A Review Paper on MPLS VPN Architecture

Size: px
Start display at page:

Download "A Review Paper on MPLS VPN Architecture"

Transcription

1 32 A Review Paper on MPLS VPN Architecture Tejender Singh Rawat 1, Manoj Kumar Pandey 2, *Upendra Kumar 3 1, 2, 3 - Assistant Professor, ECE Department, ASET, Amity University Haryana Abstract A Virtual Private Network (VPN) provides private network connections over a publicly accessible shared network like internet, instead of using leased lines. A number of VPN technologies have been outlined, among which IPSec VPN and SSL VPN are the most commonly used. In this paper we will discuss the integration of Virtual Private Network (VPN) with other technology like MPLS (i.e. Multiprotocol Label Switching). This integration of MPLS with VPN has been receiving much attention from industries and standards bodies as it enables service providers to provide IP services with key benefits like qos, traffic engineering and optimal routing over a shared MPLS backbone. This paper will focus on the integration of providing VPN services in an MPLS environment. 1. Introduction The IP-based VPN technology is rapidly becoming the foundation for the delivery of future Internet services and many service providers are offering value-added applications on top of their VPN transport networks [1]. Using MPLS, the service providers can deliver the IP VPN services that businesses demand across either switched or routed networks [2, 3]. MPLS is the enabling technology that protects today's rapidly growing VPN revenue sources, while paving the way for tomorrow's value added services portfolio [4]. This paper provides an overview of the MPLS VPN technology and compares it with other types of VPN. An implementation of VRF over MPLS using MP-BGP [5] protocol is presented that discusses the key benefits of MPLS-VPN. 2. VPN Structure or Models A virtual private network (VPN) can be defined loosely as a network in which customer connectivity amongs the multiple sites is deployed on a shared infrastructure that utilizes the same security, management, and qos policies that are applied in a private network. VPN services can be offered based on two major paradigms: 1. Overlay VPNs, whereby the service provider furnishes virtual point-to-point links between customer sites. 2. Peer-to-Peer VPNs, whereby the service provider participates in customer routing The overlay model: Tunnel-based VPNs The traditional approach for service providers has been to provide Tunnel-based managed VPN service, by setting up secure, end-to-end connections, often emulating leased lines or virtual circuits, over public networks, according to the overlay model. A tunnel has two end points where the security service is both negotiated and rendered. Tunnels can exist at several protocol layers Layer 2 tunnels. They carry point-to-point data link connections between tunnel endpoints in remote access VPN. Two layer 2 tunneling protocols are commonly used today. The Point to-point Tunnel Protocol (PPTP) [6] provides authenticated and encrypted access from Windows desktops to Microsoft or third-party remote access servers with a double encapsulation of the network layer datagram with PPP and a modified version of generic routing encapsulation (GRE) [7]. The IETF standard Layer 2 Tunneling Protocol (L2TP) [8] also provides authenticated tunneling by creating

