November 6, 2006Softwire WG Meeting1 Softwires “Mesh” Scenario Problem: –pass AF1 routing and data over the AF1-free core, –while obeying certain constraints.

Slides:



Advertisements
Similar presentations
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Advertisements

MPLS VPN.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6-The Next Generation Protocol RAMYA MEKALA UIN:
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
IETF 60 draft-ooms-v6ops-bgp-tunnel-03.txt Connecting IPv6 Islands over IPv4 MPLS using IPv6 Provider Edge Routers (6PE) J. De Clerq, Alcatel D. Ooms S.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
MPLS over L2TPv3 for support of RFC 2547-based BGP/MPLS IP VPNs
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
Internet Protocol Security (IPSec)
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
Network based IP VPN Architecture using Virtual Routers Jessica Yu CoSine Communications, Inc. Feb. 19 th, 2001.
L3VPN WG2013-Nov-71 Global Table Multicast (GTM) Based on MVPN Protocols and Procedures draft-zzhang-l3vpn-mvpn-global-table-mcast-01.txt Service providers.
1 Solving the Softwire Mesh Problem Chris Metz, IETF Softwire WG Interim Meeting Hong Kong February 2006.
L3VPN WG2013-Nov-71 Ingress Replication P-Tunnels in MVPN I ngress Replication has always been one of the P-tunnel technologies supported by MVPN But there’s.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
NEMO Requirements and Mailing List Discussions/Conclusions T.J. Kniveton - Nokia Pascal Thubert - Cisco IETF 54 – July 14, 2002 Yokohama, Japan.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Softwire IETF 78. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and.
L3VPN WG2014-Jul-221 Ingress Replication P-Tunnels in MVPN I ngress Replication (IR) is one of the MVPN P-tunnel technologies But there’s a lot of confusing.
Softwire wg Alain Durand, Comcast David Ward, Cisco.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
Different Address Family Transit (DAFT) using Encapsulation and BGP-MP Extension Tsinghua University Feb 23, 2006 Contact: ----A.
March 21, 2006L3VPN WG 1 MVPN Update New version of “bgp encoding” draft –BGP update syntax and semantics reworked to reflect current thinking –Inter-AS.
Softwire Mesh Framework: Multicast Mingwei Xu Yong Cui CERNET, China Chris Metz, Cisco 68 th IETF Meeting, Prague March 2007.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
July 24, 2007IETF 69, L3VPN WG1 Progress on Arch Doc draft-ietf-l3vpn-mcast-2547bis-mcast-05 Areas of new work: –Clarification of upstream multicast hop.
Nov. 8, 2006IDR WG Meeting1 IPv6 Next Hop for IPv4 Prefix In BGP Updates, NH not necessarily of same address family as NLRI Currently deployed examples:
Softwire mesh MIB draft-cui-softwire-mesh-mib Peng Wu Tsinghua University.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Softwire Security Requirement Update draft-ietf-softwire-security-requirements-02.txt IETF Meeting, Prague March 19, 2007 Shu Yamamoto Carl Williams Florent.
11 Softwire Security Analysis and Guidance for Mesh Shu Yamamoto Carl Williams Florent Parent Hidetoshi Yokota draft-ietf-softwire-security-requirements-XX.txt.
MPLS over L2TPv3 Encapsulation IETF VersionIHLTOSTotal length IdentificationFlagsFragment offset TTL Protocol ==
IDR WG 6PE-Alt draft-manral-idr-mpls-explicit-null-00.txt Vishwas Manral, IPInfusion Manoj Dutta, IPInfusion IETF 71, Philadelphia, PA, USA.
Global Table Multicast with BGP-MVPN draft-zzhang-l3vpn-mvpn-global-table-mcast London, 89 th IETF L3VPN WG2013-Nov-71.
December 5, 2007IETF 70 L3VPN WG1 MVPN Profiles Why do we need “profiles”? –By design, architecture provides many choices: PE-PE C-multicast routing info.
Tunnel SAFI draft-nalawade-kapoor-tunnel- safi-03.txt SSA Attribute draft-kapoor-nalawade-idr- bgp-ssa-01.txt.
IETF 61 draft-ooms-v6ops-bgp-tunnel-04.txt Connecting IPv6 Islands over IPv4 MPLS using IPv6 Provider Edge Routers (6PE) Francois Le Faucheur -
BGP-based Auto-Discovery for L2VPNs draft-hlmu-l2vpn-bgp-discovery-00.txt Sue Hares - Vasile Radoaca -
Draft-li-idr-cc-bgp-arch-00IETF 88 IDR1 An Architecture of Central Controlled Border Gateway Protocol (BGP) draft-li-idr-cc-bgp-arch-00 Zhenbin Li, Mach.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
1 MPLS Source Label Mach Chen Xiaohu Xu Zhenbin Li Luyuan Fang IETF87 MPLS Aug Berlin draft-chen-mpls-source-label-00.
Softwire Security Update Shu Yamamoto Carl Williams Florent Parent Hidetoshi Yokota 67 IETF, San Diego.
Global Table Multicast with BGP-MVPN Protocol
Softwire Mesh Framework: Multicast
Encryption and Network Security
Multicast VPN using BIER
Virtual Aggregation (VA)
Draft-nalawade-kapoor-tunnel-safi 03.txt
Alain Durand, Comcast David Ward, Cisco
Softwire Mesh Solution Framework
V4-over-v6 MVPNs.
Agenda Agreement on the problem statement
Softwire Security Update
CHAPTER 8 Network Management
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
BGP VPN service for SRv6 Plus IETF 105, Montreal
Presentation transcript:

