Presentation is loading. Please wait.

Presentation is loading. Please wait.

21.11.2013 Petteri Sirén. Content Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary.

Similar presentations


Presentation on theme: "21.11.2013 Petteri Sirén. Content Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary."— Presentation transcript:

1 21.11.2013 Petteri Sirén

2 Content Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary 28/11/2013Petteri Sirén2

3 28/11/2013Petteri Sirén3

4 Preface Why this study is done Reasons for the development of LISP Separation of location and identity EIDs and RLOCs 28/11/2013Petteri Sirén4

5 28/11/2013Petteri Sirén5

6 Locator/ID Separation Protocol Hosts operate the same way as before Core routers operate the same way as before Tunnel routers (CE/PE) perform tunneling Mapping system stores the EID-RLOC pairs Tunnel routers have map cache for EID-RLOC pairs Proxy tunnel routers are used between LISP sites and non-LISP sites 28/11/2013Petteri Sirén6

7 28/11/2013Petteri Sirén7

8 Host B 10.0.0.2 How LISP works Host A 10.1.0.11 Core B? -> Sent IP packet Src 10.1.0.11 Dst 10.0.0.2 ITR 1.1.1.1 From ITR to MS Where is 10.0.0.2? Mapping System From MS to ITR 10.0.0.2/24 is behind 2.2.2.2 28/11/2013Petteri Sirén8

9 Tunnel router EID table eid-table vrf Customer_A instance-id 101 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 100 database-mapping 10.1.0.0/16 x.t.r.2priority 2 weight 100 eid-table vrf Customer_B instance-id 102 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 50 database-mapping 10.1.0.0/16 x.t.r.2 priority 1 weight 50 eid-table default instance-id 0 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 100 28/11/2013Petteri Sirén9 LISP site xTR1 xTR2

10 28/11/2013Petteri Sirén10

11 Methods used to study LISP Tunnel routers were Cisco 800 series routers Mapping system and Proxy Tunnel router was Cisco ASR1000 Control messages were studied Map Request, Map Reply, Map Register LISP Security 28/11/2013Petteri Sirén11

12 28/11/2013Petteri Sirén12

13 Services tested Internet access IPv6 service Multihoming VPNs Back-up connection (Multi-attached) 28/11/2013Petteri Sirén13

14 LISP in VPN 28/11/2013Petteri Sirén14

15 28/11/2013Petteri Sirén15

16 Results Easy way to offer IPv6 services VPN works fine No renumbering needed when changing the location of the virtual machines SP core does not need to know the customers Adding new site is simple, only one tunnel router must be configured 28/11/2013Petteri Sirén16

17 28/11/2013Petteri Sirén17

18 Summary LISP devices: Tunnel routers, Proxy Tunnel routers & Mapping system Hosts utilize EIDs, routers use RLOCs Use cases: multihoming, no renumbering and a simple VPN solution Doesn’t solve the IPv4 address problem 28/11/2013Petteri Sirén18

19 More information RFC 6830-6836 www.lisp4.net 28/11/2013Petteri Sirén19


Download ppt "21.11.2013 Petteri Sirén. Content Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary."

Similar presentations


Ads by Google