Keep it Simple with BGP/MPLS Virtual Private Networks



Similar documents
APNIC elearning: Introduction to MPLS

Introduction to MPLS-based VPNs

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems

RFC 2547bis: BGP/MPLS VPN Fundamentals

An ADTRAN White Paper. Private IP Service BGP/MPLS VPN Networks

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

BGP Configuration Guide

Introduction to Carrier Ethernet VPNs: Understanding the Alternatives

MPLS L2VPN (VLL) Technology White Paper

HughesNet and MPLS. This white paper addresses how it is possible to seamlessly integrate MPLS and HughesNet.

IPv6 over MPLS. Course Number Presentation_ID. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Kingston University London

Cisco Which VPN Solution is Right for You?

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

Cisco Configuring Basic MPLS Using OSPF

MPLS Concepts. Overview. Objectives

IPv6 over IPv4/MPLS Networks: The 6PE approach

Enterprise Network Simulation Using MPLS- BGP

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Introducing Basic MPLS Concepts

How Routers Forward Packets

MPLS Implementation MPLS VPN

Understanding Virtual Router and Virtual Systems

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

Managing MPLS Networks. Oleg Kupershmidt and Joel Kaufman

Quidway MPLS VPN Solution for Financial Networks

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Interconnecting Cisco Networking Devices Part 2

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

How To Understand The Benefits Of An Mpls Network

Top-Down Network Design

MPLS-based Layer 3 VPNs

MPLS and IPSec A Misunderstood Relationship

Chapter 2 - The TCP/IP and OSI Networking Models

How To Make A Network Secure

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

HP Networking BGP and MPLS technology training

For internal circulation of BSNLonly

Implementing VPN over MPLS

Multi Protocol Label Switching (MPLS) is a core networking technology that

: Interconnecting Cisco Networking Devices Part 2 v1.1

Testing Edge Services: VPLS over MPLS

Master Course Computer Networks IN2097

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Table of Contents. Cisco Configuring a Basic MPLS VPN

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

Configure ISDN Backup and VPN Connection

Network Virtualization Network Admission Control Deployment Guide

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Building Trusted VPNs with Multi-VRF

- Multiprotocol Label Switching -

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

A Review Paper on MPLS VPN Architecture

Network Level Multihoming and BGP Challenges

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Lesson 13: MPLS Networks

This chapter covers four comprehensive scenarios that draw on several design topics covered in this book:

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

SEC , Cisco Systems, Inc. All rights reserved.

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

IP Routing Configuring RIP, OSPF, BGP, and PBR

White paper. Reliable and Scalable TETRA networks

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

MPLS in Private Networks Is It a Good Idea?

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Connecting Remote Offices by Setting Up VPN Tunnels

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD. BSides Asheville 2014

MPLS Based Networks in Railway Deployments

MPLS is the enabling technology for the New Broadband (IP) Public Network

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Sprint Global MPLS VPN IP Whitepaper

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Overview of Routing between Virtual LANs

Part The VPN Overview

Transcription:

White aper Keep it Simple with BG/MLS Virtual rivate Networks Joël Repiquet May 2002 www.lambdanet.net info@lambdanet.fr

Contents 1. Introduction... 3 2. VN Models... 4 2.1. Overlay vs. eer VNs... 4 2.2. -to- Layering Chain... 5 3. BG/MLS VNs Fundamentals... 7 3.1. Sites and s... 7 3.2. VN Routing & Forwarding tables (s)... 9 3.3. re-established ibg sessions and LSs... 10 3.4. Control lane VN Route Distribution... 11 3.5. Data lane Forwarding across the Backbone... 14 4. Carrier of Carriers... 15 5. Multi-rovider BG/MLS VNs... 17 6. Accessing Internet from a BG/MLS VN... 18 6.1. Non- Internet Access... 18 6.2. Internet Access... 18 List of Abbreviations... 19 References... 19 Glossary... 20 List of Figures Figure 1: Overlay vs. eer VN Model... 4 Figure 2: -to- layering chain with layer-1 -based VNs... 5 Figure 3: -to- layering chain with layer-2 -based VNs (MLS case)... 5 Figure 4: -to- layering chain with layer-3 -based VNs using Isec... 6 Figure 5: -to- layering chain with -based BG/MLS VNs... 6 Figure 6: BG/MLS VN VN Routing & Forwarding tables (s)... 9 Figure 7: BG/MLS VN -to- pre-established ibg sessions and LSs... 10 Figure 8: BG/MLS VN to Route Distribution... 11 Figure 9: BG/MLS VN -to- Route Distribution... 12 Figure 10: BG/MLS VN -to- Route Distribution... 13 Figure 11: BG/MLS VN Forwarding across the Backbone... 14 Figure 12: Carrier of Carriers BG/MLS VN S as a Customer... 15 Figure 13: Carrier of Carriers IS as a Customer... 16 Figure 14: Multi-rovider BG/MLS VNs Direct Interconnection... 17 Figure 15: Non- Internet Access... 18 Figure 16: Internet Access... 18 Keep it Simple with BG / MLS VNs White aper May 2002 age 2

