A Policy Information Model for RFC2547-like IP VPNs

Size: px
Start display at page:

Download "A Policy Information Model for RFC2547-like IP VPNs"

Transcription

1 A Policy Information Model for RFC2547-like IP VPNs Arnaud GONGUET / Olivier POUPEL ALCATEL Route de Nozay Marcoussis - France Arnaud.Gonguet@alcatel.fr / Olivier.Poupel@alcatel.fr Tel.: +33 (0) / +33 (0) Fax: +33 (0) Abstract This article presents a Policy Information Model for RFC2547-like IP VPNs. Policy Information Models are the key component of Policy-based Management. They describe a set of service specific policy conditions or policy actions, that are used to formulate the policy rules that formalize the managed service in the network. In this article, the principles of Policy-based Management are reminded, and the role and usage of Policy Information Models is introduced. Then this article provides a description of the way an RFC2547-like IP VPN is provisioned in a network. Finally the authors propose a Policy Information Model for managing RFC2547-like IP VPNs in the context of network Policy-based Management. Introduction This article presents an IP Virtual Private Network (VPN) Policy Information Model. The targeted VPN service is based on an IP network where MPLS is used for forwarding packets over the core, and BGP is used for distributing routes over the core. Moreover, only the case of a network based (or PE-based) VPN is considered here. These kind of IP VPNs are described in RFC 2547 [1]. They will be called hereafter RFC2547-like IP VPNs. Policy information models are used in the context of Policy-based Management, which principles are defined in [2]. The IP VPN Policy Information Model presented hereafter defines a set of policy actions related to the management of RFC2547-like IP VPNs services, that will be used to implement policy rules that are the key components of Policy-based Management. In the first section, this article presents the principles of Policy-based Management, and the advantages of such a network management system. The second section underlines the role and usage of the Policy Information Models in the context of Policy-based Management. The third section explains the provisioning mechanisms of an RFC2547-like IP VPN service. The last section presents a Policy Information Model for RFC2547-like IP VPNs services. UTL/C/02/ Article submitted to Net-Con'2002

2 The network Policy-based Management principles The legacy network management methodologies, that aim at translating service objectives directly into network device configuration commands, are showing some restrictions [3]: Telnet and CLI (Command Line Interface) are dependent of the underlying platform, have a complex syntax and nearly no semantics. The use of SNMP (Simple Network Management Protocol) to browse network elements MIBs (Management Information Base) and PIBs (Policy Information Base) is subject to frequent errors. Moreover, the existance of private MIBs and PIBs hampers interoperability. These restrictions have motivated standardization bodies like the DMTF (Distributed Management Task Force) and the IETF (Internet Engineering Task Force) to lay the foundations of Policy-based Management. The idea is to describe the service objectives with network level policy rules that are automatically disseminated and translated into network device configuration commands. Policy rules are written using an If <Condition> then <Do Actions> formalism. The details of the "conditions" and "actions" are described in the Policy Information Models, that define how to represent a rule, how to group elementary conditions to make a more complex condition, and the way conditions and actions are linked to the rule structure. Policy Manager LDAP, SQL, COPS, Policy Repository LDAP, SQL, PDP COPS, Telnet/CLI, SNMP, PEP PEP PEP PEP PEP PEP Figure 1: Architecture of network Policy-based Management The simplified architecture related to network policy-based management (Figure 1) is made of four elements [4]: The Policy Manager, for editing policy rules, managing the Policy Repository, and updating new policy rules to the Policy Decision Points. UTL/C/02/ Article submitted to Net-Con'2002

