Network-Based Protocol Innovations in Secure Encryption Environments
|
|
|
- Shonda Scott
- 10 years ago
- Views:
Transcription
1 Network-Based Protocol Innovations in Secure Encryption Environments Using Locator/ID Separation Protocol (LISP) to Optimize Routing in IP Encryption Environments Craig Hill Distinguished Systems Engineer U.S. Federal Area Individual Contributors: Tim Thomas Sr. Systems Engineer, U.S. Federal Dino Farinacci Cisco Fellow Cisco and/or its affiliates. All rights reserved.
2 Abstract This paper examines how recent network-based protocol innovations can be used to simplify the overall deployment, functionality, and operation of networks in which IPsec VPN devices (IVDs) are required specifically, in Department of Defense (DoD), Intelligence Community (IC), and secure enterprise networks. The main innovation addressed in this paper is the Locator/ID Separation Protocol (LISP) routing architecture framework, which, when deployed in an IVD environment, addresses some of the major deployment and operational challenges common in IVD networks today. This paper compares the use of LISP with technologies currently used in IVD deployments today. It also highlights the advantages and differentiation that simplify operations and deployment, and offers current and future enhancements that could change the way IVD networks are deployed. Please note that LISP has published drafts within the Internet Engineering Task Force (IETF) and will continue to target full standards-based approach moving forward. Problem Statement In secure federal and enterprise customers, IP encryption is a popular security protocol for core networks and for hub-and-spoke topologies in which there is a need to backhaul remote site traffic to a single aggregation site. This IPsec VPN device (IVD) supports flexible packet-based encryption at the IP layer, allowing network designers to take advantage of IPv4/v6 packet-based transport, specifically on the unsecure side of the network transport. A typical IVD encrypts the received packet (from the secure/clear-text interface), encapsulates it into an IPv4/v6 transport packet, and forwards it to the destination IVD (which has already executed its key exchange process, trusted secure association, and IP route forwarding establishment). Note: In this context, secure refers to routers and locations within the encryption boundary of the IVD. Unsecure refers to routers and locations that are outside the encryption boundary, and therefore not secure but the data is encrypted. The receiving IVD then decrypts/de-encapsulates the received packet and forwards it to the attached receiving device. Because it is IP-based and offers the flexibility for any-to-any IP communications, as well as multiple options for transport services between IVDs (e.g., optical, Ethernet, or IP), the IVD packetbased encryption solution is extremely popular among DoD and various enterprise designers Cisco and/or its affiliates. All rights reserved.
3 However, there are known industry challenges in trying to build an IP backbone with these devices as they fall short in delivering several key features users have come to expect in today s IP-based routers: Limited/no support for dynamic IP unicast routing protocols No support for dynamic IP multicast protocols No support for Virtual Route Forwarding (VRF), virtual LAN (VLAN), or Multiprotocol Label Switching (MPLS) functions (control and data plane) Limited capabilities for transporting IP type of service/differentiated services code point (ToS/DSCP) bits No 802.1Q/p support on the encryptor s Ethernet interfaces No means to rapidly detect host mobility between locations Given these limitations, network operators instead most commonly deploy IP tunnel technology, namely generic routing encapsulation (GRE) (RFC 2784), between the secure routers inside the IVD boundary. GRE tunnels, in combination with the IVD, allow the transport of IP service packets (e.g., IPv4/v6, multicast, or MPLS) through the IVDs. In its most generic form (and as stated in RFC 2784), GRE allows the transport of a payload packet (the packet needing to be encapsulated and delivered) within an outer header consisting of a GRE header plus an IP header (24 bytes total). The result is the creation of an overlay IP topology between the GRE tunnel endpoints on the secure routers, which is transparent to the IVDs and the networks between IVDs. The IVDs route the traffic based on the destination IP address in the outer IP header of the GRE packets. By leveraging this IP tunnel overlay topology, the secure routers are able to support more sophisticated technologies than can be provided by the IVDs alone. These technologies include interior gateway protocols (IGPs) such as Open Shortest Path First (OSPF) or Enhanced Interior Gateway Routing Protocol (EIGRP); MPLS services such as IP Border Gateway Protocol (BGP) VPNs; Layer 2 VPN point-to-point or point-to-multipoint; IP multicast; and IPv6. The use of GRE tunnels