1. Introduction BG/MLS VNs are simple, scalable and as secure as ATM- or FR-based VNs. They are fundamentally simple for the Customer because conventional I routing is used, there is only one external routing peer per site, and they do not require any additional skills. Still, any choice regarding traffic flows and logical topology of the VN is in the hand of the Customer. BG/MLS VNs are standardised in RFC2547bis ([1]) that is still a draft, but is fully adopted and implemented by major Vendors, especially Cisco and Juniper. This new VN approach is based on two leading protocols BG and MLS that benefit from the most investigations in the I World. The purpose of this paper is to help the potential customers of I VNs grasp the essential aspects of this new approach. Therefore, it does not go deeply in the details but the fundamental characteristics are highlighted and illustrated accurately. The recommended reading for going further in the understanding of BG/MLS VNs is the RFC2547bis itself which exposes clearly the concepts and which only drawback is to have no illustrations. This paper is structured as follows:! The eer model, followed by BG/MLS VNs, is briefly compared to various forms of Overlay model in Section 2.! The various ways Customer sites can be defined are analysed at the beginning in Section 3; then the different phases of site-to-site route distribution across the backbone are examined in turn; the objective is here to illustrate it consistently through a global view of both the backbone and different VNs; as a consequence of the routing tables building, VN data forwarding is shown.! Section 4 is dedicated to the Carrier of Carriers advanced feature, which enables another Service rovider to use the VN services of a Carrier as a transport service. This S can be another BG/MLS VN S or even an IS.! More than one Service rovider can offer BG/MLS VN services to the same Customer. Inter-rovider backbone is discussed in Section 5.! VN users will generally be offered an Internet access; how this can be realised is explained in Section 6.! Finally, besides a list of acronyms and references, a glossary will help you remind some key definitions. Keep it Simple with BG / MLS VNs White aper May 2002 age 3

2. VN Models The term I Virtual rivate Network (I VN) refers to I connectivity between a set of sites, making use of a shared network infrastructure. At the edge of each site, the router acting as a gateway with the provider network is referred to as the (Customer Edge) and the S (Service rovider) device at which a connects is known as a (rovider Edge). 2.1. Overlay vs. eer VNs Depending on routers I routing adjacency, one can distinguish two VN models: Overlay and eer. For comparing them, we will assume a full-mesh topology. # With the Overlay VN model, I routing adjacency occurs directly between s (thus creating some form of virtual backbone over the S backbone). However, a can be connected to the S network (to some ) via various forms of adjacency, ranging from layer 1 to layer 3. This form of VN is also referred to as based VNs since the VN logic is concentrated at the s. # With the eer VN model, a is the routing peer of a and does NOT have any routing adjacency with other s. As a result, it gains I connectivity with the other sites via this router. This form of VN is also referred to as -based VNs since the VN logic is concentrated at the s. They are also known as Network-Based VN (NBVN). Figure 1 shows a synoptic of the two approaches. The dotted lines are to be understood as direct routing adjacencies. Two typical topologies are illustrated: VN Red is full-meshed while VN Blue is of the form Hub-and- Spoke (where Spoke sites communicate with each other only via Hub sites). In case of Hub-and-Spoke topology, the Hub site will normally offer redundant accesses to the Spoke s. artial-meshed topology could be considered as well. The figure shows immediately that there will be less requirements in terms of processing and interfaces for the router with the peer model. Overlay Model VN Blue Site X (Hub) VN Red Site B eer Model VN Blue Site X (Hub) VN Red Site B VN Red Site A VN Red Site A VN Blue Site Y (Spoke) VN Red Site C VN Blue Site Z (Spoke) VN Blue Site Y (Spoke) VN Red Site C VN Blue Site Z (Spoke) Figure 1: Overlay vs. eer VN Model When the VN Service rovider is responsible for the provisioning of the VN, the VN is referred to as VN (rovider-rovisioned VN). With -based VN, the (as C: Customer remises Equipment) must be part of the S VN offering. With -based VN, there is no real C need since the acts as a normal router without any VN-specific function; of course, the S may offer the C option. Keep it Simple with BG / MLS VNs White aper May 2002 age 4