3 The Policy Repository, storing the policy rules in a database. The Policy Decision Point (PDP), checking the coherency of the policy rules, notifying the Policy Enforcement Points of the policy rules to be applied, and taking policy decisions that are distributed to the Policy Enforcement Points. The Policy Enforcement Points (PEP), applying the policy rules and decisions received from the PDP and notifying the results to the PDP. The protocols recommended by the IETF for network Policy-based Management are COPS (Common Open Policy Service) for the communications between the PDP and PEPs, and LDAP (Lightweight Directory Access Protocol) for the communication with the Policy Repository. Other protocols, like SNMP or SQL (Structured Query Language) that are widely used within the Internet can also be used for the communications between the components described above. Policy-based Management has several advantages: Network management is more scalable, as adding devices to the network does not change the service level policy rules. Operators are liberated from the complexity of translating service objectives into network device configuration commands, as this complexity is disseminated to the network management. Network management is eased by coherency checking that can be automatically performed with regard to resources availability, configurations conflicts, or fault recovering functionalities. Policy-based Management is currently mainly used for QoS provisioning, or for security management purpose. Network management can gain coherency and efficiency by using Policy-based Management for all kinds of services. To do so, the key element is to define the proper Policy Information Models to be able to modelize the device configuration. Introduction to the Policy Information Models Policy Information Models are the key elements of Policy-based Management. They provide the formalism for descibing a network service using policy rules. A Policy Information Model is a set of classes that enable to implement policy rules. As explained in the previous section, the policy rules that express the service objectives are described using policy conditions and policy actions. The basic policy rules, conditions and actions are formalized in Policy Core Information Model (PCIM) [2] and its extentions PCIMe [5], as a set of PolicyRule, PolicyCondition and PolicyAction classes, and a set of aggregation definitions. PCIM and PCIMe, defined at the IETF, themselves derive from the Common Information Model (CIM) [6] from the DMTF. More specific policy conditions and actions can be defined in other Policy Information Models, as the Policy QoS Information Model (QPIM) [7] from the IETF. They will be formalized as classes that inherit from the PCIMe PolicyAction or PolicyCondition classes. The RFC2547-like IP VPN Policy Information Model, defined in this article, is such an example, in which policy actions that are specific to RFC2547-like IP VPN provisioning are defined on top of the PCIMe legacy classes. UTL/C/02/ Article submitted to Net-Con'2002

4 Some information are added to the network service objectives when they are translated into policy rules. A service objective is a high level view of a service, that makes an abstraction of the network complexity. For example it can describe that a VPN is needed between two given sites. The routers that will be involved are not known at this level. The policy rules that will describe this service will mention the interfaces to connect together, as well as the VPN routes distribution behavior. Thus the mapping from service objectives to policy rules is not direct, but adds complexity. The mapping from service objectives to policy rules is done by a functional block of service/network management, that has knowledge of both network service objectives and network management data. User Requirements SLS IP VPN Provisioning System IPVPN Policy Information Model Physical Network Topology IP VPN provisioning policy rules PDP PDP Device configuration commands Figure 2: Usage of the Policy Information Model In the example of Figure 2, the IP VPN service objectives are captured within an SLS (Service Level Specification). The IP VPN provisioning system will map those objectives into IP VPN provisioning policy rules. For that purpose it uses both the IP VPN Policy Information Model and some network management data. The Policy Information Model provides the policy rules formalism, while the network management data provides the necessary information for filling the policy condition and action parameters. The IP VPN provisioning system is the Policy Manager defined in the previous section (Figure 1). Policy rules will then be transfered to PDPs. The PDPs will translate the policy rules into device specific configuration commands. The RFC2547-like IP VPNs principles Provisioning an RFC2547-like IP VPN requires first to set up the IP VPN membership configuration, that is to provision routers with VPN membership information. Then it is required to set up the IP VPN connectivity, that is to manage the route distribution between UTL/C/02/ Article submitted to Net-Con'2002

5 the VPN routers. It is finally possible to provision the VPN routers with some firewall, NAT or encryption information, to set up some particular behaviors of the VPN. Setting up the IP VPN membership configuration RFC 2547 [1] defines a way to implement large scale IP VPNs. Severe scalability problems will occur if each router in the core has to maintain routing information for all the VPNs. It is important therefore that the routing information about a particular VPN is only required to be present in edge routers (i.e. PE) related to that VPN. Therefore an RFC2547-like IP VPN is implemented by managing only the PEs. The security and the confidentiality of the transported packets are supposed to be guaranteed by the core management. RFC2547-like IP VPN membership configuration is physically assured at the PE access interfaces. A site that belong to the VPN is connected to a PE via a given interface. This interface is associated with a separate forwarding table in the PE, known as VPN Routing and Forwarding table (VRF). When a PE router receives a packet from a VPN site (via the appropriate CE), the interface through which the packet arrives determines the forwarding table used for processing that packet (Figure 3). The choice of a forwarding table is not determined by the user content of the packet. 3 CE 1 I VRF i PE 4 PE 2 1: packet from CE to PE 2: packet arrives at interface I 3: interface I implicates that VRF i is used 4: therefore the packet is sent to the right PE Figure 3: How the VRF is working To prevent a VPN to be accessed by a non member site, we decided that a VRF is associated with one and only one VPN, even if RFC 2547 [1] is not so restrictive. Different sites accessing the same VPN through the same PE can use the same VRF. In that case the VRF will be associated to more than one interface. Setting up the IP VPN membership configuration thus consists of creating VRFs on PE routers, that are associated to the sites connection interfaces. Setting up the IP VPN connectivity To connect a site to a VPN via a given PE, a VRF is created on the PE and associated with the interface that connects the site to the PE. Then BGP automatically populates the VRF with the addresses of the site, and BGP peers are defined for this VRF. The site addresses, that may not be unique in the VPN, are turned into VPN specific and unique IP addresses that are UTL/C/02/ Article submitted to Net-Con'2002

