation into several VLANs Same VLANs on different switches needs individual connections 4
5 VLAN standard IEEE 802.1Q Saving of physical port connections There are also some others (proprietary) VLAN technologies like CISCO ISL 5
6 6
7 802.1Q frame structure Source: Wikipedia.org TPID (Tag Protocol Identifier) 16 bits... set to 0x8100, that identifies type of the frame us 802.1Q PCP (Priority Code Point) 3 bits... used by QoS CFI (Canonical Format Indicator) 1 bit... determines the order (big/little endian) of bytes in MAC addresses (ethernet 0, token-ring 1) VID (VLAN identifier) 12 bits... Numerical id of VLAN, the frame belongs to 7
8 8
9 802.1Q - features Tagged frame has max. size of 1522 bytes baby giant (basic untagged ethernet frame has only 1518) Could be a problem with some old linux drivers and during transmits over trunks across switches with no support of 802.1Q Possibility of definition of up to 4094 VLANs (VLAN IDs 0 and 4095 are reserved) Native VLAN is carried in trunks untagged QinQ recursive tagging, useful mainly for ISP etc. 9
10 Configuration example of 802.1Q - CISCO Router: interface FastEthernet0/0 no ip address duplex auto speed auto! interface FastEthernet0/0.101 encapsulation dot1q 101 ip address Switch: interface FastEthernet0/1 switchport trunk encapsulation dot1q switchport trunk native vlan 999 switchport trunk allowed vlan 1,101,102, switchport mode trunk! interface FastEthernet0/10 switchport access vlan 101 switchport mode access 10
11 Configuration example of 802.1Q - Linux #vconfig add eth0 101 #ifconfig eth netmask Virtual interface is created (you can use it like any other physical interface) Linux kernel must have support of 802.1Q (or you can use loadable module 8021q) 11
12 MPLS Multi Protocol Label Switching (RFC 3031) Used mainly by ISPs for its data transfer speed Basic idea: IP routing (hungry of system resources) is made only once during entrance to MPLS network, after that packet is routed in the network using a simple tag (label), that is much quick and effective Even in MPLS network there must be an IP routing protocol running, that is used for IP prefix exchange among PE (Provider Edge) routers 12
13 MPLS Source: enskay.com CE (Customer Edge)... router at client side, that connects client to MPLS network PE (Provider Edge)... border router of MPLS network used for packet labeling P (Provider)... core MPLS router (route packets according to labels) 13
14 MPLS Source: cisco.com 14
15 LDP Label Distribution Protocol (RFC 5036) Used to build MPLS forwarding tables and to create LSP (Label Switch Path) - path through MPLS network In case of link failure route packets using backup path (quicker convergence comparing to common IP routing protocols) Is dependent on IP routing information from IGP 15
16 Placement of MPLS header (tag) Source: polaris.umuc.edu MPLS is usually being called ISO OSI layer 2.5 MPLS headers could be more than one (they forms chain, example use are MPLS VLANs) 16
17 MPLS tag structure Source: hep.ucl.ac.uk Exp. bits could carry QoS information S bit = 1... mean that this label is the last one and is followed by L3 header TTL... safety precaution against packet cycling 17
18 MPLS forwarding table Source: waset.org Show mpls forwarding-table... shows LFIB (Label Forwarding Information Base) on Cisco device 18
19 MPLS services - VPN Zdroj: ixiacom.com L3 VPN routing of IP packets from defined source to defined destination over MPLS network There is no encryption, just traffic separation from other users 19
20 MPLS services TE (Traffic Engineering) tunnels They allow to establish tunnels with defined attributes (throughput, latency) over MPLS network RSVP (Resource Reservation Protocol) is used to establish and control MPLS path with requested attributes TE tunnels are one-way only 20
21 MPLS services VPLS (Virtual Private LAN Service) Interconnection of ethernet segments over MPLS at layer 2 of ISO OSI model (pseudo-wire) RFC 4761, 4762 MPLS backbone is seen like a switch from the connected ethernet segments point of view 2 MPLS tags forwarding and membership of given VPLS network Generally higher reliability compared to WAN connection (MPLS core has usually redundant topology) 21
22 MPLS features MPLS network is able to carry different kinds of traffic (IPv4, IPv6, ATM, SONET, FR,...) MPLS usually carry just IP, or ethernet (EoMPLS) MPLS can be implemented over many different common L2 technologies (ethernet, E1, ATM, DSL, FR,...) 22