over IVDs has become common practice in certain customer deployments. It should be noted that enhancements to GRE performance (up to 40 Gbps of GRE packet encapsulation and forwarding on the Cisco CRS-1 Carrier Routing System, with future support of 140 Gbps of GRE on the Cisco CRS-3) and increased flexibility through the use of multipoint GRE tunnels look to overcome operational burdens historically associated with point-to-point GRE tunnels, especially in environments requiring larger number of sites (N 1 GRE tunnels for full mesh, where N is the number of locations). However, using GRE tunnels in larger-scale environments has proven complex and troublesome, both operationally and in terms of the hardware required to forward GRE packets and manage the maximum transmission unit (MTU) implications GRE introduces. The use of dynamic discovery of the routes to the secure networks the IVDs are protecting could increase demand on hardware resources and IVD functionality in order to process and hold a potentially larger number of IP prefixes being received from the protected network. This could prove challenging, particularly if the IVD hardware design was not originally intended to hold a large amount of IP prefixes Cisco and/or its affiliates. All rights reserved.
4 Proposed Solution This document details a solution to simplify the overall deployment and operations of IVDs, including using the Locator ID Separation Protocol (LISP) routing architecture framework to simplify the connectivity, forwarding, and operations between secure router endpoints when IVDs are required. The paper specifically addresses the challenges described prior, which could significantly impact how these types of networks are designed. LISP is not a feature, but rather a new routing architecture that is gaining traction for the broad range of uses and applications with which it can integrate. LISP implements a new semantic for IP addressing that creates two name spaces: Endpoint Identifiers (EIDs), which are the current addresses assigned to end hosts today, and Routing Locators (RLOCs), which are the addresses assigned to devices (primarily routers) comprising the global routing system. Splitting EID and RLOC functions yields many benefits, including improved routing scalability, superior multi-homing efficiency, IPv6 transition, and virtual machine (VM) and IP mobility. Additionally, given the level of indirection incorporated into its forwarding scheme, LISP has been identified as a method for simplifying IP network deployments in customer networks when the use of external IVDs is required. LISP can greatly simplify the overall IP routing paradigm in environments requiring IVDs, eliminating the need for full-mesh GRE tunnels running end-to-end routing protocols. LISP uses a pull model similar to DNS, which only requests endpoint host addresses when needed for communication. Because LISP inherently uses IP/UDP for forwarding (e.g., IP encapsulation), the data plane works seamlessly over IVDs without the need to manually configure GRE tunnels between each pair of secure routers. Further, LISP significantly limits the potential number of IP prefixes the IVD might be required to hold (e.g., RLOC addresses) to simplify the operational aspect of these networks. In turn, this will reduce the prefix memory and other related resources needed in the IVD design. For a detailed description on how LISP operates, see That site also provides details about LISP and its control plane components that are outside the scope of this paper Cisco and/or its affiliates. All rights reserved.
5 Solution Description of LISP in IVD Environments This section addresses using LISP as the IP routing framework in an IVD environment, and assumes the reader has a basic understanding of the various LISP components, including data planes and control planes. Figure 1 depicts the topology and components of a typical IP architecture in using IVDs and GRE tunnels. In this topology, point-to-point GRE tunnels are established between the secure router endpoints (at each campus/data center site), thus allowing full- or partial-mesh communications over each GRE tunnel. This communications overlay is transparent to the IVDs and the IP transport of the encrypted IVD traffic. Figure 1 Typical IVD Architecture Leveraging GRE Tunnel Overlay In the GRE deployment model, each IVD is responsible for holding the IP address prefix that the outer IP header of the GRE tunnel uses for communicating with each endpoint. It is important to note that this model hides the secure plaintext prefixes within each campus or data center site from the IVDs, thus limiting the number of prefix entries in each IVD to only those needed for GRE tunnel endpoint communications (vs. holding each secure prefix in the site campus or data center). In this model, GRE tunnels could be configured manually, or solutions such as Dynamic Multipoint VPN (DMVPN) could be used Cisco and/or its affiliates. All rights reserved.
