Advances in BGP BRKRST Gunter Van de Velde Sr. Technical Leader

Size: px
Start display at page:

Download "Advances in BGP BRKRST-3371. Gunter Van de Velde Sr. Technical Leader"

Transcription

1

2 Advances in BGP Gunter Van de Velde Sr. Technical Leader

3 What is BGP? What a Google search bgp abbreviation finds? Source: Border Gateway Protocol Bacterial Growth Potential Battlegroup Becker, Green and Pearson <sensored entry> Bermuda grass pollen Berri Gas Plant beta-glycerophosphate biliary glycoprotein blood group bone gamma-carboxyglutamic acid protei bone gamma-carboxyglutamic acid-contai bone gla protein bone Gla-containing protein Borders Group, Inc. brain-type glycogen phosphorylase Bridge Gateway Protocol Broader Gateway Protocol Bureau de Gestion de Projet Brain Gain Program Without BGP the Internet would not exist in its current stable and simple form It is the plumbing technology of the Internet 3

4 Agenda Motivation to Enhance BGP Scale and Performance Enhancements What happened in BGP Landscape? Some new Cool features that may interest you 4

5 Agenda Motivation to Enhance BGP Scale and Performance Enhancements What happened in BGP Landscape? Some new Cool features that may interest you 5

6 BGP started in 1989 Motivation and Development of BGP: When the Internet grew and moved to an autonomous system (AS) mesh architecture it was needed to have stable, non-chatty and low CPU consuming protocol to connect all of these AS s together. In June 1989, the first version of this new routing protocol was formalized, with the publishing of RFC 1105, A Border Gateway Protocol (BGP). 6

7 Service Provider Routing and Services progress Multimedia, Mobile Internet and Cloud Services will generate massive bandwidth explosion Prefix growth is almost a linear curve Evolution of offered BGP services go from basic technologies to very advanced infrastructures 7

8 Control-plane Evolution Most of services are progressing towards BGP Service/transport Before and future IDR (Peering) BGP BGP (IPv6) SP L3VPN BGP BGP + FRR + Scalability SP Multicast VPN PIM BGP Multicast VPN DDOS mitigation CLI BGP flowspec Network Monitoring SNMP BGP monitoring protocol Security Filters BGP Sec (RPKI), DDoS Mitigation Proximity SP-L3VPN-DC BGP connected app API BGP Inter-AS, VPN4DC Business & CE L2VPN LDP BGP PW Sign (VPLS) DC Interconnect L2VPN BGP MAC Sign (EVPN) MPLS transport LDP BGP+Label (Unified MPLS) Data Center OSPF/ISIS BGP + Multipath Massive Scale DMVPN NHRP / EIGRP BGP + Path Diversity Campus/Ent L3VPN BGP (IOS) BGP (NX-OS) 8

9 Why BGP is so successful? Robustness: Run over TCP Low Overhead protocol: sends an update once and then remains silent Scalability: Path Vector Protocol, allows full mesh High Availability: NSR, PIC, Well Known : Tons of engineers know BGP Simplicity: BGP is simple (even if knobs make BGP BIG and sometimes less trivial to read) Multi-protocol: IPv4, IPv6, L2VPN, L3VPN, Multicast Incremental: easy to extend: NLRI,Path Attribute, Community Flexible: Policy 9

10 Scale & Performance Enhancements BGP Scaling Update Generation Enhancements Update generation is the most important, time-critical task Is now a separate process, to provide more CPU Quantum Parallel Route Refresh Significant delay (up to minutes) seen in advertising incremental updates while RR is servicing route refresh requests or converging newly established peers Refresh and incremental updates run in parrallel Keepalive Enhancements Loosing or delayed keep-alive message result in session flaps Hence keep-alive processing is now placed into a separate process using priority queuing mechanism Adaptive Update Cache Size Instead of using a fixed cache size, the new code dynamically adapts to the address family used, the available router memory and the number of peers in an update group 10

11 Agenda Motivation to Enhance BGP Scale and Performance Enhancements What happened in BGP Landscape? Some new Cool features that may interest you 11

12 Scale & Performance Enhancements PE Scaling PE-CE Optimization In old code slow convergence was experienced with large numbers of CE s Improved by intelligently evaluating VPN prefixes based upon the prefixes in the CE s VRF VRF-Based Advertise Bits Increased memory consumption when number of VRF s was scaled on a PE Smart reuse of advertise bit space for VRF Route Reflector Scaling Selective RIB Download A Route-Reflector needs to receive the full RIB, however not all prefixes MUST be in the Forwarding Information Base (FIB) So, we now allow by using user policy to only download selected prefixes in the FIB More about BGP Performance tuning in BRKRST

13 Slow Peer Management BGP Resiliency/HA Enhancement Issue: Slow peers in update groups block convergence of other update group members by filling message queues/transmitting slowly Persistent network issue affecting all BGP routers Two components to solution Detection Protection Detection BGP update timestamps Peer s TCP connection characteristics 13

14 Slow Peer Management BGP Resiliency/HA Enhancement Protection Move slower peers out of update group Separate slow update group with matching policies created Any slow members are moved to slow update group Detection can be automatic or manual with CLI command Automatic recovery Slow peers are periodically checked for recovery Recovered peers rejoin the main update group Isolation of slow peers unblocks faster peers and lets them converge as fast as possible 14

15 ASR1000 RP2, RP1, ASR1001 and 7200 BGP Route and Session Scalability Comparison - RR 7200 NPE- G2 (2GB) ASR1000 RP1 (4GB) ASR1001 (4GB) ASR1001 (8GB) ASR1001 (16GB) ASR1000 RP2 (8GB) ASR1000 RP2 (16GB) ipv4 routes 4M 7M* 2M* 9M* 17M* 12M* 29M* vpnv4 routes 7M 6M 2M 8M 16M 10M 24M ipv6 routes 2M 5M* 2M* 8M* 15M* 9M* 24M* vpnv6 routes 6M 5M 1.5M 7.5M 14.5M 9M 21M BGP sessions < Tested with BGP selective download feature for ipv4/ipv6 for dedicated RR application. This feature prevents ipv4/ipv6 BGP routes to be installed in RIB and FIB. It reduces memory usage per ipv4/ipv6 prefix and CPU utilization ASR 1000 with RP1 allocates ~1.7GB to IOSd, ASR 1001 with 4GB allocates ~1.4GB to IOSd, whereas on NPE-G2 entire 2G is used by IOS 16

