Quidway MPLS VPN Solution for Financial Networks
|
|
|
- Ethan Phillips
- 10 years ago
- Views:
Transcription
1 Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional services from a proprietary system to the computer network not only brings better flexibility and compatibility but also greatly extends the service scale, improves the Quality of Service (QoS) and saves the operation cost. Meanwhile, the centralization of network resources brings some new problems, for example, how to logically isolate different service systems over the same network and to implement different services. With the centralization of the financial system networks, the transverse centralization of the network services and the longitudinal centralization of the network architectures become deeper and deeper necessarily. It is more and more urgent to physically unite the service networks but logically isolate them securely. How to efficiently, securely and economically build a new generation financial network on a uniform platform is the common problem faced by financial users, network solution providers and network equipment suppliers. Huawei-3Com is dedicated to providing user-oriented, tailorable, expandable, highly-efficient, simple-to-implement professional financial network solutions. The integrated VPN solution of the network product platform MPLS (based on Quidway series products) and IPSEC technology is one of these solutions. MPLS VPN technology overview Multiprotocol Label Switching (MPLS) is initially designed for improving the forwarding speed of routers. However, the MPLS plays an important role in two core technologies of the current IP network, traffic engineering and VPN. It becomes an important standard of expanding the scale of IP networks. The key pf MPLS is to introduce the concept of label switching. Label is a short, easy-to-process, partial information content without topology information. The MPLS VPN technology based on BGP4 is a carrier-class VPN technology. It shows powerful expandability and high performance on a mesh network and an IP network bearing multiple VPNs independent of each other. The MPLS-based VPN must implement the following functions: Label Distribution Protocol (LDP), which is the signaling protocol of MPLS and is used to manage and allocate labels; MPLS forwarding module, which switches
2 between layer 2 and layer 3 according to the label on packets and local mapping table; MBGP and BGP expansion, which transfers VPN routes and bears contents such as VPN properties, QoS information and labels; VPN expansion of route management, which sets up multiple routing tables for supporting VPN routing. It is necessary to introduce three concepts to the MPLS VPN network: - Custom Edge (CE): It is the edge device at a user site directly connected with the service provider device, which is usually a router, or a switch or a host. - Provider Edge (PE): It is an edge device in the backbone network, directly connected with the CE of user. - Provider Router (P router): It is a device in the backbone network, not directly connected with CE. In a carrier's network, the structure of the MPLS VPN network is set up by the service provider. In such a network structure, the service provider provides the users with VPN services. The users cannot feel the existence of the public network and feel like owning independent network resources. Alike, the users of the MPLS VPN services on the financial enterprise network cannot feel the existence of the large network. Also, the P router on the backbone network, the router not directly connected with CE, does not know the existence of the VPN, so it is only responsible for transmitting data within the backbone network. All operations of VPN construction, connection and management are performed on a PE. A PE is located on the edge of the network provided by the service provider. From the aspect of a PE, a connected IP system of users is a site, and each site is connected with the PE through a CE. A site is a basic unit of VPN. One VPN consists of several sites, and one site can belong to different VPNs. Two sites on the same VPN are connected with each other through the public network provided by a service provider. The privacy and security of VPN data transmitted on the public network must be guaranteed. That is, packets from a site only can be sent to a site on the same VPN, instead of sites of other VPNs. Moreover, any two VPNs without the same site can use overlapped address space, that is, use the independent address space on the private network of the user, without considering address space conflict with that of other VPNs or public networks. This is one reason why MPLS VPN suits multi-service, multi-user networks. MPLS/BGP VPN characteristics The MPLS/BGP VPN solution of Huawei-3Com provides the financial networks with VPNs which are based on network, easy-to-manage, secure, and with good expandability and QoS guarantee, and can be connected between any nodes.
