MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net



Similar documents
MPLS over Various IP Tunnels. W. Mark Townsley

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

INTRODUCTION TO L2VPNS

MPLS VPN Security BRKSEC-2145

Junos MPLS and VPNs (JMV)

Introducing Basic MPLS Concepts

Virtual Private Networks. Juha Heinänen Song Networks

How Routers Forward Packets

What Is a Virtual Private Network?

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Jerry Ash AT&T Bur Goode AT&T George Swallow Cisco Systems, Inc.

Cisco Which VPN Solution is Right for You?

SEC , Cisco Systems, Inc. All rights reserved.

VPN Technologies A Comparison

Transition to IPv6 in Service Providers

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Introduction to MPLS-based VPNs

MPLS VPN Security Best Practice Guidelines

Internetworking II: VPNs, MPLS, and Traffic Engineering

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, /Frankfurt Carsten Michel

SBSCET, Firozpur (Punjab), India

Designing and Developing Scalable IP Networks

Design of MPLS networks VPN and TE with testing its resiliency and reliability

MPLS L2VPN (VLL) Technology White Paper

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Demonstrating the high performance and feature richness of the compact MX Series

MPLS Security Considerations

Enterprise Network Simulation Using MPLS- BGP

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Implementing MPLS VPNs over IP Tunnels

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES

How To Understand The Benefits Of An Mpls Network

MPLS in Private Networks Is It a Good Idea?

MPLS-based Layer 2 VPNs. Kireeti Kompella Juniper Networks

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

Interconnecting Data Centers Using VPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Addressing Inter Provider Connections With MPLS-ICI

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

RFC 2547bis: BGP/MPLS VPN Fundamentals

The Essential Guide to Deploying MPLS for Enterprise Networks

MPLS Concepts. Overview. Objectives

Why Is MPLS VPN Security Important?

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Ethernet over MPLS tests

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

MPLS Implementation MPLS VPN

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

MPLS Virtual Private Network (VPN) Security

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.

APRICOT 2012 MPLS WORKSHOP L2VPN

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

How To Protect Your Network From Attack

IPv6 Fundamentals, Design, and Deployment

Implementing VPN over MPLS

Virtual Private LAN Service

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Quidway MPLS VPN Solution for Financial Networks

Multi Protocol Label Switching (MPLS) is a core networking technology that

Course Description. Students Will Learn

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Securing IP Networks with Implementation of IPv6

Virtual Privacy vs. Real Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Network Configuration Example

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45

Protection Methods in Traffic Engineering MPLS Networks

Transcription:

MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net

Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core IP only core transport requirements Applicability analysis of IP only core transport choices IETF status Conclusion 2

MPLS VPN Services BGP/MPLS Layer 3 VPNs draft-ietf-l3vpn-rfc2547bis-02.txt BGP/MPLS Layer 3 Multicast VPNs Draft-raggarwa-l3vpn-mvpn-vpls-mcast-00.txt Layer 2 point to point services RSVP signaled: draft-raggarwa-pwe3-rsvp-te-00.txt LDP signaled: draft-ietf-pwe3-control-protocol-10.txt Layer 2 VPNs BGP signaled: draft-ietf-l2vpn-vpls-bgp-02.txt VPLS BGP signaled: draft-ietf-l2vpn-vpls-bgp-02.txt LDP signaled: draft-ietf-l2vpn-vpls-ldp-05.txt 3

Transport Technology Choices MPLS transport tunnels Most commonly deployed for Layer 3 unicast VPNs and Layer 2 services IP transport tunnels Currently commonly deployed for Layer 3 multicast VPNs Choice determined by application requirement MPLS VPN service architecture doesn t enforce a particular transport technology 4

IP Transport Tunnels in Perspective Disadvantages MTU decreased by at least 16 bytes Multiple encapsulation options No support for resource reservation No support for explicit routing Incipient fast reroute technology However IP transport tunnels have a role 5

Why MPLS VPN Services over an IP Core? Transit routers may not support MPLS Legacy equipment in the network The Service Provider may not want to deploy MPLS Some people have a technology religion! As a migration path to a MPLS core from an IP core What to do in the interim? 6

Extending the Reach of MPLS MPLS VPN Services CE1 MPLS LSP IP Only Transit MPLS LSP CE2 PE1 P P P PE2 MPLS IP Transport Tunnel MPLS 7

Migration to MPLS MPLS VPN Services CE1 IP Only Core CE2 PE1 P P P PE2 IP Transport Tunnel 8

IP Only Core Transport Tunnel Requirements Multi-service transport tunnel technology Ability to carry multiple services on the same transport tunnel Avoid point solutions Minimize the number of additional mechanisms Minimize changes to protocols already used by VPN services Minimize introduction of new protocols An IP transport technology shouldn t require a new signaling protocol to enable a VPN service 9