6 composed of a Route Distinguisher and of the IP addresses. Those Route Distinguisher attributes and BGP peers management are performed independently from the service objectives mapping to policy rules, and are not modelized in the Policy Information Model. The IP connectivity between the VPN sites is determined by the BGP route distribution between VRFs. Each VRF is associated with one or more "Import Route Target" attributes, and one or more "Export Route Target" attributes. BGP associates a distribution label corresponding to the VRF "Export Route Target" to the VRF routes it distributes. BGP then populates the VRFs it encounters if the encountered VRF "Import Route Target" is equal to the BGP distribution label. In Figure 4, site 1 and site 2 belong to VPN A. The VPN connectivity allows site 1 to send packets to site 2, while site 2 cannot access site 1. The routes from site 2 must be distributed to the PE of site 1. The export Route Target from the PE of site 2 and the import Route Target from the PE of site 1 are set to A. Import RT : A Export RT : null Import RT : null Export RT : A Site 1 VPN A VRF PE Core VRF PE Site 2 VPN A Figure 4: VRF Route Target management example Setting up the IP VPN connectivity thus consists of providing the VRFs with coherent export and import Route Target attributes. An RFC2547-like IP VPN Policy Information Model IP VPN topology Model description The IP VPN topology model defined hereafter aims at providing a way to visualize the VPN service to be provisioned, in order to help its modelization using policy rules. When a policy rule refers to a topology element, the derived device configuration commands will refer to a network logical representation of this element. This does not mean that a reference is made to an object instantiation of this element. The IP VPN topology model could also be used for policy rules management, but as this article describes a Policy Information Model -and not the Policy Manager behavior- this is outside the scope of this article. UTL/C/02/ Article submitted to Net-Con'2002

7 The topology information model of the IP VPN (Figure 5) includes a description of the physical network that will support the service, and a description of the logical topology of the IP VPN. The physical network is only composed of edge nodes and edge node interfaces. The IP VPN is logically defined by a set of routing tables implemented on the edge nodes and a reference to the IP VPN service. Logical topology Physical topology LogicalNetwork (CIM) NetworkService (CIM) ProtocolEndPoint (CIM) Access InterfaceInVRF AccessInterfaceIn EdgeNode IPVPNDescription * VPNRoutingAndForwarding * AccessInterface EdgeNode (Traffic Model) VRFInVPN 1..* * VirtualAccessInterface 1..* VirtualAccess InterfaceInVRF VirtualAccessInterfaceIn EdgeNode Figure 5: RFC2547-like IP VPN topology model The physical topology of the network is described with three classes: The EdgeNode class inherits from the ProtocolEndPoint CIM class. For an RFC2547-like IP VPN it represents a PE router. It has a set of access interfaces, that can be virtual access interfaces. The AccessInterface class inherits from the ProtocolEndPoint CIM class. It represents an interface that is aggregated to an edge node. When implementing an IP VPN service, it can be associated with one, and only one, VRF table (to conform with our choice explained in the previous section). The VirtualAccessInterface class inherits from the ProtocolEndPoint CIM. It represents a sub-interface that is aggregated to an edge node. When implementing an IP VPN service, it is associated with one, and only one, VRF table. The logical topology is described with two classes: The VPNRoutingAndForwarding class inherits from the NetworkService CIM class. It represents a PE router VRF that is associated with at least one VPN. It is associated with a set of access interfaces or virtual access interfaces of the same PE. The IPVPNDescription class inherits from the LogicalNetwork CIM. It represents the logical IP VPN. It is associated with a set of VPNRoutingAndForwarding that represents the PE routers connection to the IP VPN service. IP VPN Provisioning Actions UTL/C/02/ Article submitted to Net-Con'2002