2.2. -to- Layering Chain rior to analysing the fundamental mechanisms of BG/MLS VNs that apply to the eer model, we illustrate briefly, under the form of protocol layering, inter-site communications with different approaches. An example of overlay model is considered for each level of -to- relationship (layer-1, layer-2 and layer-3). Finally the site-tosite communication is shown in case of BG/MLS VNs. Layer-1 -based VNs Here is the most basic -based VN where s are directly connected at layer-1 level via DH (E1, E3...) or SDH (STM-1, STM-4...) links. The access network and the backbone network may belong to different providers. The customer generally administers such a VN since the rovider a priori has no specific involvement in I services. It is simply mentioned here for comparison to the other types of VN. I I Routing Adjacency I DH/SDH DH/SDH DH/SDH DH/SDH Customer remises Access Network S Backbone Access Network Customer remises Figure 2: -to- layering chain with layer-1 -based VNs Layer-2 -based VNs Layer-2 -based VNs have been introduced with ATM or Frame Relay provider backbones. The main advantage is that, conversely to layer-1 VNs, several logical connections can be multiplexed over one physical access link. Nowadays, MLS technology enables an S to provide a data link service directly from its backbone router infrastructure. The figure hereafter illustrates such an MLS-based data link service and it should be noted that the full set of interface types and capacities available on high-speed routers can be used on the access link between the and the. Besides ATM and FR interfaces, Ethernet with VLANs can be used. or Cisco HDLC on DH/SDH can also be used but in this case only one logical interface is possible within one physical interface; they are nevertheless mentioned because the advantage brought by MLS is that the S can offer (and price) only the required subrate of the physical interface bandwidth. Within the backbone, from to, the MLS tunnels may be nested, thus improving the scalability of the solution. I Routing Adjacency Layer-2 logical connection I MLS Tunnel MLS I SDH SDH Customer remises Access Network S Backbone Access Network Customer remises DH SDH Ethernet E1, E3, DS3 STM-1, STM-4... 10/100BT, GigE ATM, FR,, Cisco HDLC VLAN 802.1Q Figure 3: -to- layering chain with layer-2 -based VNs (MLS case) Keep it Simple with BG / MLS VNs White aper May 2002 age 5

Layer-3 -based VNs The logical connections between s can also be based on layer-3 I tunnels, such as GRE (Generic Route Encapsulation, defined in RFCs 1701 and 1702) or I-I (I encapsulation within I, defined in RFC 2003). However, these solutions are prone to data spoofing and the overhead is at least 20 bytes per packet. Isec-based solutions have therefore been preferred, the acting as a Security Gateway. I Routing Adjacency Isec Tunnel I Security Association (SA) I Isec I I Isec Customer remises Access Network S Backbone Access Network Customer remises Figure 4: -to- layering chain with layer-3 -based VNs using Isec The level of security that can be brought by Isec in terms of authentication and confidentiality through the use of public key mechanisms is NOT questionable. However, here are some observations:! Although Isec in itself is well defined from end 1998 (in RFCs 2401 to 2412) there is no Isec VN standard defined yet. Surprisingly, the first standardisation effort (see [8]) is being carried out, at the IETF, within the frame of the VN subgroup that defined BG/MLS VN. Considering the so many options and combinations available with Isec (tunnel vs. transport mode, AH vs. ES headers, encryption algorithms, key exchange mechanisms...) the choice of an Isec-based VN S entails some dependency between the Customer and the S.! Isec adds a large overhead to each I packet as well as significant processing time.! It is not proved that strong security is required for the whole sites, and Isec could advantageously be used at a finer grained level (e.g. subnet or host levels). Since I connectivity is enabled between sites, Isec can also be applied with any other form of VN, including BG/MLS VNs. Layer-3 -based VNs Figure 5 illustrates the conventional I peering between and, while -to- is based on both ibg for VN route distribution and hierarchical MLS tunnelling for data forwarding. This is examined in more detail in the remainder of this paper. ibg I I Routing Adjacency I Routing I I I Adjacency MLS Tunnel MLS Customer remises Access Network S Backbone Access Network Customer remises Figure 5: -to- layering chain with -based BG/MLS VNs Keep it Simple with BG / MLS VNs White aper May 2002 age 6

3. BG/MLS VNs Fundamentals 3.1. Sites and s With BG/MLS VNs, a set of sites is directly attached to an S network. Those sites to which the S provides I connectivity by applying a routing policy constitute a VN. From the perspective of the S, a site represents a number of I routes that it can learn over one or more sub-interfaces via a direct routing adjacency. The S router to which a site can be attached is referred to as (rovider Edge). The customer equipment that is connected to the is known as a (Customer Edge). The notion of Site and is worth refining because it extends the potential of BG/MLS VNs. Host or Switch as The may be a single host (for instance a server) or an Ethernet switch; it represents a single subnet and the S directly declares it in the VN routing instance (the, as explained later on) at the. In this simple case, the Customer does not even need to install and manage a router at his site. Site S Network Host Site S Network Switch hysical Router as In most of the cases the will be a physical router that represents a number of subnets (or routes) as illustrated below. This gateway router will learn the site s internal routes via its IG and will then advertise dynamically these routes to the to which it is attached. Site S Network Subnet D Subnet B Subnet A Subnet C It is likely that the systems in a site will be in the same geographical area. However, one could imagine Subnet D in the figure here above to be at a remote location. It will be part of the site since the VN S backbone is not involved. Keep it Simple with BG / MLS VNs White aper May 2002 age 7