16 ASR 1000 RP1 and RP2 Convergence Performance Comparison - RR for your reference Tested with 1M Total Unique Routes Total Routes Reflected by RR to All Clients (Number of routes x Number of Clients) ASR1000 RP1 (4GB) Convergence (in seconds) ASR1001 (16GB) Convergence (in seconds) ASR1000 RP2 (16GB) Convergence (in seconds) ipv4 (1K RR clients) 1Billion vpnv4 (1K RR clients, 8K RT) 1Billion ipv6 (1K RR clients) 1Billion vpnv6 (1K RR clients, 8K RT) 1Billion ipv4 (2K RR clients) 2 Billion vpnv4 (2K RR clients, 8K RT) 2 Billion ipv6 (2K RR clients) 2 Billion vpnv6 (2K RR clients, 8K RT) 2 Billion Tested with peer groups (1K RR clients per peer group) 7200 NPE-G2 can not converge in the above test cases. ASR1000 RP2 converges about twice faster than 7200 NPE-G2 based on RR customer profile testing CPU utilization below 5% after convergence Link to Isocore report 17

17 Agenda Motivation to Enhance BGP Scale and Performance Enhancements What happened in BGP Landscape? Some new Cool features that may interest you 18

18 What Happened in XR Landscape? RT-Constraint Multi-Instance/Multi-AS Attribute Filtering and Error handling BGP Based DDoS Mitigation Add Path Support Accumulated Interior Gateway Protocol (AIGP) Metric Attribute Unipath PIC for non-vpn addressfamilies (6PE/IPv6/IPv4 Unicast) BGP Accept Own BGP 3107 PIC Update for Global Prefixes Prefix Origin Validation based on RPKI PIC for RIB and FIB DMZ Link Bandwidth for Unequal Cost Recursive Load Balancing Selective VRF Download 6PE/6vPE over L2TPv3 Next-Generation Multicast VPN 19

19 What Happened in IOS Landscape? 15.2(1)S 15.2(2)S 15.2(4)S 15.3(1)S 15.3(2)S Origin AS Validation Gracefull Shutdown ibgp NSR mvpn BGP SAFI 129 NSR without Route-Refresh Additional Path Attribute Filtering and Error Handling Diverse Path Graceful Shutdown IPv6 client for Single hop BFD IPv6 PIC Core and Edge RT Constraint IP Prefix export from a VRF into global Table mvpnv6 Extranet Support Local-AS allow-policy RT/VPN-ID Attribute Rewrite Wildcard VRF Aware Conditional Announcement 20

20 What Happened in XE Landscape? Multicast VPN BGP Dampening Multiple Cluster IDs VPN Distinguisher Attribute IPv6 NSR Local-AS Allow-policy RT or VPN-ID Rewrite Wildcard VRF Aware Conditional Advertisement 21

21 What Happened NXOS Landscape? Prefix Independent Convergence (Core) local-as AS Override (allowas-in) Disable 4-byte AS advertisement MP BGP MPLS VPNs, 6PE, MDT BGP AddPath BGP send community both BGP Neighbor AF weight command BGP med confed and AS multipath-relax BGP next hop self for route reflector Default information originate support Flexible distance manipulation with Inject map Unsupress map as-format command for AS-plain & AS-dot Enhancements for removal of private AS enable route target import-export in default VRF InterAS option B-lite BGP Authentication for Prefix-based neighbors 22

22 Agenda Motivation to Enhance BGP Scale and Performance Enhancements What happened in BGP Landscape? Some new Cool features that may interest you 23

23 PIC Edge Feature Overview Internet Service Providers provide strict SLAs to their Financial and Business VPN customers where they need to offer a sub-second convergence in the case of Core/Edge Link or node failures in their network Prefix Independent Convergence (PIC) has been supported in IOS-XR/IOS for a while for CORE link failures as well as edge node failures BGP Best-External project provides support for advertisement of Best- External path to the ibgp/rr peers when a locally selected bestpath is from an internal peer BGP PIC Unipath provides a capability to install a backup path into the forwarding table to provide prefix independent convergence in case of the PE- CE link failure 24

24 PIC Edge: PE-CE Link Protection BGP Resiliency/HA Enhancement PE1 RR PE3 Primary /24 VPN1 Site #1 CE1 MPLS Cloud Traffic Flow CE /24 VPN1 Site #2 PE2 PE4 Backup PE3 configured as primary, PE4 as backup PE3 preferred over PE4 by local preference CE2 has different RDs in VRFs on PE3 and PE4 PE4: advertise-best-external, to advertise route via PE4-CE2 link PE3: additional-paths install, to install primary and backup path 25

25 PIC Edge: Link Protection BGP Resiliency/HA Enhancement PE1 RR PE3 Primary /24 VPN1 Site #1 CE1 MPLS Cloud Traffic Flow CE /24 VPN1 Site #2 PE2 PE4 Backup PE3 has primary and backup path Primary via directly connected PE3-CE2 link Backup via PE4 best external route What happens when PE3-CE2 link fails? 26

26 PIC Edge: Link Protection BGP Resiliency/HA Enhancement PE1 RR PE3 Primary /24 VPN1 Site #1 CE1 Traffic Flow MPLS Cloud CE /24 VPN1 Site #2 PE2 PE4 Backup CEF (via BFD or link layer mechanism) detects PE3-CE2 link failure CEF immediately swaps to repair path label Traffic shunted to PE4 and across PE4-CE2 link 27

27 PIC Edge: Link Protection BGP Resiliency/HA Enhancement PE1 Traffic Flow RR PE3 Primary /24 VPN1 Site #1 CE1 Withdraw MPLS Cloud route via PE3 CE /24 VPN1 Site #2 PE2 PE4 Backup PE3 withdraws route via PE3-CE2 link Update propagated to remote PE routers 28

