© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Categorizing VPNs.

Slides:



Advertisements
Similar presentations
Identifying MPLS Applications
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Complex MPLS VPNs Introducing Central Services VPNs.
© 2003, Cisco Systems, Inc. All rights reserved..
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1 Implementing Cisco MPLS (MPLS) v2.2.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 Module Summary The VRF table is a virtual routing and forwarding instance separating sites.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring VRF Tables.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
MPLS-VPN/BGP Approach Hari Rakotoranto Technical Marketing Engineer
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin APPENDIX B NETWORKS AND TELECOMMUNI CATIONS APPENDIX B NETWORKS.
Connecting to Remote Networks © 2004 Cisco Systems, Inc. All rights reserved. Using Circuit Switching in WANs INTRO v2.0—7-1.
VPNs Virtual Private Networks. VPNs: Purpose Emulate a private network using shared Service Provider infrastructure Same policies as private network What.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 1 Remote Network Connectivity Requirements.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—7-1 Integrating Internet Access with MPLS VPNs Implementing Internet Access as a Separate VPN.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—6-1 Complex MPLS VPNs Introducing Managed CE Router Service.
Remote Networking Architectures
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring Small-Scale Routing Protocols Between PE and CE Routers.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Network based IP VPN Architecture using Virtual Routers Jessica Yu CoSine Communications, Inc. Feb. 19 th, 2001.
Growing the Network © 2004 Cisco Systems, Inc. All rights reserved. Choosing the Right Network Topology INTRO v2.0—3-1.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Building a Simple Serial Network © 2004 Cisco Systems, Inc. All rights reserved. Understanding the OSI Model INTRO v2.0—1-1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Exploring the Network.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—5-1 Module Summary  A WAN allows the transmission of data across broad geographic distances.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 5 Cabling LANs and WANs.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 5 Cabling LANs and WANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—6-1 Complex MPLS VPNs Introducing Overlapping VPNs.
CCNA 1 v3.0 Module 2 Networking Fundamentals. Objectives.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Lab 3-5 Debrief.
MPLS VPNs by Richard Bannister. The Topology The next two slides display both the physical and logical topology of our simple example network –Please.
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
1 CCNA 1 v3.1 Module 2 Networking Fundamentals Claes Larsen, CCAI.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1 MPLS Lab Physical Connection Diagram.
© 2002, Cisco Systems, Inc. All rights reserved..
Tunneling Continued/ End-to-End Principle CS 4251: Computer Networking II Nick Feamster Spring 2008.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1 MPLS Lab Physical Connection Diagram.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks and Network Address Translation
Virtual Private Networks and Network Address Translation
Topic 12: Virtual Private Networks
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Categorizing VPNs

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-2 Outline Overview What Are the Business Categories for VPNs? What Are Extranet VPNs? What Are the Connectivity Categories for VPNs? What Is the Central Services Extranet? What Is a Managed Network Implementation? Summary

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-3 VPN Business Category VPNs can be categorized based on the business needs that they fulfill: Intranet VPNs connect sites within an organization. Extranet VPNs connect different organizations in a secure way. Access VPNs (VPDNs) provides dialup access into a customer network.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-4 Extranet VPNs: Overlay VPN Implementation

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-5 Extranet VPNs: Peer-to-Peer VPN Implementation

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-6 VPN Connectivity Category VPNs can also be categorized according to the connectivity required between sites: Simple VPN: Every site can communicate with every other site. Overlapping VPNs: Some sites participate in more than one simple VPN. Central services VPN: All sites can communicate with central servers but not with each other. Managed network: A dedicated VPN is established to manage CE routers.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-7 Central Services Extranet

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-8 Managed Network Overlay VPN Implementation

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-9 Central Services Extranet: Hybrid (Overlay + Peer-to-Peer) Implementation

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-10 Summary There are three VPN business categories: intranet VPN, extranet VPN, and access VPN. In an extranet VPN, organizations are linked with dedicated virtual circuits. There are four VPN connectivity categories: simple VPN, overlapping VPN, central service VPN, and managed network. A central services extranet enables customers to access common servers for services. Managed networks allow customer CE devices to be owned and managed by the service provider.

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-11