6 Figure 2 depicts the topology and components of a typical IP architecture using IVDs, this time with the use of a LISP framework and its associated components. The secure routers S1/S2 and D1/D2 will function as ingress tunnel routers (ITRs) and egress tunnel routers (ETRs) in the architecture. (Note: An xtr correlates to a router functioning as both an ITR and ETR.) The map resolver (MR) and map server(ms) ( MR/MS in the figure) will be redundant and accessible only in the secure address space. If the need exists to communicate to non-lisp locations (this would be normal, even if only in a transition stage), one or more proxy ITRs/ETRs (PxTRs) will be provisioned; again, only accessible within the secure address space. Figure 2 - Typical IVD Architecture Leveraging LISP It should be noted that the IP network transport for the RLOC in this solution is immaterial to the function of the LISP architecture and can be assumed to use any of the network solutions typically found today in any IVD environment (e.g., IP, Ethernet, serial, optical) Cisco and/or its affiliates. All rights reserved.
7 LISP Operation in an IVD Environment To use LISP in this secure environment, the secure xtrs will be directly connected to the IVDs. The RLOC addresses (shown as /32, /32, /32, and /32) would normally be manually entered into the IVD but could be advertised if an IGP was supported to allow this. The IVD will be responsible for distributing these RLOC addresses to all IVDs throughout the network as part of the normal IVD discovery process (details for IVD prefix discovery are outside the scope of this document). Lastly, the IP addresses for the MR/MS must also be advertised and reachable by all secure xtrs for the map registration and request functions to operate. As in any LISP design, the EID address space will be hidden from the RLOC address space and, in this proposal, hidden from the IVDs as well. LISP operation in an IVD environment does not change from that found in the service provider/commercial space, meaning both data plane (ITR talking to an ETR) and control plane (ETR registering to a MS and an ITR requesting the RLOC-to-EID mapping from the MR) remain the same. However, in this secure environment, all communications will be over the IVD. Because LISP natively uses an IP encapsulation (IP/UDP) for forwarding, the operator is not required to manually configure any IP/GRE tunnels between any secure routers (e.g., ITRs/ETRs) over the IVDs. One of the key concerns in an IVD architecture in which an IGP will be used for secure IP route discovery and exchange is the impact that a large amount of prefixes could have on the IVD devices, particularly when not using GRE tunnels. Consider that when using IVD discovery with an IGP, the IVD device itself would potentially need to learn all secure prefixes found within the agency s secure network and distribute those prefixes to every other IVD. The prefix count in each IVD could get very large, potentially impacting the overall performance and scale of the IVD devices and network performance. Using the LISP framework for this type of network can greatly reduce the potential for route explosion in the IVD, as LISP inherently hides the end-user network prefixes (EIDs) from the IVDs through the RLOC/ EID separation. No matter how large the secure routing tables become in the EID space, the IVDs will not be impacted and will only require knowledge of the RLOC address of each xtr when using the LISP framework. The IVD routing table size-scaling factor is based only on the scale of the RLOC address space in the network, which will be minimal. Consider that the number of RLOC addresses will equal the number of secure router (xtr) interfaces, plus/minus the addresses of the MR/MS/PxTR, regardless of how much the prefix count increases behind each xtr (i.e., EID address space). This is an enormous benefit of LISP for scaling large IVD environments. Aside from basic IP routing requirements in these networks, applications can be deployed that will increase this explosion of prefixes in the agency networks. One key application is the rapid addition of virtual machines (VMs), in which each VM host will have a /32 address (IPv4). The same can be said for mobile or tactical networks, where /32 addresses are much more frequently seen to identify each endpoint. (LISP has other methods for simplifying this VM mobility challenge, which is described briefly in the use case section.) The LISP framework offers unlimited potential and should continue to be evaluated and considered in these complex IVD environments. Combining the pull method for host-to-host communication, dynamic prefix discovery in the IVD using IGPs, and native IP encapsulation, LISP has the potential to dramatically simplify overall network operation, setup, and scale for IVD network deployments and operation Cisco and/or its affiliates. All rights reserved.
