MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005



Similar documents
MPLS over Various IP Tunnels. W. Mark Townsley

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Introducing Basic MPLS Concepts

Introduction to MPLS-based VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Virtual Private Networks. Juha Heinänen Song Networks

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS Implementation MPLS VPN

INTRODUCTION TO L2VPNS

MPLS in Private Networks Is It a Good Idea?

What Is a Virtual Private Network?

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Addressing Inter Provider Connections With MPLS-ICI

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Transition to IPv6 in Service Providers

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Master Course Computer Networks IN2097

MPLS VPN Security Best Practice Guidelines

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Multi Protocol Label Switching (MPLS) is a core networking technology that

How Routers Forward Packets

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

For internal circulation of BSNLonly

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

SBSCET, Firozpur (Punjab), India

IPv6 over IPv4/MPLS Networks: The 6PE approach

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Enterprise Network Simulation Using MPLS- BGP

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

MPLS VPN Security BRKSEC-2145

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

VPN Technologies A Comparison

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

Cisco Configuring Basic MPLS Using OSPF

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS Concepts. Overview. Objectives

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Junos MPLS and VPNs (JMV)

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.

RFC 2547bis: BGP/MPLS VPN Fundamentals

Implementing MPLS VPNs over IP Tunnels

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

Internetworking II: VPNs, MPLS, and Traffic Engineering

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

How To Make A Network Secure

Kingston University London

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

Project Report on Traffic Engineering and QoS with MPLS and its applications

MPLS multi-domain services MD-VPN service

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

Virtual Leased Lines - Martini

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

How To Understand The Benefits Of An Mpls Network

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

MPLS Security Considerations

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

MPLS L2VPN (VLL) Technology White Paper

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Implementing Cisco MPLS

Demonstrating the high performance and feature richness of the compact MX Series

MPLS-based Layer 3 VPNs

Implementing VPN over MPLS

- Multiprotocol Label Switching -

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

The Essential Guide to Deploying MPLS for Enterprise Networks

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Why Is MPLS VPN Security Important?

Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL

MPLS Applications. Karel Pouzar CCIE#20198, CCSI#31414

SEC , Cisco Systems, Inc. All rights reserved.

Virtual Private LAN Service

Migrating to MPLS Technology and Applications

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Chapter 9. IP Secure

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

WHITE PAPER. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing

MPLS - A Choice of Signaling Protocol

Transcription:

MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1

MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel Label transports MPLS-labeled VPN packets between s. It is swapped along the LSP from one to another. MPLS VPN Label remains the same between s. It is exchanged via targeted LDP, MP-BGP, etc. and refers to a VRF, VPLS VSI, or PWE3 VC. 2

MPLS over IP The Basic Idea MPLS Tunnel Label IP Tunnel Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel Label transports MPLS-labeled VPN packets between s. It is swapped along the LSP from one to another. MPLS VPN Label remains the same between s. It is exchanged via targeted LDP, MP-BGP, etc. and refers to a VRF, VPLS VSI, or PWE3 VC. 3

MPLS over IP The Basic Idea MPLS Tunnel Label IP Tunnel Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel Label is replaced with an IP Tunnel, which performs the same function of getting the MPLS VPN label and payload between s Unfortunately, we have a few IP tunnels to choose from each with different pros and cons 4

A Long Evolution Leading to Many Optoins Unfortunately, there are a lot of choices to wade through when it comes to MPLS over IP MPLS directly over IP MPLS over Full GRE/IP MPLS over Simple GRE/IP MPLS over L2TPv3 w/bgp Tunnel SAFI Each of the above with IPsec Point-2-Point vs. Point-2-Multipoint This presentation will walk through the evolution of each of these methods of carrying MPLS over IP, leading us to where we are today 5

MPLS over IP Tunneling Technologies MPLS over IP Version IHL TOS Total length Identification Flags Fragment offset TTL Protocol 0x137 Source IP address (Ingress ) Header checksum Destination IP address (Egress ) MPLS VPN Label Exp S TTL Customer Payload Defined in draft-ietf-mpls-over-ip-or-gre-08.txt Smallest and simplest of MPLS over IP encapsulations (just +16 bytes) Not widely supported today 6