8 The provisioning of an RFC2547-like IP VPN is done in two steps (Figure 6). First the membership configuration is set up by creating on the PEs, for each site connected to a PE via a given interface, a VRF associated to the interface. Then the IP connectivity is set up by configuring Route Target attributes on the VRFs to manage the BGP route distribution. Additionally some firewall, encryption or NAT behaviors can be provisioned on the PEs. 1: Set up IP VPN membership configuration (VRF, interfaces...) Core Network Site A Site B CE PE PE CE 3: Configure IP VPN behavior (NAT, encryption, firewall...) 2: Set up IP connectivity Figure 6: Provisioning of the IP VPN service In a Policy Information Model, those actions are modelized as classes that are derived from the PCIMe PolicyAction class. Those classes are used to describe the "action" part of the policy rules that define the IP VPN service. These actions are listed below (Figure 7): ProvisionVRFPolicyAction: defines the membership configuration within an IP VPN. It specifies that a VRF must be created and attached to a set of interfaces of a PE. This enables to describe the VPN membership of a set of sites that are connected to this VPN via the given PE. ConfigureVRFPolicyAction: defines the IP VPN connectivity. It specifies that routes from the VRF connected to the distributionsource interface will be distributed to the VRFs connected to the distributiondestination interfaces. The set of such policy actions that will be defined enables to fully describe the IP VPN connectivity, that will be implemented through the Route Target attributes mechanism. NATAction: defines the NAT behavior for a given PE. FirewallAction: defines the firewall behavior for a given PE. EncryptionAction: defines the IPSec encryption behavior for a given PE. UTL/C/02/ Article submitted to Net-Con'2002

9 PolicyRule (PCIMe) PolicyCondition (PCIM) PolicyAction (PCIM) ProvisionVRFPolicyAction NATAction FirewallAction +distributionsource 1..* +attachedinterface 1..* EncryptionAction ConfigureVRFPolicyAction +distributiondestination AccessInterface (Topology Model) 1..* +distributionmandatoryhops 0..* Figure 7: RFC2547-like IP VPNs Policy Information Model The action ProvisionVRFPolicyAction This action has to be understood as the representation of the membership of a site (or many sites connected to the same PE) to a VPN. It specifies a VRF to be created and attached to a set of interfaces, on a PE router. DERIVED FROM ABSTRACT PROPERTIES ProvisionVRFPolicyAction This class represents the memberhip of one or more sites to a VPN. The sites connected to a given PE implicate the creation of a VRF on the PE, attached to the interfaces that connect the sites to the PE. PolicyAction FALSE attachedinterface[ref AccessInterface[1..n]] The reference attachedinterface: This is a reference to one or several AccessInterface, defined in the topology model (Figure 5). The action ConfigureVRFPolicyAction This action has to be understood as the representation of the connectivity of a site within a VPN. It specifies the set of sites that are accessible through the VPN from the source site. It represents the routes distribution process of a VRF, that will be implemented by means of RouteTarget. ConfigureVRFPolicyAction The class for representing the connectivity of a site within a VPN. It supports point-to-point, hub and spoke, full mesh and partial mesh topology. DERIVED FROM PolicyAction ABSTRACT FALSE PROPERTIES distributionsource[ref AccessInterface[1..n]] UTL/C/02/ Article submitted to Net-Con'2002

10 distributiondestination[ref AccessInterface [1..n]] distributionmandatoryhops[ref AccessInterface [0..n]] The reference distributionsource: This is a reference to one or more AccessInterface, defined in the topology model (Figure 5). The reference distributiondestination: This is a reference to one or more AccessInterface, defined in the topology model (Figure 5). The reference distributionmandatoryhops: This is a reference to zero or more AccessInterface, defined in the topology model (Figure 5). They represent mandatory hops to be used for the traffic flowing from the distributionsource to the distributiondestination. The action NATAction This class specifies which private address(es) need to be translated and what should be the results of this translation. DERIVED FROM ABSTRACT PROPERTIES NATAction The class that represents the network address translation action of the "If Condition then Action" semantics associated with a policy rule. PolicyAction FALSE translatefromipv4address translatetoipv4address The property translatefromipv4address: Specifies the original set of IPv4 addresses that needs to be translated. TranslateFromIPv4Address The original IPv4 address that needs to be translated. PolicyIPv4AddrValue The property translatetoipv4address: Specifies the final set of IPv4 addresses that needs to be translated to. TranslateToIPv4Address The final IPv4 address that needs to be translated to. PolicyIPv4AddrValue The action FirewallAction Specifies the firewall action to be enforced such as "allow", "deny", "log", "alarm", etc. The list of possible actions is limited by the attributes in the action object. DERIVED FROM ABSTRACT PROPERTIES FirewallAction The class for representing the firewall action of the "If Condition then Action" semantics associated with a policy rule. PolicyAction FALSE firewallaction UTL/C/02/ Article submitted to Net- Con'2002

