How To Use Ipv6 In A Network With A Network Of Your Own Ipv4 And Ipv5 At The Same Time

Size: px
Start display at page:

Download "How To Use Ipv6 In A Network With A Network Of Your Own Ipv4 And Ipv5 At The Same Time"

Transcription

1 Juniper Networks (UK) Limited 7 th July 2009 BEST PRACTICE IMPLEMENTING IPV6 IN THE CORE 2PM BST, 3PM CEST WITH JULIAN LUCEK, DISTINGUISHED SYSTEMS ENGINEER Duration: 00:52:25 Presenters Julian Lucek Jean Marc Uzé Operator: Thank you for standing by and welcome to the Jtech Live event Best Practice implementing IPV6 in the core. At this time all participants are in a listen-only mode. There will be a presentation followed by a question and answer session at which time if you wish to ask a question you will need to press *1 on your telephone. I must advise you this conference is being recorded today, Tuesday 7 th July I would now like to hand over to your speaker today, Mr Julian Lucek; please go ahead sir. Julian Lucek: This talk is on the subject of transporting IPv6 across the core. My name is Julian Lucek and I am co-presenting this presentation with my colleague Jean-Marc Uzé; the idea is that one of us will show slides and everyone will look out for questions which will be popping up in the Q&A window. You can type in questions during the presentation to that window. Also at the end, if you are on the phone bridge you can also ask questions verbally at the end. The background behind this talk is that we've been hearing a lot of interest in IPv6 from a lot of the customer base. This is largely driven by the fact 1

2 that the IPv4 address is predicted to run out relatively soon. Now for many people IPv6, rather than being a futuristic thing is now regarded as something that is relatively imminent. The good news from the Junos point of view is that from Day 1 we've had a lot of IPv6 capability, so when our very first product the M40 was introduced in 1998 the A6 already had the IPv6 capability in there. That made it easier to introduce the IPv6 protocol features and so on. When it comes to the IPv6 versions of the various protocols and also the forwarding features, we introduced those quite a long time ago, in the main, and so for example even some of the advanced things, such as 6PE and IPv6 layer 3VPNs which I am going to talk about, we've had in the code for several years. Let s have a look at an outline of what I am going to talk about today: as I mentioned I ll be focussing on different ways of carrying IPv6 across the core of the network. It might be the case that you have customers who are asking for an IPv6 internet feed, or maybe they want private connectivity using VPN between their sites, in order to carry IPv6 traffic. What I am going to talk about are different ways of carrying those types of traffic across the core of your network. If you look at the various schemes that are available, on the one hand there are some MPLS based schemes; one of those is 6PE, which allows you to carry IPv6 over the core even if the core is only IPv4 and MPLS enabled. Also I ll talk about IPv6 layer 3 VPN; sometimes this is known as 6VPE. Sometimes people do mix up 6PE and 6VPE; when we come to that section I ll be explaining the difference between those two schemes. On the other hand we have some IP based schemes; if you don t have MPLS based in your network you can either carry the IPv6 traffic using configured tunnels, transporting it over IPv4 tunnels to take it across the core of the network. Or else you can carry it natively; you can do native IPv6 forwarding through the core of the network. Typically because people are also carrying IPv4, of course, they ll be doing IPv4/ IPv6 dual stack. During this talk I ll be talking about all four of these different schemes that we have shown on this slide. First of all what I'd like to do is talk about the MPLS based schemes. The 6PE, to give it its full title its IPv6 islands over an MPLS IPv4 core that 2

3 is described in RFC4798; and the IPv6 VPN, which I mentioned is now sometimes called the 6VPE nowadays that is described in RFC4659. The interesting thing about both of those schemes is the fact that you can avoid turning on IPv6 in the core of your network; you can use existing IPv4 signalled transport LSPs, which you might already have deployed for carrying IPv4 traffic and you can use exactly those same LSPs if you wish for this IPv6 traffic. Both of these, as I mentioned, we've had in the code for quite a long time and lets have a look at the applicability of each of these. The 6PE scheme, the important thing to emphasise is that it is not a VPN technology; sometimes people think it is a VPN, but it is not. The roots for 6PE reside in the main routing instance on each PE router; and as such the 6PE is useful for transporting internet IPv6 just like you transport internet IPv4; typically in the main routing instance with 6PE you can transport internet IPv6 between your PE routers and do that over MPLS. The IPv6 VPN, on the other hand, by definition is a VPN and it is very similar to the IPv4 layer 3VPN model. With that you ve got routes residing in VRS on each PE router and so that gives you separation between different customers and it allows you to have overlapping addresses, just like with the IPv4 VPNs. Also one use case for it is that you could, if you want, use it for internet IPv6; by analogy some people use VRS to carry it might be Version4 internet routes. People who do that can also put internet IPv6 in the VRS if they want, and use IPv6 VPN as the infrastructure for transporting that traffic across the core. Let s have a look in slightly more detail at the 6PE scheme. If you look at this diagram, the grey region in the centre of the diagram is the IPv4 domain. That extends inwards from the PE routers towards the core of the network and the links, which are shown in black, are carrying normal IGP, carrying IPv4 reachability information, IPv4 addresses on the links. You have MPLS LSPs, which are shown in red between the PE routers; those are signalled using IPv4, either RSVP or LDP. Then you need to have BGP sessions between your PE routers and those can be going via route reflectors if you want; those again are running over IPv4; that infrastructure in the middle of the network in the grey is normal IPv4. 3