23 Private networks and NAT Internet is growing unstoppably (there are more than IP prefixes in global routing tables) IPv4 addresses are going to be depleted in several years (now they are all allocated to RIRs) Solution: IPv6 More efficient use of actual IP address range (return of ip addresses that are not used, ip address deals,...) Low consumption of public ip addresses (NAT) 23
24 Private IP networks Defined in RFC 1918 These addresses are not Internet routable (core routers should drop any packets with destination from these addresses ranges) /8 ( ) /12 ( ) /16 ( ) Only for local ip addressing of inside network behind NAT (no collision with global IP addresses) 24
25 NAT Network Address Translation Generally means address translation M:N Translation 1:N is usually called masquerading If M!=N, then is necessary to alter (translate) also UDP/TCP port numbers (NAPT, PAT) Enhanced security (in cooperation with FW) inside computers are not directly accessible from global Internet Opposite of basic concept of the Internet, where mutual direct accessibility of all devices should be standard 25
26 NAT translation table Zdroj: cisco.com 26
27 NAT example configuration - CISCO interface ethernet 0 ip address ip nat inside interface ethernet 1 ip address ip nat inside interface serial 0 ip address ip nat outside Source: cisco.com ip nat inside source list 1 interface serial0 overload access-list 1 permit access-list 1 permit Useful troubleshooting commands: show ip nat translations show ip nat statistic debug ip nat 27
28 NAT example configuration - Linux #echo 1 > /proc/sys/net/ipv4/ip_forward #/sbin/iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE #/sbin/iptables -A FORWARD -i eth0 -o eth1 -m state --state RELATED, ESTABLISHED -j ACCEPT #/sbin/iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT eth1... interface of the internal network eth0... interface of the external network (Internet) 28
29 Interconnection of private networks over global Internet (IP tunnels) 29
30 Tunneling protocols example GRE tunnel IPSec tunnel Other tunnels using transport over UDP/TCP/ICMP 30
31 GRE (Generic Routing Encapsulation) protocol (RFC 1702) Source: pygor.org point-to-point tunnel IP protocol type 47 GRE tunnel is able to carry various kinds of packets (IPv4, IPv6, IPX,...) 31
32 GRE protocol packet structure C... checksum present, R... routing present, K... key present, S... sequence number present, s... strict source route Recur... recursion control Flags... reserved, must be set to 0 Version... version of GRE protocol 0 Protocol type... type of the payload like similar field in ethernet frames Offset... header size when using source routing not used Key... data flow identification does not have any security meaning!!! Sequence number... can be used for packet reordering Routing... source route records not used 32
33 Example configuration of GRE tunnel - CISCO Router A: interface Tunnel0 ip address tunnel source tunnel destination tunnel mode gre ip Router B: interface Tunnel0 ip address tunnel source tunnel destination tunnel mode gre ip 33
34 Example configuration of GRE tunnel - Linux # modprobe ip_gre # ip tunnel add gretun mode gre local remote ttl 64 dev eth0 # ip address add dev gretun peer /32 # ip link set dev gretun up # ip route add /24 via
35 IPSec Standardized VPN protocol (RFC 4301, 4309) Enables authentication of the source and destination (AH) and encryption of the transmitted data (ESP) can be used individually, header chaining,... Security framework possibility to use various encryption and hash algorithms Mutual authentication possibility using shared key or X.509 certificate Tunnel mode or transport mode 35
36 Source: unixwiz.net 36
37 AH (Authentication Header) Next hdr... next header type AH len... AH header length Reserved... set to 0 Source: unixwiz.net Secure data integrity and source authentication SPI... number identifying SA (security association) Sequence number... incremental order of sequence numbers security against packet spoofing Auth. Data... cryptographic material for authentication purposes variable length 37