11 The property firewallaction: The action defines the type of firewall action to be enforced. VALUES firewallaction The firewall action to be enforced INTEGER The action can take the following values 0 Allow 1 Allow & Log 2 Allow and Alarm 3 Deny 4 Deny & Log 5 Deny and Alarm The action EncryptionAction: The encryption standard is assumed to be IPSec [8]. This class provides the IPSec parameters that will be used to set up the security association required to handle the encryption and decryption of packets. DERIVED FROM ABSTRACT PROPERTIES EncryptionAction The class for representing the encryption action of the "If Condition then Action" semantics associated with a policy rule. PolicyAction TRUE ikeauthentication ikeencryption ikedhgroup iketimeout iketrafficbasedexpiry ipsecauthentication ipsecencryption ipsecdhgroup ipsectimeout ipsectrafficbasedexpiry ikepeerauthenticationmethod The property ikeauthentication: This property specifies the authentication algorithm to be used. The ikeauthentication parameters can be used to generate the corresponding ISAKMP (ISA Key Management Protocol) parameters in cases where ISAKMP is still being used. This document does not describe a separate set of parameters for ISAKMP. It is left to the policy servers generating the configuration to handle the corresponding translation. ikeauthentication The property that specifies the authentication algorithm. String The property ikeencryption: This property specifies the encryption algorithm to be used. ikeencryption The property that specifies the encryption algorithm. String UTL/C/02/ Article submitted to Net- Con'2002

12 The property ikedhgroup: This property specifies the DHGroup to be used during IKE negotiations. ikedhgroup The property that specifies the DHGroup to be used during IKE negotiations. String The property iketimeout: This property specifies the IKE Timeout to be used. iketimeout The property that specifies the IKE timeout. Integer The property iketrafficbasedexpiry: This property specifies the IKE Traffic based expiry to be used. iketrafficbasedexpiry The property that specifies the IKE traffic based expiry to be used. Integer The property ipsecauthentication: This property specifies the authentication algorithm to be used. ipsecauthentication The property that specifies the authentication algorithm. String The property ipsecencryption: This property specifies the encryption algorithm to be used. ipsecencryption The property that specifies the encryption algorithm. String The property ipsecdhgroup: This property specifies the DHGroup to be used during IPSec negotiations. ipsecdhgroup The property that specifies the DHGroup to be used during the IKE Phase II negotiations. String The property ipsectimeout: The property specifies the IPSEC Key Timeout to be used. ipsectimeout The property that specifies the IPSEC Key timeout. Integer The property ipsectrafficbasedexpiry: UTL/C/02/ Article submitted to Net- Con'2002

13 This property specifies the IPSEC Traffic based Key expiry to be used. ipsectrafficbasedexpiry The property that specifies the IPSec traffic based Key expiry to be used. Integer The property ikepeerauthenticationmethod: The IKE peers are the IKE processes that are at the two ends of a control channel related to encryption of traffic at the data layer. The method used by the peers to authenticate each other. The IKE peers are running on the IP VPN nodes. VALUE ikepeerauthenticationmethod The property that specifies the method used by the IKE peers to authenticate each other. unsigned 16-bit integer The possible values are listed below. 0 ProposalList is to be used 1 Pre-shared key 2 DSS (D S S) signatures 3 RSA (R S A) signatures 4 Encryption with RSA 5 Revised encryption with RSA 6 Kerberos Conclusion This article presents the basis of Policy-based Management, and particularly the role and usage of Policy Information Models. Then a Policy Information Model is proposed for the provisioning of RFC2547-like IP VPNs. This work is proposed at the IETF [9]. Policy Information Models are a key element for Policy-based Management, and a lot of efficiency and coherency could be gained in network management from using Policy-based Management not only for QoS or security purposes, but also for all kinds of services management. By leading research activities in Policy-based Management, Alcatel actively contributes to develop tomorrow tools which will allow to gain efficiency and coherency to manage next generation networks. References [1] IETF-draft, "BGP/MPLS VPNs", draft-ietf-ppvpn-rfc2547bis-01.txt, E. C. Rosen, Y. Rekhter, S. J. Brannon, C. J. Chase, J. De Clercq, P. Hitchen, D. Marshall, M. J. Morrow, A. Vedrenne, January 2002, work in progress, expire in July 2002 UTL/C/02/ Article submitted to Net- Con'2002