4 Then what you have is islands, as IPv6, because you might have customers who have asked for an internet IPv6 routes feed and so you can see customer A and customer B, which are in those IPv6 islands shown in blue. For that, between the PE routers and the customer routers you ve got EBGP sessions exchanging IPv6 prefixes, of course. Also you'd have IPv6 addresses on those links between the PEs and the customers. Similarly, at the ASBR you ve got ASBR placed in the pairing exchange and so you ve got pairings with various private peers or upstream providers, and again you ve got EBGP sessions with each of those exchanging IPv6 prefixes. The point of the 6PE infrastructure is that it allows those IPv6 prefixes to be communicated between the PEs and the ASBRs and it allows the traffic to be transported on those red MPLS LSPs without having to turn on any IPv6 within that grey island in the middle that's the premise behind 6PE. Let s have a look in slightly more detail about how you actually forward the traffic in the 6PE scheme. If you're doing transport of IPv4 packets over MPLS, then what you're doing is just putting the IPv4 packet directly into the transport LSP. If you did the same with IPv6 packets, you could actually cause problems. If you re using a Penultimate Hop Popping on your LSP, what would happen is that a bare IPv6 packet would be exposed on the Penultimate router, and the Penultimate router is typically a P router that does not run IPv6. The problem with that is that if it doesn t support IPv6, it wouldn t know how to set the correct ether type on the link going to the PE router the correct ether type in the layer 2 header, which would confuse it. If on the other hand you used the explicit NULL label on the last hop of the LSP, you have the issue that the explicit NULL label is different for IPv4 and IPv6. You couldn t use the same LSP for both IPv4 and IPv6 traffic, which would be inconvenient. In fact, what 6PE does, is it uses an inner label in order to shield the IPv6 packet from the P routers, so we can look at that in more detail on a diagram. In the top diagram, I m showing the normal IPv4 over MPLS label encapsulation, so this is assuming IPv4 internet packets in the main routing instance, and so the packets are travelling from left to right, and so the packets arrive from the customer on the ingress PE which is PE1, and PE1 does a route lookup in BGP; it determines that PE2 is the BGP next hop, and so it identifies the LSP that 4

5 goes towards PE2, and so it puts the corresponding label onto the packet. It puts the MPLS label X on to the packet; the packet goes to PE1; PE1 swaps the label for a label value of W, and then PE2, which is doing Penultimate Hop Popping, is popping that label value of W, exposing the bare IPv4 packet, which travels, final hop to PE2, and PE2 then routes it towards its final destination. In the 6 PE case in contrast, we show what s happening in the lower half of the slide. As I mentioned, we re using an inner label to shield the IPv6 packets, and so in that case, PE1 is putting on an inner label, whose value is Y, and then it s pushing the transport label on to the packets, which is having a value of X, and then as before, on PE1, PE1 swaps that label value of X to a label value of W; and then on PE2, PE2 is popping that label W, and so what you re left with is the IPv6 packet, with that inner label Y, and so because we ve got that inner label value of Y, PE2 never sees the IPv6 packet, which is good, because PE2, according to the definition of 6PE may not support IPv6, as I said. And so, that packet, with that label value of Y, arrives on PE2; PE2 takes off that label value of Y and does a route lookup on the underlying IPv6 packet, and sends it towards its destination. The question is, how does PE1 know what that inner label value is that label value of Y, and the answer is that that s communicated over the BGP session, and so we ve got a multiprotocol BGP session. It s using the special address family, which is AFI2 and SAFI4 as it happens, and that s an address family for exchanging labelled IPv6 routes, and so that s how that label value is communicated. Those are the BGP sessions for each IPv6 prefix that is advertised; that s the essence of the 6PE scheme. Now we can look at the configuration; in terms of the BGP configuration, the configuration is relatively straightforward, and so you are turning on family INET6, as you can see, shown in red, labelled Unicast because we want a labelled route to be sent, and then explicit NULL, and what that explicit NULL means is that the actual label value that we advertised in JUNOS is actually always the label value 2, which is the IPv6 explicit NULL. Some other implementations that necessarily advertise 2 as the label value, but that s fine, it should operate fine with those other implementations that s not a problem at all. 5

