CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs
|
|
- Felicity Thornton
- 5 years ago
- Views:
Transcription
1 : Computer Networks Lecture 9: Mar 30, 2005 VPNs
2 VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
3 What is a VPN? Making a shared network look like a private network Why do this? Private networks have all kinds of advantages (we ll get to that) But building a private network is expensive (cheaper to have shared resources rather than dedicated)
4 History of VPNs Originally a telephone network concept Separated offices could have a phone system that looked like one internal phone system Benefits? Fewer digits to dial Could have different tariffs Company didn t have to pay for individual long distance calls Came with own blocking probabilities, etc. Service guarantees better (or worse) than public phone service
5 Original data VPNs Lots of different network technologies in those days Decnet, Appletalk, SNA, XNS, IPX, None of these were meant to scale to global proportions Virtually always used in corporate settings Providers offer virtual circuits between customer sites Frame Relay or ATM A lot cheaper than dedicated leased lines Customer runs whatever network technology over these These still exist (but being replaced by IP VPNs)
6 VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
7 Advantages of original data VPNs Repeat: a lot cheaper than dedicated leased lines Corporate users had no other choice This was the whole business behind framerelay and ATM services Fine-grained bandwidth tariffs Bandwidth guarantees Service Level Agreements (SLA) Multi-protocol
8 Frame Relay VPN Example CE CE CE FR FR CE FR FR CE FR FR FR CE CE CE CE = Customer Equipment FR = Frame Relay
9 CE1 Define circuits CE to CE (for given customer: purple) CE3 CE FR FR CE3 FR 31 FR CE4 FR FR FR CE2 CE2 CE4 CE = Customer Equipment FR = Frame Relay
10 CE1 dest circuit CE2 24 CE3 12 CE4 31 Customer establishes routing tables (per protocol) 24 FR CE FR FR FR CE3 CE3 CE4 FR FR FR CE2 CE2 CE4 CE = Customer Equipment FR = Frame Relay
11 CE1 Provider provisions underlying network CE3 CE1 FR FR CE3 FR Provider does queuing analysis of load through each link, determines, throughput characteristics, gives service guarantees to customers accordingly. FR FR FR FR CE4 CE2 CE2 CE4 CE = Customer Equipment FR = Frame Relay
12 How has the world changed? Everything is IP now Some old stuff still around, but most data networks are just IP So, why do we still care about VPNs???
13 IP VPN benefits IP not really global (private addresses) VPN makes separated IP sites look like one private IP network Security Bandwidth guarantees across ISP QoS, SLAs Simplified network operation ISP can do the routing for you
14 Client VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
15 Client VPNs Solves problem of how to connect remote hosts to a firewalled network Security and private addresses benefits only Not simplicity or QoS benefits
16 Client VPNs Solves problem of how to connect remote hosts to a firewalled network Internet FW/ VPN Site (private network) Site Host Remote Host IPsec Tunnels Site Host Remote Host
17 Client VPNs: Configuration VPN IP addr: User name: joe Password: Rtu44!+3wyZ FW/ VPN Site Host Remote Host Site joe: Rtu44!+3wyZ Host sally: 5Yee#34hB!2
18 Client VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
19 Client VPNs: Configuration VPN IP addr: User name: joe Password: Rtu44!+3wyZ Remote Host More likely AAA or LDAP backend has the passwords FW/ VPN AAA Site joe: Rtu44!+3wyZ Host sally: 5Yee#34hB!2 Site Host
20 Client VPNs: Host gets local IP address Remote Host DHCP Router FW/ VPN AAA Site Host Site Host
21 Client VPNs: Host connects to VPN VPN authenticates remote host through backend database (RADIUS or LDAP) FW/ VPN AAA RADIUS Site Host Remote Host IPsec Site Host
22 Client VPNs: VPN assigns site address As proprietary enhancement to IPsec, or with PPP (over IPsec) Remote Host IPsec FW/ VPN AAA RADIUS Site Host Site Host
23 Client VPNs: Packets tunneled over IPsec FW/ RADIUS VPN IPsec Remote Host AAA Site Host Site Host IPsec Tunnel
24 Client VPNs: Packets tunneled over IPsec Some VPN clients smart enough to avoid sending non-vpn traffic through the VPN tunnel Not this This Public AAA Host FW/ RADIUS VPN IPsec Remote Host Site Host Site Host
25 IPsec Two parts: Session Establishment (key exchange) and Payload IKE/ISAKMP is session establishment Negotiate encryption algorithms Negotiate payload headers (AH, ESP) Negotiate policies Keying can be either: Symmetric shared keys Public keys (in certificates) Either way, a session key is negotiated by IKE
26 IPsec Payloads AH: Authentication Header Authenticates each packet but doesn t encrypt Has fallen out of favor (redundant and no more efficient) ESP: Encapsulating Security Payload Encrypts (with authentication as side effect)
27 Transport IPsec IPsec transmission modes: Transport or Tunnel mode TCP/UDP ESP or AH IP Transport mode. Used when IPsec tunnel is end-to-end. Operates over some of the IP fields, and doesn t work with NAT! Transport IPsec TCP/UDP IP ESP or AH IP Tunnel mode. Used when IPsec tunnel not end-to-end. Hides the IP identity of endpoints. Operates over inner IP fields can work with NAT.