14 [2] IETF-RFC 3060, "Policy Core Information Model -- Version 1 Specification", B. Moore, E. Ellesson, J. Strassner, A. Westerinen, February 2001 [3] GRES'01, "A "Policy-driven" approach of SLA Management", O. Poupel, A. Gonguet, December 2001 [4] IETF-RFC 2753, "A Framework for Policy-based Admission Control", R. Yavatkar, D. Pendarakis, R. Guerin, January 2000 [5] IETF-draft, "Policy Core Information Model Extensions", draft-ietf-policy-pcim-ext- 07.txt, B. Moore, L. Rafalow, Y. Ramberg, Y. Snir, A. Westerinen, R. Chadha, M. Brunner, R. Cohen, J. Strassner, February 2002, work in progress, expire in August 2002 [6] DMTF, "Common Information Model (CIM) Specification", version 2.2, June 1999, [7] IETF-draft, "Policy QoS Information Model", draft-ietf-policy-qos-info-model-04.txt, Y. Snir, Y. Ramberg, J. Strassner, R. Cohen, B. Moore, November 2001, work in progress, expire in May 2002 [8] IETF-RFC 2401, "Security Architecture for the Internet Protocol", S. Kent, R. Atkinson, November 1998 [9] IETF-draft, "IPVPN Policy Information Model", M. Iyer, A. Gonguet, C. Jacquenet, P. Lago, R. Scandarioto, February 2002, work in progress, expire in August 2002 UTL/C/02/ Article submitted to Net- Con'2002

A "Policy-driven" approach of SLA Management

A Policy-driven approach of SLA Management A "-driven" approach of SLA Management Olivier Poupel, Arnaud Gonguet ALCATEL Route de Nozay, F-91461 Marcoussis Cedex, France. [Olivier.Poupel,Arnaud.Gonguet]@alcatel.fr RÉSUMÉ Depuis plusieurs années,

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

QAME Support for Policy-Based Management of Country-wide Networks

QAME Support for Policy-Based Management of Country-wide Networks QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

High Level Overview of IPSec and MPLS IPVPNs

High Level Overview of IPSec and MPLS IPVPNs IPVPN High Level Overview of IPSec and MPLS IPVPNs Date: 16/0/05 Author: Warren Potts Version: 1.1 Abstract This document provides a high level overview of the differences between IPSec and MPLS based

More information

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Configuring MPLS Hub-and-Spoke Layer 3 VPNs CHAPTER 23 This chapter describes how to configure a hub-and-spoke topology for Multiprotocol Layer Switching (MPLS) Layer 3 virtual private networks (VPNs) on Cisco NX-OS devices. This chapter includes

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S& Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

More information

Moonv6 Test Suite. MPLS Provider Edge Router (6PE) Interoperablility Test Suite. Technical Document. Revision 0.1

Moonv6 Test Suite. MPLS Provider Edge Router (6PE) Interoperablility Test Suite. Technical Document. Revision 0.1 Moonv6 Test Suite MPLS Provider Edge Router (6PE) Interoperablility Test Suite Technical Document Revision 0.1 IPv6 Consortium 121 Technology Drive, Suite 2 InterOperability Laboratory Durham, NH 03824-3525

More information

BUY ONLINE AT: http://www.itgovernance.co.uk/products/730

BUY ONLINE AT: http://www.itgovernance.co.uk/products/730 IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration

More information

Why Is MPLS VPN Security Important?

Why Is MPLS VPN Security Important? MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :

More information

Lecture 17 - Network Security

Lecture 17 - Network Security Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

MPLS Security Considerations

MPLS Security Considerations MPLS Security Considerations Monique J. Morrow, Cisco Systems mmorrow@cisco.com November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

For internal circulation of BSNLonly

For internal circulation of BSNLonly E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based

More information

Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol

Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol Adam Burke, Neco Ventura Department of Electrical Engineering, University of Cape Town,

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network. Where MPLS part I explains the basics of labeling packets, it s not giving any advantage over normal routing, apart from faster table lookups. But extensions to MPLS allow for more. In this article I ll

More information

Introduction to Security and PIX Firewall

Introduction to Security and PIX Firewall Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network