3 1) Network-based and easy-to-manage: This network-based VPN can be implemented by the backbone network completely. The VPN management of different service users can be entrusted to the backbone network management organization. In this case, the end users cannot feel the integration of the service network with other service networks, and feel like using a physically independent network. They need not learn the construction and connection of the VPN, which are built on the network by the backbone network management organization. The MPLS VPN can greatly reduce the investment of the network operators and users and particularly suits the case that financial enterprise users centralize multi-service networks to implement Intranet and Extranet. 2) Good expandability: Since it is based on MPLS/BGP, it is easy to expand the network nodes and the network has good tailorability. 3) Reliable security: On the basis of MPLS/BGP, packets in the MPLS domain composed of network nodes are switched in the label-forwarding mode (LSP). Therefore, it has the same security level as ATM/FR virtual circuits. 4) QoS: On the basis of MPLS/BGP, it can adopt the particular mechanisms of the MPLS technology, such as CoS, RSVP and traffic engineering, thus implementing VPNs with QoS guarantee. MPLS/BGP VPN implementation Quidway MPLS adopts the virtual routing table method to make several VPN routing tables on a router. Each VPN corresponds to one or several VPN routing/forwarding instances (VRFs). VRF defines the membership of the VPN (a site) connected to PE. One VRF has one IP routing table, one FIB (Forwarding Information Table), relevant ports, and rules and parameters for controlling routing. The routing and switching of data packet are controlled by the VRF routing table and FIB table. Each VPN corresponds to one routing table and one FIB table. A PE router can obtain a route prefixed with an IP address from a CE through a static route, RIP or BGP. The prefix is a standard IPv4 prefix. Then, the PE converts it into a VPN-IPv4 prefix by adding an 8-byte Route Distinguisher (RD). This makes the user address unique. That is, what the user uses is the reserved address specified by IANA. The RD for generating the VPN-IPv4 prefix is specified by the VRF configuration command of the PE router. MBGP transfers Network Layer Reachability Information (NLRI) for each VPN-IPv4 prefix of the VPN. The communication between Border Gateway Protocol (BGP) entities is performed in the interior BGP (ibgp) within an AS
4 and in the external BGP (EBGP) between ASs. The ibgp is between PE and PE/RR (Route Reflector), and the EBGP is between PE and CE. BGP transfers the routing reachability information of VPN-IPv4 through Multiprotocol Extensions for BGP-4, which defines that a BGP peer can obtain BGP routing only from other VPN peers. IP packets are switched to the destination address through the MPLS label. The routing is based on the VRF routing table and FIB table. The PE router generates a label for each prefix learned from the CE router. This label will be transferred as a BGP Communities property and attached to the BGP update. When a source PE router obtains an IP packet from the CE router, it will send out this IP packet with the label learned from the destination PE router. After the destination PE router obtains the labeled IP packet, it will remove the label from the IP packet and send the IP packet to the CE router. Transferring the labeled IP packet on the backbone part is based on label switching or traffic engineered path. When an IP packet of a user is transferred through core, it has two labels. 1) One label at the first layer indicates the destination PE router. 2) One label at the second layer indicates the site link for the destination PE router. Quidway MPLS/BGP VPN solution Figure 1 Quidway MPLS VPN solution
5 On the MPLS VPN network constructed with Quidway products, all network nodes and some nodes in the backbone layer can be set with VPN services. These network nodes are PE routers, which can adopt the Quidway NE routers or Quidway AR28-80 routers. Due to the particularity of PE nodes and large work load of VPNs, it is recommended to use the Quidway NE products for the network with a complex architecture and many VPNs. The PEs can be interconnected with each other through the P routers on the backbone layer or be interconnected directly. Figure 1 illustrates an internal private network of a group. For the backbone network, each VPN which contains sites that can be identified with a RD. In Figure 1. RD 1010 belongs to a saving service user, and RDs 99 and 90 belong to other two services respectively, OA and settlement for example. The MPLS VPN features that VPNs of different services can share the same address segment. For the group user with a large structure but seriously insufficient address resources, this is a feasible address resource solution besides IP V6. On the central node of an enterprise network can be set a Network Management Center (NMC), server or DB and Internet exit. Common resources on the central node, for example, DB and financial mainframe, can be interconnected with each other through layer 3 switch. Different VPNs are connected to layer 3 switch through different VLAN sub interfaces of the PE and access the common resources through layer 3 switch. The returned data packets enter the proper VLAN through VLAN information, and back to the proper VPN. If the address segments in different VPNs are repeated (conflicted), set Network Address Translation (NAT) on the VLAN sub interface of the PE to convert the addresses into the public address segment of the enterprise network. To access applications like the Internet, adopt the same scheme. Considering the structure characteristics of current financial networks, Huawei provides the MPLS + IPsec solution for the networks with multiple layers and high security requirements, which completely supports the VPN network transition of the financial networks. Figure 2 illustrates the combination solution.