8 Key Advantages for LISP in an IVD Environment Using the LISP routing architecture in combination with IVD deployments addresses several key challenges common in IVD networks today. Highlighted below are key advantages of how the LISP + IVD solution could benefit network operators and designers who are either already running IVDs in their networks, or planning to deploy them: 1. Native IP forwarding: Using the LISP framework in an IVD environment eliminates almost all the manual setup and change management required in IVD networks today, including GRE tunnel establishment, IGP/BGP peering over GRE, the impact of adding new locations, and address moves within a location. 2. IP-encapsulated data plane: The LISP data plane natively uses IP/UDP encapsulation (verses stateful tunnel technology) for forwarding, eliminating the need for the network operator to manually configure GRE tunnels between secure router endpoints. 3. IVD discovery option: In combining LISP functionality with optional IP prefix discovery options in the IVD, LISP xtrs can dynamically advertise their RLOC address to the IVD. This eliminates the need for establishing IGPs over static GRE tunnels between xtrs (the typical discovery process), and also simplifies or eliminates the configuration of static entries in each IVD device. 4. Conversational learning (on-demand pull model): Using LISP, each secure host (and/or xtr) only requests (i.e., pulls ) communications to the specific host with which it needs to communicate, on demand. This can be thought of as conversational learning in that it only requests specific information (/32 IP address) to talk to a specific host, verses inefficiently pushing routes, even where they are not needed. This creates an EID-to-RLOC cache entry in the sending router (ITR), which will maintain the cache for a period of time while the flow is active. In turn, this eliminates the need for all secure routers (and IVDs depending upon the prefix discovery method chosen) to hold all of the routes for the entire customer routing domain. It also eliminates the need to configure a full or partial mesh of GRE tunnels that require IGP neighbor establishment for route exchange. 5. Reduction of routing table prefix entries in the IVD (assuming the use of IGPs for prefix discovery): Because LISP uses a pull model and the IVD can use IGPs for secure IP prefix discovery, the IVD is no longer required to hold all the prefixes for each subnet in the secure routers on the secure side of the IVD. Instead, the IVD will only require knowledge of the RLOC prefixes, which will be /32 addresses and will equate to the number of secure router interfaces connecting to the secure side of the IVD. In contrast, a standard routing solution would use the push model, in which each secure router at each site would advertise its entire routing table to the IVD, which would then distribute it fully to the other IVDs and give each IVD and secure router an identical copy of the agency-wide routing table and topology. 6. Controlling traffic in multi-homing topologies: For locations running LISP that offer multiple entry points (two IVDs and/or two secure routers), operators have the option to control how the traffic load is sent to the receiving location (ETR) on a per-prefix basis. LISP ETRs have the ability to set a priority/weight on a per-prefix basis to dictate how traffic is sent to them by the originating ITRs. 7. Seamless mobility of host/node/vm: By leveraging the RLOC and EID separation capability inherent within LISP, node/host mobility between xtrs is available to the level that TCP connections can be maintained during the move. In this case, the host with an EID address would move (e.g., a virtual machine mobility requirement) and, while the same EID prefix follows the mobile host, the LISP infrastructure would dynamically discover the new RLOC now associated with the EID host, allowing communications to be seamlessly maintained Cisco and/or its affiliates. All rights reserved.