38 ESP (Encapsulating Security Payload) Zdroj: unixwiz.net Does not have influence to packet header (opposite to AH) but in tunnel mode is encrypted and thus protected whole packet including header SPI... number identifying SA (security association) Sequence number... increasing order of sequence numbers protection against packet spoofing Encrypted payload... encrypted data (original packet) including necessary cryptographic material Padding, pad len... padding, length of padding Next header... header type of encrypted packet ESP secures data integrity, authentication and encryption Authentication data... cryptographic material for authentications purposes 38
39 SA (Security Association) a IKE (Internet Key Exchange) SA is group of attributes that clearly identifies IPSec data flow (IP addresses, encryption and hash algorithms, SPI and others) SA is one-way - in order to secure encrypted communication between two parties (nodes) it is necessary to establish two SA (one for each direction) Protocol IKE is used to establish SA it is used to exchange and setup attributes of encrypted connection (each node usually supports more than one encryption mechanism and the choice of the best one supported by both parties is in charge of IKE) IKE communicates using UDP port 500 (usually it is an userspace daemon) 39
40 Source: unixwiz.net 40
41 Source: unixwiz.net 41
42 Source: unixwiz.net 42
43 Source: unixwiz.net 43
44 Example IPSec configuration - CISCO crypto isakmp policy 1 authentication pre-share crypto isakmp key XXXXX address ! crypto ipsec transform-set IPSec_transform ah-sha-hmac esp-aes! crypto map CMap 10 ipsec-isakmp set peer set transform-set IPSec_transform match address 101! interface Ethernet0/0 ip address crypto map CMap! access-list 101 permit ip host host
45 Other tunnels using transport over UDP/TCP/ICMP Usually proprietary, non-standardized solutions Highly flexible, broadly configurable Mainly used for tunneling traffic through firewall 45
46 Examples of other tunnel systems VTUN ( ICMPTX ( Transport over UDP or TCP Data encryption and compression possibility Allows EoIP (EoUDP a EoTCP) tunnel establishment Transport over ICMP TINC ( Transport over UDP 46
47 Coexistence of IPv6 with IPv4 Slow deployment of IPv6 global operators does not support it very much There appear separated IPv6 islands, that needs interconnection over global IPv4 Internet Source: wiki.nil.com 47
48 IPv6 over IPv4 tunneling protocols Manually configurable ipv6ip tunnel Automatic IPv6oIPv4 tunnel routers tunnel IPv6 addresses in the format 2002:IPV4ADDR::/48 Source: Amit's CISCO zone 48
49 Example configuration of IPv6 over IPv4 tunnel protocol - CISCO interface Tunnel0 no ip address ipv6 address 2001:db8:5678:1::2/64 ipv6 enable tunnel source tunnel destination tunnel mode ipv6ip 49
50 Any questions? 50
CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs
: Computer Networks Lecture 9: Mar 30, 2005 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance
Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance Johnnie Chen Project Manager of Network Security Group Network Benchmarking Lab Network Benchmarking Laboratory
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham In part two of NetCertLabs Cisco CCNA Security VPN lab series, we explored setting up a site-to-site VPN connection where one side
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Lab14.8.1 Configure a PIX Firewall VPN
Lab14.8.1 Configure a PIX Firewall VPN Complete the following lab exercise to practice what you learned in this chapter. Objectives In this lab exercise you will complete the following tasks: Visual Objective
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
IPv6 Fundamentals, Design, and Deployment
IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
Cisco 1841 MyDigitalShield BYOG Integration Guide
Cisco 1841 MyDigitalShield BYOG Integration Guide CONTENTS Introduction 3 Assumptions 3 What You Will Need 4 Verify IP Address 5 Configure the IPSEC Tunnel 6 Configure Access List for Local Interface 6
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels
Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels This article provides a reference for deploying a Barracuda Link Balancer under the following conditions: 1. 2. In transparent (firewall-disabled)
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Firewall Troubleshooting
Firewall Troubleshooting (Checkpoint Specific) For typical connectivity issues where a firewall is in question follow these steps to eliminate any issues relating to the firewall. Firewall 1. From the