6 Figure 2. MPLS + IPSEC/GRE solution The following should be considered when selecting proper technologies for different layers of networks: 1) Guaranteeing the availability and application efficiency to the maximum extent. 2) Guaranteeing the network expandability. 3) Guaranteeing the network security. 4) Guaranteeing the network manageability. Compared with the overall MPLS solution, this solution adopts many general VPN technologies for the edge network, such as L2TP, GRE and IPsec. L2TP, GRE and IPSEC are widely-used IP VPN technologies at present. L2TP is a layer 2 tunneling protocol, which is used seldom now. Instead, GRE, a layer 3 tunneling protocol, is widely used due to its extensive compatibility and simple maintenance feature. Coupled with the security feature of IPSEC, GRE+IPSEC is a typical case in the tunnel VPN technology application. One purpose of the GRE+IPSEC solution is to ensure the network security while implementing the private network. Just like what users worry, for the network of sensitive data, the closer to the edge the network, the weaker the
7 security measure. For financial service networks, any data is significant. Therefore, it is necessary to fully consider the security of VPN implementation on the lower-security Intranet. In Figure 2, the implementation of VPNs under provincial banks mainly depends on two VPN protocols and they are interconnected with MPLS VPNs at the upper level on the PE device (Quidway NE08/16E/3600 device). The dotted lines in red indicate the start and end points of IPsec tunnels. For networks with many tunnels, to resolve the problem of network resource occupation by IPsec, we can place a Quidway AR2800 device by the PE device as the IPsec tunnel gateway, and expand one or two (according to the specific requirement) network security processing modules of Huawei on the AR2800 device. In this case, the IPsec tunnel encryption/decryption tasks from the networks at lower levels (municipalities or counties) can be processed in a centralized, high-efficient way, thus to realize secure VPN access. In the Quidway VPN implementation recommendations, the highest encryption algorithm can be 3DES. The municipalities and counties are at the end of the IPsec star structure and support this algorithm, with no hardware encryption card required. In this solution, the GRE tunnel starts from the first routing device at the upstream of the access network. It implements layer-2 isolation for service systems through 802.1Q VLAN in a LAN. The following is the flow of data flow transmission: At the ingress of the router, the network operating system categorizes the data flow according to the subnet information of the IP packet or 802.1Q TAG directly. The data flow is categorized into ordinary OA and payment packets. The payment packets enter the GRE tunnel directly. They are marked with the packet header of the GRE tunnel and configured with policies on the uplink interface of this router. Apply IPSEC, re-encapsulate the GRE data flow, encrypt the data flow with IPsec and transfer the encrypted packets to the WAN. On the PE node (the opposite of the tunnel), the IPsec packets reach the router in the WAN. In one way, the packets are decrypted and decapsulated directly, and then the packets enter the MPLS VPN. In another way, the packets enter the Quidway R3600 through the Ethernet interface, and then they are decrypted to GRE packets. The packets back to the WAN router (NE16/08, AR2800) through the Ethernet. The device in the WAN peers off the GRE packet header through the GRE tunnel information and sends the internal data into the proper MPLS VPN. The reverse operation is similar. At this time, a complete VPN data transmission flow is finished. Different network layers can adopt different VPN technologies. The financial organizations can select the GRE+IPSEC scheme or other VPN technologies as required on the edge networks with minimum changes to the existing network structure and equipment. All the technologies can realize smooth interconnection according to the working principle of central MPLS VPN.
8 However, since sensitive networks have strict network security requirements, it is recommended to implement IPsec 128-bit (or longer) encryption and compression to enhance the security of the non-security-guarantee VPN on the edge. Security guarantee of the Quidway VPN solution 1) Security measures of VPN VPN, built directly on public networks, can be realized simply, easily and flexibly, but its security is a big problem. The enterprise must protect the data transmitted on its VPN from being intercepted and tampered and prevent illegal access to network resources or private information. In the MPLS VPN, packets are forwarded in the label mode, which has the same security level as ATM/FR virtual circuits, ensuring the general data security. In applications requiring higher security, the use of encrypted tunnel provides better protection of the privacy and integrality of the data, so that the data can be transmitted on the network without being intercepted or tampered. For example, a customer of the VPN user needs to send out significant data through the VPN. In this case, the user can configure the encryption tunnel on the user router CE and devices under it through IPsec and send the data in a selective mode. 2) Security measures for access to the Internet I. Address translation Address translation translates between private network addresses and public network addresses. The advantage of address translation is to shield the actual address of the Intranet, so that external networks cannot penetrate the address proxy to directly access the Intranet. The address translation with visit control lists are supported. A user can specify the host allowing address translation, so as to effectively control accesses from internal networks to external networks. Combined with the address pool, it supports multiple-to-multiple address translation, thus using the legal IP address resources of the user more effectively. II. Packet filtering technology Each domain in the IP packet header and the upper layer protocol header over the IP packet (like TCP) contains information to be processed by the router. The following attributes of IP packets are often used for packet filtering: l l l l IP source/destination address and protocol domain. TCP or UDP source/destination port. ICMP code and ICMP type domain. Flag fields of TCP.