6 The other thing is that on the core facing interface on the PE, you need to configure family INET6. You don t configure an address on that; all you re doing by configuring family INET6 is you re saying to the router that you can expect to see packets arriving with that label value of 2, which is an IPv6 explicit NULL, and so the interface has to be ready to receive such packets. The other thing that needs to be configured is under protocols and PLS. You just have this line of configuration, IPv6 tunnelling, so those are the ingredients that you need to turn on 6PE. If you look at the link at the bottom of this slide, that shows you more details in our techpubs on how to configure the 6PE scheme. 6PE has been deployed in various networks: I would like to show you an example and so the next two slides are provided courtesy of Telefónica, who have deployed 6PE in their network. The 6PE in Telefónica has been deployed in the international network, so this is the Telefónica International World Wide Service Network, and this is a network that spans the whole of Europe and South America. For this 6PE scheme, the IPv6 pairings for the outside worlds are in AM6 Amsterdam, and also links in London, and as far as the BGP goes, there s a full mesh of BGP sessions between the 6PE PE routers, and for the transport, the LSPs or LDPs sit in the LSPs, and as I said, these are just signals using normal IPv4. Here s a schematic diagram of that network, so you can see the Telefónica International IS in the middle of the slide. You can see the two pairing exchanges, and so you ve got 6PE configured on those pairing routers, and then you ve got various PE routers facing towards the customers, and of course they have the 6PE configured on there as well, and as you saw from the previous slides, you ve got the full mesh of BGP sessions communicating the IPv6 prefixes. That s the real deployment of 6PE. Staying on the subject of using MPLS to transport IPv6 traffic, I d like to turn our attention to the IPv6 layer 3 VPN. As I mentioned before, this is described in RFC4659, and like the 6PE, you can use the existing IPv4 signalled LSPs to carry the traffic, and it s using very similar machinery to the IPv4 VPNs, and in fact you can have IPv4 and IPv6 co-existing in the same VRF, and so you re using multiprotocol BGP to exchange labelled 6

7 VPN routes between the PEs, so that s the prefix plus the inner label, VPN label. You re using route distinguishers to disambiguate routes; you re using route targets in the form of extended communities, to identify which VPN you want to put these routes into, and the label stacking is the same as for the IPv4 case, so the ingress PE is pushing the VPN label on to the packet, and then pushing the outer transport label, which might be the RSVP or LDP signalled LSP. This diagram shows the typical infrastructure for IPv4, layer 3VPN; you can see we ve got our PE routers, we ve got MPLS LSPs shown in orange, which are signals using IPv4. We ve got BGP sessions to communicate reachability information between the PEs, and typically that goes via route reflectors; and on those BGP sessions, you have the VPN- IPv4 address family configured. Then, between the PEs and CEs you have various protocols, depending on the customer requirements; you might be running an LSPF or EBGP or you might have static routing so that the PEs can exchange routes with the CE routes. That s typical IPv4 VPN infrastructure. For the IPv6, it s very similar, so again we ve got MPLS LSPs - signals using IPv4 as shown in orange; we ve got the BGP sessions, and those are running over IPv4. This time, you re using the IPv6 VPN address family VPN-IPv6 address family; and then of course this time, on the PEs facing the CEs, you ve got IPv6 address configured on the interface, and you re running a protocol that supports IPv6 in order to exchange routing information with the CE routers, and so that could be OSPFv3, or it could be BGP carrying IPv6 address family, or it could be static routes, of course; so a very similar infrastructure, as you can see, to the IPv4 layer 3 VPN. It s interesting to look at what the BGP updates look like, when the PEs are communicating reachability information; so on the left of the slide I m showing the IPv4 layer 3 VPN case, and on the right hand side of the slides, the IPv6 VPN case, and as you can see, they re very similar, so you ve got the address family, and in the IPv4 case that s SAFI 128, and in the IPv6 VPN case, it s SAFI 2, SAFI 128, as shown in that blue colour. You ve got the route target the extended community - and you ve got the next hop, and in the VPN IPv6 case, the BGP next hop is encoded as IPv4 mapped IPv6 address, and then if you look at the NLRI itself, you ve got the route distinguisher in both cases. In the actual prefix being advertised, and the prefix in the IPv6 case is shown in that blue colour, so it highlights it, and then the label the VPN label that s associated to that prefix it s 7