2 Layer 2 tunnels across a variety of networks (e.g. IP, ATM). Recently, Cisco has pioneered the new L2TPv3 protocol, based on optimized extensions to L2TP standard that includes signaling enhancements, a new encapsulation header, and a protocol identifier to support the end-to-end transportation of multiple Layer 2 protocols such as ATM and Ethernet Layer 3 tunnels. They provide IP-based virtual connection and in this approach normal IP packets are routed between tunnel endpoints that are separated by any intervening network topology. These facilities are now provided by the IPSec protocol suite. IPSec provides three basic communication necessities: confidentiality, secure communications and authentication and data integrity and between parties. At the core of the IPSec architecture [9] is the concept of security association (SA), specifying security services that should be applied to the traffic. The IKE (Internet Key Exchange) Protocol enables the automatic negotiation of SAs between two IPSec entities. Data security and integrity are provided with many encryption/hashing algorithms (e.g. MD5, SHA1 and 3DES) The peer model: Network-Based VPNs. As said before, the peer model is based on a Layer 3 connectionless architecture offering the advantages of a highly scalable VPN solution in which some or all VPN capabilities are deployed within the service provider's network. A customer site is required to "peer" with only one router located at the service provider's points of presence (POPs), as opposed to all other VPN terminators or customer routers in the same VPN. Actually the most promising approach to peer model VPN is based on the Multi-Protocol Label Switching (MPLS) technology that is rapidly emerging as a core technology for next generation networks, in particular optical networks. MPLS is essentially a hybrid routing and forwarding strategy, streamlining the backbone switching of IP packets between the network (Layer 3) and transport (Layer 2) mainly focused on improving Internet scalability through better Traffic Engineering practices and qos provisioning Layer 3 (or IP-based) MPLS VPNs. It leverages the BGP routing protocol already in use at the edge of ISP networks to propagate MPLS VPN information across the network. In more detail, MPLS is used to forward packets while BGP is used to distribute VPN routes over the backbone. The information about MPLS VPNs can be propagated via BGP on the Internet's backbone routers between different ISPs and Autonomous Systems by encoding customer IPv4 address prefixes into unique VPN-IPv4 NLRIs (Network layer reachability information). In this context, an NLRI is a prefix associated to a VPN route. Furthermore, through the use of the Extended BGP community attribute, the PE routers are able to control the distribution of these routes within the MPLS-VPN domain and between different AS. The interior of an MPLS VPN network is made up of MPLS-aware provider (P) router devices forming the MPLS core that are not directly connect to any VPN terminating router. Provider edge (PE) routers that surround the core devices enable the VPN functions of an MPLS VPN network. MPLS core and PE routers work as label switch routers (LSR) that are devices capable of switching packets based on their MPLS-imposed labels. The VPN-terminating router is referred to as a customer edge router (CE) and thus a VPN consists of a group of CE routers connected to the MPLS backbone PE routers [11]. Only the PE routers are aware of the VPN. The CE routers are not aware of the underlying network and perceive that they are connected via a true private network. Each RFC2547 MPLS VPN is associated with a VPN routing/forwarding instance (VRF). A VRF defines the VPN membership of a customer site attached to a PE router. 33

3 A separate set of routing and forwarding tables is maintained for each VRF preventing information from being forwarded outside a VPN and also preventing packets that are outside a VPN from being forwarded to a router within the VPN. This is the mechanism that allows the VPN traffic to be kept in separate contexts. Within each VPN, there is any-to-any connectivity: each site can send IP packets directly to any other site in the VPN, without having to go through a central site. In an MPLS VPN, the customer sites run ordinary IP. They do not need to run MPLS, IPSec or any other special VPN functions. A route distinguisher (RD) identifies each individual VPN. It is used to prefix the IP addresses involved in the different VPNs giving us a way to tell duplicate private addresses apart, to distinguish them. The RD is configured at the PE router as part of the VPN setup and is not visible to the customer. MPLS-VPN enforces traffic separation between customers because forwarding within the MPLS backbone is based on stacked labels. The MPLS LSPs setup begins and terminates at the PE routers while the CE routers perform normal routing. The incoming interface on the PE is used to determine which forwarding table to use when handling a packet because each incoming interface on a PE router is associated with a particular VPN Layer 2 MPLS VPN. AToM is a framework for encapsulating and transporting Layer 2 frames across the MPLS network, fully supporting Layer 2 services such as ATM VPNs, while aggregating and integrating transport technologies and taking advantage of proven MPLS quality of service (QoS) and scalability. It can transport ATM AAL5, Ethernet, Frame Relay, PPP, and Cisco HDLC packets. Currently, AToM only provides "like-to-like" transfers across the IP/MPLS backbone not allowing any kind of interworking between distinct layer 2 technologies. Actually, the ATOM technology is still under definition/development and not yet matures for performance analysis, so the layer 2 VPN paradigm will not be exploited in our evaluation. 3. VPN performance and scalability Issues The operational challenge of managing many separate highly meshed VPNs has served to highlight the performance and scalability limitations of traditional VPN technology based on the overlay model. For example, with an IPSec fully meshed VPN, each VPN gateway needs to know about every other gateway with which it will communicate. This requires the establishment and management of N-squared tunnels (or links) that are overlaid on top of the service provider network. This creates the operational challenge Classical VPNs strengths and drawbacks: Overlay/Tunnel-based VPNs offer several advantages. Enterprises can take any basic IP transport service and add VPN capabilities external to an ISP s network; the encryption and tunneling operates end-to-end and also is independent of intermediate routers and switches. These kinds of VPNs can thus be used in regions where service providers do not yet offer IP VPN services and, because the enterprise rather than the service provider control VPN access, customers aren t held hostage to slow VPN provisioning policies. And, just as tunnel-based VPNs can span enterprise IP networks, they can also span multiple Internet peering points and operate across multiple interconnected ISPs. This extends their reach to extranet partners who may be served by different service providers. But encrypted-tunnel VPNs also have significant limitations. If an enterprise chooses to provide the tunnels, it also has to assume responsibility for operating the encryption, key management and authentication systems, and ensuring that these systems are configured to match corporate security policies. Encryption can tax the throughput of routers and servers, reducing performance, and tunneling IP packets reduces network efficiency, a 34

