MPLS Implementation MPLS VPN



Similar documents
For internal circulation of BSNLonly

Introducing Basic MPLS Concepts

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

How Routers Forward Packets

Implementing Cisco MPLS

Cisco Configuring Basic MPLS Using OSPF

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS VPN Implementation

Introduction to MPLS-based VPNs

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

- Multiprotocol Label Switching -

MPLS VPN Technology. Overview. Outline

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN

RFC 2547bis: BGP/MPLS VPN Fundamentals

Fundamentals Multiprotocol Label Switching MPLS III

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Table of Contents. Cisco Configuring a Basic MPLS VPN

Configuring a Basic MPLS VPN

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Exam : Implementing Cisco Service Provider Next-Generation Egde Network Services. Title :

Kingston University London

Part The VPN Overview

Lab 4.2 Challenge Lab: Implementing MPLS VPNs

Enterprise Network Simulation Using MPLS- BGP

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Using OSPF in an MPLS VPN Environment

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

MPLS-based Layer 3 VPNs

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

IPv6 over IPv4/MPLS Networks: The 6PE approach

Cisco Implementing Cisco Service Provider Next-Generation Egde Network Services. Version: 4.1

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

MPLS L2VPN (VLL) Technology White Paper

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

MPLS VPNs with DiffServ A QoS Performance study

Approach to build MPLS VPN using QoS capabilities

Frame Mode MPLS Implementation

Multi Protocol Label Switching (MPLS) is a core networking technology that

Why Is MPLS VPN Security Important?

Implementing VPN over MPLS

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

How To Make A Network Secure

MPLS Applications. Karel Pouzar CCIE#20198, CCSI#31414

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS Concepts. Overview. Objectives

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: Requirements

MPLS Security Considerations

l.cittadini, m.cola, g.di battista

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at:

Exam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: Total Questions: 401

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Introduction Inter-AS L3VPN

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Configuring MPLS VPN & Remote Access. 12- ian- 2010

Virtual Private Networks. Juha Heinänen Song Networks

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

SEC , Cisco Systems, Inc. All rights reserved.

Inter-Autonomous Systems for MPLS VPNs

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

Layer 3 Multiprotocol Label Switching Virtual Private Network

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

MPLS/VPN Overview Cisco Systems, Inc. All rights reserved. 1

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Security of the MPLS Architecture

Methods of interconnecting MPLS Networks

Internetworking II: VPNs, MPLS, and Traffic Engineering

SBSCET, Firozpur (Punjab), India

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

November Defining the Value of MPLS VPNs

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Implementing Cisco MPLS

Quidway MPLS VPN Solution for Financial Networks

Advanced MPLS VPN Solutions

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

VPN Technologies A Comparison

MPLS VPN Route Target Rewrite

Protection Methods in Traffic Engineering MPLS Networks

MPLS Concepts. MPLS Concepts

MPLS Architecture for evaluating end-to-end delivery

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

MPLS Virtual Private Networks

S ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

Layer 3 MPLS VPN Enterprise Consumer Guide Version 2

Transcription:

MPLS Implementation MPLS VPN Describing MPLS VPN Technology

Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay VPN implementation model. Describe the benefits and disadvantages of the peer-topeer VPN implementation model. Describe the features of the MPLS VPN architecture. Describe routing in the MPLS VPN architecture.

VPN Taxonomy Overlay VPNs Service providers provide virtual point-to-point links. Peer-to-peer VPNs Service providers participate in the customer routing.

VPN Terminology Customer site Large customer site Provider Network (P-Network): the Service Provider infrastructure used to provide VPN services Customer Network (C-Network): the part of the network still under customer control Customer Site: a contiguous part of customer network (can encompass many physical locations)

VPN Terminology Customer site Service Provider Network Large customer site Provider Edge (PE) device: the device in the P-network to which the CE-devices are connected Provider core (P) device: the device in the P-network with no customer connectivity Customer Edge (CE) device: the device in the C-network with link into P-network. Also called Customer Premises Equipment (CPE)

Overlay VPNs Layer 1 Overlay VPN Mentioned for historical reasons only. Layer 2 Overlay VPN Traditional switched WAN Implmented with X.25, Frame Relay, ATM and SMDS SP is responsible for transport of Layer 2 frames Customer is responsible for all higher layers Layer 3 Overlay VPN SP network is invisible to customer routers Uses IP tunneling SP provides point-to-point data transport between customer sites

Layer 2 Overlay VPN Using Frame Relay

Layer 3 Overlay VPNs Router A Router B Router C Router D The service provider infrastructure appears as point-to-point links to customer routes. Routing protocols run directly between customer routers. The service provider does not see customer routes and is responsible only for providing point-to-point transport of customer data.

