Deploying MPLS VPNs-2up
Deploying MPLS VPNs-2up
Deploying MPLS VPNs-2up
BRKRST-2102
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
Agenda
MPLS VPN Explained MPLS VPN Services Best Practices Conclusion
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
Prerequisites
Must be willing to bet
on MPLS VPN Networks
Must understand basic IP routing, especially BGP Must understand MPLS basics (push, pop, swap, label stacking) Must be able to keep the speaker awake
by asking Bad questions
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
Terminology
LSR: Label switch router LSP: Label switched path
The chain of labels that are swapped at each hop to get from one LSR to another
MP-BGP: Multiprotocol BGP PE: Provider edge router interfaces with CE routers P: Provider (core) router, without knowledge of VPN VPNv4: Address family used in BGP to carry MPLS-VPN routes RD: Route distinguisher
Distinguish same network/mask prefix in different VRFs
Agenda
MPLS VPN Explained
Technology Configuration
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
MPLS-VPN Technology
Control planeVPN route propagation Data planeVPN packet forwarding
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
MPLS-VPN Technology
MPLS VPN Connection Model
P PE VPN Backbone IGP P P P PE
MP-iBGP Session
PE Routers
Edge routers Use MPLS with P routers Uses IP with CE routers Connects to both CE and P routers Distribute VPN information through MP-BGP to other PE router with VPN-IPv4 addresses, extended community, label
P Routers
P routers are in the core of the MPLS cloud P routers do not need to run BGP and doesnt need to have any VPN knowledge Forward packets by looking at labels P and PE routers share a common IGP
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
MPLS-VPN Technology
Separate Routing Tables at PE
VPN 2 CE PE CE VPN 1 MPLS Backbone IGP (OSPF, ISIS)
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
MPLS-VPN Technology
VPN 2 CE VRF Green PE
Has its own routing table and forwarding table (CEF) VRF has its own instance for the routing protocol
(static, RIP, BGP, EIGRP, OSPF)
10
MPLS-VPN Technology
VPN 2 CE PE
PE installs the routes, learned from CE routers, in the appropriate VRF routing table(s) PE installs the IGP (backbone) routes in the global routing table VPN customers can use overlapping IP addresses
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
11
MPLS-VPN Technology
Control Plane
8 Bytes 1:1 RD VPNv4 4 Bytes 10.1.1.0 IPv4 Route-Target Label 8 Bytes 3 Bytes
12
Route-Target
Label
MP-IBGP update with RD, RT, and label To convert an IPv4 address into a VPNv4 address, RD is appended to the IPv4 address i.e. 1:1:10.1.1.0
Makes the customers IPv4 route globally unique
! ip vrf v1 rd 1:1 !
Cisco Confidential
13
MP-IBGP update with RD, RT, and Label Route-target (RT): Identifies the VRF for the received VPNv4 prefix. It is an 8-byte extended community (a BGP attribute) Each VRF is configured with RT(s) at the PE
RT helps to color the prefix
! ip vrf v1 route-target import 1:1 route-target export 1:2 !