8 very similar, whether it s IPv4 or IPv6. This shows the configuration; from the BGP side, as shown in red, you need to turn on family INET6-VPN, and if you re also still carrying IPv4 prefixes in the layer 3 VPN, you still have the family INET VNP turned on as well, so that s the BGP part of the configuration. As you saw through the 6 PE case, under protocols and PLS we turn on this phrase IPv6 tunnelling, and then if you look at the actual configuration of the VRF, then on the left I m showing an example for IPv4, and on the right an example for IPv6. In the VRF there s no explicit configuration where you say this VRF is carrying IPv6. It s implicit, so basically it s determined by the fact that you ve got IPv6 address configured on at least one of the interfaces in the VRF. Also, in this case, in terms of the protocols, it s got OSPFv3 configured towards the CE routes, so in the main, you can see the configuration is very similar whether it s IPv4, or IPv6. If you want to see more details of the configuration, then that s in our techpubs, at the link shown at the bottom of this slide. IPv6, layer 3 VPN has been deployed, so I d like to show you some slides which are provided courtesy of Pacific Northwest Gigapop, who have deployed this. Pacific Northwest Gigapop are in North America and they provide connectivity services to R&E customers. The idea is that with the IPv6, they offer different packages of routes that the participants the research and education networks - can sign up to. For example, they can sign up to receive routes from research and education peers; they can sign up to receive routes from the Internet 2 network; they can sign up to receive routes from the general IPv6 internet. The idea is that each of these packages of routes is put into a different IPv6 layer 3 VPN, and so depending on what each R&E customer signs up for, they are connected into these various different VPNs, using a different logical interface to connect them into the different VRFs. This network has actually been in production since September 2007, so this is one of the first deployments of IPv6 layer 3 VPN. If you look at this network diagram, what you have is a mixture of different routers T640s and M120s for example - and so high speed participants, high speed customers, are connected at 10 gigs into the T640s the T640 has the Layer 3 VPN IPv6 configured on it. Sometimes people think of the T series as being a core router, but it makes a very good high speed PE 8

9 as well of course; and then the lower speed participants, the ones who are connected at 1 gig, are connected into M120s over the 1 gig interfaces, so this is a real deployment of IPv6 layer 3 VPNs as you can see. Also, other organisations have been involved in trials, lab trials, for example, and this is a slide provided courtesy of BT, which shows an IPv6 layer 3 VPN lab trial. In this trial, there was a live feed of IPv6 internet routes full feeds coming from the UK6x, and that feed was put into one of the VRFs for the purposes of this trial, and then other VRFs were used for other purposes, simulating private IPv6 connectivity; then various features were tested, during this trial - various routing protocols between PE and CE, so BGP, OSPFv3, and also static routes. The other thing that was tested, which is interesting, is routes target filtering on the BGP sessions, so route target filtering people use it for the IPv4 layer 3 VPNs, and it s also available for the IPv6 layer 3 VPNs. Route target filtering, in case you haven t come across it, is a really useful technique to avoid sending layer 3 VPN routes to a PE that the PE is not interested in. Rather than sending it routes pertaining to all of the VPNs in the network, route target filtering gives you an automated way of only sending routes pertaining to VPNs that it has configured on it. It s a very convenient scheme to use. That was tested as part of this lab trial as well. The other thing that was tested, which is also very important is forwarding plain features; things like classifying the packets as they come in from a customer policing, firewall filtering and so on, and we support all of those for IPv6 packets of course. One frequently asked question regarding the IPv6 layer 3 VPN is whether you can have IPv4 and IPv6 in the same VRF, and the answer is yes. You can certainly do that; in that case, going to the CE you d have a protocol that supports both IPv4 and IPv6, or two different protocols, so you could have OSPFv2 for the IPv4, and OSPFv3 for the IPv6, for example. Or you could be using EBGP sessions, with both the IPv6 and IPv4 address families, and that s perfectly fine. You can have those in the same VRF and be using the same route targets, whether it s IPv4 or IPv6 prefixes. Regarding adding IPv6 VPN into the existing VPN infrastructure, if you re already using layer 3 VPN; as I mentioned, you can use the same LSPs as you already have in your network in the same BGP sessions which you might already have for IPv4 VPNs, or BGP layer 2 VPN and BGP VPLS. 9

10 You simply add that extra address family on the BGP sessions and much the same features are supported for the IPv6 VPN, so typically people who want to do multi-field classification or BA classification when the packet comes in from the CE routes, firewall filtering and policing, destination class usage perhaps, selecting an LSP according to policy or class and finally sending the packet on the outbound queue and marking the XP bits to the required [audio] all the same sorts of things people often do with IPv4 Layer 3 VPN. The other thing is on the egress PE; again, people would want to do classification on the egress PE as the packet comes in from the core, firewall filtering and policing and then finally sending the packet out into the correct queue on to the outbound interface, so the same sorts of processes that people do today with IPv4 Layer 3 VPNs. That was a flavour of the MPLS-based schemes for transporting IPv6 across the core. Now let s turn our attention to the right hand side of this slide and the IP-based schemes. IPv6 over IPv4 configured tunnels I ll talk about first of all and then I ll talk about native IPv6 or IPv4/IPv6 dualstack, so let s look at those. Regarding the configured tunnels, these are used for if you ve got a core network, which only supports IPv4 or there s a reason why you can t turn on IPv6 and perhaps it s a network that doesn t support MPLS either in the core and so a way of doing that is to actually configure IPv4-based tunnels going between PEs, so you mesh your PEs with IPv4-based tunnels. These can be GRE tunnels or IPsec tunnels and the outer header is an IPv4 header and then hidden inside you ve got the actual IPv6 packet and that s the way that you can transport it across the IPv4 only core. With this scheme, the advantage is that you don t have to touch the core routers at all, so if you haven t got MPLS today and you haven t got IPv6 in the core, then you don t have to touch the core routes as you re just doing it through configuration on the PE routers. It s not particularly convenient in the sense that you have to manually configure these tunnels between the PE routers, so if you add a new PE to the network, you need to configure the tunnels on all the other PEs on the network. But as I say, it does have a niche in a network which doesn t support MPLS or IPv6 in the core. 10

