0% found this document useful (0 votes)
31 views19 pages

27.Security+Basics+ +VPN+Instance

Uploaded by

Muhammad Tanveer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views19 pages

27.Security+Basics+ +VPN+Instance

Uploaded by

Muhammad Tanveer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

Course Objectives

After completing this course, you will be able to:


Understand the basics of VPN instances.
Understand the main application scenario for VPN instances.
Perform basic configurations of VPN instances on Huawei switches.
Contents

VPN Instance Overview

Basic VPN Instance Configurations

Configuration Examples

FAQs
Enterprise Requirements

Production Management
network network

 SW1 is a service switch and connects to service devices. SW2


CoreSwitch
is a network management switch and connects to
management devices. The CoreSwitch is a core switch.
 The CoreSwitch is the gateway of the service and
SW1 SW2 management networks.
 VLAN10 and VLAN200 implement IP interworking on the
VLAN10 VLAN200
CoreSwitch. The service network and management network
can exchange data through the CoreSwitch.
 For the sake of security, the service network should be
PC NMS isolated from the management network.
Solutions for network isolation

Production Management Production Management


network network network network

CoreSwitch

CoreSwitch1 CoreSwitch2

SW1 SW2 SW1 SW2

VLAN10 VLAN200 VLAN10 VLAN200

NMS
PC NMS PCs NMS

Solution: Deploy an ACL. Solution: Add a CoreSwitch to physically isolate each network.
Problem: Expansibility Problem: Hardware costs
Simple Application of VPN Instances

Production Management
network network

VLAN11 VLAN201
 A VPN instance dedicated to traffic management is created on
CoreSwitch
the CoreSwitch. For the root device, the VPN instance is a
virtual device.
 VLAN200 and VLAN201 are associated with the VPN instance.
SW1 SW2
 The VPN instance uses a routing table that is independent from
VLAN10 VLAN200 the root device. The routing table of the VPN instance is
completely isolated from that of the root device, without
increasing the hardware cost.

PC NMS

Root device VPN instance


VRF Overview

 Virtual Routing and Forwarding (VRF) is a key technology of the MPLS VPN
architecture. It is similar to a virtual device.
 VRF helps logically divide a physical device, such as a router, switch, or firewall, into
multiple virtual devices called VRF instances. Each virtual device works like an
independent device, and has an independent routing table, independent route selection
processes, and independent interfaces.
 VRP helps thoroughly isolate data or services. In MPLS VPN, VRP enables ISPs to
provide VPN access services for multiple customers on the same Provider Edge (PE).
The routes and data of the customers are completed isolated. Even though these
customers use the same IP address space, no IP address conflict occurs.
 VRF can be used independently of MPLS VPN. The instance virtualization feature of
VRF can be used for service or data isolation on network devices.
 On Huawei datacom devices, VRF is also called a VPN instance.
Application of VRF Instances

 By default, all interfaces of a network device, including the Layer 3 interfaces or sub-
interfaces of routers and firewalls and VLANIF interfaces of switches, belong to the
same forwarding instance, namely, the root instance of the device.
 If you create a VPN instance on a network device, the network device has a virtual
device. You can add a specific interface to the VPN instance, and this interface will be
dedicated to the VPN instance.
 Each VPN instance has a data forwarding table independent of the root device. The
VPN instances use different data forwarding planes. In this way, the traffic received by a
specific VPN instance (interface) will not be sent to other VPN instances or to the root
device.
 VPN instances can be deployed on switches, routers, and firewalls as long as these
devices support related features.
 VPN instances are crucial to MPLS VPN. On an enterprise network, VPN instances can
work independently of MPLS VPN. They are widely used to implement data or service
isolation and to solve the issue of overlapping IP address space.
Example: Before Deployment of the VPN Instances

1.1.1.0/24 2.2.2.0/24
Routing table of the CoreSwitch

Destination Outbound Next-hop


Protocol
Network/Mask Interface Address
GE0/0/0 GE0/0/0 192.168.1.0/24 Direct Vlanif10 192.168.1.254
192.168.100.2 172.16.100.2
172.16.1.0/24 Direct Vlanif200 172.16.1.254
CoreSwitch 192.168.100.0/24 Direct Vlanif11 192.168.100.1
Vlanif11 Vlanif201 172.16.100.0/24 Direct Vlanif201 172.16.100.1
192.168.100.1 172.16.100.1
1.1.1.0/24 Static Vlanif11 192.168.100.2
Vlanif10 Vlanif200 2.2.2.0/24 Static Vlanif201 172.16.100.2
192.168.1.254 172.16.1.254