Tunneling Technologies MPLS over Full GRE Header Version IHL TOS Total length Identification Flags Fragment offset TTL Protocol 0x47 Header checksum Source IP address (Local address on router) Destination IP address (Local address on router) Checksum (Opt) Offset (Opt) Key (Opt) Sequence Number (Opt) MPLS VPN Label Exp S TTL Customer Payload Defined in draft-ietf-mpls-over-ip-or-gre-08.txt Also not widely supported today 7

Tunneling Technologies MPLS over Simplified GRE Header Version IHL TOS Total length Identification Flags Fragment offset TTL Protocol 0x47 Header checksum Source IP address (Local address on router) Destination IP address (Local address on router) MPLS VPN Label Exp S TTL Customer Payload Most widely supported, particularly for manually configured, point to point tunnels Larger encapsulation than MPLS over IP, but with no tangible advantage as the GRE Header is simply reduced to a constant set of bits in each packet 8

Manually Configured Overlay (GRE) IP/MPLS Network P CE Manually Configured Tunnel CE CE IP Network P IP/MPLS Network Manual Point-to-Point GRE Tunnel Connects disparate MPLS networks. Separate MPLS networks act as one, so all services enabled by MPLS are available across both clouds This was, and still sometimes is, a good thing But 9

Manually Configured Overlay (GRE) IP/MPLS Network CE P Label Switched Paths CE CE IP Network P IP/MPLS Network Number of LSPs are multiplied, setup between all nodes on BOTH networks IP-only Nodes Still Isolated Traffic may not traverse optimal path between s 10

Manually Configured Overlay (GRE) IP/MPLS Network CE Manually Configured Tunnel P CE CE IP Network PP IP/MPLS Network Each tunnel enlarges the single, flat, MPLS network. MPLS sees no hierarchy or partitioning. At high scale, manual GRE overlay network becomes cumbersome to manage and burdensome on number of LSPs and IGPs carrying /32 routes for all s Needed: Dynamic point-2-multipoint tunnels between s 11

MPLS over Dynamic Multipoint GRE One Multipoint GRE Tunnel is dynamically created on each for receiving traffic from other s Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 2 Session Id Cookie 172B644AF2E9BB31 BAB6440F209F0201 032B6440F1E9B80A F12B644012E9B7C0 A1216440F2E9ABA1 3 Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 Session Id Cookie 172B644AF2E9BB31 BAB6440F209F0201 032B6440F1E9B80A F12B644012E9B7C0 A1216440F2E9ABA1 But.. Mixed tunneling environments are not easily supported if other s cannot decapsulate MPLS over GRE then VPN traffic could be blackholed 1 Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 Session Id Cookie 172B644AF2E9BB31 BAB6440F209F0201 032B6440F1E9B80A F12B644012E9B7C0 A1216440F2E9ABA1 6 5 Endpoint 172.16.255.1 172.16.255.2 Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 Session Id 4 Session Id Cookie 172B644AF2E9BB31 BAB6440F209F0201 032B6440F1E9B80A F12B644012E9B7C0 A1216440F2E9ABA1 Cookie 172B644AF2E9BB31 BAB6440F209F0201 172.16.255.3 032B6440F1E9B80A Still Needed: A method for s to advertise if they are able to receive MPLS over IP traffic, and with what type of encapsulation Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 Protocol ID 172.16.255.4 172.16.255.5 F12B644012E9B7C0 A1216440F2E9ABA1 12

BGP Tunnel SAFI to The Rescue! draft-nalawade-kapoor-tunnel-safi-02.txt Defines a SAFI which binds a tunnel endpoint ( IP address) to a set of tunnel capabilities: Type 1 : L2TPv3 Tunnel information (Session, Cookie) Type 2 : mgre Tunnel information (Header Type, Key, etc) Type 3 : IPSec Tunnel information (Security Association) Type 4 : MPLS Tunnel information (Native MPLS) With this information being advertised along with the BGP Next Hop, s will only receive data for which they are able to properly decapsulate Policies may be defined e.g., encrypt some tunnels, not others 13