Virtual Site The interface at the (and the ) for a - link is better to be seen as a sub-interface (or logical interface). There can be (with FR, ATM and VLAN layer-2 encapsulation modes) several sub-interfaces for the same physical interface. As a result, a physical router, through its physical connection to the, can represent several virtual sites (and be viewed therefore as several s) by splitting route subsets between separate sub-interfaces. (Virtual) Site Subnet A S Network 1 2 sub-interface for 1 sub-interface for 2 (Virtual) Site Subnet B Some alternatives are possible: (1) use several physical interfaces instead of sub-interfaces within a single physical interface (it would be the only possibility anyway with or Cisco HDLC encapsulation modes); (2) instead of a router, this could be realised with an Ethernet switch, via VLANs; (3) in some cases, instead of having the physical site split into several virtual sites, it can be up to a host to have its traffic dynamically routed towards the appropriate VN sub-interface. Resiliency in - Connections For resilience, a site can be attached via more than one to one or more s (moreover, as this will be discussed at the end of this paper, to the same or different VN service providers). Site Subnet A Subnet B S Network Subnet C Keep it Simple with BG / MLS VNs White aper May 2002 age 8

3.2. VN Routing & Forwarding tables (s) Figure 6 shows a Service rovider network attached to a number of sites that represent 3 VNs (Red, Blue and Green). Those routers within the S network that are not attached to s are referred to as (for rovider core) routers. We will base our explanations of BG/MLS VNs mechanisms on this same global view; this model is inspired by a case study presented in reference [4] and will enable you to understand the various phases. The customer administers its VN and therefore assigns I addresses throughout the sites. It is likely that these addresses will be within the private ranges defined in RFC 1918 (it could be non-globally unique public I addresses as well). As a result, the same addresses could be assigned for different VNs. This overlapping is enabled by BG/MLS VNs. As illustrated, Site 5 is part of two VNs: there is an overlapping between VN Blue and VN Green. This is why the corresponding and are shown in brown. Site 1 Site 2 10.5/16 2 1 Interface: if_11 RD = RD_1 Export Target = Red Import Target = Red if_12 if_11 1 Interface: if_12 RD = RD_2 Export Target = Blue Import Target = Blue if_1a if_1b Interface: if_21 RD = RD_4 Export Target = Red Import Target = Red if_2a if_2b 2 if_21 if_22 Interface: if_22 RD = RD_5 Export Target = Blue, Green Import Target = Blue, Green 4 5 Site 4 Site 5 & Site 3 3 if_13 Interface: if_13 RD = RD_3 Export Target = Green Import Target = Green if_3c if_3b 3 if_32 6 Site 6 Site 8 8 if_31 if_33 7 Site 7 Interface: if_31 RD = RD_8 Export Target = Red Import Target = Red Interface: if_32, if_33 RD = RD_67 Export Target = Green Import Target = Green Figure 6: BG/MLS VN VN Routing & Forwarding tables (s) At a, a represents the context that is specific to an attached VN; a is primarily associated to (is identified by) the one or more sub-interfaces through which the sites belonging to this VN are connected. In Figure 6 study case, all the s have only one sub-interface but Green at 3 that has 2 sub-interfaces (those of Site 6 and 7). The other parameters that must be defined at creation time are (1) the route distinguisher (RD) and (2) the route targets (RT) for the Import and Export policies; these parameters are used when the VN private routes are distributed via the backbone to the other sites. The RDs enable the overlapping of addresses between VNs while the RTs enable the distribution of VN routes to the relevant remote sites. Keep it Simple with BG / MLS VNs White aper May 2002 age 9