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER
CHAPTER 5 The following two case studies are provided as reference material for implementing p2p GRE over IPsec designs. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study This
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: www.thegreenbow.com Contact: [email protected]
TheGreenBow IPsec VPN Client Configuration Guide Cisco RV325 v1 Website: www.thegreenbow.com Contact: [email protected] Table of Contents 1 Introduction... 3 1.1 Goal of this document... 3 1.2 VPN
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Point-to-Point GRE over IPsec Design and Implementation
CHAPTER 2 Point-to-Point GRE over IPsec Design and Implementation In designing a VPN deployment for a customer, it is essential to integrate broader design considerations such as high availability, resiliency,
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall
Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall This document is a step-by-step instruction for setting up VPN between Netgear ProSafe VPN firewall (FVS318 or FVM318) and Cisco PIX
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Juniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
Amazon Virtual Private Cloud. Network Administrator Guide API Version 2015-04-15
Amazon Virtual Private Cloud Network Administrator Amazon Virtual Private Cloud: Network Administrator Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Table of Contents
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Amazon Virtual Private Cloud. Network Administrator Guide API Version 2014-06-15
Amazon Virtual Private Cloud Network Administrator Amazon Web Services Amazon Virtual Private Cloud: Network Administrator Amazon Web Services Copyright 2014 Amazon Web Services, Inc. and/or its affiliates.
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
LECTURE 4 NETWORK INFRASTRUCTURE
SYSTEM ADMINISTRATION MTAT.08.021 LECTURE 4 NETWORK INFRASTRUCTURE Prepared By: Amnir Hadachi and Artjom Lind University of Tartu, Institute of Computer Science [email protected] / [email protected]
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.
Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012
MikroTik RouterOS Workshop Load Balancing Best Practice Warsaw MUM Europe 2012 MikroTik 2012 About Me Jānis Meģis, MikroTik Jānis (Tehnical, Trainer, NOT Sales) Support & Training Engineer for almost 8
Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW)
Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW) Course Number: 642 825 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Transition to IPv6 in Service Providers
Transition to IPv6 in Service Providers Jean-Marc Uzé Director Product & Technology, EMEA [email protected] UKNOF14 Workshop Imperial college, London, Sept 11 th, 2009 1 Agenda Planning Transition Transition
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
Multiprotocol Label Switching Load Balancing
Multiprotocol Label Switching Load Balancing First Published: July 2013 The Cisco ME 3800 and ME 3600 switches support IPv4 and IPv6 load balancing at the LER and LSR. Effective with Cisco IOS Release
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Netopia 3346. TheGreenBow IPSec VPN Client. Configuration Guide. http://www.thegreenbow.com. [email protected]
TheGreenBow IPSec VPN Client Configuration Guide Netopia 3346 WebSite: Contact: http://www.thegreenbow.com [email protected] IPSec VPN Router Configuration Property of TheGreenBow Sistech SA - Sistech
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Virtual Private Networks. Juha Heinänen [email protected] Song Networks
Virtual Private Networks Juha Heinänen [email protected] Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME-05-2012-01 Rev. A
WiNG 5.X How To Policy Based Routing Cache Redirection Part No. TME-05-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Triple DES Encryption for IPSec
Triple DES Encryption for IPSec Feature Summary Platforms Prerequisites IPSec supports the Triple DES encryption algorithm (168-bit) in addition to 56-bit encryption. Triple DES (3DES) is a strong form
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering
Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
VLAN and QinQ Technology White Paper
VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