What about Security? Quick Review: MPLS VPN Security Meircom performed testing that proved that MPLS-VPNs have met or exceeded all of the security characteristics of a comparable layer two based VPN such as Frame-Relay or ATM. http://www.mier.com/reports/cisco/mpls-vpns.pdf In addition : Cisco Security White Paper on MPLS http://www.cisco.com/warp/public/732/tech/mpls/docs/0701_mpls_security_pu.fm.pdf 14

Quick Review: MPLS VPN Security VPN A VPN B VPN C X Label IP Label IP MPLS SP Core Label MP-iBGP IP X Label IP VPN A VPN B VPN C Working assumption for MPLS VPN Security: The core network (+P) is secure MPLS-labeled packets will always be dropped on core boundaries. 15

MPLS over GRE Security in an IP network Single line of defense: SpoofedIP Packets CE or Peering SP IP Core VPN B L3 ACL MPLS over GRE alone relies 100% on L3ACLs to protect VPN from spoofed data ACLs throughout the network can be operationally cumbersome (SA and DA address lists at each and border routers), could affect performance, subject to misconfiguration, etc. All it takes is one correctly spoofed MPLS label to infiltrate a customer VPN 16

Blind Insertion attack for VPN access 2. SP Core accepts encapsulated attack with valid IP source and destination of s 3. Egress receives an MPLS VPN over GRE packet and -- If the MPLS label is correctly chosen routes the packet into the customer VPN SP Core Customer VPN 1. Attacker sends encapsulated IP attack packet Hacker Internet 4. Host within customer VPN responds to the attacker via the Internet SP SA / SP DA GRE MPLS VPN Label Hacker SA / Customer DA Attack Data 17

Spoofing MPLS over GRE Service-Provider IP addresses can be discovered or easily guessed GRE Header contains constant, well-known values MPLS Label is 20-bits of variant data that must be guessed by hacker How quickly can a hacker guess a correct 20-bit MPLS label? 100 pps attack rate 100 active VPN labels (routes) on a Version IHL TOS Total length Identification Flags Fragment offset TTL Protocol 0x47 Header checksum Source IP address (Local address on router) Destination IP address (Local address on router) 0 0 0 0x8847 MPLS VPN Label Exp Customer Payload Answer: 1 minute, 45 seconds S TTL 18

Tunneling Technologies Can we use IPSec? Of course! But you have to pay for it. IPsec is a very heavyweight solution, it requires p2p IKE key exchange, crypto acceleration hardware, etc. A number of MPLS over IPsec proposals were made in the IETF, in the end MPLS over IPsec is really MPLS over IP, GRE, or L2TPv3 used with IPsec in Transport Mode IPsec is not tunneling it is just providing security for another type of tunnel IPsec can always be bolted on in places it is needed, particularly with the ability to advertise tunnel capabilities between s 19

MPLS VPN over GRE Network Security Bottom Line: In order to avoid becoming a transit point for packets inserted into a customer VPN, IP ACLs alone are not a robust solution. IPsec may be used with any MPLS over IP tunnel type, but is expensive to both opex and capex Still Needed: An additional layer of protection to make spoofing far more difficult than it is today with GRE, but without the overhead of IPsec 20

Where to apply additional layer of security L2TPv3 provides a simple and efficient method to make simple packet spoofing attacks impossible. Protection occurs at the most important point, right before entering the Customer VPN SP Core Customer VPN Internet Hacker SP SA / SP DA L2TPv3 MPLS VPN Label Hacker SA / Customer DA Attack Data 21