11 Turning our attention to IPv4 and IPv6 dual-stack, this is where you re running IPv6 natively across the cores; you re running them as normal IPv6 packets and so on each router along the path we have a [deedger] in the core. You re doing an IPv6 lookup and routing the packets accordingly and so for that you need to turn on IPv6 throughout the network, of course, including the core router, so you need to turn on the IPv6 address family on the BGP session so that all the routers involved can have exterior routes. Also you need IPv6 in the IGP so that you can resolve next hops and when you re doing this of course you can run IPv4 in parallel and that s true whether you re using OSPF or IS-IS as the IGP. Let s have a look at that in more detail for the OSPF case. Traditionally certainly it used to be the case that looking back in history OSPFv2 has been around for many years and that s what people use for IPv4 reachability. When IPv6 came along people decided that it would be too difficult to alter OSPFv2 to carry IPv6 reachability information and so a new version of OSPF was devised, OSPFv3, for carrying IPv6 reachability information. These are two completely separate protocols. If you ve got OSPFv2 already because you re running IPv4 in the network, which is already up and running, you can turn on the OSPFv3 on the various interfaces without disrupting the existing OSPF version to adjacency, because they re two completely separate protocols; that makes it easy for the transition. More recently there is an alternative possibility, because since JUNOS 9.2 we also support IPv4 address families within OSPFv3 and so in that case you can just use OSPFv3 and you re carrying within that both IPv4 reachability information and IPv6 reachability information. That s described in the draft that I ve shown there on the slide, and also I ve got a link to the 'techpub switch describing how to configure it. For this IPv4 and IPv6 are in different realms, meaning they ve got a separate links database and separate adjacencies and so on, so potentially you can have different topologies for the IPv6 and the IPv4. Turning our attention to IS-IS: IS-IS is a bit different because compared to the traditional OSPFv2, OSPFv3 situation, with IS-IS it s carrying both IPv4 and IPv6 within the same protocol. In JUNOS and if you ve got IS-IS up and running, because you re using it to carry IPv4 reachability already, if you ve got an interface where IS-IS is configured and then you turn on family inet6, then IS-IS will automatically start advertising the IPv6 11

12 reachability information as well. When you do that there s no interruption to the IS-IS adjacency which makes it more straightforward to migrate to IPv6 and still have the IPv4 running. When you turn on the IPv6 when you re using IS-IS across the network you do have to be careful to avoid routing loops if IPv6 hasn t been turned on everywhere. The reason for that is that if you consider a router in the network, it s not aware if a remote link somewhere else in the network doesn t have IPv6 configured on it; so you can have a situation where you can get routing loops as a result of that. Ways of avoiding this, as listed on the slide, either you say I m going to turn on IPv6 everywhere between all the PE routers and all the core routers and throughout the core; and only once I ve turned it on am I going to introduce the IPv6 traffic to avoid these loops. Or you need to turn on the IPv6 very carefully in an expanding circle, so you start turning it on on a particular link and then you expand this sphere of influence. You turn it on on adjacent links on those routers and you do it in a careful way keeping an eye on the topology and the metrics to avoid routing loops; that can be quite complicated in a large complex network. Another way of doing it to avoid that problem is to use IS-IS multi-topology and so you ve got one topology for IPv4 and another for IPv6 and if you do that then you don t have these issues with routing loops. In our implementation in recent code - from JUNOS 9.5 onwards - in fact you can have IS-IS running single topology and you can turn on multi-topology and you can do that without tearing down the IS-IS adjacency. If you want to read more about these IPv6 using IS-IS considerations, I strongly recommend the book by Hannes Gredler and Walter Goralski, Complete IS-IS Routing Protocol. If you look at pages of that book it describes what I ve just been saying on this slide in more detail. Regarding deployments, an example of deployments of IPv4/IPv6 dualstack is FLAG Telecom, which is now part of Reliance. FLAG Telecom gave a presentation at APNIC and also at SANOG on this topic, talking about FLAG s IPv6 implementation and I ve given some links to those presentations there and I strongly recommend having a look at that presentation in full at those URLs, because it s very interesting. For now I ll show a subset of the slides from that presentation courtesy of Reliance. 12