All routes to directly connected interfaces and routes


discovered by the device and destined to the remote network
are stored in the routing table, called the global routing table, of
PC1 192.168.1.1 PC2 172.16.1.1 the device. The service and management networks are
Gateway 192.168.1.254 Gateway 172.16.1.254 interconnected through the CoreSwitch, which is a security risk.
Example: Deployment of the VPN Instance

1.1.1.0/24 2.2.2.0/24
Global routing table of the CoreSwitch
(routing table of the root device)
Destination Outbound Next-hop
Protocol
GE0/0/0 GE0/0/0 Network/Mask Interface Address
192.168.100.2 172.16.100.2 192.168.1.0/24 Direct Vlanif10 192.168.1.254

CoreSwitch 192.168.100.0/24 Direct Vlanif11 192.168.100.1


1.1.1.0/24 Static Vlanif11 192.168.100.2
Vlanif11 Vlanif201
192.168.100.1 172.16.100.1
VPN instance-specific routing table of the CoreSwitch
Vlanif10 Vlanif200
192.168.1.254 172.16.1.254 Destination Outbound Next-hop
Protocol
Network/Mask Interface Address
172.16.1.0/24 Direct Vlanif200 172.16.1.254
172.16.100.0/24 Direct Vlanif201 172.16.100.1
2.2.2.0/24 Static Vlanif201 172.16.100.2
PC1 192.168.1.1 PC2 172.16.1.1
Gateway 192.168.1.254 Gateway 172.16.1.254
Example: Deployment of the VPN Instance

Global routing table of the CoreSwitch


(routing table of the root device)
1.1.1.0/24 2.2.2.0/24
Destination Outbound Next-hop
Protocol
Network/Mask Interface Address
192.168.1.0/24 Direct Vlanif10 192.168.1.254
192.168.100.0/24 Direct Vlanif11 192.168.100.1
1.1.1.0/24 OSPF Vlanif11 192.168.100.2
OSPF OSPF VPN instance-specific routing table of the CoreSwitch
process 1 process 2
Vlanif11 Vlanif201 Destination Outbound Next-hop
Protocol
192.168.100.1 172.16.100.1 Network/Mask Interface Address
172.16.1.0/24 Direct Vlanif200 172.16.1.254
Vlanif10 Vlanif200
172.16.100.0/24 Direct Vlanif201 172.16.100.1
192.168.1.254 172.16.1.254
2.2.2.0/24 OSPF Vlanif201 172.16.100.2
CoreSwitch
Multiple routing protocols or multiple processes of the same dynamic routing
protocol can be run on the device. The process of a dynamic routing protocol
PC1 192.168.1.1 PC2 172.16.1.1 associated with a VPN instance is dedicated to the VPN instance. The routes
Gateway 192.168.1.254 Gateway 172.16.1.254
learned by the process of the dynamic routing protocol are imported to the
routing table of the VPN instance.
Contents

VPN Instance Overview

Basic VPN Instance Configurations

Configuration Examples

FAQs
Basic VPN Instance Configurations

[Huawei] ip vpn-instance vpnname


[Huawei-vpn-instance-vpnname]
Create a VPN instance named vpnname on the device and access the view of the VPN instance.

[Huawei-vpn-instance-vpnname] route-distinguisher 100:1

In the VPN instance view, set an RD. RDs play a critical role in MPLS VPN and must be planned properly. If MPLS
VPN is not involved in the actual scenario and only VPN instances are used for service isolation, user-defined RDs
can be used.

This command can be used to create a VPN instance on firewalls, routers, and
switches. The created VPN instance is not bound to any interface by default.
Therefore, you need to bind interfaces to the VPN instance.
Binding an Interface to a VPN Instance

[Huawei] interface Vlanif 10


[Huawei-Vlanif10] ip binding vpn-instance vpnname

Bind a VLANIF interface to a VPN instance.

[Huawei] interface GigabitEthernet 0/0/1


[Huawei-GigabitEthernet0/0/1] ip binding vpn-instance vpnname

Bind physical interface GE 0/0/1 to a VPN instance.

[Huawei] interface GigabitEthernet 0/0/2.10


[Huawei-GigabitEthernet0/0/2.10] ip binding vpn-instance vpnname

Bind Ethernet sub-interface GE 0/0/2.10 to a VPN instance.