November 6, 2006Softwire WG Meeting1 Softwires “Mesh” Scenario Problem: –pass AF1 routing and data over the AF1-free core, –while obeying certain constraints on solution Legacy devices not necessarily attached to “islands” Legacy AF1 Device Legacy AF1 Device AF2-only cloud (“AF1-free core”) AF1/AF2 AFBR

November 6, 2006Softwire WG Meeting2 Solution Constraints Transparent to legacy AF1 equipment –No explicit mesh of legacy-legacy adjacencies Only AFBRs are dual-AF: –No AF1 routing protocols within core –No native AF1 data packets within core Allow network administrators to choose tunneling technology for moving data

November 6, 2006Softwire WG Meeting3 Design Center Two main cases of interest: –IPv4 through IPv6-only (“IPv4-free”) core –IPv6 through IPv4-only (“IPv6-free”) core Solutions may apply more generally –e.g., IPv4 through “BGP-free” core (no external routes) –but not within scope of WG Handling of VPN address families already solved in L3VPN, out of scope for this WG

November 6, 2006Softwire WG Meeting4 Solution Components Routing: –Ingress AFBR must know egress AFBR for AF1 prefix –Core routers are AF1-free –AFBRs use BGP to distribute AF1 routes among themselves –Well understood model, leveraged in L3VPN Data Plane –BGP provides AFBR next hop for each AF1 prefix –Ingress AFBR must tunnel packet to egress AFBR

November 6, 2006Softwire WG Meeting5 Routing: AF1 Prefixes with AF2 Next Hops AFBR “perspective” on Next Hops for AF1 prefixes: –next hop across the core is another AFBR –since the AFBRs can only communicate with each other via AF2, the next hop for an AF1 prefix is an AF2 address BGP Terminology: –the address or address prefix whose route is being distributed is known as NLRI. –each route associates a next hop (NH) with an NLRI. –our model allows AF1 NLRI to have AF2 NH Several precedents for BGP NLRI and NH in different AF –non-IP NLRI with IPv4 and/or IPv6 NH –VPN-IP NLRI with IPv4 and/or IPv6 NH –6PE: IPv6 NLRI with IPv4 NH

November 6, 2006Softwire WG Meeting6 Mixed NLRI/NH Softwire WG responsibility is to –endorse the notion of a v6 nh for a v4 prefix (and vice versa) –say when to generate updates that have mixed NLRI/NH –say how these may affect forwarding decisions There are encoding issues, but those fall within the scope of the IDR WG

November 6, 2006Softwire WG Meeting7 When to Generate Mixed NLRI/NH Updates Matter of policy Default –When doing “next hop self”, specify “self” NH in IPvX if running BGP session on IPvX, even if NLRI is not IPvX. –When not doing “next hop self”, (e.g., RR), do not change address family of NH Specific deployment scenarios might require departure from default policy