13 The situation was that FLAG wanted to turn on IPv6 in the network and the network had a series of T-Series and M-Series routers. A big product on that network is IP Transit Service especially for carriers and ISPs who are along the path of the FLAG cable systems. There was demand from a customer in Asia for having IPv6 internet feed, so that was the catalyst for turning on IPv6 in this network, so what happened was that IPv6 peerings were activated in most of the internet exchanges where FLAG connected to, so links in M6 and Hong Kong, Japan and also New York and LA. The way it was done was that the IPv6 was given as a free add-on service to the existing IP transit customers and the IPv6 part was done on a besteffort basis with no particular SLA. As far as the customers were concerned, they could choose; they could choose to have the IPv4 and IPv6 feed in one connection, or they could have a separate logical interface, one for IPv4 and the other for IPv6. The other interesting aspect is what it took to actually deploy this. As I mentioned, part of the process is to turn on IPv6 addresses on all the links in the network, turn on the IPv6 address family in BGP and so on. As you can see on the slide, that work took about three days and I was going to mention the PE switch does take a fair bit of time is physically going round all the interfaces and putting the IPv6 addresses on. However, it s interesting to look at the third bullet on the slide, which says it took longer to write the design document and planned work procedures and worrying about it than it took to physically do it, so this was a deployment that went smoothly for the dual-stack. That brings me more or less to the end. As you can see we ve talked about different schemes for carrying IPv6 across the core of the network, MPLS-based and IP-based schemes. What we re seeing is that as you d expect service providers are tending to use the IPv6 method, which is analogous to the way they tend to have been doing the IPv4 over time, so people who carry IPv4 internet traffic over MPLS LSPs between the Edge Routers, they tend to use 6PE for the IPv6 case; that's the most analogous scheme. People who put internet into a CRS, they tend to use the Layer 3 VPN schemes for IPv6. People who carry IPv4 natively as IPv4 packets right across the core of the network tend to do the same as the IPv6 and so have the dual-stack. Then you can have situations where either people have old routers in the core of the network that we don t want to touch - 13

14 we don t want to turn on MPLS, we don t want to turn on IPv6 - or perhaps the core of the network isn t actually owned by them, so they re using other people s facilities to transport the traffic between their own Edge Routers and in that case the IPv6 over IPv4 configured tunnels are good. Really there s no correct answer which is always correct for everybody; it s just like the IPv4 case where different people use different schemes according to the situation in their network. That s a summary of the different schemes that are available. In addition, there are other possibilities which I didn t mentioned: if you re using MPLS, of course, you could use Layer 2 VPN or VPLS to transport IPv6 traffic as of course those schemes are agnostic to what the Layer 3 packet is; that s another possibility that might be useful for some people. That brings me to the end; what we can do now is we can open the phone lines. If you re actually connected over the PSTN line, you can ask a question, so I ll hand over to Stephanie who will explain how you can ask a question if you want to. I think most people are actually just logged on to the webpage, not over the PSTN line. Operator: Ladies and gentlemen, we will now begin the question and answer session. If you wish to ask a question please press *1 on your telephone and please wait for your name to be announced. For any questions or comments please press *1 on your telephone. There are no questions at the moment. Jean-Marc Uzé: Jean-Marc speaking; Julian, I have a couple of questions for you: one [unclear] is about MTU; is there any issue related to MTU5 in using either 6P or 6VPE? Julian Lucek: I guess one does need to be aware of the MTU budget, because the IPv6 headers are longer, but I guess that s part of the IP packet. I guess 6PE, you ve got a bigger label stack compared to if you ve just got IPv4 packets in MPLS, because if it s IPv4 internet riding over an MPLS RSVP or LDP LSP, you ve got 4 bytes of MPLS overheads; if it s 6PE then you ve got an extra label, they re inner labels, you ve got an extra 4 bytes to take account of in your MTU budget. For the IPv6 Layer 3 VPN, in terms of MPLS overhead it s the same inner label and transport label for both. 14

15 Jean-Marc Uzé: Another question is related to the size of AS numbers; is there an issue using 4-octet, 4-byte AS numbers in any of the elements describe in this session? Julian Lucek: Jean-Marc Uzé: core. That should be okay; there shouldn t be issue with that. Another question was about LSP signalling using IPv6 in the Julian Lucek: That s an interesting question. Today we don t support that; as I mentioned I m using IPv4 and those schemes that I mentioned, the IPv6 Layer 3 VPN and the 6PE, they can run over those IPv4 signalled LSPs. We haven t had too much demand for IPv6 LSPs. It s something we ve got at the back of our minds as something we may need to do at some point in the future, but it s not something that, from what we ve been hearing from the user base, is urgent as such, but we re willing to discuss it offline if somebody does have a need for it. I guess if one wants to move in the years to come we ll transition to IPv6; I guess IPv4 will be regarded as legacy and I suppose ultimately people will want to build pure IPv6 networks including all of the internal infrastructure and signalling and so when that day comes, certainly it would be useful to have the actual LSPs themselves signalled using IPv6. Jean-Marc Uzé: I m getting the message that nobody can hear me when I m repeating the question, so you should also repeat the question before answering, but please encourage people to ask the questions directly now for the rest of the session if you have a couple of minutes. Julian Lucek: If there are any more questions please signal to Stephanie. Operator: Once again, if you wish to ask a question or make a comment please press *1 on your telephone now. There are no questions from here. Julian Lucek: We re going to close shortly. Just before we close, after the slides disappear you ll be in something called exit lobby and you re welcome to stay there. A couple of reasons: there are a couple of survey questions such as which IPv6 technology is the most interesting to you for your network; also there s a chat window, so you can ask any final questions as well. That will be there for a few minutes after the main session ends, which you ll see on your webpage. 15