28 AH header format Next Header Payload Len RESERVED Security Parameters Index (SPI) Sequence Number Field Authentication Data (variable)
29 ESP header format Security Parameters Index (SPI) Sequence Number Payload Data* (variable) Padding (0-255 bytes) Pad Length Next Header Authentication Data (variable)
30 New IPsec transmission modes Transport IPsec NAT Transport IPsec NAT TCP/UDP ESP or AH UDP IP TCP/UDP IP ESP or AH UDP IP Extra layer of UDP allows IPsec to work over NAT.
31 Client VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
32 Client VPNs: Host gets local IP address 2. If PPP, AAA tells Access Router to tunnel user to VPN. (If not PPP, Access Router uses local configuration.) Remote Host AAA Access Router 1. Remote host connects to Internet (dialup-ppp or PPPoE (cable) or DSL) IPsec or GRE or L2TP FW/ VPN Site Host 3. Tunnel established (or packets forwarded over pre-established tunnel) Compulsory if Access Router forces tunnel, voluntary if user requests it (through certain NAI). NAI = Site Host
33 Provider-based client VPNs Used for instance when enterprise pays for employee access, wants it to go through enterprise network I know Cisco did this But never used that much Business model didn t take off Used even less now In part because VPN client comes with windows OS??? The tunneling technology commonly used for roaming dialup though
34 Network VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
35 Reiterate network VPN benefits Makes separated IP sites look like one private IP network Security QoS guarantees Simplified network operation
36 Customer-based Network VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
37 Customer-based Network VPNs Site CE CE Site Internet Site CE CE Site Customer buys own equipment, configures IPsec tunnels over the global internet, manages addressing and routing. ISP plays no role.
38 Customer-based Network VPNs Great for enterprises that have the resources and skills to do it Large companies More control, better security model Doesn t require trust in ISP ability and intentions Can use different ISPs at different sites But not all enterprises have this skill
39 Provider-based Network VPNs (aka Provider Provisioned: PPVPN) VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
40 Provider-based Network VPNs Site CE PE ISP PE CE Site Site CE PE PE CE Site Provider manages all the complexity of the VPN. Customer simply connects to the provider equipment.
41 Same provider equipment used for multiple customers Site Site CE CE PE ISP PE CE Site Site CE PE PE CE Site CE CE Site Site
42 Model for customer Attach to ISP router (PE) as though it was one of your routers Run routing algorithm with it OSPF, RIP, BGP PE will advertise prefixes from other sites of same customer
43 Various PPVPN issues Tunnel type? IPsec (more secure, more expensive) GRE etc. How to discover which customer is at which PE? Don t want PEs without given customer to participate in routing for that customer How to distinguish overlapping private address spaces
44 BGP/MPLS VPNs (RFC2547) VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
45 BGP/MPLS VPNs (RFC2547) Cisco invention Leverage Cisco s investment in both BGP and MPLS (Multi-Protocol Label Switching) What is MPLS? Link-layer technology Tags like circuit switching But with some IP awareness How Cisco killed Epsilon Initially marketed as high performance switching Later became traffic engineering and VPN
46 CE1 Recall this frame-relay traffic engineered L2 VPN CE3 CE1 FR FR CE3 FR FR CE4 FR FR FR CE2 CE2 CE4 CE = Customer Equipment FR = Frame Relay
47 ISPs historically used L2 networks in their core ER ER ER ATM ATM ER ATM ATM ER ER ATM ER ATM ATM ER ATM = Asynchronous Transfer Mode ER = Edge Router
48 Logically, ISPs were structured like this ER ER ER ER ATM Cloud ER ER ER ER Every router was adjacent to every other
49 Why L2 (ATM)? ATM was, at least until 4-5 years ago, faster than IP forwarding ATM switches were better matched to the underlying SONET transmission links It was easier to traffic engineer based on virtual circuits than based on destination IP address IP wasn t the only network protocol