4 key concern for anyone using limited-bandwidth, dial modem connections. Moreover, encryption is often incompatible with the network address translation (NAT) between small office/home office locations and ISP networks. The lack of correlation between VPNs and particular paths limits the service providers ability to allocate bandwidth or adjust QOS parameters in switches and routers for a particular VPN. The result is that neither enterprises nor service providers may have control over encrypted tunnel VPN performance. Scalability, as previously stated, is the most significant problem. Tunnel-based VPNs are an overlay type of network in which they ride on top of another networking technology, usually IP. Because of this overlay, a tunnel must be established between every site, which can lead to a very inefficient network. There are two typical layouts we will examine in detail here: a hub-and-spoke and a fully meshed configuration. The hub-and-spoke configuration consists of one central (hub) site connected to many remote (spoke) sites. This is the most practical configuration for a tunnel-based network. The hub site VPN terminating equipment is usually a very expensive one depending on the number of spokes since every spoke establishes a tunnel to the hub site. This model is not optimal for spoke-to-spoke communications. Any packets from one spoke to another spoke must first pass through the hub, requiring the hub to perform its steps to deencapsulate, de-encrypt, determine forwarding path, encrypt and encapsulate for every single packet. The latency will be higher compared to what it would be if the two sites communicated directly. The obvious solution to this would be to create a fully meshed network. However, this type of configuration has many drawbacks, the most critical being scalability. The number of tunnels needed to support a fully meshed encrypted tunnel network geometrically increases with the number of sites. Provisioning can be a problem. A provisioner must configure every tunnel. Configuring a single tunnel is not such a problem, but the time required to bring up a VPN increases dramatically as the size of the network grows. Fully meshed networks are the worst case. Supporting and troubleshooting this type of network could also be difficult for a service provider. Another consideration is about terminating devices. A provider needs to ensure all of them will interoperate properly. The easiest solution is to use the same devices at every location. However this is not always possible. Many times a customer will have a mix of their own devices that they wish to re-use. While interoperability is not as big a problem today, it is still an issue that must be dealt with when using this technology. Security is yet another consideration. Every VPN terminating device must be accessible to the public Internet and relies on encrypted tunnels to securely transmit data between sites. Therefore, every of these devices must have security measures in place, such as a firewall, to protect every location. Every firewall would need to be opened to allow provisionary access to the devices, which in itself can be a security risk. The management of each firewall becomes very difficult as the network grows in size A scalable solution: MPLS VPN. As stated above, when creating a VPN using connectionoriented, point-to-point overlays, such as Frame Relay, or ATM virtual connections (VCs) or tunneling-on-ip techniques, the VPN s key deficiency is scalability. MPLS-based VPNs, instead, are structured according to a pure peer model-based and connectionless architecture to leverage a highly scalable solution. First, according to the peer model, a customer site is required to peer only with one provider edge (PE) router as opposed to all other PE or customer edge (CE) routers that are members of the VPN, eliminating the proliferation of point-to-point customer-terminated tunnels or Virtual Circuits. Furthermore, the other great advantage of MPLS VPNs is that they are inherently connectionless. The Internet owes its success to its basic technology, TCP/IP, built on a packetbased, connectionless network paradigm. This means that no prior action is necessary to establish 35