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
14
PE addresses used as BGP next-hop must be uniquely known in the backbone IGP
Do Not Summarize the PE Loopback Addresses in the Core
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
15
3
CE1 PE1
Site 2 CE2
10.1.1.0/24 Next-Hop=CE-1
PE2
MPLS Backbone
1. PE1 receives an IPv4 update (eBGP/OSPF/ISIS/RIP/EIGRP) 2. PE1 translates it into VPNv4 address
Assigns an RT per VRF configuration Rewrites next-hop attribute to itself Assigns a label based on VRF and/or interface
16
3
CE1 PE1
10.1.1.0/24 Next-Hop=PE-2
Site 2
CE2 P P PE2
10.1.1.0/24 Next-Hop=CE-1
MPLS Backbone
4. PE2 receives and checks whether the RT=green (40:103, say) is locally configured within any VRF, if yes, then 5. PE2 translates VPNv4 prefix back into IPv4 prefix,
Installs the prefix into the VRF routing table Updates the VRF CEF table with label=100 for 10.1.1.0/24 Advertise this IPv4 prefix to CE2 (using EBGP/RIP/OSPF/ISIS/EIGRP)
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
17
MPLS-VPN Technology
Forwarding Plane
Site 1
10.1.1.0/24
10.1.1.0/24 Next-Hop=CE-1
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
18
MPLS-VPN Technology
Forwarding Plane
Site 1
10.1.1.0/24
Site 2 CE1 P
10.1.1.1
P PE2
CE2
10.1.1.1
PE1
100 10.1.1.1
P
10.1.1.1 25
50
100
100
10.1.1.1
PE2 imposes TWO labels for each packet going to the VPN destination 10.1.1.1 The top label is LDP learned and derived from an IGP route
Represents LSP to PE address (exit point of a VPN route)
Cisco Confidential
19
Agenda
MPLS VPN Explained
Technology Configuration
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
20
10
PE1
interface Serial0 ip address 192.168.10.1 255.255.255.0 ip vrf forwarding VPN-A
PE-P Configuration
P Se0 PE1 s1 PE1
router ospf 1 network 130.130.1.0 0.0.0.3 area 0 Interface Serial1 ip address 130.130.1.1 255.255.255.252 mpls ip
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
21
RR: MP-IBGP
RR PE1 PE2 RR
router bgp 1 no bgp default route-target filter neighbor 1.2.3.6 remote-as 1 neighbor 1.2.3.6 update-source loopback0 ! address-family vpnv4 neighbor 1.2.3.6 route-reflector- client neighbor 1.2.3.6 activate !
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
22
11
BGP
CE1 PE1 PE1
router bgp 1 ! address-family ipv4 vrf VPN-A neighbor 192.168.10.2 remote-as 2 neighbor 192.168.10.2 activate exit-address-family !
PE-CE
Site 1
10.1.1.0/24 192.168.10.2
OSPF
CE1 PE1 PE1
router ospf 1 ! router ospf 2 vrf VPN-A network 192.168.10.0 0.0.0.255 area 0 redistribute bgp 1 subnets !
192.168.10.1
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
23
RIP
CE1 PE1
router rip ! address-family ipv4 vrf VPN-A version 2 no auto-summary network 192.168.10.0 redistribute bgp 1 metric transparent !
PE-CE
Site 1
10.1.1.0/24 192.168.10.2
EIGRP
CE1 PE1
router eigrp 1 ! address-family ipv4 vrf VPN-A no auto-summary network 192.168.10.0 0.0.0.255 autonomous-system 1 redistribute bgp 1 metric 100000 100 255 1 1500 !
192.168.10.1
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
24
12
Static
CE1 PE1
ip route vrf VPN-A 10.1.1.0 255.255.255.0 192.168.10.2
If PE-CE protocol is non-BGP, then redistribution of other sites VPN routes from MP-IBGP is required (shown below for RIP) -
CE1
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
25
CE1
For config hands-on, please attend Configuring MPLS VPNs (LABCRT-2208) session Having familiarized with Cisco IOS based config, lets glance through the IOX based config for VPNs
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
26
13
PE1
PE-CE
Site 1
10.1.1.0/24 192.168.10.2
BGP
CE1 PE1 PE1
192.168.10.1
router bgp 1 vrf VPN-A rd 1:1 address-family ipv4 unicast redistribute connected ! neighbor 192.168.10.2 remote-as 2 address-family ipv4 unicast route-policy raj-temp in ! ! ! !
27
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP transport 11. Providing Multi-VRF CE Service
28
14
CE1 PE12
PE2
Site A
Site B
VPN sites (such as Site A) could be multihomed VPN customer may demand the traffic (to the multihomed site) be loadshared
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
29
CE1
2 CEs 2 PEs
CE1
171.68.2.0/24
CE2
Site A
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
30
15
Configure unique RD per VRF per PE for multihomed site/interfaces Enable BGP multipath within the relevant BGP VRF address-family at remote/receiving PE2 (why PE2?)