November 6, 2006Softwire WG Meeting8 Deployment Constraint In a given AF1-free core, all AFBRs (and any RRs of which they are clients) must be able to deal with mixed NH/NLRI combinations

November 6, 2006Softwire WG Meeting9 Data Plane: Encapsulation and Policy AF1 data packets must be tunneled through AF2 core from one AFBR to another Tunneling technology is chosen by policy Typical case probably very simple: –admin. selects favorite tunneling technology –admin. only deploys AFBRs that offer it Policy is configured at AFBR which does encapsulation (i.e., tunnel head end)

November 6, 2006Softwire WG Meeting10 Conditional Policies Policy cannot be automatically deduced from information about capabilities of head end and tail end: –E.g., what if they both support MPLS, but core doesn’t? –Policy must be configured at head end Policies can be made conditional on information gathered in real time about tail end or even about individual prefix

November 6, 2006Softwire WG Meeting11 Example Conditional Policy Example: –use GRE to talk to “type X” AFBRs, –but use L2TP to talk to “type Y” AFBRs Conditional policy pre-configured Information about “type” of AFBR gathered in real time BGP can be used by an AFBR to distribute the information that it is, e.g., type Y.

November 6, 2006Softwire WG Meeting12 BGP-Based Distribution of Information about an AFBR Like BGP-based auto-discovery used in L2/L3VPN Useful to have special BGP update to carry arbitrary information about originator of update: Info-SAFI –Carries factual info about AFBR –Info is opaque to BGP –Info often representable as arbitrarily assigned (ext.) community –Info and route distribution can be constrained independently –Factual info from tail end used as input to conditional policy configured at head end Very general but simple mechanism, allows administrators full control of policy To be discussed in IDR

November 6, 2006Softwire WG Meeting13 More on Policy Head end and tail end do not negotiate policy, or even suggest policies to each other Policies depending on facts about individual prefixes could be configured: –possibly based on attributes of prefixes –no need for tail end to dynamcally assign prefixes to tunnels Polices with respect to QoS, TE, Security, could also be configured at head end

November 6, 2006Softwire WG Meeting14 Tunnel Setup and Signaling Some tunneling technologies don’t need anything but the tail address: –GRE (without optional key) –IP-in-IP –LDP-based MPLS Others have native signaling which can be used: –RSVP-TE But …

November 6, 2006Softwire WG Meeting15 BGP for Tunnel Setup For some tunneling technologies: –tail needs to pass info for head to place in the encapsulation header, –but native signaling either doesn’t exist or isn’t right for this application Examples: –GRE if optional key is to be used –L2TPv3

November 6, 2006Softwire WG Meeting16 BGP for L2TPv3 Tunnel Setup Tail end must pass session id and cookie value to head ends –for given tail end, all head ends can use same session id and cookie –best done via p2mp signaling but L2TPv3 native signaling is p2p makes sense to pass this info via BGP. –good use for the info-SAFI.

November 6, 2006Softwire WG Meeting17 What’s Not Needed Prioritized lists of encapsulation types –policies configured at head end –no negotiation of policy between head and tail –so prioritized list from tail doesn’t make much sense Replacement of “BGP next hop” notion with “BGP next tunnel” notion Leads to simplification over some previous proposals, without loss of generality

November 6, 2006Softwire WG Meeting18 Payload Type Identification Some tunnel technologies have native means of identifying payload type Others require demultiplexor value to be distributed by BGP with other encaps info Details to be worked out for each encaps type

November 6, 2006Softwire WG Meeting19 Security? Scope is Internet traffic, not VPN traffic –If confidentiality or integrity is required inside the tunnel, it’s also required outside the tunnel, so no new confidentiality requirement Spoofed encapsulation header is possible –but without the tunnel, a spoofed payload packet would be possible, so no new authentication requirement

November 6, 2006Softwire WG Meeting20 Security?? Security ADs don’t take “no” for an answer: –Allow tunnel-mode IPsec as one of the IP-based tunneling technologies –Given large number of tunnels, requres automated key distribution (IKE) Need for security probably not prefix-dependent or dependent on tunnel endpoints In progress

November 6, 2006Softwire WG Meeting21 Multicast Next time! (Probably based on carrying AF1 multicast streams in AF2 multicast tunnels) (Probably with an array of possible AF2 multicast tunnel technologies, like the MVPN PMSI.)