Tunneling Technologies MPLS over L2TPv3 w/bgp Tunnel SAFI Version IHL TOS Total length Identification Flags Fragment offset TTL Protocol 0x115 Header checksum Source IP address (Local address on router) Destination IP address (Local address on router) Session ID (32-bits) Cookie Authentication Data (64-bits, Optional) MPLS VPN Label Exp S TTL Customer Payload draft-ietf-mpls-over-l2tpv3-00.txt & RFC3931 Large scale deployments already exist today 22

MPLS over L2TPv3 L2TPv3 Distributed Session Processing Session-ID (32 bits) Cookie (64 bits) 101 01000101011010001010101100101101 On a distributed system the context for multiple services or multiple service instances can be balanced across resources Structure imposed on the the Session-ID bits can quickly vector the L2TPv3 packet to the resource servicing that context Processing of tunneled payload is based on the associated context switch to an interface, route in a VRF, Bridge in a VSI 23

MPLS over L2TPv3 L2TPv3 Packet Authentication Check w/cookie Session-ID (32 IDbits) Cookie = 0xA83F2C32h 64-bit value must match for each packet Not a 64-bit lookup! Just a very fast compare based on the Session ID lookup No encryption hardware needed Rather than checking an IP SA or DA, L2TPv3 seeds each packet with an unguessable value selected at random by each, and advertised to other s in the VPN via the BGP Tunnel SAFI Somewhat like an ACL, but simple to manage and virtually impossible for a hacker to guess 24

Spoofing VPNs over L2TPv3 Tunnels We assume that the L2TPv3 Session-ID may be known, as it could be predictable or even hard-coded to a constant for some services in order to optimize forwarding How quickly can a hacker guess a correct 64-bit L2TPv3 cookie? 10 Mpps attack rate ANY VPN labels is considered valid Answer: 60 000 Years! 25

Tunneling Technologies L2TPv3 w/bgp Tunnel SAFI One L2TPv3 Multipoint session is dynamically created on each for receiving traffic from other s (point to point L2TPv3 signaling is not used) 1 Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 2 Session Id Cookie 172B644AF2E9BB31 BAB6440F209F0201 032B6440F1E9B80A F12B644012E9B7C0 A1216440F2E9ABA1 3 Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 Session Id Cookie 172B644AF2E9BB31 BAB6440F209F0201 032B6440F1E9B80A F12B644012E9B7C0 A1216440F2E9ABA1 4 BGP advertises tunnel capabilities via Tunnel SAFI - MPLS over L2TPv3 traffic only sent to s which know how to handle it Tunnel SAFI also includes per- Session ID and Cookie pair Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 Session Id Cookie 172B644AF2E9BB31 BAB6440F209F0201 032B6440F1E9B80A F12B644012E9B7C0 A1216440F2E9ABA1 6 Endpoint 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 Session Id 5 Endpoint Session Id 172.16.255.1 172.16.255.2 172.16.255.3 172.16.255.4 172.16.255.5 Endpoint Session Id Cookie 172.16.255.1 172B644AF2E9BB31 172.16.255.2 BAB6440F209F0201 172.16.255.3 032B6440F1E9B80A 172.16.255.4 F12B644012E9B7C0 172.16.255.5 A1216440F2E9ABA1 Cookie 172B644AF2E9BB31 172B644AF2E9BB31 172B644AF2E9BB31 F12B644012E9B7C0 A1216440F2E9ABA1 Cookie 172B644AF2E9BB31 BAB6440F209F0201 032B6440F1E9B80A F12B644012E9B7C0 A1216440F2E9ABA1 26

Review of capabilities Static IP Static GRE overlay Dynamic Multipoint GRE L2TPv3 w/safi Encapsulates MPLS over IP Yes Yes Yes Yes Tested in a large active deployment? Yes? Yes Avoids full mesh via scalable, dynamic, p2mp tunnels No No Yes Yes Avoids blackholes by advertising tunnel capabilities No No No Yes Encapsulation facilitates highspeed lookup and distributed processing assist No No No Yes Simple, scalable, anti-spoofing protection built-in No No No Yes 27