Peer-to-Peer VPNs

Benefits and Disadvantages of the Overlay VPN Implementation Model Benefits: Well-known and easy to implement. Service provider does not participate in customer routing. Customer network and service provider network are wellisolated. Disadvantages: Implementing optimum routing requires a full mesh of VCs. VCs have to be provisioned manually. Bandwidth must be provisioned on a site-to-site basis. Overlay VPNs always incur encapsulation overhead (IPsec or GRE).

Benefits and Disadvantages of the Peer-to- Peer VPN Implementation Model Benefits: Guarantees optimum routing between customer sites. Easier to provision an additional VPN. Only sites are provisioned, not links between them. Disadvantages: The service provider participates in customer routing. The service provider becomes responsible for customer convergence. PE routers carry all routes from all customers. The service provider needs detailed IP routing knowledge.

Non-SP Related Drawbacks of Peer-to-Peer VPNs Shared PE router: All customers share the same (provider-assigned or public) address space. High maintenance costs are associated with packet filters. Performance is lower each packet has to pass a packet filter. Dedicated PE router: All customers share the same address space. Each customer requires a dedicated router at each POP.

MPLS VPN Architecture An MPLS VPN combines the best features of overlay VPN and a peer-to-peer VPN models: PE routers participate in customer routing, guaranteeing optimum routing between sites and easy provisioning. PE routers carry a separate set of routes for each customer (similar to the dedicated PE router approach). Customers can use overlapping addresses.

MPLS VPN Architecture (Cont.)

PE Router Architecture

Propagation of Routing Information Across the P- Network

Routing Information Propagation Across P- Network IGP for Customer A IGP for Customer A Customer A IGP for Customer B IGP for Customer B Customer B IGP for Customer C IGP for Customer C Customer B PE-Router-X P-Router PE-Router-Y Customer C Customer C P-Network Customer A Q: How will PE routers exchange customer routing information? A1: Run a dedicated IGP for each customer across P-network. Wrong answer: The solution does not scale. P-routers carry all customer routers.

Routing Information Propagation Across P- Network Customer A A dedicated routing protocol used to carry customer routes Customer B Customer B PE-Router-X P-Router PE-Router-Y Customer C Customer C P-Network Customer A Q: How will PE routers exchange customer routing information? A2: Run a single routing protocol that will carry all customer routes inside the provider backbone. Better answer, but still not good enough P-routers carry all customer routers.

Routing Information Propagation Across P- Network Customer A A dedicated routing protocol used to carry customer routes between PE routers Customer B Customer B PE-Router-X P-Router PE-Router-Y Customer C Customer C P-Network Customer A Q: How will PE routers exchange customer routing information? A3: Run a single routing protocol that will carry all customer routes between PE routers. Use MPLS labels to exchange packets between PE routers. The best answer P-routers do not carry customer routes, the solution is scalable.

Routing Information Propagation Across P- Network Customer A A dedicated routing protocol used to carry customer routes between PE routers Customer B Customer B PE-Router-X P-Router PE-Router-Y Customer C Customer C P-Network Customer A Q: Which protocol can be used to carry customer routes between PE-routers? A: The number of customer routes can be very large. BGP is the only routing protocol that can scale to a very large number of routes. Conclusion: BGP is used to exchange customer routes directly between PE routers.

Propagation of Routing Information Across the P- Network The number of customer routes can be very large; BGP is the only routing protocol that can scale to such a number. BGP is used to exchange customer routes directly between PE routers.

Route Distinguishers Question? How will information about the overlapping subnetworks of two customers be propagated via a single routing protocol? Answer: Extend the customer addresses to make them unique. The 64-bit RD is prepended to an IPv4 address to make the address globally unique. The resulting address is a VPNv4 address. VPNv4 addresses are exchanged between PE routers via BGP. BGP that supports address families other than IPv4 addresses is called multiprotocol BGP (MPBGP).

Distinguishing Routes: Steps 1, 2, and 3

Distinguishing Routes: Steps 4 and 5

Using RDs in an MPLS VPN The RD has no special meaning. The RD is used only to make potentially overlapping IPv4 addresses globally unique. This design cannot support all topologies that are required by the customer.

VoIP Service on an MPLS VPN Requirements: All sites of one customer need to communicate. Central sites of both customers need to communicate with VoIP gateways and other central sites. Other sites from different customers do not communicate with each other.