1 ip vrf green rd 300:11 route-target both 1:1 PE11
171.68.2.0/24
2 RR
router bgp 1 address-family ipv4 vrf green maximum-paths eibgp 2 PE2 CE2
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
CE1
If RR exists in the network, then RR must advertise all the BGP paths learned via PE11 and PE12 to the remote PE routers that are to select BGP multipaths
Please note that without unique RD per VRF per PE, RR would advertise only one of the received paths for 171.68.2.0/24 to other PEs
Watch out for the increased memory consumption (within BGP) due to multipaths at the PEs eiBGP multipath implicitly provides both eBGP and iBGP multipath for VPN paths
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
32
16
171.68.2.0/24
CE1
Site A PE12
MPLS Backbone
Site B
In a classic case, PE11, upon detecting the PE-CE link failure, sends BGP message to withdraw all the related VPN routes from the MPLS/VPN network
This results in the remote PE routers selecting the alternate bestpath (if any), but until then, they keep sending the MPLS/VPN traffic to PE11, which keeps dropping the traffic
Cisco IOS and IOX now have incorporated a Fast Local Repair feature to minimize the loss due to the PE-CE link failure from sec to msec
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
33
171.68.2.0/24
CE1
Site A PE12
MPLS Backbone
Site B
This feature helps PE11 to minimize the traffic loss from sec to msec, by redirecting the CE1 bound traffic to PE12 (with the right label), which forwards the traffic to CE1
PE11 reprograms the forwarding entry after selecting the alternate BGP best path (which is via PE12)
In parallel, PE11 sends the BGP withdraw message to RR/PE2, which will run the bestpath algorithm and removes the path learned via PE11, and then adjust their forwarding entries via PE12 This feature is independent of whether multipath is enabled on PE2 or not, however, dependent on VPN site multihoming
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
34
17
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP transport 11. Providing Multi-VRF CE Service
35
MPLS-VPN Services:
2. Hub and Spoke Service to the VPN Customers Traditionally, VPN deployments are Hub and Spoke
Spoke to spoke communication is via Hub site only
Despite MPLS VPNs implicit any-to-any, i.e, full-mesh connectivity, Hub and Spoke service can easily be offered
Done with import and export of route-target (RT) values
PE routers can run any routing protocol with VPN customers Hub and spoke sites independently
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
36
18
MPLS-VPN Services:
ip vrf green-spoke1 description VRF for SPOKE A rd 300:111 route-target export 1:1 route-target import 2:2 Spoke A
171.68.1.0/24
CE-SA
PE-SA
ip vrf HUB-OUT description VRF for traffic from HUB rd 300:11 route-target import 1:1 Eth0/0.1 PE-Hub Eth0/0.2
Spoke B
171.68.2.0/24
CE-SB
PE-SB
MPLS VPN Backbone ip vrf HUB-IN description VRF for traffic to HUB rd 300:12 route-target export 2:2
ip vrf green-spoke2 description VRF for SPOKE B rd 300:112 route-target export 1:1 route-target import 2:2
BRKRST-2102 13902_06_2007_x1
37
MPLS-VPN Services:
2. Hub and Spoke Service: Configuration If BGP is used between every PE and CE, then asoverride and allowas-in knobs must be used at the PE_Hub*
Otherwise AS_PATH looping will occur
If the spoke sites only need the default route from the hub site, then it is possible to use a single interface between PE-hub and CE-hub (instead of two interfaces as shown on the previous slide)