9 8. IPv6 transition: Another key benefit of LISP is that it has the ability to use IPv6 addresses in the EID space while maintaining IPv4 addresses in the RLOC space, thus allowing the IVDs and the secure transport to remain at IPv4. In an IVD environment, IPv6 transition can begin in the secure router domain (EIDs) without the IVD and/or core transporting the RLOC addresses to also require a simultaneous transition to IPv6. This could be thought of as a 6 over 4 transition mechanism. LISP and Competing Technologies Although this paper highlights the advantages LISP offers in terms of simplifying IVD environments that are deployed in a variety of secure network topologies, it should be noted that LISP has relevant advantages for the secure encrypted traffic (e.g., RLOC addresses) network designs as well. For example, a standard IP transport for the encrypted traffic might have security requirements mandating the need for an additional layer of IPsec encryption for encrypted packets traversing between IVDs. LISP could be deployed on this network for reasons discussed in this paper, but would also provide the ability to leverage technologies such as Group Encrypted Transport (GET) VPN, which would hide (i.e., encrypt) the IVD address space. This would also include hiding the unsecure xtr EID addresses in the encrypted payload. In this scenario, the IVD source address would be an EID address relative to a xtr on the encrypted side of the IVD. Adding GET VPN encryption, the EID address would be encrypted, leaving only the RLOC space intact while transiting the IP transport, adding another level of security to the deployment. In the areas where Layer 3 virtualization (VRFs) is required, there are proven MPLS VPN solutions using dynamic multipoint GRE technology that are tailored specifically to IVD environments. LISP is, however, also targeting virtualization deployment capabilities that will complement Cisco s suite of network virtualization options. LISP is a key emerging technology for IP and is completely open standard. As such, LISP and MPLS VPN over IP feature enhancements and use cases continue to evolve. Cisco will continue to drive these innovations into features and capabilities for secure network communities. Why Cisco Cisco offers innovative products and solutions together with a wide range of services programs to accelerate customer success. These are delivered through a combination of people, processes, tools, and partners, resulting in high levels of customer satisfaction. LISP is Cisco innovation that is being promoted as an open standard. Through its participation in standards bodies such as the IETF LISP Working Group, Cisco is committed to the development of the LISP architecture. For More Information Full details on these IPv6 transition strategies using LISP can be found in an IPv6 transition white paper located on the download page of the LISP website located at lisp.cisco.com. For more information about LISP, including information about the protocol itself, LISP deployment, LISP component descriptions, and LISP interworking, please visit or lisp.cisco.com. For general LISP solution questions, including deployment guidance, contact your local Cisco account representative or send an to [email protected] Cisco and/or its affiliates. All rights reserved.
10 References Glen Nakamoto, Lisa Higgins, Justin Richer: MITRE Corporation, Scalable HAIPE Discovery Using a DNS-Like Referral Model LISP Reference Source LISP Overview Informative References from draft-farinacci-lisp-12 [AFI] IANA, Address Family Indicators (AFIs), ADDRESS FAMILY NUMBERS February [ALT] [APT] [CHIAPPA] [CONS] [DHTs] [GSE] [INTERWORK] [LISA96] [LISP-MS] [LISP1] [LISP2] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, LISP Alternative Topology (LISP-ALT), draft-fuller-lisp-alt-03.txt (work in progress), February Jen, D., Meisel, M., Massey, D., Wang, L., Zhang, B., and L. Zhang, APT: A Practical Transit Mapping Service, draft-jen-apt-01.txt (work in progress), November Chiappa, J., Endpoints and Endpoint Names: A Proposed Enhancement to the Internet Architecture, Internet-Draft Farinacci, D., Fuller, V., and D. Meyer, LISP-CONS: A Content Distribution Overlay Network Service for LISP, draft-meyer-lisp-cons-03.txt (work in progress), November Ratnasamy, S., Shenker, S., and I. Stoica, Routing Algorithms for DHTs: Some Open Questions, PDF file GSE - An Alternate Addressing Architecture for IPv6, draft-ietf-ipngwg-gseaddr-00.txt (work in progress), Lewis, D., Meyer, D., Farinacci, D., and V. Fuller, Interworking LISP with IPv4 and IPv6, draft-lewis-lisp-interworking-01.txt (work in progress), January Lear, E., Katinsky, J., Coffin, J., and D. Tharp, Renumbering: Threat or Menace?, Usenix, September Farinacci, D. and V. Fuller, LISP Map Server, draft-fuller-lisp-ms-00.txt (work in progress), March Farinacci, D., Oran, D., Fuller, V., and J. Schiller, Locator/ID Separation Protocol (LISP1) [Routable ID Version], Slide set October Farinacci, D., Oran, D., Fuller, V., and J. Schiller, Locator/ID Separation Protocol (LISP2) [DNS-based Version], Slide set November 2006.