50 But there were problems ISPs had 100 s of routers, each of which logically had a link to all others Was difficult to manage and run routing over all of these logical links Scaled poorly Basic idea of MPLS was to elevate ATM intelligence to L3, while doing switching at L2! Epsilon business model
51 MPLS tried to get the best of both worlds IP Router MPLS ATM Switch Control: IP Router Software Forwarding: Longestmatch Control: IP Router Software Forwarding: Label Swapping Control: ATM Forum Software Forwarding: Label Swapping
52 MPLS Operation 1a. Routing protocols (e.g. OSPF-TE, IS-IS-TE) exchange reachability to destination networks 1b. Label Distribution Protocol (LDP) establishes label mappings to destination network 4. LER at egress removes label and delivers packet IP IP 10 IP 20 IP 40 IP 2. Ingress LER receives packet and label s packets 3. LSR forwards packets using label swapping
53 Original business model failed Simple reason: People figured out how to make IP fast as fast as ATM MPLS spent a long time looking for a reason to exist Finally found it in MPLS-BGP PPVPNs
54 Basic difficulty with PPVPN: private addresses
55 MPLS Label identifies VPN
56 How BGP/MPLS VPNs work BGP updates normally carry a set of IP prefixes in the routing path With MPLS VPN, they carry a VPN identifier, and an MPLS tag VPN identifier distinguishes overlapping address MPLS tag says how to encapsulate customer s IP over MPLS Within MPLS, the tag both routes the packet and identifies the customer Tunnels are typically not secure Customer assumes provider links are physically secure
57 A few more MPLS details Headers are stackable Uses variant of RSVP for establishing label values Also used these days for Traffic Engineering Because can route on source and dest Allows per-customer Service Level Aggrements Label Exp S TTL
58 Virtual Router based L3 VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
59 Virtual Router based L3 VPNs BGP/MPLS gave Cisco a huge advantage Because Cisco was the BGP and MPLS expert Competitors counter argument: No need to couple routing technology with tunneling technology they are separate issues Simpler to use virtual routers
60 What is a virtual router (VR)? Separate logical router within a single physical router Runs its own routing algorithm Has its own FIB (Forwarding Information Base) Basic idea: Incoming tunnel identifies which VR is intended If GRE, then GRE key field If IPsec, then IPsec SPI field If L2TP, then L2TP key field This is how overlapping addresses are distinguished
61 VR approach has discovery issues No standard way to configure tunnels and discover which PEs attach to which customers All manually configured (via management system) Various proposals exist Via BGP, OSPF, DNS, an LDAP database, and even IP multicast
62 Layer 2 LAN VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure
63 Layer 2 LAN VPNs Model is for PE to look like LAN to CE CE broadcast over LAN reaches only other CEs of the same customer Thus customer can run OSPF over LAN in standard way Supports multicast Multi-protocol Uses VLAN (Virtual LAN) tags to distinguish customers Advantages over FR and ATM are: Ethernet is more common interface Supports broadcast/multicast
64 What is a VLAN? A virtual LAN : makes a single physical look like multiple LANs Virtual LAN and priority capabilities are provided by 802.1Q/p: a VLAN tag is provided by 802.1Q to identify VLAN membership Limited to 4096 VLANs this is a potential scalability issue the VLAN tag has a 3-bit priority field that allows 8 possible service classes (matches DiffServ s 8 possible classes)
65 Why VLANs? LAN scalability: limits broadcast domains (limits broadcast storms); also limits multicast, chatty protocols, etc., reducing overall network traffic. Network efficiencies: traffic flows from different VLANS can be segregated Allows non-physical grouping of nodes that share similar resources Allows easy changing of LAN membership Reduces the amount of level 3 (IP) routing Security: limits snooping; authentication required (via GVRP) to join VLAN
66 More to the point Ethernet has gotten very fast GigE common 10gig Ethernet coming (optical) We can put much more on an Ethernet, so we need to segregate These days, site networks are composed of ethernet switches and VLANs, not routers and subnets!