More information

A Multilevel Policy-Based Network Management System for Differentiated Services Network

A Multilevel Policy-Based Network Management System for Differentiated Services Network A Multilevel Policy-Based Network Management System for Differentiated Services Network Yu Kang, Song Ouyang Department of Computer Science, Central South University, Changsha, Hunan, P. R. China 410083

More information

Provisioning Cable Services

Provisioning Cable Services CHAPTER 10 This chapter describes how to provision MPLS VPN cable in IP Solutions Center (ISC). It contains the following sections: Overview of MPLS VPN Cable, page 10-1 in ISC, page 10-5 Creating the

More information

7750 SR OS System Management Guide

7750 SR OS System Management Guide 7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

A Review Paper on MPLS VPN Architecture

A Review Paper on MPLS VPN Architecture 32 A Review Paper on MPLS VPN Architecture Tejender Singh Rawat 1, Manoj Kumar Pandey 2, *Upendra Kumar 3 1, 2, 3 - Assistant Professor, ECE Department, ASET, Amity University Haryana Abstract A Virtual

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

A Management Architecture for Layer 1 VPN Services

A Management Architecture for Layer 1 VPN Services A Management Architecture for Layer 1 VPN Services Neumar Malheiros, Edmundo Madeira, Institute of Computing State University of Campinas (UNICAMP) PO 6176-13083-970 - Campinas SP, Brazil {ncm, edmundo}@ic.unicamp.br

More information

Introduction Inter-AS L3VPN

Introduction Inter-AS L3VPN Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

FortiOS Handbook IPsec VPN for FortiOS 5.0

FortiOS Handbook IPsec VPN for FortiOS 5.0 FortiOS Handbook IPsec VPN for FortiOS 5.0 IPsec VPN for FortiOS 5.0 26 August 2015 01-504-112804-20150826 Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard, are registered

More information

Configure ISDN Backup and VPN Connection

Configure ISDN Backup and VPN Connection Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

A Resilient Path Management for BGP/MPLS VPN

A Resilient Path Management for BGP/MPLS VPN A Resilient Path Management for BGP/MPLS VPN APNOMS2003 1 Introduction APNOMS2003 2 APNOMS2003 3 BGP/MPLS VPN Configuration MPLS/MP-iBGP VPN 1 VPN 1 VPN 2 VPN 2 BGP/MPLS VPN Overview BGP/MPLS Virtual Private

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

MPLS VPN Implementation

MPLS VPN Implementation MPLS VPN Implementation Overview Virtual Routing and Forwarding Table VPN-Aware Routing Protocols VRF Configuration Tasks Configuring BGP Address families Configuring BGP Neighbors Configuring MP-BGP Monitoring

More information

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com Advanced IPSec with GET VPN Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com 1 Agenda Motivations for GET-enabled IPVPN GET-enabled IPVPN Overview GET Deployment Properties

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow MPLS VPN Security in Service Provider Networks Peter Tomsu Michael Behringer Monique Morrow 1 About this Presentation Advanced level advanced MPLS concepts and architectures. Target Audience: Service provider!!

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where

More information

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core

More information

MPLS VPN Security BRKSEC-2145

MPLS VPN Security BRKSEC-2145 MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security

More information

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001 The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion

More information

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0 Course Outline AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0 Module 1: MPLS Features Lesson 1: Describing Basic MPLS Concepts Provide an overview of MPLS forwarding, features,

More information

MPLS VPN Security Best Practice Guidelines

MPLS VPN Security Best Practice Guidelines Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. mmorrow@cisco.com mbehring@cisco.com

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

IPv6 Fundamentals, Design, and Deployment

IPv6 Fundamentals, Design, and Deployment IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

University of Murcia (Spain) Antonio F. Gómez Skarmeta skarmeta@dif.um.es. University of Murcia SPAIN

University of Murcia (Spain) Antonio F. Gómez Skarmeta skarmeta@dif.um.es. University of Murcia SPAIN University of Murcia (Spain) Antonio F. Gómez Skarmeta skarmeta@dif.um.es University of Murcia SPAIN Network Security in IPv6 IPv6 IPsec/IKE Implementations UMU-PKIv6 Policy-Based Network Management (PBNM)

More information

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs : Computer Networks Lecture 9: Mar 30, 2005 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay

More information

Implementing Cisco MPLS

Implementing Cisco MPLS Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,

More information

Agilent Technologies RouterTester Whitepaper

Agilent Technologies RouterTester Whitepaper Testing MPLS and IP VPNs Agilent Technologies RouterTester Whitepaper Introduction With the tightening economy in the US and rest of the world, the focus of service providers has shifted to exploring new