28 PIC Edge: Link Protection BGP Resiliency/HA Enhancement Primary PE1 RR PE /24 VPN1 Site #1 CE1 Withdraw MPLS Cloud route via PE3 CE /24 VPN1 Site #2 PE2 Traffic Flow PE4 Backup BGP on remote PEs selects new bestpath New bestpath is via PE4 Traffic flows directly to PE4 instead of via PE3 29

29 PIC Edge: Edge Node Protection BGP Resiliency/HA Enhancement PE1 RR PE3 Primary /24 VPN1 Site #1 CE1 MPLS Cloud Traffic Flow CE /24 VPN1 Site #2 PE2 PE4 Backup PE3 configured as primary, PE4 as backup PE3 preferred over PE4 by local preference CE2 has different RDs in VRFs on PE3 and PE4 PE4: advertise-best-external, to advertise route via PE4-CE2 link PE1: additional-paths install, to install primary and backup path 30

30 PIC Edge: Edge Node Protection BGP Resiliency/HA Enhancement Primary Traffic Flow PE1 RR PE /24 VPN1 Site #1 CE1 MPLS Cloud CE /24 VPN1 Site #2 PE2 PE4 Backup PE1 has primary and backup path Primary via PE3 Backup via PE4 best external route What happens when node PE3 fails? 31

31 PIC Edge: Edge Node Protection BGP Resiliency/HA Enhancement Primary Traffic Flow PE1 RR PE /24 VPN1 Site #1 CE1 MPLS Cloud PE3 s /32 host route removed from IGP CE /24 VPN1 Site #2 PE2 PE4 Backup BGP Resiliency/HA Enhancement 32

32 PIC Edge: Edge Node Protection BGP Resiliency/HA Enhancement Primary Traffic Flow PE1 RR PE /24 VPN1 Site #1 CE1 MPLS Cloud PE3 s /32 host route removed from IGP CE /24 VPN1 Site #2 PE2 PE4 Backup PE1 detects loss of PE3 s /32 host route in IGP CEF immediately swaps forwarding destination label from PE3 to PE4 using backup path BGP on PE1 computes a new bestpath later, choosing PE4 33

33 Enabling BGP PIC Enabling IP Routing Fast Convergence for your reference BGP PIC leverages IGP convergence Make sure IGP converges quickly IOS-XR: IGP Timers pretty-much tuned by default IOS: Sample OSPF config: process-max-time 50 ip routing protocol purge interface interface carrier-delay msec 0 negotiation auto ip ospf network point-to-point bfd interval 100 min_rx 100 mul 3 router ospf 1 ispf timers throttle spf timers throttle lsa all timers lsa arrival 20 timers pacing flood 15 passive-interface Loopback 0 bfd all-interfaces 34

34 Enabling BGP PIC Edge: IOS-XR for your reference Two BGP-PIC Edge Flavors: BGP PIC Edge Multipath and Unipath Multipath: Re-routing router load-balances across multiple next-hops, backup next-hops are actively taking traffic, are active in the routing/forwarding plane, commonly found in active/active redundancy scenarios. No configuration, apart from enabling BGP multipath (maximum-paths... ) Unipath: Backup path(s) are NOT taking traffic, as found in active/standby scenarios route-policy backup! Currently, only a single backup path is supported set path-selection backup 1 install [multipath-protect] [advertise] end-policy router bgp... address-family ipv4 unicast additional-paths selection route-policy backup! address-family vpnv4 unicast additional-paths selection route-policy backup! 35

35 Enabling BGP PIC Edge: IOS for your reference As in IOS-XR, PIC-Edge w/ multipath requires no additional configuration PIC-Edge unipath needs to be enabled explicitly... router bgp... address-family ipv4 [vrf...] or address-family vpnv4 bgp additional-paths install... or implicitly when enabling best external router bgp... address-family ipv4 [vrf...] or address-family vpnv4 bgp advertise-best-external

36 Question: How will my PE s learn about the alternate Paths? By default my RR Only-Reflects the Best-Route Prefix Z Via E0 NH:PE2, P:Z RR NH:PE2, P:Z E0 PE2 Prefix Z Via PE2 Z E0 Prefix Z Via E0 PE3 NH:PE3, P:Z PE1 37

37 Diverse BGP Path Distribution Shadow Session Easy deployment no upgrade of any existing router is required, just new ibgp session per each extra path (CLI knob in RR1) Diverse ibgp session does announce the 2nd best path PE2 NH:PE2, P:Z RR1 NH:PE3, P:Z NH:PE2, P:Z Prefix Z Via PE2 Via PE3 Z PE1 NH:PE3, P:Z PE3 38

38 BGP Add-Path Add-Path will signal diverse paths from 2 to X paths Required all Add-Path receiver BGP router to support Add-Path capability. PE2 NH:PE2, P:Z RR1 NH:PE2, P:Z AP 1 NH:PE3, P:Z AP 2 Prefix Z Via PE2 Via PE3 Z PE1 NH:PE3, P:Z PE3 39

39 BGP Add-path flavors IETF defines 5 flavors of Add-x-Path. 2 are implemented by Cisco: Add-n-path: with add-n-path the route reflector will do best path computation for all paths and send n best to BR/PE. Usecase: Primary + n-1 Backup scenario. (n is maximal for IOS-XR 2 and 3 for IOS). Add-all-path: with add-all-path, the route reflector will do the primary best path computation (only on first path) and then send all path to BR/PE. Usecase: Large DC ECMP load balancing, hot potato routing scenario 40

40 Add-path: selecting second best 1. Select best 2. Simple Remove rule all paths whose next-hop == best s (including best) 3. Run bestpath selection again on the remaining paths to select backup 41

41 Add-Path Configuration IOS-XR for your reference Enable in global address-family mode Enables for all IBGP neighbors Enable/Disable in neighbor mode router bgp 100 address-family ipv4 unicast additional-paths send! address-family vpnv4 unicast additional-paths send! neighbor remote-as 100 address-family ipv4 unicast! address-family vpnv4 unicast!! neighbor remote-as 100 capability additional-paths send disable address-family ipv4 unicast! 43