3.3. re-established ibg sessions and LSs For VN sites to be attached and be operational, there are two prerequisites to be performed at S network configuration time: (1) the establishment of internal BG (ibg) sessions between s and (2) the set-up of MLS label switch paths between s. These two conditions summarize the fundamental mechanisms used by BG/MLS VNs:! On the Control plane: the use of BG for the distribution of VN routes through the S backbone! On the Data plane: the use of MLS for the I traffic forwarding itself, more exactly the transfer of VN data through the S backbone. MiBG 29 3 LS if_2a 21 2 3 19 if_2b 23 if_1a LS 3 LS 1 12 13 MiBG MiBG if_1b LS 3 3 LS if_3b 31 3 LS if_3a 32 3 Figure 7: BG/MLS VN -to- pre-established ibg sessions and LSs Multi-protocol BG must be used for the sessions between s. However, this is no more a new feature and this functionality is integrated in the software of backbone routers. M-BG is required because it enables routers to convey other routes than the classical 4-byte Iv4 routes. As we will see later on, VN routes are not distributed within the backbone as Iv4 routes; they are prefixed with the route distinguisher and are therefore 12-bytes long. Instead of a full-mesh of -to- ibg sessions, route reflectors can be used for scalability. This point is not discussed further since it does not impact the logic of VN routes distribution. MLS LSs are unidirectional and therefore a pair of LSs must be established between s (for QoS purposes, several pairs could be set-up with different queuing priorities). It should be noticed, in the perspective of the data transfer phase discussed later on, that the number shown at the ingress side of the LS, represents the outer label. The labels shown at the egress side of a router represents the swap labels (e.g. 19 and 29 between 1 and 2). The labels numbered 3 represent a special label value indicating that this router is the penultimate hop in the path. LSs are established using either LD or RSV. Keep it Simple with BG / MLS VNs White aper May 2002 age 10

3.4. Control lane VN Route Distribution to Distribution of VN routes is shown in several phases: (1) from to (2) from to and (3) from to. It should be noted that, although the representation suggests some simultaneity for all sites, this process occurs either when a site is attached or detached (join and prune operations), or when some routes are added, modified or removed at a site. From the customer perspective, routing occurs normally. Once agreed with the S which sites are parts of which VN and what is the logical topology a full-meshed topology is enabled by default but the customer may want to restrict it to some partial-meshed topology the peers with its and advertises its routes. The routing protocols may be interior routing protocols (RI, OSF) or BG. It is also possible not to use any routing protocol and instead have static routing configured at each site. For clarification, we will assume in the remainder of this paper that dynamic routing is used. Site 1 1 10.5/16: if_12, 1002 : if_11, 1001 : if_21, 2001 2 if_21 4 Site 4 Site 2 10.5/16 2 if_12 if_11 1 : if_22, 2002 if_22 5 Site 5 & Site 3 3 if_13 : if_13, 1003 VN label 3 if_32 6 Site 6 Site 8 8 if_31 : if_31, 3001 if_33 : if_32, 3002 : if_33, 3003 7 Site 7 Figure 8: BG/MLS VN to Route Distribution When the receives routes over a sub-interface, it stores them in the associated. These local routes are at the classical I format (and are stored as such in the ). In the, they are associated to the subinterface and are assigned a label value. This label is known as the VN label (also known as inner label or bottom label in regards to its conveyance within the LS). The VN label value is a s local matter. It identifies the sub-interface by which this route is learned. Hence, routes learned over the same sub-interface will have the same label value. This will enable the when receiving traffic towards one of these routes to choose the suitable sub-interface. When two sites (or more) attached to one are in the same VN, they gain connectivity directly via the that they share. This is illustrated on Figure 8 with Sites 6 and 7. In this figure, the are dimensioned according to the number of routes they will eventually contain. At this stage, the local routes in the are represented in plain colour. It should be noticed that for an overall understanding of the illustration, labels and interfaces have been numbered consistently with the first digit corresponding to the number (e.g. if_31 and VN label 3001 for 8 connected to 3). Keep it Simple with BG / MLS VNs White aper May 2002 age 11

to Once the has learned local routes from its s, it will advertise them via BG to the other s, according to the Route Distinguisher and Export Route Target(s) that were defined at creation time (see Figure 6). First, the VN routes could not be conveyed as such via BG (since I address overlapping can normally occur between VNs) otherwise only one route would be kept, thus making the others unreachable. Routes are therefore prefixed with an 8-byte Route Distinguisher that typically consists of the S s number plus the VN identifier. Besides, the VN label that was allocated to each local route must also be conveyed with this route. This is why we refer to the format of VN routes when advertised through the backbone as labelled VN-Iv4 routes. The VN routes will also be flagged as extended BG community attributes with their one or more Route Targets. Finally, the Next Hop BG attribute value is the (advertising) loopback address itself. Site 1 Site 2 10.5/16 2 Site 3 1 3 if_12 if_11 if_13 : if_1b, 13 + 3001 LS label 1 : if_1b, 13+3002 : if_1b, 13+3003 if_1b if_1a ibg Updates VN-Iv4 @ Rd_8: Rd_67: Rd_67: if_3b Label 3001 3002 3003 : if_2b, 21+3001 NH @ 3 3 3 3 if_2a ibg Updates RT(s) Red Green Green if_3a 2 if_2b if_32 if_21 if_22 6 4 5 Site 6 Site 4 : if_2b, 23+3002 : if_2b, 23+3003 Site 5 & Site 8 8 if_31 if_33 7 Site 7 Figure 9: BG/MLS VN -to- Route Distribution An example of the VN route distribution from 3 to other s is shown in Figure 9. 3 exports the local routes of its two s according to the RD and Export RT of each. When 1 and 2 receive these BG updates, they will filter the labelled VN routes according to the Import olicy of each of their s, before completing these s with the relevant VN routes. In Figure 9, the remote routes in s Red and Blue at 1, as well as in s Red and Brown at 2, are shown with a different pattern (with transversal lines). They are stored in the as Iv4 routes (the RD has been removed) along with the suitable interface and label stack (where the outmost label represents the LS ingress label enabling this to reach the egress as mentioned in the BG Next Hop parameter while the inner label is the VN label just received with this VN route). Once all the VN routes have been distributed through the S backbone, all the s of all the s contain both their local routes as well as the remote routes, as shown in Figure 10. Keep it Simple with BG / MLS VNs White aper May 2002 age 12