Maintaining the Routing Table of a VPN Instance

[Huawei] ip route-static vpn-instance vpnname 2.2.2.0 24 172.16.100.2

Add a static route to the routing table of a VPN instance.

[Huawei] display ip routing-table vpn-instance vpnname

Check the routing table of a VPN instance. If the command does not have the vpn-instance keyword, the global routing
table of the root device is displayed.
<Huawei> ping -vpn-instance vpnname 2.2.2.2

Perform the ping operation in the VPN instance. If the command does not have the vpn-instance keyword, the ping
operation is performed on the root device by default, and ICMP packets are forwarded based on the global routing table.

<Huawei> tracert -vpn-instance vpnname 2.2.2.2

Perform the tracert operation in the VPN instance.


Creating an OSPF Process in a VPN Instance

[Huawei] ospf 2 vpn-instance vpnname


[Huawei-ospf-2]

Create OSPF process 2 and bind it to a specific VPN instance. The routes learned by the device from the OSPF process
are imported to the routing table of the VPN instance.

A device can have multiple OSPF processes that are distinguished by their IDs. If you do not set vpn-instance or
related parameters when creating an OSPF process, the OSPF process exists on the root device. The routes learned
from the process are imported to the global routing table of the root device.
Contents

VPN Instance Overview

Basic VPN Instance Configurations

Configuration Examples

FAQs
Real-world Application of VPN Instances

Customer 1. Site 1 has two VLANs: VLAN10 and VLAN20. The two VLANs share
Network
the same gateway, CoreSW-Site1.
2. For the sake of security, VLAN 10 needs to be completely isolated
from VLAN 20.
FW1 FW2 3. Nodes in VLAN 10 need to access the customer network through the
firewall. VLAN 20 is a backup plane. The nodes in VLAN 20
192.168.30.1 communicate with devices at site 2 through the switch.
30
VL

N 4. The devices at site 2 are disabled from accessing nodes in VLAN 10.
12 LA
AN

/
E0
E0

V
30

/1

G
1

GE0/0/15 VLAN 1000


CoreSW-Site1
GE0/0/15 VRRP
CoreSW-Site2 Virtual-IP
Eth-trunk1 Eth-trunk2
VLAN21 VLAN IP Gateway Zone
X2/X3 1E/4E 10 192.168.10.0/24 192.168.10.1 Trust
20 192.168.20.0/24 192.168.20.1
VLAN 10 VLAN20
Server 30 192.168.30.0/24 192.168.30.1 Trust
Site 1 Site 2 21 192.168.21.0/24 192.168.21.1
E9000 1000 192.168.255.0/30 / /
Logical Layer Perspective of the Implementation of VPN Instances on a Switch

FW1 FW2

192.168.30.1

GE0/0/11 GE0/0/12 GE0/0/15 GE0/0/15


Trunk (VLAN30) Trunk (VLAN30) Trunk (VLAN1000) Trunk (VLAN1000)

Vlanif10 Vlanif30 Vlanif20 Vlanif1000


Vlanif1000
192.168.10.1/24 192.168.30.4/24 192.168.20.1/24 192.168.255.1/30
192.168.255.2/30
On RootDevice On RootDevice On VPN-Instance xxx On VPN-Instance xxx

Vlanif21
Eth-trunk1 Eth-trunk2 192.168.21.1/24
Trunk (VLAN10) Trunk (VLAN20)

CoreSW-Site1 CoreSW-Site2

Eth-trunk1 Eth-trunk2
Trunk (VLAN10) Trunk (VLAN20)
2X/3X 1E/4E Root Instance VPN Instance
Server
E9000
Configuration Review

1. Create VLANs 10, 20, 30, and 1000 on CoreSW-Site1.


2. Configure a specific Layer 2 interface on CoreSW-Site1 and bind the interface to a VPN
instance.
3. Create a VPN instance named test on CoreSW-Site1.
4. On CoreSW-Site1, bind VLANIF 20 and VLANIF 1000 to VPN instance test to thoroughly
isolate the two interfaces from the root device.
5. Configure a static default route on the root device on CoreSW-Site1 and set the next-hop
address of the route to VRRP virtual IP address 192.168.30.1.
6. Configure a static route to VLAN 21 for VPN instance test on CoreSW-Site1 and set the
next-hop address of the route to CoreSW-Site2.
7. Note: The return route destined for 192.168.10.0/24 must be configured on FW1/FW2.

You might also like