42 Add-Path Configuration IOS-XR for your reference Enable in global address-family mode Enables for all IBGP neighbors Enable/Disable in neighbor mode router bgp 100 address-family ipv4 unicast additional-paths receive! address-family vpnv4 unicast additional-paths receive! neighbor remote-as 100 address-family ipv4 unicast! address-family vpnv4 unicast!! neighbor remote-as 100 capability additional-paths receive disable address-family ipv4 unicast!!! 44

43 PIC Edge: Test Results BGP Resiliency/HA Enhancement Test Setup Node Failure Link Failure No PIC Edge, No BFD sec 8-17 sec BFD Only sec 6-12 sec PIC Edge Only 8 sec 4 sec PIC Edge, BFD 0 sec 0 sec 47

44 Automated Route Target Filtering BGP Feature Increased VPN service deployment increases load on VPN routers 10% YOY VPN table growth Highly desirable to filter unwanted VPN routes Multiple filtering approaches New RT filter address family Extended community ORF 48

45 Automated Route Target Filtering BGP Feature Derive RT filtering information from VPN RT import lists automatically Exchange filtering info via RT filter AF or extended community ORF Translate filter info received from neighbors into outbound filtering policies Generate incremental updates for received RT update queries Incremental deployment possible/desirable 49

46 Automated Route Target Filtering VRF- Blue RT-Constraint: NLRI= {VRF-Blue, VRF-Red} RT-Constraint: NLRI= {VRF-Green, VRF-Purple} VRF- Green VRF- Red PE-3 RT-Constraint: NLRI= {VRF-Blue, VRF-Red, VRF-Green} PE-1 VRF- Purple VRF- Red RR-1 RR-2 RT-Constraint: NLRI={VRF-Green, VRF-Purple, VRF-Blue} VRF- Purple VRF- Green PE-4 RT-Constraint: NLRI= {VRF-Red, VRF-Green} RT-Constraint: NLRI= {VRF-Purple, VRF-Blue} PE-2 VRF- Blue Improves PE and RR scaling and performance by sending only relevant VPN routes 50

47 IOS XR - Accept own Accept own This feature allows movement from a PE- Based service provisioning model to a centralized router reflector (RR)-based service provisioning model. With this feature, you can define route TO service-vrf mapping within a centralized route reflector and then propagate this information down to all the PE clients of that RR. Without this feature, you would define the route TO service VRF mapping in all PE devices, thereby incurring a high configuration overhead, which could result in more errors. router#configure router(config)#router bgp 100 router(config-bgp)#neighbor router(config-bgp-nbr)#address-family vpnv4 unicast router(config-bgp-nbr-af)#accept-own This feature enables a route reflector to modify the Route Target (RT) list of a VPN route that is distributed by the route reflector, enabling the route reflector to control how a route originated within one VRF is imported into other VRFs. 51

48 Overview AIGP AIGP (Accumulated IGP Metric Attribute for BGP) Optional, non-transitive BGP path attribute BGP attribute to provide BGP a way to make its routing decision based on the IGP metric, to choose the shortest path between two nodes across different AS. The main driving force for this feature is to solve the IGP scale issue seen in some ISP core network. Mainly to be deployed to carry nexthop prefixes/labels across different AS within the same administrative domain. The remote ingress PE select its best path using the modified best path selection process using AIGP metric. 52

49 Overview AIGP Passing AIGP attribute to non-aigp capable neighbors Translate AIGP into cost-community 2 POI of pre-best-path and igp-cost are supported A transitive keyword to make cost-comm transitive to ebgp neighbors Redistribute BGP (with AIGP) into IGP Translate AIGP value into BGP MED Other software components Route installation for BGP to tag AIGP metric during route installation NH notification when AIGP metric changed Update generation throttling is not supported in 4.0 It is highly recommended to deploy BGP best-external and Additional-path in conjunction with the AIGP attribute, to effectively achieve the desired routing policy. 56

50 AIGP: Originating AIGP AIGP is enabled between ibgp neighbors by default AIGP between ebgp neighbors need to be enabled AIGP can be originated by using redistribute ospf, redistribute isis, redistribute static or the BGP network command. AIGP can also be originated using neighbor address-family inbound or outbound policy to set AIGP to be the IGP cost or to a fixed value. route-policy set_aigp_1 if destination in ( /24 le 32) then set aigp-metric 111 elseif destination in (2100::1:0/112, 2100::2:0/112) then set aigp-metric igp-cost Endif end-policy router bgp 1 address-family ipv4 unicast redistribute ospf 1 route-policy set_aigp_1 57

51 What is Multi-Instance BGP? A new IOS-XR BGP architecture to support multiple instances along the lines of OSPF instances Each BGP instance is a separate process running on the same or a different RP/DRP node The BGP instances do not share any prefix table between them No need for a common adj-rib-in (brib) as is the case with distributed BGP The BGP instances do not communicate with each other and do not set up peering with each other Each individual instance can set up peering with another router independently 60

52 What is Multi-AS BGP? It will be possible to configure each instance of a multi-instances BGP with a different AS number Global address families can t be configured under more than one AS except vpnv4 and vpnv6 VPN address-families may be configured under multiple AS instances that do not share any VRFs 61

53 Configuration Example for your reference 63

54 Attribute Filtering and error-handling Attribute filtering Unwanted optional transitive attribute such as ATTR_SET, CONFED segment in AS4_PATH causing outage in some equipments. Prevent unwanted/unknown BGP attributes from hitting legacy equipment Block specific attributes Block a range of non-mandatory attributes Error-handling draft-ietf-idr-optional-transitive-04.txt Punishment should not exceed the crime Gracefully fix or ignore non-severe errors Avoid session resets for most cases Never discard update error, as that can lead to inconsistencies 66

55 Architecture Malformed BGP Updates Invalid Attribute Contents Wrong Attribute Length Transitive Attributes Unknown Attributes Unwanted Attributes Attribute Filtering Error-handling NLRI processing 67