11 [LISPDHT] Mathy, L., Iannone, L., and O. Bonaventure, LISP-DHT: Towards a DHT to map identifiers onto locators, draft-mathy-lisp-dht-00.txt (work in progress), February [LOC-ID-ARCH] Meyer, D. and D. Lewis, Architectural Implications of Locator/ID Separation, draftmeyer-loc-id-implications-01.txt (work in progress), January [MLISP] [NERD] [OPENLISP] [RADIR] [RFC3344bis] [RFC4192] [RPFV] [RPMD] [SHIM6] Farinacci, D., Meyer, D., Zwiebel, J., and S. Venaas, LISP for Multicast Environments, draft-farinacci-lisp-multicast-01.txt (work in progress), November Lear, E., NERD: A Not-So-Novel EID to RLOC Database, draft-lear-lisp-nerd-04.txt (work in progress), April Iannone, L. and O. Bonaventure, Open LISP Implementation Report, draft-iannone-openlisp-implementation-01.txt (work in progress), July Narten, T., Routing and Addressing Problem Statement, draft-narten-radir-problem-statement-00.txt (work in progress), July Perkins, C., IP Mobility Support for IPv4, revised, draft-ietf-mip4-rfc3344bis-05 (work in progress), July Baker, F., Lear, E., and R. Droms, Procedures for Renumbering an IPv6 Network Without a Flag Day, RFC 4192, September Wijnands, I.J., Boers, A., and E. Rosen, The RPF Vector TLV, draft-ietf-pim-rpf-vector-08.txt (work in progress). Handley, M., Huici, F., and A. Greenhalgh, RPMD: Protocol for Routing Protocol Metadata Dissemination, draft-handley-p2ppush-unpublished txt (work in progress), July Nordmark, E. and M. Bagnulo, Level 3 multi-homing shim protocol, draft-ietf-shim6-proto-06.txt (work in progress), October Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco s trademarks can be found at Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) 9/11
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
Telepresence in an IPv6 World. Simplify the Transition
Telepresence in an IPv6 World Simplify the Transition IPV6 has the potential to transform communications, collaboration, learning, entertainment, physical security and more. What You Will Learn If you
LISP Functional Overview
CHAPTER 2 This document assumes that the reader has prior knowledge of LISP and its network components. For detailed information on LISP components, their roles, operation and configuration, refer to http://www.cisco.com/go/lisp
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Preserve IP Addresses During Data Center Migration
White Paper Preserve IP Addresses During Data Center Migration Configure Cisco Locator/ID Separation Protocol and Cisco ASR 1000 Series Aggregation Services Routers 2015 Cisco and/or its affiliates. All
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems [email protected]
Advanced IPSec with GET VPN Nadhem J. AlFardan Consulting System Engineer Cisco Systems [email protected] 1 Agenda Motivations for GET-enabled IPVPN GET-enabled IPVPN Overview GET Deployment Properties
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
Cisco IP Solution Center MPLS VPN Management 5.0
Cisco IP Solution Center MPLS VPN Management 5.0 As part of the Cisco IP Solution Center (ISC) family of intelligent network management applications, the Cisco ISC MPLS VPN Management application reduces
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
MPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
Scaling the Internet with LISP
Scaling the Internet with LISP Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) Place Sainte-Barbe, 2, B-1348, Louvain-la-Neuve (Belgium) http://inl.info.ucl.ac.be
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
WHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents
WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Sprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
Interconnecting IPv6 Domains Using Tunnels
Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
IPv6 Deployment Strategies
Version History Version Number Date Notes 1 10/15/2001 This document was created. 2 11/13/2001 Update to the explanation of NAT along tunnel paths. 3 03/08/2002 Update to the Related Documents section.
