© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.24-1 MPLS VPN Technology Introducing MPLS VPN Architecture.

Slides:



Advertisements
Similar presentations
Virtual Trunk Protocol
Advertisements

Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
OSPF 1.
1 OpenFlow + : Extension for OpenFlow and its Implementation Hongyu Hu, Jun Bi, Tao Feng, You Wang, Pingping Lin Tsinghua University
Virtual Links: VLANs and Tunneling
1 Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
MPLS VPN.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Year 6 mental test 5 second questions
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Complex MPLS VPNs Introducing Central Services VPNs.
Floating Cloud Tiered Internet Architecture Current: Rochester Institute of Technology, Rensselaer Polytechnic Institute, University of Nevada, Reno Level.
Chapter 1: Introduction to Scaling Networks
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS TE Overview Configuring MPLS TE on Cisco IOS Platforms.
ABC Technology Project
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Frame-Mode MPLS Implementation on Cisco IOS Platforms Troubleshooting Frame-Mode MPLS on Cisco.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Subnetting IP Networks Network Fundamentals.
© 2005 AT&T, All Rights Reserved. 11 July 2005 AT&T Enhanced VPN Services Performance Reporting and Web Tools Presenter : Sam Levine x111.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
© 2012 National Heart Foundation of Australia. Slide 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 1 Introduction to Networking.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLANs LAN Switching and Wireless – Chapter 3.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
Addition 1’s to 20.
Chapter 9: Subnetting IP Networks
25 seconds left…...
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
Week 1.
We will resume in: 25 Minutes.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Connecting LANs, Backbone Networks, and Virtual LANs
A SMALL TRUTH TO MAKE LIFE 100%
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 Module Summary The VRF table is a virtual routing and forwarding instance separating sites.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring VRF Tables.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
Introducing MPLS Labels and Label Stacks
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
MPLS / VPN Connectivity between VPNs JET 2004/03/15.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5#-1 MPLS VPN Implementation Configuring OSPF as the Routing Protocol Between PE and CE Routers.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—7-1 Integrating Internet Access with MPLS VPNs Implementing Internet Access as a Separate VPN.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—6-1 Complex MPLS VPNs Introducing Managed CE Router Service.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring Small-Scale Routing Protocols Between PE and CE Routers.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Categorizing VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—6-1 Complex MPLS VPNs Introducing Overlapping VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. FRAME MODE MPLS IMPLEMENTATION.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—2-1 BGP Transit Autonomous Systems Forwarding Packets in a Transit AS.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
MBGP and Customer Routes
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Outline Overview What Are the Drawbacks of Traditional Peer-to-Peer VPNs? What Is the MPLS VPN Architecture? What Is the Architecture of a PE Router in an MPLS VPN? What Are the Methods of Propagating Routing Information Across the P-Network? What Are RDs? Is the RD enough? How Have Complex VPNs Redefined the Meaning of VPNs? What Is the Impact of Complex VPN Topologies on Virtual Routing Tables? Summary

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Drawbacks of Traditional Peer-to-Peer VPNs Shared PE router: –All customers share the same (provider-assigned or public) address space. –High maintenance costs are associated with packet filters. –Performance is lowereach packet has to pass a packet filter. Dedicated PE router: –All customers share the same address space. –Each customer requires a dedicated router at each POP.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Architecture An MPLS VPN combines the best features of an overlay VPN and a peer-to-peer VPN: PE routers participate in customer routing, guaranteeing optimum routing between sites and easy provisioning. PE routers carry a separate set of routes for each customer (similar to the dedicated PE router approach). Customers can use overlapping addresses.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Architecture: Terminology Note: PE Router = Edge LSR P Router = LSR