56 Attribute filtering for your reference First level of inbound filtering Filtering is configured as a range of attribute codes and a corresponding action to take (Note: Never Discard Update as that can lead towards inconsistencies) Actions Discard the attribute Treat-as-withdraw Applied when parsing each attribute in the received Update message When a attribute matches the filter, further processing of the attribute is stopped and the corresponding action is taken 68

57 Error-handling for your reference Comes into play after attribute-filtering is applied When we detect one or more malformed attributes or NLRIs or other fields in the Update message Steps Classification of errors Actions to be taken Logging 69

58 BGP Origin Validation Origin Validation for E-BGP routes Next release to cover origin validation for locally sourced routes Support client functionality of RPKI RTR protocol Separate database to store record entries from the cache Support to announce path validation state to IBGP neighbors using a well known path validation state extended community Modified route policies to incorporate path validation states 71

59 Prefix hijacking Announce someone else s prefix Announce a more specific of someone else s prefix Either way, you are trying to steal someone else s traffic by getting it routed to you Capture, sniff, redirect, manipulate traffic as you wish Source: nanog 46 preso 72

60 How does the Solution look like? 73

61 Multicast VPN Solution Space (complete solution is now available) Service IPv4 Native IPv6 Native IPv4 mvpn IPv6 mvpn C-Multicast Signaling PIM PORT BGP Core Tree Signaling PIM (pt-mpt) MLDP (pt-mpt mpt-mpt) P2MP TE (pt-mpt) Encapsulation /Forwarding IP/GRE LSM 77

62 Multicast VPN BGP Signaling BGP Auto-Discovery RR PE3 Source CE1 PIM C-Join (*,G) or (S,G) PE1 BGP BGP C-mroutes PIM C-Join (*,G) or (S,G) CE3 Receiver RP CE2 PE2 PE4 CE4 Receiver BGP customer-multicast signaling and BGP auto-discover is now added to the multicast VPN solution. BGP as overlay allows Service Providers to capitalize on a single protocol Auto-Discovery of PEs and Core tree/tunnel information Advertisement of Customer Multicast routes 78

63 BGP Graceful Shutdown RFC 6198 April 2011 Old Behaviour If session drops then BGP will withdraw all prefixes learned over that session BGP has no mechanism to signal prefix will soon be unreachable (for maintenance for example) Historically RR s have worsened the issue as they tend to hide the alternate path as they only forward the best path 1 BGP Graceful Shutdown allows to do maintenance on router without service disruption. #Graceful Shutdown Please wait 2 BGP/ Prefix / localpref : 10 This new knob allows a router to notify neighbor to redirect traffic to other paths and after some time will drop BGP sessions. 3 Traffic is redirected The notification could be done using Local Preference attribute or user community attribute 79

64 Graceful Shutdown GSHUT well-known community The GSHUT community attribute is applied to a neighbor specified by the neighbor shutdown graceful command, thereby gracefully shutting down the link in an expected number of seconds The GSHUT community is specified in a community list, which is referenced by a route map and then used to make policy routing decisions. neighbor {ipv4-address ipv6-address peer-group-name} shutdown graceful seconds {community value [local-preference value] local-preference value} 80

65 DDoS Mitigation a stepstone approach Phase III Dynamic application aware redirection and traffic handling IOS-XR IOS-XE Phase II Malicious traffic mitigation Cleaning of Malicious traffic Dirty and clean traffic handling Usage of Multi-instance BGP IOS-XR IOS-XE partial Phase I ACL RTBH PBR urpf 81

66 DDoS Overview Distributed denial-of-service (DDoS) attacks target network infrastructures or computer services by sending overwhelming number of service requests to the server from many sources. Server resources are used up in serving the fake requests resulting in denial or degradation of legitimate service requests to be served Addressing DDoS attacks Detection Detect incoming fake requests Mitigation Diversion Send traffic to a specialized device that removes the fake packets from the traffic stream while retaining the legitimate packets Return Send back the clean traffic to the server 82

67 DDOS impact on Customer Business 83

68 DDoS mitigation architecture 1. Detection (no DDoS) Scan Netflow data to detect DDOS attacks Security Server DDOS Analyser Sample Netflow DDOS scrubber 86

69 DDoS mitigation architecture 2. Detection (DDOS) Scan Netflow data Find DDOS signature Security Server DDOS Analyser Sample Netflow DDOS scrubber 87

70 DDoS mitigation architecture 3. Redirect traffic to DDOS scruber Scan Netflow data Find DDoS signature Security Server DDoS Analyser BGP DDoS Mitigation Action: redirect to DDoS scrubber DDoS scrubber 88

71 DDoS Mitigation: Architecture Considerations Normal traffic flow when there is no attack Redirect traffic from any edge PE to any specific DDoS scrubber Including the PE that is connected to the host network Granular (prefix level/network) diversion Customers buy DDoS mitigation service for some prefixes Pre-provisioned DDoS service for those prefixes (using policy such as standard community flag) Centralized controller that injects the diversion route VPN based Labeled return path for the clean traffic To prevent routing loops Solution support redirection of BGP less/more specific prefixes or local originated prefixes (static route, redistributed route) Support for multi-homed customers During attack, send clean traffic from DDOS scrubber to multiple PE s 89

72 The concept Traffic under normal conditions Server Scrubber Traffic under normalized conditions Traffic takes shortest path Upstream and downstream traffic follow traditional routing PE2 ISP PE1 PE3 Security analyser Security server Pre-provisioned DDoS instrumentation Traffic Scrubber Separate clean and malicious traffic Security Analyser Analyses Netflow/IPFIX statistics from the traffic flows Security server Actions upon traffic analysis by communication to infrastructure routers Internet users 90

73 BGP based DDoS Traffic under DDoS condition Server PE2 Scrubber Traffic under DDoS condition Traffic is redirected to a scrubber Scrubber separates the clean from the malicious traffic Clean traffic is returned to original destination server PE3 Security analyser Security server ISP PE1 Goal Do not drop all traffic Collect traffic intelligence Operational simplicity Easy to remove redirect when traffic normalizes Internet users 91

74 How does it work? Normal traffic condition Server /32 Internet and VPN Route-Reflector PE PE3 Scrubber All PE s peer with the RR All PE s exchange both Global Internet and VPN prefixes All PE interfaces are non-vpn Security analyser is performing doing analyses ISP PE1 Security analyser Security server Destination Next-hop / Internet users 92

