L3VPN Training Course
L3VPN Training Course
Valerio Martini
This tutorial is licensed under the Creative Commons creativecommons.org/licenses/by-nc-sa/3.0/ http://www.ist-nobel.org/Nobel2/servlet/Nobel2.Main
Summary
What is a VPN? MPLS VPN (RFC4364). A choice Private Instances of routing (VRFs Table) Multi Protocol BGP A MPLS Tunnel A quick view on:
VPN Multi Domain VPN QoS and Scalability
What is a VPN ?
A Virtual Private Network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy and reservation through the use of tunneling protocols
Layer3 VPNs (L3VPN) are based on IP/MPLS networks (cfr. RFC4364 BGP MPLS/IP VPN) L3 VPN connectivity is provided across Service Providers networks L3 VPNs are based on IP address scheme and the relevant virtual connectivity is based on the use of ad hoc forwarding table called VRF (VPN Routing and Forwarding tables) Backbone Routers (P-Routers) are unaware of the tunnel and VRF tables but are aware of tunneling protocols Service Provider routers (PE-Routers) are outsourced to corporate network WANs (Sites) to establish L3 VPN
VPN Terminology
VPN 1 VPN 2 VPN 3 VPN 3
FE P Provider Router PE Provider Edge Router CE Customer Edge Router GE VPN 1 VPN 3
P
FE
VPN 1
Backbone Backbone
GE
VPN 2
VPN Terminology
WAN of a corporate network (Site) consists of a network systems placed in geographic proximity VPN 3 VPN 1 VPN 2 VPN 3
Backbone
BGP - IP/MPLS - OSPF/(RSVP)
P
FE
VPN 1
GE VPN 1 VPN 3
Backbone Backbone
GE
VPN 2
VPN Terminology
VPN 1 VPN 2 VPN 3 VPN 3
FE End System An Attachment Circuit is usually considered as a Data Link e.g., a Fast Ethernet (FE) or GE Gigabit Ethernet GE VPN 1 VPN 3
P
FE
VPN 1
Backbone Backbone
GE
VPN 2
VPN Taxonomy
A brief classification :
Type of customer side Virtual Tunnel
Layer 2 VPNs provide Layer 2 connectivity e.g., Native Ethernet LAN Layer 3 VPNs provide Layer 3 connectivity e.g., based on Access IP Router
PE-based :
Network providers are responsible for VPN configuration and maintenance
CE Vs PE Based
Type of endpoint (Location) of the tunnel
Service Provider is responsible for all domain endpoints and must be able to
configure all Edge Routers maintain the router provide advanced services operate on point-to-point Security (IPsec PE-based) For example: VPN L3 belongs natively to this category The Customer network is completely VPN unaware
This tutorial is licensed under the Creative Commons creativecommons.org/licenses/by-nc-sa/3.0/
Service providers that offer Layer 3 VPN services can take advantage of new, advanced features
L3 VPN services allow businesses to outsource their current network core using a private IP-based service offering from an SP. the most common deployment is an any-to-any topology where any customer device can connect directly to the L3 VPN. Enterprise traffic entering the SP domain is then routed based on the information in the VRF table and encapsulated with MPLS labels to ensure proper tunneling and de-multiplexing through the core.
The main three steps for the establishment of a VPN over an IP/MPLS backbone:
1. 2. 3.
Routing Instance Configuration (VRFs Table and Policy) BGP-MP (MultiProtocol) configuration (it carry VRFs table Among PEs) MPLS Configuration
10
11
VPN 3
FE
FE FE - 1
Key
FE - 2 VPN 1 VPN 2 VPN 3 Firewall FE
VPN 1
VPN 1 VPN 3
FE
FE
FE VPN 2
12
MPLS MPLS OSPF OSPF RSVP RSVP BGP-MP BGP-MP Backbone Backbone
Enterprises
CE Routing Tables
OSPF Domain
There are three methods to populate the VRF Statically (by manually configuration) or RIP OSPF BGP [email protected] 13
IP pkt
Customer Network
Customer Network
1. Identify VPN
VRFs Tables
5. Send out
The Route Target is used to distinguish different VRF tables PE Router Composes The This tutorial is licensed under the Creative Commons Labeled Frame
creativecommons.org/licenses/by-nc-sa/3.0/
Label MPLS
Label VPN
IP pkt
14
IP
IP
IP IP
VPN Site
The Core Routers Are Completely UNAWARE of the label VPN -TAG This tutorial is licensed under the Creative Commons
creativecommons.org/licenses/by-nc-sa/3.0/
15
Routers PE Configuration <routing-instances> <routing-instances> <instance> <instance> <name> <name> vpn-ABC vpn-ABC </name> </name> <instance-type> <instance-type> VRF VRF </instance-type> </instance-type> <interface> <interface> fe-0/3/1.0 fe-0/3/1.0 </interface> </interface> <route-distinguisher> <route-distinguisher> 2.2.2.2:RD 2.2.2.2:RD </route-distinguisher> </route-distinguisher> </instance> </instance> </routing-instances> </routing-instances>