67 Typical site configuration (from Cisco)
68 VLAN Header 64 bits 48 bits 48 bits 16 bits 46 to 1500 Bytes 32 bits Preamble Destination MAC Address Source MAC Address Length/ Type Data/LLC Frame Check Sequence Original Ethernet Frame Structure 64 bits 48 bits 48 bits 16 bits16 bits 16 bits 46 to 1500 Bytes 32 bits Preamble Dest MAC Address Source MAC Address TPID TCI Length/ Type Data/LLC Frame Check Sequence User Priority (3) CFI (1) VLAN ID (12) Ethernet with VLAN
69 Meta-Point: Its all about tunnels! In this lecture we saw a lot of tunnels IPsec, MPLS, GRE, L2TP I said before that the Internet has two ways to scale: Hierarchy and caching It has a third way: Tunnels!
70 Tunnels are scalable Tunnels prevents the middle from having to know details of the edge But in a manner that is more flexible than hierarchy Hierarchy forces a structure from the middle (top) Tunnels cut through the middle transparently Tunnels have been introduced piecemeal We still don t have a coherent architecture for them...
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
How Routers Forward Packets
Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire
Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Virtual Private Networks
Virtual Private Networks The Ohio State University Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security
Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks
Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Network virtualization
Martin Černý, Jan Fürman (Martin.Cerny@cesnet.cz, Jan.Furman@cesnet.cz) Department of Computer Systems Faculty of Information Technologies Czech technical university in Prague Martin Černý, Jan Fürman,
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Network Working Group Request for Comments: 2547. March 1999
Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
Introducción n a MPLS y MPLS VPN MPLS VPN
Introducción n a MPLS y MPLS VPN nemunoz@cisco.com Nelson Muñoz Presentation_ID 200, Cisco Systems, Inc. Agenda Introducción Que es una VPN? IP+ATM Conceptos básicos de MPLS MPLS VPN QoS en MPLS Ventajas
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
Implementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com
RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: Kapil.Kumar@relianceinfo.com Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic Mario.Baldi@polito.it www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
What Is a Virtual Private Network?
C H A P T E R 1 What Is a Virtual Private Network? A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE
MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete
MPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Broadband Network Architecture
Broadband Network Architecture Jan Martijn Metselaar May 24, 2012 Winitu Consulting Klipperaak 2d 2411 ND Bodegraven The Netherlands slide Broadband Services! Dual play, Triple play, Multi play! But what
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
Agilent Technologies RouterTester Whitepaper
Testing MPLS and IP VPNs Agilent Technologies RouterTester Whitepaper Introduction With the tightening economy in the US and rest of the world, the focus of service providers has shifted to exploring new
VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005
VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC
DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does
Virtual Private Networks
Virtual Private Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/
How Virtual Private Networks Work
How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater
Welcome to Today s Seminar!
Welcome to Today s Seminar! Welcome to this exciting, informative session on Internet VPNs and the QoS Difference Keynote speakers Eric Zines, Sr Market Analyst, TeleChoice Ashley Stephenson, Chairman,
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
End-To-End QoS Architecture for VPNs: MPLS VPN Deployment in a Backbone Network
End-To-End QoS Architecture for s: MPLS Deployment in a Backbone Network Haeryong Lee, Jeongyeon Hwang, Byungryong Kang, Kyoungpyo Jun Electronics and Telecommunications Research Institute E-Mail: hrlee@etri.r&
CTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
MPLS Peter Raedler Systems Engineer praedler@cisco.com 2001, Cisco Systems, Inc. Agenda Overview of MPLS Business Opportunities Security
MPLS Peter Raedler Systems Engineer praedler@cisco.com 1 Agenda Overview of MPLS Business Opportunities Security 2 Copyright All rights reserved. 1 Optical Internetworking Eliminating the overhead Traditional
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
Understanding PBB-TE for Carrier Ethernet
Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.
Security of the MPLS Architecture
WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol
Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)
MEE09:44 BLEKINGE INSTITUTE OF TECHNOLOGY School of Engineering Department of Telecommunication Systems Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
Secured Voice over VPN Tunnel and QoS. Feature Paper
Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Design of MPLS networks VPN and TE with testing its resiliency and reliability
MASARYK UNIVERSITY FACULTY OF INFORMATICS Design of MPLS networks VPN and TE with testing its resiliency and reliability Diploma thesis Michal Aron Brno, spring 2014 ZADANIE DP Declaration I declare
Blue 102. IP Service Architecture Futures. Geoff Huston May 2000
Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage
s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]
s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
Lesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
The Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
IPv6 Deployment Strategies
Version History Version Number Date Notes 1 10/15/2001 This document was created. 2 11/13/2001 Update to the explanation of NAT along tunnel paths. 3 03/08/2002 Update to the Related Documents section.
Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF
Building scalable IPSec infrastructure with MikroTik IPSec, L2TP/IPSec, OSPF Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris,
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This