75 How does it work? Server is under DDoS Server Internet and VPN Route-Reflector PE Scrubber Flow is detected as dirty by Security analyser Result: Server is under attack Traffic needs to be redirected to the scrubber to mitigate the attack /32 PE3 ISP PE1 Security analyser Security server Destination Next-hop / Internet users 93

76 How does it work? Server is under DDoS Server Internet and VPN Route-Reflector PE DDoS Route-Reflector Scrubber Destination Next-hop / /32 Internet users ISP PE1 PE3 Security server DDoS Route-Reflector was previsioned Mitigation route to /32 is injected on the DDoS RR by the Security server Mitigation route to /32 is pointing to on DDoS mitigation RR 94

77 How does it work? Destination Next-hop Server is under DDoS / Server /32 Internet and VPN Route-Reflector PE2 ISP PE1 DDoS Route-Reflector PE3 Security server Scrubber BGP Table Mitigation route to /32 is pointing to is signalled to all PE s All PE s receive the mitigation route from the DDoS Mitigation RR Each PE will now have 2 routes to reach /32 Which route will the PE use? Routing Table Destination Next-hop Destination Next-hop / /32???????????? Internet users /

78 How does it work? Server is under DDoS Server /32 Internet and VPN Route-Reflector PE DDoS Route-Reflector PE3 Scrubber Trick # 1 The DDoS mitigation route will ALWAYS be preferred, even if Both prefix lengths are the same DDoS prefix is shorter Original prefix has better administrative distance ISP PE1 Security server BGP Table Routing Table Destination Next-hop Destination Next-hop / / Internet users /

79 How does it work? Server is under DDoS Server /32 Internet and VPN Route-Reflector PE DDoS Route-Reflector PE3 Clean traffic Scrubber The mitigated traffic flows towards PE3 ( ) PE3 is sending the dirty flow towards the scrubber The scrubber will Handle and remove the dirty traffic within the original flow Send the cleaned traffic towards the original destination ( at PE2 ( )) ISP PE1 BGP Table Routing Table Destination Next-hop Destination Next-hop Internet users / / /

80 How does it work? Server is under DDoS Server /32 Internet and VPN Route-Reflector PE DDoS Route-Reflector PE3 Clean traffic Scrubber Problem Scrubber sends traffic to PE3 PE3 does routing lookup for and finds that it is directly attached ROUTING LOOP!!! How do we fix this? We use a new isolated routing table for the clean traffic This routing table is Preprovisioned Inside a VPN ISP PE1 BGP Table Routing Table Destination Next-hop Destination Next-hop Internet users / / /

81 How does it work? Server is under DDoS Server PE / PE3 Scrubber The clean traffic will be injected upon PE3 on an interface member of VPN Clean PE3 will now do a routing destination lookup for in VPN Clean The matching routing table entry is pointing towards PE2 at The clean flow, which is now part of VPN Clean is sent towards PE2 reachable at ISP PE1 BGP Table Routing Table Destination Next-hop Destination Next-hop VPN Internet users VPN Clean / / / Global / Clean 99

82 How does it work? Server is under DDoS Server PE2 CE /32 Routing Table PE2 receives the clean flow Destination Next-hop VPN / Global /32 CE1 Clean PE3 Scrubber within VPN clean PE2 does a destination address routing lookup in VPN clean A matching route is found in VPN clean Flow is forwarded towards CE1 onwards to Server Internet users ISP PE1 HOLD on a minute! PE2 does not have any interface part of VPN clean All interfaces on PE2 are global interfaces so how did that clean route for get into VPN clean? 100

83 How does it work? BGP Table Destination Nexthop VPN /32 CE1 Global Routing Table Destination Next-hop VPN / Global / Global /32 CE1 Clean CE1 clean Internet users Server PE2 CE1 PE /32 ISP PE1 Scrubber Trick # 2 Copy the locally BGP inserted route directly into VPN clean BGP table Neighbour details are inherited from the global table (i.e.) Outgoing interface Next-hop Interface pointing towards CE1 is NOT VPN aware This VPN clean distributed as normal VPN New CLI command to do that import from default-vrf route-policy ddos advertise-as-vpn 101

84 Going back to traditional traffic flow Server is under DDoS Destination Next-hop Internet and VPN Route-Reflector DDoS Route-Reflector / Server / ISP PE Security server Scrubber Remove the routing entry on the Mitigation DDoS RR No more route is remaining on the DDoS Mitigation RR Traffic flows normally again Internet users 102

85 Configuration (1) router bgp 99 instance ddos bgp router-id bgp read-only bgp install diversion address-family ipv4 unicast! router bgp 99 bgp router-id address-family ipv4 unicast! Creation of DDoS BGP instance Allows config of 2th IPv4 or IPv6 instance Suppresses BGP Update Generation Triggers BGP ddos instance to install diversion path to RIB, so that the paths are pushed down to FIB 103

86 Configuration (2) Importing the global route s in the clean VRF vrf clean address-family ipv4 unicast import from default-vrf route-policy ddos advertise-as-vpn export route-target 111:1!! address-family ipv6 unicast import from default-vrf route-policy ddos advertise-as-vpn export route-target 111:1!!! 104

87 109

88 Complete Your Online Session Evaluation Give us your feedback and you could win fabulous prizes. Winners announced daily. Receive 20 Cisco Daily Challenge points for each session evaluation you complete. Complete your session evaluation online now through either the mobile app or internet kiosk stations. Maximize your Cisco Live experience with your free Cisco Live 365 account. Download session PDFs, view sessions on-demand and participate in live activities throughout the year. Click the Enter Cisco Live 365 button in your Cisco Live portal to log in. 110

89

Advances in BGP BRKRST-3371. Oliver Boehmer AS Solutions Architect

Advances in BGP BRKRST-3371. Oliver Boehmer AS Solutions Architect Advances in BGP Oliver Boehmer AS Solutions Architect What is BGP? What a Google search bgp abbreviation finds Source: http://www.all-acronyms.com/bgp Border Gateway Protocol Bacterial Growth Potential

More information

BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May 2013. 2012 Cisco and/or its affiliates. All rights reserved.

BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May 2013. 2012 Cisco and/or its affiliates. All rights reserved. BGP DDoS Mitigation Gunter Van de Velde Sr Technical Leader NOSTG, Cisco Systems May 2013 2012 Cisco and/or its affiliates. All rights reserved. 1 A simple DDoS mitigation mechanism explained Bertrand

More information

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543) BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE

More information

Introduction Inter-AS L3VPN

Introduction Inter-AS L3VPN Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back

More information

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This

More information

Deploying BGP Fast Convergence / BGP PIC

Deploying BGP Fast Convergence / BGP PIC Deploying BGP Fast Convergence / BGP PIC Oliver Böhmer V2.1 Housekeeping We value your feedback- don't forget to complete your online session evaluations after each session & the Overall Conference Evaluation

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01.

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01. MPLS Cisco MPLS MPLS Introduction The most up-to-date version of this test is at: http://networksims.com/i01.html Cisco Router Challenge 227 Outline This challenge involves basic frame-mode MPLS configuration.

More information

MPLS VPN Route Target Rewrite

MPLS VPN Route Target Rewrite The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets

More information

Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,

More information

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint

More information

Implementing MPLS VPNs over IP Tunnels

Implementing MPLS VPNs over IP Tunnels Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint tunneling instead

More information

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Configuring MPLS Hub-and-Spoke Layer 3 VPNs CHAPTER 23 This chapter describes how to configure a hub-and-spoke topology for Multiprotocol Layer Switching (MPLS) Layer 3 virtual private networks (VPNs) on Cisco NX-OS devices. This chapter includes

More information

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track** Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

How To Make A Network Secure

How To Make A Network Secure 1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance

More information

BGP Best Path Selection Algorithm

BGP Best Path Selection Algorithm BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP

More information

MPLS VPN Implementation

MPLS VPN Implementation MPLS VPN Implementation Overview Virtual Routing and Forwarding Table VPN-Aware Routing Protocols VRF Configuration Tasks Configuring BGP Address families Configuring BGP Neighbors Configuring MP-BGP Monitoring

More information

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

IMPLEMENTING CISCO MPLS V3.0 (MPLS) IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: 112085. Requirements

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: 112085. Requirements IPv6 over MPLS VPN Document ID: 112085 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram VRF Configuration Multiprotocol BGP (MP BGP) Configuration

More information

Expert Reference Series of White Papers. Cisco Service Provider Next Generation Networks

Expert Reference Series of White Papers. Cisco Service Provider Next Generation Networks Expert Reference Series of White Papers Cisco Service Provider Next Generation Networks 1-800-COURSES www.globalknowledge.com Cisco Service Provider Next Generation Networks Johnny Bass, Senior Global

More information

BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth

BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth The Border Gateway Protocol (BGP) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for links between directly

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network. Where MPLS part I explains the basics of labeling packets, it s not giving any advantage over normal routing, apart from faster table lookups. But extensions to MPLS allow for more. In this article I ll

More information

Table of Contents. Cisco Configuring a Basic MPLS VPN

Table of Contents. Cisco Configuring a Basic MPLS VPN Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration

More information

BGP Attributes and Path Selection

BGP Attributes and Path Selection BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes

More information

How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv

How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv BGP Support for IP Prefix Import from Global Table into a VRF Table The BGP Support for IP Prefix Import from Global Table into a VRF Table feature introduces the capability to import IPv4 unicast prefixes

More information

How To Understand Bg

How To Understand Bg Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

BGP Link Bandwidth. Finding Feature Information. Contents

BGP Link Bandwidth. Finding Feature Information. Contents The BGP (Border Gateway Protocol) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for links between directly

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

For internal circulation of BSNLonly

For internal circulation of BSNLonly E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based

More information

Using the Border Gateway Protocol for Interdomain Routing

Using the Border Gateway Protocol for Interdomain Routing CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Expert Reference Series of White Papers. Cisco Service Provider Next Generation Networks

Expert Reference Series of White Papers. Cisco Service Provider Next Generation Networks Expert Reference Series of White Papers Cisco Service Provider Next Generation Networks 1-800-COURSES www.globalknowledge.com Cisco Service Provider Next Generation Networks Johnny Bass - Senior Global

More information

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0 erou03_v1.0 APNIC elearning: BGP Basics Contact: training@apnic.net Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes

More information

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved. 1 Session Number BGP Feature Update 12.0S July 2003 Mike Pennington mpenning@cisco.com Cisco Systems - Denver, CO 2 Overview Overview Definition of Terms BGP Convergence optimization Issues w/ Static peer-groups

More information

Why Is MPLS VPN Security Important?

Why Is MPLS VPN Security Important? MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS WHITE PAPER UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary.............................................................................................

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

BGP: Frequently Asked Questions

BGP: Frequently Asked Questions BGP: Frequently Asked Questions Document ID: 5816 Contents Introduction How do I configure BGP? How do I configure BGP with the use of a loopback address? What is the order of preference of attributes

More information

BGP - Optimising the Foundational SDN Technology

BGP - Optimising the Foundational SDN Technology BGP - Optimising the Foundational SDN Technology Gunter Van de Velde Sr Technical Leader 11 June 2014 Agenda Some words about SDN BGP-Assisted SDN Use-case 1. WAN Orchestration BGP-LS 2. Flow Steering/Security

More information

MPLS VPN Security BRKSEC-2145

MPLS VPN Security BRKSEC-2145 MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security

More information

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations

More information

APNIC elearning: BGP Attributes

APNIC elearning: BGP Attributes APNIC elearning: BGP Attributes Contact: training@apnic.net erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice

More information

BGP Terminology, Concepts, and Operation. Chapter 6 2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public

BGP Terminology, Concepts, and Operation. Chapter 6 2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public BGP Terminology, Concepts, and Operation 1 IGP versus EGP Interior gateway protocol (IGP) A routing protocol operating within an Autonomous System (AS). RIP, OSPF, and EIGRP are IGPs. Exterior gateway