BUY ONLINE AT: http://www.itgovernance.co.uk/products/730
IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology
Simplify Your Route to the Internet:
Expert Reference Series of White Papers Simplify Your Route to the Internet: Three Advantages of Using LISP 1-800-COURSES www.globalknowledge.com Simplify Your Route to the Internet: Three Advantages of
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire
Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,
MPLS over Various IP Tunnels. W. Mark Townsley
MPLS over Various IP Tunnels W. Mark Townsley Generic MPLS over IP Manual, Point to Point Tunnel IP/MPLS Network P Manually Configured Tunnel IP Network P IP/MPLS Network Typically a GRE tunnel, but may
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION
DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION NOVEMBER 2004 1 INTRODUCTION Spoke, Presentation_ID 11/04 2004, Cisco Systems, Inc. All rights reserved. 2 What is Dynamic Multipoint VPN? Dynamic Multipoint
IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2. A Thesis by.
IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2 A Thesis by Prithvi Manduva B.Tech, Progressive Engineering College, JNTU 2008 Submitted to the
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
Stretched Active- Active Application Centric Infrastructure (ACI) Fabric
Stretched Active- Active Application Centric Infrastructure (ACI) Fabric May 12, 2015 Abstract This white paper illustrates how the Cisco Application Centric Infrastructure (ACI) can be implemented as
Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**
Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
IPv6 Fundamentals, Design, and Deployment
IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
APPLICATION NOTE. Benefits of MPLS in the Enterprise Network
APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Connecting Remote Offices by Setting Up VPN Tunnels
Connecting Remote Offices by Setting Up VPN Tunnels Cisco RV0xx Series Routers Overview As your business expands to additional sites, you need to ensure that all employees have access to the network resources
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC
DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
Using LISP for Secure Hybrid Cloud Extension
Using LISP for Secure Hybrid Cloud Extension draft-freitasbellagamba-lisp-hybrid-cloud-use-case-00 Santiago Freitas Patrice Bellagamba Yves Hertoghs IETF 89, London, UK A New Use Case for LISP It s a use
Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing
White Paper Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing What You Will Learn With the exhaustion of IPv4 addresses, businesses and government agencies
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment What You Will Learn Cisco Systems and Akamai Technologies intend to deliver the world s first combined Cisco Intelligent WAN with
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X
QUICK START GUIDE Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X 1 Package Contents 1 Powering On the ASA 2 Connecting Interface Cables and Verifying Connectivity
Cisco Unified Computing. Optimization Service
Improve your unified compute so it remains a competitive resource with the Cisco Unified Computing Optimization Service. Cisco Unified Computing Optimization Service Increase Agility and Performance with
s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]
s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?
Juniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
ENTERPRISE CONNECTIVITY
ENTERPRISE CONNECTIVITY IP Services for Business, Governmental & Non-Governmental Organizations The success of today s organizations and enterprises highly depends on reliable and secure connectivity.
Cloud Computing and the Internet. Conferenza GARR 2010
Cloud Computing and the Internet Conferenza GARR 2010 Cloud Computing The current buzzword ;-) Your computing is in the cloud! Provide computing as a utility Similar to Electricity, Water, Phone service,
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization
Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization Gateway Use Cases for Virtual Networks with MX Series Routers 1 Table of Contents Executive Summary... 3 Introduction...4
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
A Review of IPv6 Multihoming Solutions
A Review of IPv6 Multihoming Solutions Habib Naderi Department of Computer Science University of Auckland Auckland, New Zealand [email protected] Brian E. Carpenter Department of Computer Science
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 [email protected] AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
MITEL. NetSolutions. Flat Rate MPLS VPN
MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations
MPLS VPN Security BRKSEC-2145
MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security
A Review Paper on MPLS VPN Architecture
32 A Review Paper on MPLS VPN Architecture Tejender Singh Rawat 1, Manoj Kumar Pandey 2, *Upendra Kumar 3 1, 2, 3 - Assistant Professor, ECE Department, ASET, Amity University Haryana Abstract A Virtual
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Solutions Guide. Ethernet-based Network Virtualization for the Enterprise
Solutions Guide Ethernet-based Network Virtualization for the Enterprise Introduction The concept of Tunnelling Layer 2 and Layer 3 connections across a shared Layer 2 network used to be the preserve of
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Preparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