Connectivity Requirements for VoIP Service

Route Targets Site 2 VPN 1 Site 4 VPN 2 Site 1 Site 3 VPN 3 Site 5 Some sites participate in more than one VPN. The RD cannot identify participation in more than one VPN. RTs were introduced in the MPLS VPN architecture to support complex VPN topologies. RTs are additional attributes that attach to VPNv4 BGP routes to indicate VPN membership.

How Do RTs Work? Export RTs: Identify VPN membership Append to the customer route when the route is converted into a VPNv4 route Import RTs: Associate with each virtual routing table Select routes inserted into the virtual routing table

MPLS VPN Routing Criteria Designers imposed these criteria on MPLS VPNs: CE routers can only run standard IP routing software. Only PE routers need to support MPLS VPN services and Internet routing. P routers have no VPN routes.

MPLS VPN Routing: CE Router Perspective The CE routers run standard IP routing software and exchange routing updates with the PE router. The PE router appears as another router in the C- network.

PE-CE Routing Protocols PE-CE routing protocols are configured for individual VRFs. Supported protocols include BGP, OSPF, static, RIP, and EIGRP. Routing configuration on the CE router has no VRF information.

MPLS VPN Routing: Overall Customer Perspective To the customer, the PE routers appear as core routers that are connected via a BGP backbone. The usual BGP and IGP design rules apply. The P routers are hidden from the customer.

MPLS VPN Routing: P Router Perspective P routers perform as follows: Do not participate in MPLS VPN routing and do not carry VPN routes Run backbone IGP with the PE routers and exchange information about global subnetworks (core links and loopbacks)

MPLS VPN Routing: PE Router Perspective PE routers exchange the following: VPN routes with CE routers via per-vpn routing protocols Core routes with P routers and PE routers via core IGP VPNv4 routes with other PE routers via MPBGP sessions

End-to-End Routing Information Flow

VPN Label Propagation MPLS VPN Backbone CE-router CE-router Ingress-PE P-router P-router Egress-PE CE-router CE-router Q: How will the ingress PE-router get the second label in the label stack from the egress PE-router? A: Labels are propagated in MP-BGP VPNv4 routing updates.

VPN Label Propagation MPLS VPN Backbone CE-router CE-router Ingress-PE P-router P-router Egress-PE CE-router CE-router Step #1: VPN label is assigned to every VPN route by the egress PE router Egress-PE#show tag-switching forwarding vrf SiteA2 Local Outgoing Prefix Bytes tag Outgoing Next Hop tag tag or VC or Tunnel Id switched interface 26 Aggregate 150.1.31.36/30[V] 0 37 Untagged 203.1.2.1/32[V] 0 Se1/0.20 point2point 38 Untagged 203.1.20.0/24[V] 0 Se1/0.20 point2point

VPN Label Propagation MPLS VPN Backbone CE-router CE-router Ingress-PE P-router P-router Egress-PE CE-router CE-router Step #2: VPN label is advertised to all other PE-routers in MP-BGP update Ingress-PE#show ip bgp vpnv4 all tags Network Next Hop In tag/out tag Route Distinguisher: 100:1 (vrf1) 12.0.0.0 10.20.0.60 26/notag 10.20.0.60 26/notag 203.1.20.0 10.15.0.15 notag/38

VPN Label Propagation MPLS VPN Backbone CE-router CE-router Ingress-PE P-router P-router Egress-PE CE-router CE-router Step #3: Label stack is built in Virtual Forwarding table Ingress-PE#show ip cef vrf Vrf1 203.1.20.0 detail 203.1.20.0/24, version 57, cached adjacency to Serial1/0.2 0 packets, 0 bytes tag information set local tag: VPN-route-head fast tag rewrite with Se1/0.2, point2point, tags imposed: {26 38} via 192.168.3.103, 0 dependencies, recursive next hop 192.168.3.10, Serial1/0.2 via 192.168.3.103/32 valid cached adjacency tag rewrite with Se1/0.2, point2point, tags imposed: {26 38}

Summary VPNs allow you to use the shared infrastructure of a SP to implement your private networks. There are two implementation models: overlay and peer-to-peer. The MPLS VPN architecture offers SPs a peer-to-peer VPN architecture that combines the best features of overlay VPNs with the best features of peer-to-peer VPNs. MPLS VPNs use a 64-bit prefix called the route distinguisher (RD) to convert non-unique 32-bit customer IPv4 addresses into 96-bit unique addresses that can be transported. MPLS works by prepending packets with an MPLS header, containing one or more labels. This is called a label stack.