5 communication between hosts, making it easy for two parties to communicate in a very effective and flexible way. To establish privacy in a connectionless IP environment, classic tunnel-based VPN solutions impose an often complex negotiation/setup procedure on a connection-oriented, point-topoint overlay created on the network. Thus, even if it runs over a connectionless network, a classic VPN cannot take advantage of the ease of connectivity and service flexibility available in connectionless networks. On the other side, when you create a connectionless VPN, you do not need tunnels and encryption to ensure network privacy, thus eliminating significant complexity. Other scalability issues of MPLS VPNs are due to the partitioning of VPN and IGP/EGP specific routes between the provider edge (PE) routers and the provider (P) routers in the network core. In detail, PE routers must maintain VPN specific routes for those VPNs terminated on their interfaces and P routers do not need to maintain any VPN routes but only those necessary for the core IGP/EGP routing activity. This increases the scalability of the provider s core and ensures that no one device become a scalability bottleneck [13]. Another significant technical advantage of MPLS VPNs is that no intelligence is required in the VPN terminating devices, since all of the VPN functions are performed in the core network and are transparent to the customer device, that does not need to be VPN aware or have to support IPSec or other tunneling protocols. This means the customer can use much less expensive devices or even continue using existing devices to terminate VPN. Latency is kept to minimum because packets are not encapsulated or encrypted. Encryption is not required since an MPLS VPN creates an entirely private network connection, ensuring, as asserted before, security levels very similar to those provided by a frame relay or ATM network. From the topological point of view, it is very simple with this technology to create optimally connected fully meshed VPN networks since there are no tunnels or Virtual circuits to set-up. The default configuration is in fact a full mesh. Sites connect directly to a PE and then can reach any other sites in the VPN. So, also in a logical hub-and-spoke VPN architecture, if the hub site should become unreachable, remote spoke sites can still communicate with each other. As part of their VPN service, providers may wish to offer premium services defined by SLAs to expedite traffic from certain customers or applications, controlling the mix of bandwidth, delay, jitter, and packet loss in the network. The key to an effective, network-wide IP QoS plan is scalability. A scalable way to provide higher levels of service quality with minimal loss in granularity is to implement multiple service classes, or classes of service (CoSs). Support for VPN CoS is provided within and between VPNs. CoS is an important requirement for many IP VPN customers. Network traffic is classified and labeled at the edge of the network before aggregation according to QoS policies defined by subscribers and implemented by the provider and transported across the provider core. Provisioning is also much easier in an MPLS VPN network. Provisioning only needs to be done on the backbone network equipment. Access to the customer terminating devices is not required. Once a site has been configured, it does not need to be revisited to add additional sites later. As new sites are added, configuration changes are only done to the PE they connect to. Because MPLS VPNs are connectionless, no specific connection maps or topologies are required. You can add sites to intranets and extranets and form closed user groups. When you manage VPNs in this manner, it enables membership of any given site in multiple VPNs, maximizing flexibility in building intranets and extranets. In addition, to make a VPN service more accessible, customers of a service provider can design their own addressing plan, independent of addressing plans for other service provider customers. MPLS VPNs allow customers to continue to use their address spaces without network address translation (NAT) by providing a public and private view of the address. A NAT is required 36

