virtual private networks juha heinänen [email protected] song networks

22
Virtual Private Networks Juha Heinänen [email protected] Song Networks

Upload: annice-cunningham

Post on 28-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks

Juha Heinä[email protected] Networks

Page 2: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 2

What is an IP VPN?

an emulation of private (wide area) network facility using provider IP facilities

provides permanent connectivity between multiple customer sites

implementation can be either customer or provider based

can span multiple providers

Page 3: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 3

SP1 SP2 SP3

VPN Example

PEP

Two VPNs spanning three SPsTwo VPNs spanning three SPs

RAS

PE

PE

PE

PEP

P

PE

PE

CEs

Page 4: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 4

support for customer addressing non-unique, overlapping address spaces

support for data security authenticity, privacy, integrity

support for QoS assurances bandwidth, latency

VPN Requirements

Page 5: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 5

VPN Classification

Who implements the VPN CE or PE based

at which layer the VPN operates Layer 2 or Layer 3

how the VPN is implemented membership discovery, signaling,

tunneling protocol, ...

Page 6: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 6

CE Based VPNs

integrate VPN capabilities in CE devices CEs are connected via IPSec tunnels over

the Internet (available everywhere) provide site-to-site security require networking skills and a key

management systemthe only choice if security of the VPN

service is a concern

Page 7: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 7

A CE Based VPN

InternetInternet

IPSec Tunnel

RAS

Telecommuter

Page 8: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 8

PE Based VPNs

Outsource the VPN operation to SPs PEs appear as router peers or bridges to

CEs works with conventional access routers simplified CE operation brings new revenue sources to SPs

suitable when the SPs and local loops can be trusted

Page 9: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 9

A Network Based VPN

VPN Tunnel”Virtual”

Router or Bridge

Telecommuter

InternetInternet ”Virtual” RAS

Page 10: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 10

Layer 2 vs. Layer 3 VPNs

Layer 2 VPNs provide Virtual Private Wire Service (VPWS)

or Virtual Private LAN Service (VPLS) PEs not aware of customer’s Layer 3

protocols, addresses, or routingLayer 3 VPNs

provide Virtual Routing Service PEs participate as routing peers in

customers’ Layer 3 protocols

Page 11: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 11

Virtual Private Wire Service

AccessConnection

AccessConnection

VPN TunnelVPN Tunnel

AC can be physical PPP or Ethernet link,FR or ATM VC, VLAN, MPLS LSP, etc.

InternetInternet

Page 12: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 12

Virtual Private LAN Service

AC can be physical Ethernet link or VLAN

VirtualLearningBridge

VirtualLearningBridge

InternetInternet

Page 13: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 13

Layer 3 VPN

Dynamic orStatic Routing

Dynamic orStatic Routing

VirtualRouter

VirtualRouter

AC can be physical PPP or Ethernet link,FR or ATM VC, VLAN, MPLS LSP, etc.

InternetInternet

Page 14: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 14

Generic VPN Problems

how to discover which other CEs or PEs belong to the same VPN

how to setup VPN tunnels and which tunneling protocols to use

how to advertise end-point reachability within a VPN

Page 15: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 15

VPN Membership Discovery

a CE or a PE port is configured to belong to a given VPN

CE or PE learns about other members via configuration (CEs) BGP piggy packing (PEs) DNS (CEs and PEs)

DNS vs. BGP for discovery is currently a hot issue

Page 16: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 16

VPN Tunneling

choices for VPN tunneling protocols MPLS (over MPLS or GRE), L2TPv3, IPSec

choices for tunnel setup protocols LDP, BGP piggy packing, L2TPv3, IPSec

tunneling protocol can be chosen independently of discovery protocol

Page 17: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 17

Advertising Reachability

Layer 2 VPNs VPLS has no need to advertise

reachability VPWS can piggy pack Layer 3

reachability into tunnel setupLayer 3 VPNs

via IGP over VPN tunnels between VRs via BGP extended with VPN addresses

Page 18: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 18

BGP Piggy Packing

Assumes that each PE runs (extended) BGP

difficulties with multiprovider VPNs all transit SPs need to be trusted VPN information visible at boarder routers advertisement scope is difficult to control

OK for single SP VPNs where customer sites can be backhauled to BGP speaking PEs

Page 19: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 19

BGP/MPLS Model

SP1 SP2 SP3

MPLS LSPs for the VPN MPLS LSPs for the VPN

Page 20: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 20

SP1 SP2 SP3

DNS/GRE/MPLS Model

IP tunnels for the VPN IP tunnels for the VPN

Page 21: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 21

DNS Based VPLS Example

PE2<xyz.vpn.sp.net>

PE1<xyz.vpn.sp.net>

PE3

<xyz.vpn.sp.net>

<xyz.vpn.sp.net>

xyz.vpn.sp.net IN A PE1xyz.vpn.sp.net IN A PE1

IN A PE2 IN A PE2

IN A PE3 IN A PE3

Page 22: Virtual Private Networks Juha Heinänen jh@song.fi Song Networks

© Juha Heinänen 22

Summary

Frame Relay and ATM based VPNs are migrating to IP based VPNs

a secure VPN can only be implementing using IPSec between CEs

Layer 2 VPNs (especially VPLS) is becoming an alternative to Layer 3 VPNs

jury is still out regarding the discovery and tunneling protocols