IP Only Core Transport Tunnel Requirements Operational ease Configuration and management Tunnel liveliness mechanism Security considerations 10

IP Only Core Transport Choices Applicability Analysis MPLS over IP MPLS over GRE MPLS over IPsec MPLS over L2TPv3 Let us analyze the applicability of these to various MPLS VPN applications Will focus on BGP/MPLS unicast VPNs and VPLS A system wide view must be taken while evaluating the above system = service provider infrastructure 11

IP Only Core Encapsulation MPLS over IP draft-ietf-mpls-in-ip-or-gre-05.txt MPLS over GRE draft-ietf-mpls-in-ip-or-gre-05.txt MPLS over IPsec draft-ietf-mpls-in-ip-or-gre-05.txt MPLS over L2TPv3 draft-townsley-l2tpv3-mpls-01.txt 12

IP Only Core Encapsulation IP Header MPLS VPN Label EXP S TTL Payload.. MPLS Over IP IP Header GRE Header MPLS VPN Label EXP S TTL Payload.. MPLS Over GRE 13

IP Only Core Encapsulation IP Header IPSec Header MPLS VPN Label EXP S TTL Payload.. MPLS Over IPSec (Transport Mode) IP Header Session ID (32 bits) 64 bit Cookie (optional) MPLS VPN Label EXP S TTL Payload.. MPLS Over L2TPv3 14

IP Only Core BGP/MPLS Unicast VPNs MPLS over IP and MPLS over GRE No change to BGP VPN mechanisms draft-ietf-l3vpn-rfc2547bis-02.txt and draft-ietf-l3vpn-gre-ip- 2547-02.txt MPLS over IPsec Requires an additional protocol: IKE for key exchange No change to BGP VPN mechanisms MPLS over L2TPv3 Requires additional mechanism in BGP to exchange L2TPv3 session and cookie information draft-townsley-l3vpn-l2tpv3-00.txt draft-nalawade-kapoor-tunnel-safi-01.txt 15

IP Only Core VPLS over IP MPLS over IP and MPLS over GRE BGP based VPLS with no changes to BGP mechanisms. LDP based VPLS with no changes to LDP mechanisms and BGP based or manual auto-discovery MPLS over IPsec IKE for key exchange BGP based VPLS with no changes to BGP mechanisms. LDP based VPLS with no changes to LDP mechanisms and BGP based or manual auto-discovery L2TPv3 Auto-discovery? BGP? Currently requires L2TPv3 based signaling: draft-ietf-l2tpextl2vpn-01.txt 16

Multi-Service IP Transport MPLS over IP or GRE BGP/LDP based VPLS BGP/MPLS L3 VPNs CE3 CE1 IP Only Core CE2 CE4 PE1 P P P PE2 IP or GRE Dynamic Transport Tunnel 17

Application Specific IP Transport MPLS over L2TPv3 L2TPv3 Signaled VPLS BGP/MPLS L3 VPNs + L2TPv3 session/cookie CE3 CE1 IP Only Core CE2 CE4 PE1 P P P PE2 L2TPv3 Dynamic Transport Tunnel for L3 VPNs L2TPv3 Transport Tunnel / PW for VPLS 18

Meeting the Requirements Multi-Service Transport Technology MPLS over IP and MPLS over GRE support all MPLS VPN services IPsec supports only ingress replication with Multicast VPNs The same MPLS over IP, GRE and IPsec tunnel can be used for providing different MPLS VPN services The same L2TPv3 tunnel can NOT be used for providing different VPN services The complete VPLS solution with L2TPv3 is not clear Applicability of L2TPv3 to Multicast VPNs is not clear 19

Meeting the Requirements Minimize Additional Mechanisms Minimize changes to the MPLS VPN enabling technology MPLS over IP, GRE and IPsec do not require any changes MPLS over L2TPv3 requires enhancements to BGP for BGP/MPLS L3VPNs Minimize the number of new protocols MPLS over IP and GRE do NOT require new protocols IPsec requires IKE L2TPv3 requires L2TPv3 signaling for L2 transport L2TPv3 doesn t reduce the BGP/MPLS L3VPN protocols or the L2 services auto-discovery protocol 20

IP Only Core Transport Configuration and Management MPLS over IP and GRE tunnels can be dynamically created between the ingress and egress PE routers No additional mechanisms are required Several vendors are shipping soft-gre implementations IPsec tunnels require IKE configuration L2TPv3 tunnels can be dynamically created when L2TPv3 signaling is not used Additional mechanisms are required to exchange L2TPv3 session and cookie 21

IP Only Core Transport Tunnel Liveliness Mechanism BFD can be used for liveliness detection on the MPLS over IP, GRE, IPsec or L2TPv3 tunnel. BFD session will be established between the tunnel endpoints Provides scalable and sub-second liveliness detection L2TPv3 keep-alives are insufficient on their own as they are not suited to sub-second liveliness detection 22