6 only if two VPNs with overlapping address spaces want to communicate. This enables customers to use their own unregistered private addresses, and communicate freely across a public IP network. Security can be much easier to implement with an MPLS VPNs. MPLS VPN security is accomplished by using a data plane and control plane approach. The data plane protects against a packet from within a MPLS VPN from traveling outside of its VPN boundaries and from packets from outside a MPLS VPN traveling into the boundaries of a MPLS VPN. The service provider will ensure that routers will drop packets that do not belong to MPLS VPN by examining the label of the packet. Control plane security ensures that non trusted peers cannot inject routes into the MPLS VPN. This is accomplished by the use of the MD5 authentication feature of BGP. Control plane security will also ensure that physical security of the routers is maintained to eliminate unauthorized access. From a security perspective, it is important to note that whereas MPLS VPNs provide traffic isolation, similar to ATM or frame relay it does not include a mechanism to provide strict confidentiality through encryption. However, if the layer 2 separation provided by partitioned routers and reserved paths is not considered sufficient for the security requirements of the user and strong encryption is required, IPSec and MPLS can be used together. The RFC 2547 MPLS VPNs describes an approach that uses Tunnel Mode IPSec. 4. Virtual Routing and Forwarding (VRF) The PE routers participate in the routing and IP numbering plans of each directly connected customer, creating Virtual Private Routed Networks (VPRNs). Many of IP numbering plans may overlap (such as the commonly used 10.x.x.x address space). The PE routers need to ensure that traffic destined for Company A's 10.x.x.x network will not be delivered inadvertently to Company B's 10.x.x.x IP network. To do this, the PE routers must maintain separate opaque routing and forwarding tables for each directly connected customer. These routing instances are called VPN Routing and Forwarding tables (VRFs). 5. MPLS VPN Routing PE VPN routing and forwarding tables need to be populated with the correct routing information for the attached VPNs. This routing topology data must be isolated for individual VRFs and cannot be allowed to leak into other VRFs. This separation is accomplished by adding an identifier known as a route distinguisher to traditional IP route advertisements. Route distinguishers are 8-byte blocks that are placed in front of an IPv4 network route advertisement. All VRFs must have unique route distinguishers. A route distinguisher may be represented as 200:50. In this example, 200 is the ASN of the ISP and 50 is the number assigned to that particular VRF. This numbering system ensures that all VRFs will have universally unique identifiers, even if they cross multiple ISPs. The route distinguisher is the mechanism that facilitates the use of overlapping customer IP address spaces; it associates each of these addresses with the correct VRF. Routing updates are accomplished via an extension of the Border Gateway Protocol (BGP). All PE routers communicate with each other via Interior BGP (IBPG) with Multiprotocol extensions. BGP updates are always based on the import and export routing policies configured within each individual router. For a VRF to be instantiated within a PE router, an explicit policy must be in place to accept (import) and propagate (export) the particular route distinguisher associated with that VRF. Route Distinguisher = Type + ASN + Assigned Number VPN-IP Address = Route Distinguisher + IPv4 Address. 37

7 6. MPLS VPN Strengths The following are the primary strengths of MPLS based VPNs. Scalability A well-executed MPLS-based VPN deployment is capable of supporting tens of thousands of VPNs over the same network. MPLS-based VPNs scale well because they do not require the full-mesh, end-to end site peering across the network. Security MPLS provides traffic separation between VPNs by using unique route distinguishers. Route distinguishers are assigned automatically when the VPN is provisioned and are placed in packet headers to provide traffic separation. They are not seen by end users within the VPN group. MPLS VPN privacy is similar to the privacy in traditional WAN infrastructures such as Frame Relay and ATM. Traffic Engineering by deploying traffic engineering in the core, service provider network engineers can implement policies to help ensure optimal traffic distribution and improve overall network utilization. MPLS enables traffic engineering by allowing traffic to be directed through a specific path based on least-cost routing, link utilization, latency, jitter, and other factors. Support for SLAs A well-executed MPLS-based VPN implementation supports SLAs and service-level guarantees (SLGs) by providing scalable, robust QoS mechanisms, guaranteed bandwidth, and traffic engineering capabilities. 7. Conclusion In today s economy where the most important objective for an engineer is to implement the new emerging technologies for transferring the data securely and in a cost effective manner. This venture of new technology i.e. MPLS over the existing technology i.e. VPN provides benefits that service providers need urgently in their networks, such as scalability, manageability and security. MPLS VPN offers many advantages including support for TE, QoS provisioning and scalability enhancements, the requirement of having MPLS support throughout the entire network is limiting its widespread usage. It would be an excellent choice for providing VPN services as it combines the benefits of both Overlay and Peer-to-Peer networks. Furthermore by using MPLS core the Service Provider can make use of other MPLS Features such as Traffic Engineering, Quality of Service and Network Management. 8. References [1] Francesco Palmieri, "Evaluating MPLS VPN against traditional approaches", Eighth IEEE Symposium on Computers and Communications (ISCC'03), June 30, [2] Ahmed Abdelhalim, "IP/MPLS-Based VPNs Layer-3 vs. Layer-2", Foundry Networks, Inc. June [3] Tim Wu, "MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice", Riverstone Networks, [4] Dr. Hosein F. Badran, "Service Provider Networking Infrastructures with MPLS" in Sixth IEEE Symposium on Computers and Communications (ISCC'01) July 05, [5] E. Rosen, Y. Rekhter, "BGP/MPLS VPNs" RFC 2547, March [6] K. Hamzeh, G. Singh Pall, W. Verthein, J. Taarud, W.A. Little: Point-to-Point Tunneling Protocol PPTP, IETF draft: draft-ietf-pppext-pptp-02.txt, [7] S. Hanks, T. Li, D. Farinacci, P. Traina: Generic Routing Encapsulation over IPv4 networks, RFC1702,