to When a at a is updated with a remote route, it advertises this route to the attached s that are associated to this. As shown in Figure 10, there is then full I connectivity between the sites belonging to the same VN. For example Site 1 has learned via its peer (1) the routes from Sites 4 and 8. Similarly, Site 5, which is shared between VN Blue and VN Green, has learned routes from remote site 2 (Blue) as well as remote sites 3, 6 and 7 (Green). Site 1 1 2 if_21 4 Site 4 Site 2 10.5/16 2 if_12 if_11 1 10.5/16 if_22 5 Site 5 & Site 3 3 if_13 3 if_32 6 Site 6 Site 8 8 if_31 if_33 7 Site 7 Figure 10: BG/MLS VN -to- Route Distribution Here is a summary of the (logical) tables finally available at each :! Remote routes are shown in bold and shaded in grey! There is no outer label for the local routes 1 Route Output Interface Outer Label Inner Label 2 Route Output Interface Outer Label Inner Label 3 Route Output Interface Outer Label Inner Label if_11 1001 if_21 2001 if_31 3001 Red if_1a 12 if_1b 13 2001 3001 Red if_2a 21 if_2b 23 1001 3001 Red if_3b 31 if_3a 32 1001 2001 Blue Green 10.5/16 if_12 if_1a 12 if_13 if_1b 13 if_1b 13 1002 2002 1003 3002 3003 Brown 10.5/16 if_22 if_2b 23 if_2b 23 if_2a 21 2002 if_2a 21 1003 3002 3003 1002 Green if_32 if_33 if_3b 31 if_3a 32 3002 3003 1003 2002 if_1a 12 2002 Keep it Simple with BG / MLS VNs White aper May 2002 age 13

3.5. Data lane Forwarding across the Backbone Route distribution on the control plane has enabled the building of the s and thus prepared the transfer of I traffic between sites. Figure 11 illustrates two simultaneous data transfers: (1) from a host at Site 1 to, for example, some server at Site 4 (with I address 10.2.4.2); and (2) from a host at Site 3 to some other server at Site 5 (with I address 10.4.1.8). 19 Site 1 Site 2 10.5/16 2 1 if_12 2001 12 10.2.4.2 2001 ayload 10.2.4.2 19 ayload 2002 12 10.4.1.8 2002 ayload 10.2.4.2 10.4.1.8 ayload ayload if_11 x if_1a 1 if_1b y 2001 10.2.4.2 ayload 2002 10.4.1.8 ayload if_2a if_2b 2 10.2.4.2 ayload if_21 if_22 10.4.1.8 ayload 4 5 Site 4 Site 5 & Site 3 3 if_13 10.4.1.8 ayload if_3c if_3b 3 if_32 6 Site 6 Site 8 8 if_31 if_33 7 Site 7 Figure 11: BG/MLS VN Forwarding across the Backbone When the I packet with destination address 10.2.4.2 is received by 1 from 1, the Red is interrogated and the entry corresponding to route indicates if_1a as output interface, 12+2001 as label stack, as well as (not shown) a data link header. The label stack is inserted in front of the I packet, the data link header is inserted in front of the label stack and the resulting frame is queued on the output interface. Similarly, when the I packet with destination address 10.4.1.8 is received by 1 from 3, the Green is interrogated and the entry corresponding to route indicates if_1a as output interface, 12+2002 as label stack, as well as (not shown) a data link header. The label stack is inserted in front of the I packet, the data link header is inserted in front of the label stack and the resulting frame is queued on the output interface. The two frames are sent on the LS egress path (1 s output interface: if_1a); at x router, the top labels are swapped (19 replaces 12) and the labelled packets forwarded towards y, which is the penultimate hop in the LS. As a result, the outer labels are popped and the packets sent towards 2 with only the inner label in front. At egress 2, the relevant sub-interface is retrieved from the VN label and the original Iv4 packet is finally forwarded to the enabling you to reach the server within the site. Keep it Simple with BG / MLS VNs White aper May 2002 age 14