IP Only Core Transport Security Considerations System wide perspective SP infrastructure including CE-PE link Look at some threats DoS Attacks VPN packet spoofing Does L2TPv3 add value? The role of IPsec 23

Security Considerations System Wide Perspective The chain is as strong as its weakest link Need to look at the whole system, and how to protect it against ALL security threats that are possible in practice This presentation will discuss only some of the security threats 24

Security Considerations Some Threats Denial of Service (DoS) Attacks the router s control plane Impacts ALL the customers on the attacked PE (not just one VPN) VPN packet spoofing Impacts only the specific VPN 25

Security Considerations Preventing DoS Against a Router Protect route processor Limit access to known sources requires ACL Rate limit traffic to central processor Prevent source address spoofing Filtering at ingress to service provider requires ACL Must be at line rate 26

Protecting Against DoS Attacks L3 Line Rate ACLs and Rate Limiting CE1 P IP Only Core CE2 PE1 P DoS Attack IP Transport Tunnel 27

VPN Packet Spoofing Are ACLs used for protecting against DoS sufficient? To protect against DoS: Each router limits traffic to lo0 to only sources within its own service provider Each ingress router should reject packets whose source address is from the address block used by the service provider for its infrastructure To protect against VPN packet spoofing with 2547 over IP/GRE: Filter out packets from outside which have source addresses that belong inside, and Filter out on each PE all packets which have source addresses that belong outside Bottom line: requirements for protecting against VPN packet spoofing with 2547 over IP/GRE are satisfied by the mechanisms to protect against DoS 28

Protecting Against VPN Spoofing Attacks L3 Line Rate ACLs CE1 Spoofed MPLS VPN Packet PE1 P P IP Only Core IP Transport Tunnel CE2 29

Security Considerations Does L2TPv3 Add Value? 2547 over L2TP focuses only on protection against spoofing of VPN traffic: If the IP network which MPLS packets are being carried over is vulnerable to spoofing attacks which could bypass these boundary ACLs then the L2TPv3 Cookie provides ample protection (draft-townsley-l2tpv3-mpls-01.txt) 2547 over L2TP or L2TP PWs do NOT mitigate DoS attacks against the router Line rate boundary ACLs are required to prevent DoS attacks Also protect against VPN packet spoofing Bottom line: 2547 over L2TPv3 does not eliminate the need for (line rate) ACLs and doesn t provide a value add. 30

Security Considerations The Role of IPsec Secures the CE to PE link Required for securing the end-to-end MPLS VPN service Cryptographic authentication Protection against packet spoofing between PE and CE Ensures payload integrity Encryption Ensures payload privacy 31

Meeting the Requirements Score Card Multi-service Transport MPLS over IP, GRE. Minimize changes to the enabling MPLS VPN technology Minimize # of signaling protocols MPLS over IP, GRE Configuration and management Tunnel liveliness mechanism Security considerations MPLS over IP, GRE, IPsec MPLS over IP, GRE, IPsec, L2TPv3 All require boundary ACLs Bottom line: MPLS over IP/GRE is the multi-service MPLS over IP transport technology. IPsec has limited applicability. L2TPv3 doesn t provide a value add. 32

IETF Status MPLS over IP/GRE/IPsec (draft-ietf-mpls-in-ip-or-gre-05.txt): Passed WG Last Call Passed IETF Last Call In the IESG review 2547 Unicast VPNs over IP/GRE (draft-ietf-l3vpn-gre-ip-2547-02.txt) L3VPN WG document Passed IETF Last Call In the IESG review 33

IETF Status 2547 Multicast VPNs over IP/GRe Only requires MVPN signaling and draft-ietf-l3vpn-gre-ip-2547-02.txt MPLS PWs over IP/GRE/IPsec Only requires draft Martini and draft-ietf-mpls-in-ip-or-gre-05.txt L2VPNs over IP/GRE/IPsec Only requires BGP signaling and draft-ietf-mpls-in-ip-or-gre-05.txt VPLS over IP/GRE/IPsec Only requires BGP signaling and draft-ietf-mpls-in-ip-or-gre-05.txt 34

IETF Status 2547 over L2TP: draft-townsley-l3vpn-l2tpv3-00.txt Not a WG document draft-townsley-l2tpv3-mpls-01.txt Not a WG document draft-nalawade-kapoor-tunnel-safi-01.txt Not a WG document 35

Conclusion MPLS VPN services over an IP only core have to be supported A system wide perspective must be taken while choosing the IP transport technology MPLS over IP and GRE is the multi-service MPLS over IP transport technology IPsec has its role L2TPv3 does not provide a value add 36