8 [8] A. Valencia, K. Hamzeh, A. Rubens, T. Kolar, M. Littlewood, W. M. Townsley, J. Taarud, G. Singh Pall, B. Palter, W. Verthein: Layer Two Tunneling Protocol L2TP, IETF draft: draft-ietfpppext-l2tp-10.txt, [9] S. Kent, R. Atkinson: Security Architecture for the Internet Protocol. IETF draft: draft-ietf-ipsecarch-sec-04.txt, [10] E. Rosen, Y. Rekhter: BGP/MPLS VPNs, RFC 2547, [11] S. Previdi: Introduction to MPLS-BGP-VPN, Proceedings of MPLS Forum 2000, [12] G. Heron, L. Martini: An Architecture for L2VPNs, IETF draft: draft-ietf-ppvpn-12vpn- 00.txt, [13] R. Pulley: Implementing VPNs Using MPLS, Proceedings of MPLS Forum 2000,

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001 The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

For internal circulation of BSNLonly

For internal circulation of BSNLonly E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

What Is a Virtual Private Network?

What Is a Virtual Private Network? C H A P T E R 1 What Is a Virtual Private Network? A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure

More information

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis) MEE09:44 BLEKINGE INSTITUTE OF TECHNOLOGY School of Engineering Department of Telecommunication Systems Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

Exam : 642-889. Implementing Cisco Service Provider Next-Generation Egde Network Services. Title :

Exam : 642-889. Implementing Cisco Service Provider Next-Generation Egde Network Services. Title : Exam : 642-889 Title : Implementing Cisco Service Provider Next-Generation Egde Network Services Version : DEMO 1 / 6 1.Which type of VPN requires a full mesh of virtual circuits to provide optimal site-to-site

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: Kapil.Kumar@relianceinfo.com Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

Part The VPN Overview

Part The VPN Overview VPN1 6/9/03 6:00 PM Page 1 Part 1 The VPN Overview VPN1 6/9/03 6:00 PM Page 2 VPN1 6/9/03 6:00 PM Page 3 Chapter 1 VPN-in-Brief 1.1 VPN Overview This is the information age. We no longer have to commute

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

End-To-End QoS Architecture for VPNs: MPLS VPN Deployment in a Backbone Network

End-To-End QoS Architecture for VPNs: MPLS VPN Deployment in a Backbone Network End-To-End QoS Architecture for s: MPLS Deployment in a Backbone Network Haeryong Lee, Jeongyeon Hwang, Byungryong Kang, Kyoungpyo Jun Electronics and Telecommunications Research Institute E-Mail: hrlee@etri.r&

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks The Ohio State University Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security

More information

Sprint Global MPLS VPN IP Whitepaper

Sprint Global MPLS VPN IP Whitepaper Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized

More information

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding Rissal Efendi STMIK PROVISI Semarang, Indonesia ABSTRACT MPLS is a network management

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

Rolling Out New SSL VPN Service

Rolling Out New SSL VPN Service Rolling Out New SSL VPN Service Introduction Typically, service providers offer infrastructure services, such as site-to-site connectivity and data center hosting. In addition to this, they are always

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S& Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise Managed Services: Taking Advantage of Managed Services in the High-End Enterprise What You Will Learn This document explores the challenges and solutions for high-end enterprises using managed services.