16 The other thing that I d like to do is to just advertise some future sessions, J-Tech Live sessions. On 8 th September we ve got a session on Next Generation Multicast VPNs, which is obviously a very hot topic at the moment, as many of you know; the registration is open for that. Another one that we ve got coming in September, or in fact beginning of October, is one on Data Centre Design and that s on 6 th October. The registration for that Data Centre on actually starts next week. The other thing is if you look on the J-Tech Live page, there s a tab which says education and for the first 100 people who do so we ve got 100 Prometric vouchers which allow you to take any Juniper-related Prometric exam free of charge. Normally you have to pay quite a bit to take one of these Prometric exams, so as I say first 100 people get a voucher free of charge. With that thank you very much for attending; any questions, please drop us a mail or come to the exit lobby afterwards to ask questions in the chat window there. Operator: Ladies and gentlemen, that does conclude our J-Tech Live event. Thank you for participating, you may all disconnect. 16

Transition to IPv6 in Service Providers

Transition to IPv6 in Service Providers Transition to IPv6 in Service Providers Jean-Marc Uzé Director Product & Technology, EMEA juze@juniper.net UKNOF14 Workshop Imperial college, London, Sept 11 th, 2009 1 Agenda Planning Transition Transition

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

How To Make A Network Secure

How To Make A Network Secure 1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC

DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information

For internal circulation of BSNLonly

For internal circulation of BSNLonly E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based

More information

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

Cisco Configuring Basic MPLS Using OSPF

Cisco Configuring Basic MPLS Using OSPF Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration

More information

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS is the enabling technology for the New Broadband (IP) Public Network From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic Mario.Baldi@polito.it www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

FLAG s IPv6 Implementation

FLAG s IPv6 Implementation FLAG s IPv6 Implementation Bijal Sanghani FLAG Telecom Ltd. Commercial In Confidence FLAG IP Network Overview Multiple STM-16 Backbone links mostly sits on Flag s own Cable System: FA-1, FEA, FNAL, FALCON.

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations

More information

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26 Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS WHITE PAPER UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary.............................................................................................

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

Overlay Networks and Tunneling Reading: 4.5, 9.4

Overlay Networks and Tunneling Reading: 4.5, 9.4 Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30 2:50 in COS 105) Mike Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp://www.cs.princeton.edu/courses/archive/spring09/cos461/

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Exercise 4 MPLS router configuration

Exercise 4 MPLS router configuration Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

Introduction Inter-AS L3VPN

Introduction Inter-AS L3VPN Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

Multi-Protocol Label Switching To Support Quality of Service Needs

Multi-Protocol Label Switching To Support Quality of Service Needs Technical Report, IDE1008, February 2010 Multi-Protocol Label Switching To Support Quality of Service Needs Master s Thesis in Computer Network Engineering - 15hp AMJAD IFTIKHAR AOON MUHAMMAD SHAH & FOWAD

More information

Junos MPLS and VPNs (JMV)

Junos MPLS and VPNs (JMV) Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S& Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

MPLS. Packet switching vs. circuit switching Virtual circuits

MPLS. Packet switching vs. circuit switching Virtual circuits MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit

More information

MPLS Architecture for evaluating end-to-end delivery

MPLS Architecture for evaluating end-to-end delivery International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-

More information

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005 MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel

More information

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in

More information

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core

More information

APNIC elearning: BGP Attributes

APNIC elearning: BGP Attributes APNIC elearning: BGP Attributes Contact: training@apnic.net erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice

More information

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN MPLS VPN Peer to Peer VPN s Agenda MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) CE-PE OSPF Routing CE-PE Static Routing CE-PE RIP Routing

More information

MPLS over Various IP Tunnels. W. Mark Townsley

MPLS over Various IP Tunnels. W. Mark Townsley MPLS over Various IP Tunnels W. Mark Townsley Generic MPLS over IP Manual, Point to Point Tunnel IP/MPLS Network P Manually Configured Tunnel IP Network P IP/MPLS Network Typically a GRE tunnel, but may

More information

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint

More information

KTHNOC, MPLS static lab, rev: 1.10. MPLS static lab. Juniper version. Group Nr. Name1. Name2. Name3. Name4. Date. Grade. Instructor s Signature