Let CE-hub router advertise the default or aggregate Avoid generating a BGP aggregate at the PE
38
19
MPLS-VPN Services:
ip vrf green-spoke1 description VRF for SPOKE A rd 300:111 route-target export 1:1 route-target import 2:2 Spoke A
171.68.1.0/24
CE-SA
PE-SA
ip vrf HUB-OUT description VRF for traffic from HUB rd 300:11 route-target import 1:1 Eth0/0.1 PE-Hub Eth0/0.2
Spoke B
171.68.2.0/24
CE-SB
PE-SB
MPLS VPN Backbone ip vrf HUB-IN description VRF for traffic to HUB rd 300:12 route-target export 2:2
router bgp <ASN> address-family ipv4 vrf HUB-IN neighbor <CE> allowas-in 2
Cisco Confidential
ip vrf green-spoke2 description VRF for SPOKE B rd 300:112 route-target export 1:1 route-target import 2:2
BRKRST-2102 13902_06_2007_x1
39
MPLS-VPN Services:
CE-SA
PE-SA
VRF HUB-OUT RT and LFIB Destination NextHop Label 171.68.1.0/24 PE-SA 40 171.68.2.0/24 PE-SB 50 MP-iBGP 171.68.0.0/16 Label 35 Route-Target 2:2
VRF RT and LFIB at PE-SA 171.68.0.0/16 PE-Hub 35 171.68.1.0/24 CE-SA VRF RT and LFIB at PE-SB 171.68.0.0/16 PE-Hub 35 171.68.2.0/24 CE-SB
VRF HUB-OUT
PE-Hub
VRF HUB-IN
171.68.2.0/24
CE-SB
PE-SB
Spoke B
40
20
MPLS-VPN Services:
2. Hub and Spoke Service: Forwarding Plane This is how the spoke-to-spoke traffic flows MPLS Backbone Spoke A
171.68.1.0/24 171.68.1.1
CE-SA
PE-SA
L2
40
171.68.1.1
VRF HUB-OUT
PE-Hub Spoke B
171.68.2.0/24 171.68.1.1
CE-SB
PE-SB
L1
35
171.68.1.1
VRF HUB-IN
Cisco Confidential
41
MPLS-VPN Services:
2. Hub and Spoke Service: Half-Duplex VRF Why do we need Half-duplex VRF? If more than one spoke router (CE) connects to the same PE router within the single VRF, then such spokes can reach other without needing the Hub
This defeats the purpose of doing Hub and Spoke
42
21
MPLS-VPN Services:
ip vrf red-vrf description VRF upstream flow rd 300:111 route-target import 2:2
Spoke A
171.68.1.0/24
Spoke B
171.68.2.0/24
CE-SB
Upstream VRF
Downstream VRF
ip vrf HUB-IN description VRF for traffic to HUB rd 300:12 route-target export 2:2
PE-SA installs the spoke routes only in downstream VRF i.e. blue-VRF PE-SA forwards the incoming IP traffic (from Spokes) using the upstream VRF i.e. red-vrf routing table
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
43
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP transport 11. Providing Multi-VRF CE Service
44
22
MPLS-VPN Services
3. Extranet VPN MPLS VPN, by default, isolates one VPN customer from another
Separate virtual routing table for each VPN customer
Needs right import and export route-target (RT) values configuration within the VRFs
Export-map or import-map should be used
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
45
ip vrf VPN_A rd 3000:111 export map VPN_A_Export import map VPN_A_Import route-target import 3000:111 route-target export 3000:111 route-target import 3000:1 ! route-map VPN_A_Export permit 10 match ip address 1 set extcommunity rt 3000:2 ! route-map VPN_A_Import permit 10 match ip address 2 ! access-list 1 permit 171.68.0.0 0.0.0.0 access-list 2 permit 180.1.0.0 0.0.0.0
ip vrf VPN_B rd 3000:222 export map VPN_B_Export import map VPN_B_Import route-target import 3000:222 route-target export 3000:222 route-target import 3000:2 ! route-map VPN_B_Export permit 10 match ip address 2 set extcommunity rt 3000:1 ! route-map VPN_B_Import permit 10 match ip address 1 ! access-list 1 permit 171.68.0.0 0.0.0.0 access-list 2 permit 180.1.0.0 0.0.0.0
Only Site#1 of both VPN_A and VPN_B would Communicate with Each Other, Site#2 Wont be part of it.