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between

More information

Building Trusted VPNs with Multi-VRF

Building Trusted VPNs with Multi-VRF Building Trusted VPNs with Introduction Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

Introducción n a MPLS y MPLS VPN MPLS VPN

Introducción n a MPLS y MPLS VPN MPLS VPN Introducción n a MPLS y MPLS VPN nemunoz@cisco.com Nelson Muñoz Presentation_ID 200, Cisco Systems, Inc. Agenda Introducción Que es una VPN? IP+ATM Conceptos básicos de MPLS MPLS VPN QoS en MPLS Ventajas

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need

More information

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) How the different Inter-AS and Carrier s Carrier

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network

More information

VPN Technologies A Comparison

VPN Technologies A Comparison VPN Technologies A Comparison Matthew Finlayson, matthewfinlayson@metaswitch.com Jon Harrison, jon.harrison@metaswitch.com Richard Sugarman, richard.sugarman@metaswitch.com First issued February 2003 100

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

Agilent Technologies RouterTester Whitepaper

Agilent Technologies RouterTester Whitepaper Testing MPLS and IP VPNs Agilent Technologies RouterTester Whitepaper Introduction With the tightening economy in the US and rest of the world, the focus of service providers has shifted to exploring new

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,

More information

DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC

DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does

More information

Private IP Overview. Feature Description Benefit to the Customer

Private IP Overview. Feature Description Benefit to the Customer Private IP Overview Private IP is a network-based virtual private network (VPN) enabling customers to effectively communicate over a secure network. It also provides the foundation for automating business

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS WHITE PAPER UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary.............................................................................................

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

BUY ONLINE AT: http://www.itgovernance.co.uk/products/730

BUY ONLINE AT: http://www.itgovernance.co.uk/products/730 IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Security of the MPLS Architecture

Security of the MPLS Architecture WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol

More information

QoS Performance Evaluation in BGP/MPLS VPN

QoS Performance Evaluation in BGP/MPLS VPN 1 QoS Performance Evaluation in BGP/MPLS VPN M. C. Castro, N. A. Nassif and W. C. Borelli 1 Abstract-- The recent exponential growth of the Internet has encouraged more applications, users and services

More information

Frame Relay vs. IP VPNs

Frame Relay vs. IP VPNs Contents: The Case for Frame Relay The Case for IP VPNs Conclusion Frame Relay vs. IP VPNs 2002 Contents: Table of Contents Introduction 2 Definition of Terms 2 Virtual Privacy and 3 the Value of Shared

More information

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN

More information

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core

More information

INTRODUCTION TO L2VPNS

INTRODUCTION TO L2VPNS INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer

More information

MITEL. NetSolutions. Flat Rate MPLS VPN

MITEL. NetSolutions. Flat Rate MPLS VPN MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?

More information

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Reti Private Virtuali - VPN

Reti Private Virtuali - VPN 1 Reti Private Virtuali - VPN Marco Misitano, CISSP Enterprise Conulting, Security misi@cisco.com Ordine degli Ingegneri della Provincia di Milano 2 Agenda Technology introduction Remote Access VPN Site

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Welcome to Today s Seminar!

Welcome to Today s Seminar! Welcome to Today s Seminar! Welcome to this exciting, informative session on Internet VPNs and the QoS Difference Keynote speakers Eric Zines, Sr Market Analyst, TeleChoice Ashley Stephenson, Chairman,

More information

Group Encrypted Transport VPN

Group Encrypted Transport VPN Group Encrypted Transport VPN Petr Růžička petr.ruzicka@cisco.com Cisco Systems Czech Republic V Celnici 10, 117 21 Praha Abstract Today's networked applications, such as voice and video, are accelerating

More information

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically

More information

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs : Computer Networks Lecture 9: Mar 30, 2005 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay

More information

A Resilient Path Management for BGP/MPLS VPN

A Resilient Path Management for BGP/MPLS VPN A Resilient Path Management for BGP/MPLS VPN APNOMS2003 1 Introduction APNOMS2003 2 APNOMS2003 3 BGP/MPLS VPN Configuration MPLS/MP-iBGP VPN 1 VPN 1 VPN 2 VPN 2 BGP/MPLS VPN Overview BGP/MPLS Virtual Private

More information

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Virtual Private Networks Solutions for Secure Remote Access. White Paper Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information

More information

TrustNet Group Encryption

TrustNet Group Encryption TrustNet Group Encryption Executive Summary Protecting data in motion has become a high priority for a growing number of companies. As more companies face the real and growing threat of data theft, along

More information

Introduction to Meg@POP

Introduction to Meg@POP Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple

More information

Junos MPLS and VPNs (JMV)

Junos MPLS and VPNs (JMV) Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites

More information