9 Single SYN: Indicates the connection establishment request. SYN/ACK: indicates the connection acknowledgement. Indicates a dialup connection being in use. FIN: Indicates connection interruption. Different combinations of these fields form different rules. For example, to disable a FTP connection from the host to host , packet filtering can create such rules to discard relevant packets: l IP destination address = l IP source address = l IP protocol field = 6 (TCP) l Destination port = 21 (FTP) Other fields need not be considered in most cases. Quidway supports interface-based packet filtering, namely, filtering packets in the ingress and egress directions of an interface. Quidway also supports time-segment-based packet filtering. The time range in which packet filtering rules are effective can be specified, for example, FTP packets are allowed to enter at 8:00~20:00 every Monday but FTP connection is disabled at any other time. The time segment can be flexibly set as absolute time segment, periodic time segment, continuous time segment or discrete time segment. The security rules of packet filtering firewall can be designed flexibly according to the network features and the features of the network which the data packets pass through, so as to protect the network security. Refer to Figure 1. In the VPN solution, the packet filtering firewall can be set on the egress of each service VPN or the egress of the overall enterprise network. It is necessary to set the packet filtering policy for the resource egress node accessed by the interconnected-denied applications. 3) Security measures of firewall A firewall prevents the networking from being attacked by untrusted networks on the one hand, and on the other hand it needs to allow legal communications between networks. A firewall has the following characteristics: The communications of the network with a firewall must pass the firewall. Only the data packet passing the verification of the configured policies can pass the firewall. The firewall itself has very strong anti-attack and anti-penetrating capabilities.
10 The firewall protects the protected network from being attacked by external networks. The hardware firewall should support several network interfaces. These interfaces are LAN interfaces, for example, Ethernet, Token Ring and FDDI, and they are used to connect several networks. The connections of these networks must pass the hardware firewall. The firewall controls, verifies and filters these connections. Due to these characteristics, the firewall can be set on the border of a private network, for example, the egress of Internet and the egress of important internal LAN. In this way, it can protect the security of these private networks better.
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 Original version: Johanna Nieminen and Timo Viipuri (2005) Modified: Timo-Pekka Heikkinen, Juha Järvinen and Yavor Ivanov (2006) Task
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
MPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Transition to IPv6 in Service Providers
Transition to IPv6 in Service Providers Jean-Marc Uzé Director Product & Technology, EMEA [email protected] UKNOF14 Workshop Imperial college, London, Sept 11 th, 2009 1 Agenda Planning Transition Transition
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP
Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs
: Computer Networks Lecture 9: Mar 30, 2005 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
Intranet Security Solution
Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: [email protected]
RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: [email protected] Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical
A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding
A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding Rissal Efendi STMIK PROVISI Semarang, Indonesia ABSTRACT MPLS is a network management
Provisioning Cable Services
CHAPTER 10 This chapter describes how to provision MPLS VPN cable in IP Solutions Center (ISC). It contains the following sections: Overview of MPLS VPN Cable, page 10-1 in ISC, page 10-5 Creating the
Security of the MPLS Architecture
WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Implementing MPLS VPNs over IP Tunnels
Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint tunneling instead
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint
DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC
DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
Building Trusted VPNs with Multi-VRF
Building Trusted VPNs with Introduction Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several
UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS
WHITE PAPER UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary.............................................................................................
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)
MEE09:44 BLEKINGE INSTITUTE OF TECHNOLOGY School of Engineering Department of Telecommunication Systems Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
Introduction of Quidway SecPath 1000 Security Gateway
Introduction of Quidway SecPath 1000 Security Gateway Quidway SecPath 1000 security gateway is new generation security equipment developed specially for enterprise customer by Huawei-3Com. It can help
Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**
Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge
Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail [email protected] Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN
MPLS VPN Peer to Peer VPN s Agenda MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) CE-PE OSPF Routing CE-PE Static Routing CE-PE RIP Routing
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
Why Is MPLS VPN Security Important?
MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :
5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
Constructing High Quality IP Core Network
Constructing High Quality IP Core Network What we need is not only a network, but also the services that network can provide. ---------Huawei-3Com Constructing networks is much like building bridges or
Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
Table of Contents. Cisco Configuring a Basic MPLS VPN
Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
MPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
Configuring MPLS Hub-and-Spoke Layer 3 VPNs
CHAPTER 23 This chapter describes how to configure a hub-and-spoke topology for Multiprotocol Layer Switching (MPLS) Layer 3 virtual private networks (VPNs) on Cisco NX-OS devices. This chapter includes
MPLS Security Considerations
MPLS Security Considerations Monique J. Morrow, Cisco Systems [email protected] November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Configuration Example
Configuration Example Use a Branch Office VPN for Failover From a Private Network Link Example configuration files created with WSM v11.10.1 Revised 7/22/2015 Use Case In this configuration example, an
Implementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
Introduction Inter-AS L3VPN
Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Network virtualization
Martin Černý, Jan Fürman ([email protected], [email protected]) Department of Computer Systems Faculty of Information Technologies Czech technical university in Prague Martin Černý, Jan Fürman,
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap
Outline Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 2 Qin Yin Fall Semester 2013 More words about VLAN Virtual Routing and Forwarding (VRF) The use of load
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
MPLS VPN Security BRKSEC-2145
MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security
Virtual Private Networks. Juha Heinänen [email protected] Song Networks
Virtual Private Networks Juha Heinänen [email protected] Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