KTHNOC, MPLS static lab, rev: 1.10. MPLS static lab. Juniper version. Group Nr. Name1. Name2. Name3. Name4. Date. Grade. Instructor s Signature KTHNOC MPLS static lab Juniper version Group Nr Name1 Name2 Name3 Name4 Date Grade Instructor s Signature Table of Contents 1 Goals...3 2 Preparations...3 2.1MPLS concepts...3 2.2 Assign labels...4 3 Static

More information

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Design of MPLS networks VPN and TE with testing its resiliency and reliability MASARYK UNIVERSITY FACULTY OF INFORMATICS Design of MPLS networks VPN and TE with testing its resiliency and reliability Diploma thesis Michal Aron Brno, spring 2014 ZADANIE DP Declaration I declare

More information

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds

More information

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

IMPLEMENTING CISCO MPLS V3.0 (MPLS) IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility

More information

Course Description. Students Will Learn

Course Description. Students Will Learn Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user

More information

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track** Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: 112085. Requirements

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: 112085. Requirements IPv6 over MPLS VPN Document ID: 112085 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram VRF Configuration Multiprotocol BGP (MP BGP) Configuration

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s) netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description silvia.filippi@kaskonetworks.it http://www.kaksonetworks.it/ A lab showing

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

Implementing MPLS VPNs over IP Tunnels

Implementing MPLS VPNs over IP Tunnels Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint tunneling instead

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

MPLS VPN Route Target Rewrite

MPLS VPN Route Target Rewrite The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets

More information

(Refer Slide Time: 01:38 01:37)

(Refer Slide Time: 01:38 01:37) Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed

More information

Understanding Route Redistribution & Filtering

Understanding Route Redistribution & Filtering Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......

More information

Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B

Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments

More information

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013 Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing

More information

Residential IPv6 IPv6 a t at S wisscom Swisscom a, n an overview overview Martin Gysi

Residential IPv6 IPv6 a t at S wisscom Swisscom a, n an overview overview Martin Gysi Residential IPv6 at Swisscom, an overview Martin Gysi What is Required for an IPv6 Internet Access Service? ADSL L2 platform, IPv6 not required VDSL Complex Infrastructure is Barrier to Cost-efficient

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel

BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel BUILDING MPLS-BASED MULTICAST VPN SOLUTION DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel Agenda Multicast VPN (mvpn) Overview L3VPN Multicast Solution using PIM/GRE (Draft-Rosen) MPLS Multicast Building

More information

CIRA s experience in deploying IPv6

CIRA s experience in deploying IPv6 CIRA s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011 1 About CIRA The Registry that operates the Country

More information

APNIC elearning: Introduction to MPLS

APNIC elearning: Introduction to MPLS 2/5/5 ANIC elearning: Introduction to MLS 3 MAY 25 3: M AEST Brisbane (UTC+) Issue Date: Revision: Introduction resenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security DNS/DNSSEC

More information

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) How the different Inter-AS and Carrier s Carrier

More information

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes

More information

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network. Where MPLS part I explains the basics of labeling packets, it s not giving any advantage over normal routing, apart from faster table lookups. But extensions to MPLS allow for more. In this article I ll

More information

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

VPN Technologies: Definitions and Requirements

VPN Technologies: Definitions and Requirements VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.

More information

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001 The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion

More information

IPv6 Opportunity and challenge

IPv6 Opportunity and challenge Juniper Networks Solution from enterprise to service provider Jean-Marc Uzé juze@juniper.net 10 May 2004 1 Opportunity and challenge More devices demanding more addresses 3G Mobile IP multimedia specifies

More information

Implementing Cisco MPLS

Implementing Cisco MPLS Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Fault Management In MPLS Networks

Fault Management In MPLS Networks CHAPTER 6 This chapter describes the alarms that Cisco ANA detects and reports for LDP, BGP, MPLS TE (using RSVP TE), MPLS Black Holes, as well as alarm reports for Layer 2 and Layer 3 VPNs: MPLS Related

More information

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01.

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01. MPLS Cisco MPLS MPLS Introduction The most up-to-date version of this test is at: http://networksims.com/i01.html Cisco Router Challenge 227 Outline This challenge involves basic frame-mode MPLS configuration.

More information

Internetworking II: VPNs, MPLS, and Traffic Engineering

Internetworking II: VPNs, MPLS, and Traffic Engineering Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual

More information

Multiprotocol Label Switching Architecture & LDP. Introduction MPLS Basics LDP Procedures LDP Specification

Multiprotocol Label Switching Architecture & LDP. Introduction MPLS Basics LDP Procedures LDP Specification Multiprotocol Label Switching Architecture & LDP Introduction MPLS Basics LDP Procedures LDP Specification 1 MPLS&LDP->Introduction Conventional network forwarding Each router analyzes the coming packet

More information

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual

More information

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks arajagopal@foundrynet.com Agenda 2 Why Load

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information