4. Carrier of Carriers A BG/MLS VN service provider is referred to as a Carrier of Carriers when its role is to deliver VN services to another S of which sites (typically Os, but possibly regional networks) are geographically dispersed. This S can be another BG/MLS VN S or an Internet Service rovider (IS). All the sites of the customer S have the same number. Figure 12 shows (in gold colour) a BG/MLS VN S as a customer (the S). In this example, the sites are single Os with only one router acting (1) as a vis-à-vis the Carrier s, and (2) as a in regards to its own customers. The S s routers could be simply co-located at the Carrier s Os. Site 8 Site 7 o B Site 1 Site 6 o A Carrier of Carriers o C Site 2 Site 5 o D Site 3 Site 4 Figure 12: Carrier of Carriers BG/MLS VN S as a Customer Keep it Simple with BG / MLS VNs White aper May 2002 age 15

With this method: (1) the S needs only advertise from to its (few) internal routes to the Carrier; (2) MLS is at least required between the Carrier and the S at the - boundary; and (3) the S establishes MiBG sessions between its s for distributing its own external routes, i.e. labelled VN IV4 routes in case of a BG/MLS VN S, or the so-called 100,000 Internet routes in case of an IS. Figure 13 shows, in contrast to the previous case, an IS as a customer. In this example, the sites are single Os with only one router acting (1) as a vis-à-vis the Carrier s, and (2) as an BR ( Border Router) in regards to its own customers, peering partners, or upstream transit providers. Note: This figure purposely does not represent a realistic localisation of the different types of peers. Instead, it reflects the logical organisation of Internet connectivity: upstream providers at the top, peering partners laterally, and customers at the bottom... Upstream rovider BR Upstream rovider BR BR o B eering artner eering artner BR o A BR Carrier of Carriers BR BR BR o C BR eering artner eering artner o D BR BR BR Customer Customer Figure 13: Carrier of Carriers IS as a Customer Keep it Simple with BG / MLS VNs White aper May 2002 age 16

5. Multi-rovider BG/MLS VNs A same BG/MLS VN can be split over two (or more) service providers. These S networks, which have different numbers, must therefore be interconnected, either directly (as shown in Figure 14) or via some transit service provider. Assuming that each S has globally unique addresses, the preferred solution is (1) to use EBG between border routers for the redistribution of labelled Iv4 internal routes; and (2) to establish multi-hop ebg sessions for inter-provider -to- redistribution of labelled VN Iv4 routes. Site 5 Site 4 Site 3 ebg redistribution of internal routes BG/MLS S 1 BR BR BG/MLS S 2 Site 1 Multi-hop ebg redistribution of VN routes Site 2 Figure 14: Multi-rovider BG/MLS VNs Direct Interconnection In case a transit provider is used between the two BG/MLS VN Ss, this transit provider can be either itself a BG/MLS VN S, or simply an MLS-capable S. It should be noted that the ebg solutions used for multi- operations (between different Ss) could be applied as well in the case of a single S that has several numbers. Keep it Simple with BG / MLS VNs White aper May 2002 age 17

6. Accessing Internet from a BG/MLS VN 6.1. Non- Internet Access A centralised Customer site with an Internet access via another interface to the same S enables all VN users, via a Firewall with NAT function, to access the Internet. Internet 2 2 Site 2 NAT + Firewall Site 1 1 1 BG/MLS VN & Internet S 3 3 Site 3 Figure 15: Non- Internet Access 6.2. Internet Access The sub-interface can be used as well for accessing the Internet. However, unless this service is offered by the S, the NAT and Firewalls are required, generally at one or more centralised sites. Internet 2 2 Site 2 NAT + Firewall Site 1 1 1 BG/MLS VN & Internet S 3 3 Site 3 Figure 16: Internet Access Keep it Simple with BG / MLS VNs White aper May 2002 age 18