This tutorial is licensed under the Creative Commons creativecommons.org/licenses/by-nc-sa/3.0/
FIRST the name of routing instance SECOND the type of routing instance THIRD the name of Juniper physical interface FOURTH the VPN IPv4 family Address [email protected] 16
VPN 3
FE
FE FE - 1
Key
FE - 2 VPN 1 VPN 2 VPN 3 Firewall FE
VPN 1
VPN 1 VPN 3
FE
FE
FE VPN 2
17
Routers PE Configuration
<bgp> <bgp> <local-address> <local-address> 2.2.2.2 2.2.2.2 </local-address> </local-address> <local-as> <local-as> AS AS </local-as> </local-as> <group> <group> <name> 1-2-3 </name> <name> 1-2-3 </name> <type>internal</type> <type>internal</type> <neighbor> <neighbor> <name> Edge-1 </name> <name> Edge-1 </name> <local-address> 1.1.1.1 </local-address> <local-address> 1.1.1.1 </local-address> <name> Edge-3 </name> <name> Edge-3 </name> <local-address> 3.3.3.3 </local-address> <local-address> 3.3.3.3 </local-address>
This tutorial is licensed under the Creative Commons creativecommons.org/licenses/by-nc-sa/3.0/
FIRST the name of the Local Address of PE SECOND the Autonomous System THIRD the name of BGP group
18
Routers Route-Reflector
Route REFLECTOR RR is a Designated Router
BGP is based over a full mesh refresh n(n-1)/2 Session e.g., 10 Routers 10*(10-1)/2 = 45 BGP Sessions BGP with RR (n-1)+(n-1) Session e.g., 10 Routers 9+9 = 18 BGP Sessions
Route REFLECTOR
19
VPN 3
FE
FE FE - 1
Key
FE - 2 VPN 1 VPN 2 VPN 3 Firewall FE
VPN 1
VPN 1 VPN 3
FE
FE
FE VPN 2
20
VPN Site
Routers PE Configuration
VPN Site <mpls> <mpls> <label-switched-path> <label-switched-path> <name> <name> to-A CR 2 to-A </name> </name> Core Router <to> CR 1 <to> 1.1.1.1 1.1.1.1 </to> </to> The FIRST <bandwidth> the name of the LSP <bandwidth> 30m 30m The SECOND </bandwidth> </bandwidth> the Destination of LSP (EGRESS ROUTER) <install> <install> 10.20.12.0/24<active/> The THIRD 10.20.12.0/24<active/> the bandwidth reserved </install> </install> </label-switched-path> </label-switched-path> The FOURTH </mpls> set of IP activated </mpls> This tutorial is licensed under the Creative the Commons
creativecommons.org/licenses/by-nc-sa/3.0/
CR 3
VPN Site
21
Benefits
RFC4364 defines an emerging standard commonly named MPLS VPN or more exactly BGP/MPLS IP VPN
VPNs use overlapping Address Spaces (VPN IPv4 Family) Providers use existing protocols (BGP, RSVP, OSPF, MPLS) Provider backbones routers do not need to have any VPN routing information Providers can get good SLA and QoS support Customers are UNAWARE of MPLS (all the work is done by Service Provider) Customers are UNAWARE of security policy Customers are UNAWARE of connectivity and routing VPN management
This tutorial is licensed under the Creative Commons creativecommons.org/licenses/by-nc-sa/3.0/
22
Drawback
RFC4364 defines an emerging standard commonly named MPLS VPN or more exactly BGP/MPLS IP VPN
IP onlyL3 VPNs transport only IPv4 traffic.
Non-IP protocols need to be tunneled through some mechanism (such as GRE) on the CE or C devices
Possible difficulties in integrationThe difficulty of integration from Layer 2 to Layer 3 peering varies greatly depending on the SP offering. If the SP does not offer some service, integration with a different routing protocol, such as eBGP, might require
23
VPN Multi-Domain
Two sites of a VPN are connected to a different AUTONOMUS SYSTEM (AS) There are 2 methods to implement this features :
VRF-to-VRF EBGP (External BGP)
AS 2
AS 1
AS 3
25
References
IANA Consideration (Internet Assigned Number Authority) IANA has created a new registry for the Route Distinguisher Type Field Rosen, E., Rekhter, Y., BGP/MPLS IP Virtual Private Network, RFC 4364 Mertz, C., The Latest in Virtual Private Network, Part I&II, IEEE Internet Computing, June 2004; available at http://computer.org/internet Daugherty, B., and Mertz, C., Multiprotocol Label Switching And IP, Part I, IEEE Internet Computing, June 2005; available at http://computer.org/internet JUNOS software documentation for M-series and T-series platforms, available at http://www.juniper.net/techpubs
26