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v PE Router Architecture PE router in an MPLS VPN uses virtual routing tables to implement the functionality of customer dedicated PE routers.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Propagation of Routing Information Across the P-Network Question: How will PE routers exchange customer routing information? Option #1: Run a dedicated IGP for each customer across the P-network. This is the wrong answer for these reasons: The solution does not scale. P routers carry all customer routes.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Propagation of Routing Information Across the P-Network (Cont.) Question: How will PE routers exchange customer routing information? Option #2: Run a single routing protocol that will carry all customer routes inside the provider backbone. Better answer, but still not good enough: P routers carry all customer routes.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Propagation of Routing Information Across the P-Network (Cont.) Question: How will PE routers exchange customer routing information? Option #3: Run a single routing protocol that will carry all customer routes between PE routers. Use MPLS labels to exchange packets between PE routers. The best answer: P routers do not carry customer routes; the solution is scalable.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Propagation of Routing Information Across the P-Network (Cont.) Question: Which protocol can be used to carry customer routes between PE routers? Answer: The number of customer routes can be very large. BGP is the only routing protocol that can scale to a very large number of routes. Conclusion: BGP is used to exchange customer routes directly between PE routers.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Propagation of Routing Information Across the P-Network (Cont.) Question: How will information about the overlapping subnetworks of two customers be propagated via a single routing protocol? Answer: Extend the customer addresses to make them unique.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Route Distinguishers The 64-bit route distinguisher is prepended to an IPv4 address to make it globally unique. The resulting address is a VPNv4 address. VPNv4 addresses are exchanged between PE routers via BGP. –BGP that supports address families other than IPv4 addresses is called MP-BGP. A similar process is used in IPv6: –64-bit route distinguisher is prepended to a 16-byte IPv6 address. –The resulting 24-byte address is a unique VPNv6 address.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Route Distinguishers (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Route Distinguishers (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v RDs: Usage in an MPLS VPN The RD has no special meaning. The RD is used only to make potentially overlapping IPv4 addresses globally unique. The RD is used as a VPN identifier, but this design could not support all topologies required by the customers.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Requirements: All sites of one customer need to communicate. Central sites of both customers need to communicate with VoIP gateways and other central sites. Other sites from different customers do not communicate with each other. Is the RD Enough? VoIP Service Sample

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Example: Connectivity Requirements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v RTs: Why Are They Needed? Some sites have to participate in more than one VPN. The RD cannot identify participation in more than one VPN. RTs were introduced in the MPLS VPN architecture to support complex VPN topologies. –A different method is needed in which a set of identifiers can be attached to a route.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v RTs: What Are They? RTs are additional attributes attached to VPNv4 BGP routes to indicate VPN membership. Extended BGP communities are used to encode these attributes. –Extended communities carry the meaning of the attribute together with its value. Any number of RTs can be attached to a single route.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v RTs: How Do They Work? Export RTs: –Identifying VPN membership –Appended to the customer route when it is converted into a VPNv4 route Import RTs: –Associated with each virtual routing table –Select routes to be inserted into the virtual routing table

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v VPNs Redefined With the introduction of complex VPN topologies, VPNs have had to be redefined: A VPN is a collection of sites sharing common routing information. A site can be part of different VPNs. A VPN can be seen as a community of interest (closed user group). Complex VPN topologies are supported by multiple virtual routing tables on the PE routers.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Impact of Complex VPN Topologies on Virtual Routing Tables A virtual routing table in a PE router can be used only for sites with identical connectivity requirements. Complex VPN topologies require more than one virtual routing table per VPN. As each virtual routing table requires a distinct RD value, the number of RDs in the MPLS VPN network increases.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Impact of Complex VPN Topologies on Virtual Routing Tables (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Summary There are several drawback to traditional peer-to-peer VPNs. MPLS VPN architecture combines the best features of the overlay and peer-to-peer VPN models. The architecture of a PE router in an MPLS VPN uses separate virtual routers containing the routes of each customers inside one physical router. The most scalable method of exchanging customer routes across a provider network is the use of a single BGP routing protocol from PE router to PE router.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Summary (Cont.) Route distinguishers transform non-unique 32-bit addresses into 96-bit unique addresses. Route targets are used to identify VPN membership in overlapping topologies. VPNs are now considered a collection of sites sharing common routing information. Placing sites with different routing requirements in the same virtual routing table will result in inconsistent routing.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v