MPLS over IP Tunneling Solutions 28

Extending the Reach of MPLS MPLS over IP Tunnels VPWS L2VPN (Pseudowires) CE-2 CE-1 MPLS Cloud A MPLS Layer-3 VPN (RFC2547) MPLS Cloud B IP-Only Network CE-5 CE-4-1 IP/MPLS IP Tunnels -2 IP/MPLS IP -3 VPLS L2VPN CE-3 Multiple MPLS or IP networks, seamless global MPLS service presented to customers 29

Step-by-Step Migration to MPLS IP/MPLS Network CE MPLS/IP CE CE MPLS/MPLS IP Network IP/MPLS Network Native MPLS/MPLS is used when possible, MPLS/L2TPv3, MPLS/GRE or MPLS over IPsec where necessary, etc. Requires BGP Tunnel SAFI to advertise capabilities 30

Operational Flexibility There are many benefits to an MPLS core network, including Traffic Engineering, Fast Re-route, etc. However, IP networks without MPLS end-to-end can still be engineered well enough to deploy Edge MPLS-based services such as L2VPN and L3VPN Deploying Edge MPLS services may be decoupled from deploying MPLS Core features, allowing separate operational teams to migrate at their own pace 31

Scaling MPLS VPNS Native MPLS VPNs (w/o IP Tunnels) Large MPLS VPN Network (2-3000 s) Each must signal its own Tunnel LSP (i.e., LDP) and carry a /32 route within the IGP. To support 3000 s in one VPN, IGP must support 3000 /32 routes There are examples of this size Native MPLS VPN today 32

Scaling MPLS VPNS Native MPLS VPNs (w/o IP Tunnels) Very Large MPLS VPN Network (10000-20000 s) 10000-20000 s means 10000-20000 /32 routes in an IGP. Seriously stresses existing state of the art in IGP protocols, may test absolute maximum (maximum in OSPF is 56000 routes) Inhibitor to pushing MPLS VPNs beyond the core and into access networks 33

Scaling MPLS VPNs over IP Tunnels MPLS over IP Very Large MPLS VPN Network s are reachable via IP CIDR blocks, so no need for /32 LSPs between all s. If you can ping the router, you can use it as a in the VPN Not necessary to advertise /32 routes to s, so no need to carry 10000-20000 routes in the network IGP. Use Core MPLS features where you want, based on where you need FRR, TE, etc. Requires dynamic multipoint IP tunnels and built-in anti-spoofing security 34

MPLS over IP Tunnels Summary of what you can do with this technology Extending the Reach of MPLS MPLS services (such as RFC 2547 VPNs) based on IP Tunnels can cross multiple providers (Inter-provider) or administrative domains (Inter-AS) to reach customers anywhere IP reaches Migration to MPLS MPLS/MPLS where available, MPLS/IP where not Operational Flexibilty Some service providers do not yet have (or do not yet want) MPLS in their core networks, but still want to offer their customers MPLS-based services Scaling MPLS VPN deployments IP route aggregation allows for scaling MPLS VPNs across a very large number of s without increasing the number of - LSPs and associated /32 routes advertised in an IGP. 35

MPLS over IP Tunnels Summary of Available Tunneling Technologies Static MPLS over GRE may be used to connect a small number of isolated nodes or disparate MPLS networks, but is not recommended for high scale deployments Dynamic Multipoint Tunneling available with GRE or L2TPv3 solves the manual provisioning problem with static GRE tunnels, but still can allow blackholes The BGP Tunnel SAFI prevents blackholes to routers which cannot decapsulate a given type of IP tunnel, allowing staged migration to MPLS IPsec can provide strong security, but is expensive from an opex and capex perspective. L2TPv3 includes lightweight yet strong anti-spoofing protection, with zero additional opex complexity over mgre, an no reliance on ACLs Conclusion: MPLS over L2TPv3 w/bgp Tunnel SAFI is the most feature rich and proven MPLS over IP Tunnel offering among the choices available 36