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

Understanding Virtual Router and Virtual Systems

Understanding Virtual Router and Virtual Systems Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT

More information

Cisco 642-889. Implementing Cisco Service Provider Next-Generation Egde Network Services. Version: 4.1

Cisco 642-889. Implementing Cisco Service Provider Next-Generation Egde Network Services. Version: 4.1 Cisco 642-889 Implementing Cisco Service Provider Next-Generation Egde Network Services Version: 4.1 QUESTION NO: 1 Cisco 642-889 Exam Which type of VPN requires a full mesh of virtual circuits to provide

More information

Exam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: 642-691 Total Questions: 401

Exam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: 642-691 Total Questions: 401 Question: 1 Every time a flap occurs on a route, the route receives A. 750 per-flap penalty points which are user configurable B. 1500 per-flap penalty points which are user configurable C. 200 per-flap

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN MPLS VPN Peer to Peer VPN s Agenda MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) CE-PE OSPF Routing CE-PE Static Routing CE-PE RIP Routing

More information

BGP Multipath Load Sharing for Both ebgp and ibgp in an MPLS-VPN

BGP Multipath Load Sharing for Both ebgp and ibgp in an MPLS-VPN BGP Multipath Load Sharing for Both ebgp and ibgp in an MPLS-VPN The BGP Multipath Load Sharing for ebgp and ibgp feature allows you to configure multipath load balancing with both external BGP (ebgp)

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two

More information

Versatile Routing and Services with BGP. Understanding and Implementing BGP in SR-OS

Versatile Routing and Services with BGP. Understanding and Implementing BGP in SR-OS Brochure More information from http://www.researchandmarkets.com/reports/2720838/ Versatile Routing and Services with BGP. Understanding and Implementing BGP in SR-OS Description: Design a robust BGP control

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

BGP Advanced Features and Enhancements

BGP Advanced Features and Enhancements BGP Advanced Features and Enhancements George Wu TCOM610 Conditional Route Injection Network: originate route into BGP if there is corresponding routes in IP routing table Aggregate-address: inject route

More information

How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2

How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2 61200860L1-29.4E March 2012 Configuration Guide Configuring Border Gateway Protocol in AOS for Releases Prior to 18.03.00/R10.1.0 This guide only addresses BGP in AOS data products using AOS firmware prior

More information

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 alastair.johnson@alcatel-lucent.com AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN

More information

Frame Mode MPLS Implementation

Frame Mode MPLS Implementation CHAPTER 4 Frame Mode MPLS Implementation Lab 4-1: Configuring Frame Mode MPLS (4.5.1) In this lab, you learn how to do the following: Configure EIGRP on a router. Configure LDP on a router. Change the

More information

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds

More information

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions Luyuan Fang ATT MPLSCon 2005, NYC The world s networking company SM Outline Overview of the L3 VPN deployment VoIP over MPLS VPN MPLS

More information

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T.

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T. BGP Link Bandwidth The Border Gateway Protocol (BGP) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

Multihomed BGP Configurations

Multihomed BGP Configurations Multihomed BGP Configurations lvaro Retana Cisco IOS Deployment and Scalability 1 genda General Considerations Multihomed Networks Best Current Practices 2 The Basics General Considerations 3 General Considerations

More information

BGP Support for Next-Hop Address Tracking

BGP Support for Next-Hop Address Tracking The feature is enabled by default when a supporting Cisco software image is installed. BGP next-hop address tracking is event driven. BGP prefixes are automatically tracked as peering sessions are established.

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001 The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion

More information

GregSowell.com. Mikrotik Routing

GregSowell.com. Mikrotik Routing Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this

More information

BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel

BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel BUILDING MPLS-BASED MULTICAST VPN SOLUTION DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel Agenda Multicast VPN (mvpn) Overview L3VPN Multicast Solution using PIM/GRE (Draft-Rosen) MPLS Multicast Building

More information

MPLS VPN Security Best Practice Guidelines

MPLS VPN Security Best Practice Guidelines Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. mmorrow@cisco.com mbehring@cisco.com

More information

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013 Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing

More information

Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution

Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu (xuxh@huawei.com) IETF82, TAIWAN Why VM Mobility across Data Centers Data center maintenance Applications

More information

Understanding Route Redistribution & Filtering

Understanding Route Redistribution & Filtering Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes

More information

Advanced BGP Policy. Advanced Topics

Advanced BGP Policy. Advanced Topics Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections

More information

Routing Protocol - BGP

Routing Protocol - BGP Routing Protocol - BGP BGP Enterprise Network BGP ISP AS 3000 AS 2000 BGP is using between Autonomous Systems BGP(cont.) RFC 1771(BGPv4) Support CIDR Transfer the AS information to reach destination Using

More information

Interdomain Routing. Outline

Interdomain Routing. Outline Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

Configuring a Basic MPLS VPN

Configuring a Basic MPLS VPN Configuring a Basic MPLS VPN Help us help you. Please rate this document. Contents Introduction Conventions Hardware and Software Versions Network Diagram Configuration Procedures Enabling Configuring

More information

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) How the different Inter-AS and Carrier s Carrier

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?

More information

Lab 4.2 Challenge Lab: Implementing MPLS VPNs

Lab 4.2 Challenge Lab: Implementing MPLS VPNs Lab 4.2 Challenge Lab: Implementing MPLS VPNs Learning Objectives Configure Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) on a router Enable MPLS on a router Verify

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

l.cittadini, m.cola, g.di battista

l.cittadini, m.cola, g.di battista MPLS VPN l.cittadini, m.cola, g.di battista motivations customer s problem a customer (e.g., private company, public administration, etc.) has several geographically distributed sites and would like to

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

Inter-Autonomous Systems for MPLS VPNs

Inter-Autonomous Systems for MPLS VPNs Inter-Autonomous Systems for MPLS VPNs This feature module explains how to provide MPLS VPN services that can span several autonomous systems (ASs) and VPN service providers. History of the Inter-Autonomous

More information

Load balancing and traffic control in BGP

Load balancing and traffic control in BGP DD2491 p2 2011 Load balancing and traffic control in BGP Olof Hagsand KTH CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better Can

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information