More information

Group Encrypted Transport VPN

Group Encrypted Transport VPN Group Encrypted Transport VPN Petr Růžička petr.ruzicka@cisco.com Cisco Systems Czech Republic V Celnici 10, 117 21 Praha Abstract Today's networked applications, such as voice and video, are accelerating

More information

Rolling Out New SSL VPN Service

Rolling Out New SSL VPN Service Rolling Out New SSL VPN Service Introduction Typically, service providers offer infrastructure services, such as site-to-site connectivity and data center hosting. In addition to this, they are always

More information

Transition to IPv6 in Service Providers

Transition to IPv6 in Service Providers Transition to IPv6 in Service Providers Jean-Marc Uzé Director Product & Technology, EMEA juze@juniper.net UKNOF14 Workshop Imperial college, London, Sept 11 th, 2009 1 Agenda Planning Transition Transition

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel between a WatchGuard Firebox Vclass appliance (Vcontroller version

More information

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic Introduction This document discusses Cisco tunnel default gateway implementations that are available as part

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

Implementing MPLS VPNs over IP Tunnels

Implementing MPLS VPNs over IP Tunnels Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint tunneling instead

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks VPNs Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

How To Make A Network Secure

How To Make A Network Secure 1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need

More information

Security of the MPLS Architecture

Security of the MPLS Architecture WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

The BANDIT Products in Virtual Private Networks

The BANDIT Products in Virtual Private Networks encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

IMPLEMENTING CISCO MPLS V2.3 (MPLS) IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide VNS3 to Cisco ASA Instructions ASDM 9.2 IPsec Configuration Guide 2016 Site-to-Site IPsec Tunnel IPsec protocol allows you to securely connect two sites together over the public internet using cryptographically

More information

Building Trusted VPNs with Multi-VRF

Building Trusted VPNs with Multi-VRF Building Trusted VPNs with Introduction Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several

More information

Software. Quidview 56 CAMS 57. XLog NTAS 58

Software. Quidview 56 CAMS 57. XLog NTAS 58 Software Quidview 56 CAMS 57 XLog NTAS 58 55 Quidview Quidview Network Management System Quidview network management software is a suite of scalable tools for simplifying the network management and maintenance.

More information

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Course Overview: The Securing Networks with Cisco Routers and Switches (SECURE) 1.0 course is a five-day course that aims at providing network

More information

Private IP Overview. Feature Description Benefit to the Customer

Private IP Overview. Feature Description Benefit to the Customer Private IP Overview Private IP is a network-based virtual private network (VPN) enabling customers to effectively communicate over a secure network. It also provides the foundation for automating business

More information

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: Kapil.Kumar@relianceinfo.com Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical

More information

VPN Technologies A Comparison

VPN Technologies A Comparison VPN Technologies A Comparison Matthew Finlayson, matthewfinlayson@metaswitch.com Jon Harrison, jon.harrison@metaswitch.com Richard Sugarman, richard.sugarman@metaswitch.com First issued February 2003 100

More information

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) How the different Inter-AS and Carrier s Carrier

More information

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint

More information

Network Security. Lecture 3

Network Security. Lecture 3 Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview

More information

IPv6 Security: How is the Client Secured?

IPv6 Security: How is the Client Secured? IPv6 Security: How is the Client Secured? Jeffrey L Carrell Network Conversions Network Security Consultant 1 IPv6 Security: How is the Client Secured? IPv6/IPsec IPsec Challenges IPsec Monitoring/Management

More information

IPv6 Opportunity and challenge

IPv6 Opportunity and challenge Juniper Networks Solution from enterprise to service provider Jean-Marc Uzé juze@juniper.net 10 May 2004 1 Opportunity and challenge More devices demanding more addresses 3G Mobile IP multimedia specifies

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS WHITE PAPER UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary.............................................................................................

More information

Configuring a Basic MPLS VPN

Configuring a Basic MPLS VPN Configuring a Basic MPLS VPN Help us help you. Please rate this document. Contents Introduction Conventions Hardware and Software Versions Network Diagram Configuration Procedures Enabling Configuring

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks The Ohio State University Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security

More information

CA Spectrum MPLS-VPN Manager

CA Spectrum MPLS-VPN Manager CA Spectrum MPLS-VPN Manager User Guide Release 9.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information