List of Abbreviations Autonomous System IS-IS Intermediate System to rovider Edge BR Autonomous System Border Intermediate System O oint Of resence Router IS Internet Service rovider oint-to-oint rotocol ATM Asynchronous Transfer Mode LAN Local Area Network VN rovider rovisioned VN BG Border Gateway rotocol LD Label Distribution rotocol RD Route Distinguisher Customer Edge LS Label Switched ath RI Routing Information rotocol C EBG EG FR GRE IBG Customer remises Equipment External BG (also ebg) Exterior Gateway rotocol Frame Relay Generic Routing Encapsulation Internal BG (also ibg) LSR Label Switching Router M-BG Multi rotocol BG (accordingly M-iBG and M-eBG) MLS Multi rotocol Label Switching NAT Network Address Translation NBVN Network-Based VN RR RSV RT SA SDH Route Reflector Resource Reservation rotocol Route Target Security Association Synchronous Digital Hierarchy (STM-1, STM-4, STM-16...) IG IKE ISec Interior Gateway rotocol (e.g., RI, IS-IS and OSF) Internet Key Exchange Internet rotocol Security protocol OSF DH Open Shortest ath First routing protocol rovider equipment lesiochronous Digital Hierarchy (E1, E3, DS3) S VN Service rovider Virtual rivate Network VN Routing and Forwarding table References [1] "BG/MLS VNs", Rosen, E. et al., draft-ietf-ppvpn-rfc2547bis-01.txt, January 2002. [2] Use of - Isec in RFC2547 VNs, Rosen, E. et al., draft-ietf-ppvpn-ipsec-2547-01.txt, February 2002. [3] Use of - GRE or I in RFC2547 VNs, Y. Rekhter & E. Rosen, draft-ietf-ppvpn-gre-ip-2547-01.txt, February 2002. [4] RFC2547bis: BG/MLS VN Fundamentals White aper; Chuck Semeria; 03/01 Juniper Networks [5] RFC2547bis: BG/MLS VN Hierarchical and Recursive Applications White aper; Chuck Semeria; 07/01 Juniper Networks [6] "Service requirements for Layer 3 rovider rovisioned Virtual rivate Networks", Carugi, M. et al., draft-ietf-ppvpn-requirements- 04.txt, March 2002. [7] "A Framework for Layer 3 rovider rovisioned Virtual rivate Networks", Callon, R. et al., draft-ietf-ppvpn-framework-04.txt, February 2002. [8] A Framework for rovider rovisioned -based Virtual rivate Networks using Isec, De Clercq et. al., draft-ietf-ppvpn-cebased-01.txt, November 2001. [9] MLS and VN Architectures, Ivan epelnjak & Jim Guichard; Cisco ress Keep it Simple with BG / MLS VNs White aper May 2002 age 19

Glossary VN communication between a set of sites, making use of a shared network infrastructure. VN VN for which the service provider participates in management and provisioning of the VN. User A user is an entity (e.g., a human being using a host, a server, or a system) that has been authorized to use a VN service Site A site is a set of users that have mutual I reachability without use of a specific service provider network. A site may consist of a set of users that are in geographic proximity. However, two geographic locations connected via another provider's network would also constitute a single site since communication between the two locations does not involve the use of the service provider offering the VN service. Customer A single organization, corporation, or enterprise that administratively controls a set of sites. Intranet An intranet restricts communication to a set of sites that belong to one customer. An example is branch offices at different sites that require communication to a headquarters site. Extranet An extranet allows the specification of communication between a set of sites that belong to different customers. In other words, two or more organizations have access to a specified set of each other's sites. Examples of an extranet scenario include multiple companies cooperating in joint software development, a service provider having access to information from the vendors' corporate sites, different companies, or universities participating in a consortium. Access connection An access connection provides connectivity between a and a. This includes over dedicated physical circuits, as well as logical circuits, such as Ethernet, frame Relay or ATM, or I tunnels (e.g., Isec, L2T). Access network An access network provides access connections between and devices. It may be a TDM network, L2 network (e.g. FR, ATM, and Ethernet), or an I network over which access is tunnelled Tunnel A tunnel between two entities is formed by encapsulating packets within another encapsulating header for purpose of transmission between those two entities in support of a VN application. Examples of protocols commonly used for tunnelling are: MLS, GRE, Isec, and I-in-I tunnels. Hierarchical Tunnel Encapsulating one tunnel within another forms a hierarchical tunnel. Note that the tunnelling protocols need not be the same in a hierarchical tunnel. In the context of VNs, a hierarchical tunnel is a logical association between two entities (e.g., a or switching-router or router) defined by the innermost tunnel protocol header in a hierarchical tunnel For reasons of efficiency, some VN solutions use hierarchical tunnels between routers to reduce the number of tunnels seen by routers in the backbone. -based VN A -based VN is one in which knowledge of L3 aspects of the customer network is limited to devices. Customer sites are interconnected via tunnels or nested tunnels. The S backbone is unaware of the existence of the VN. -based VN A -based VN is one in which the S backbone is aware of (i.e., maintains state information for) the VN, and provides a layer 3 service that routes packets between customer sites using the customer network's address space. Keep it Simple with BG / MLS VNs White aper May 2002 age 20