Petteri Sirén
Content Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary 28/11/2013Petteri Sirén2
28/11/2013Petteri Sirén3
Preface Why this study is done Reasons for the development of LISP Separation of location and identity EIDs and RLOCs 28/11/2013Petteri Sirén4
28/11/2013Petteri Sirén5
Locator/ID Separation Protocol Hosts operate the same way as before Core routers operate the same way as before Tunnel routers (CE/PE) perform tunneling Mapping system stores the EID-RLOC pairs Tunnel routers have map cache for EID-RLOC pairs Proxy tunnel routers are used between LISP sites and non-LISP sites 28/11/2013Petteri Sirén6
28/11/2013Petteri Sirén7
Host B How LISP works Host A Core B? -> Sent IP packet Src Dst ITR From ITR to MS Where is ? Mapping System From MS to ITR /24 is behind /11/2013Petteri Sirén8
Tunnel router EID table eid-table vrf Customer_A instance-id 101 database-mapping /16 x.t.r.1 priority 1 weight 100 database-mapping /16 x.t.r.2priority 2 weight 100 eid-table vrf Customer_B instance-id 102 database-mapping /16 x.t.r.1 priority 1 weight 50 database-mapping /16 x.t.r.2 priority 1 weight 50 eid-table default instance-id 0 database-mapping /16 x.t.r.1 priority 1 weight /11/2013Petteri Sirén9 LISP site xTR1 xTR2
28/11/2013Petteri Sirén10
Methods used to study LISP Tunnel routers were Cisco 800 series routers Mapping system and Proxy Tunnel router was Cisco ASR1000 Control messages were studied Map Request, Map Reply, Map Register LISP Security 28/11/2013Petteri Sirén11
28/11/2013Petteri Sirén12
Services tested Internet access IPv6 service Multihoming VPNs Back-up connection (Multi-attached) 28/11/2013Petteri Sirén13
LISP in VPN 28/11/2013Petteri Sirén14
28/11/2013Petteri Sirén15
Results Easy way to offer IPv6 services VPN works fine No renumbering needed when changing the location of the virtual machines SP core does not need to know the customers Adding new site is simple, only one tunnel router must be configured 28/11/2013Petteri Sirén16
28/11/2013Petteri Sirén17
Summary LISP devices: Tunnel routers, Proxy Tunnel routers & Mapping system Hosts utilize EIDs, routers use RLOCs Use cases: multihoming, no renumbering and a simple VPN solution Doesn’t solve the IPv4 address problem 28/11/2013Petteri Sirén18
More information RFC /11/2013Petteri Sirén19