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
46
23
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP transport 11. Providing Multi-VRF CE Service
47
MPLS-VPN Services
4. Internet Access Service to VPN Customers Internet access service could be provided as another value-added service to VPN customers Security mechanism must be in place at both provider network and customer network
To protect from the Internet vulnerabilities
VPN customers benefit from the single point of contact for both Intranet and Internet connectivity
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
48
24
MPLS-VPN Services
4. Internet Access: Different Methods of Service Four ways to provide the Internet service
1. VRF specific default route with global keyword 2. Separate PE-CE sub-interface (non-VRF) 3. Extranet with Internet-VRF 4. VRF-aware NAT
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
49
MPLS-VPN Services
1. VRF specific default route
1.1 Static default route to move traffic from VRF to Internet (global routing table) 1.2 Static routes for VPN customers to move traffic from Internet (global routing table) to VRF
50
25
MPLS-VPN Services:
Site1 171.68.0.0/16 CE1 SO PE1 192.168.1.2
PE1# ip vrf VPN-A rd 100:1 route-target both 100:1 Interface Serial0 ip address 192.168.10.1 255.255.255.0 ip vrf forwarding VPN-A Router bgp 100 no bgp default ipv4-unicast redistribute static neighbor 192.168.1.1 remote 100 neighbor 192.168.1.1 activate neighbor 192.168.1.1 next-hop-self neighbor 192.168.1.1 update-source loopback0
A default route, pointing to the ASBR, is installed into the site VRF at each PE The static route, pointing to the VRF interface, is installed in the global routing table and redistributed into BGP
51
ip route vrf VPN-A 0.0.0.0 0.0.0.0 192.168.1.1 global ip route 171.68.0.0 255.255.0.0 Serial0
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
MPLS-VPN Services:
Site1 171.68.0.0/16
IP Packet D=171.68.1.1 IP Packet D=Cisco.com Label = 30 IP Packet D=Cisco.com
Internet
Se0
192.168.1.2
PE1 P
PE2
Label = 35 IP Packet D=171.68.1.1
SO
192.168.1.1
IP Packet D=171.68.1.1
Global Table and LFIB Destination Label/Interface 192.168.1.2/32 Label=35 171.68.0.0/16 192.168.1.2 Internet Serial 0
VRF Routing/FIB Table Destination Label/Interface 0.0.0.0/0 192.168.1.1 (global) Site-1 Serial 0
Pros Different Internet gateways can be used for different VRFs PE routers need not to hold the Internet table Simple configuration
Cons Using default route for Internet routing does NOT allow any other default route for intra-VPN routing Increasing size of global routing table by leaking VPN routes Static configuration (possibility of traffic blackholing)
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
52
26
MPLS-VPN Services
4.2 Internet Access
1. VRF specific default route
1.1 Static default route to move traffic from VRF to Internet (global routing table) 1.2 Static routes for VPN customers to move traffic from Internet (global routing table) to VRF
53
ASBR
P Internet GW
One sub-interface for VPN routing associated to a VRF Another sub-interface for Internet routing associated to the global routing table Could advertise full Internet routes or a default route to CE The PE will need to advertise VPN routes to the Internet (via global routing table)
54
27
S0.2 S0.1 CE Routing Table VPN Routes Serial0.1 Internet Routes Serial0.2 PE Global Table and FIB Internet Routes 192.168.1.1 192.168.1.1 Label=30
IP Packet D=Cisco.com
PE1 192.168.1.2 P
192.168.1.1
PE2
PE-Internet GW
Pros
CE could dual home and perform optimal routing Traffic separation done by CE
Cons
PE to hold full Internet routes BGP complexities introduced in CE; CE1 may need to aggregate to avoid AS_PATH looping
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
55
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
56
28
4.4 Internet Access Using VRF-Aware NAT If the VPN customers need Internet access without Internet routes, then VRF-aware NAT can be used at the Internet-GW i.e. ASBR The Internet GW doesnt need to have Internet routes either Overlapping VPN addresses is no longer a problem More in the VRF-aware NAT slides
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
57
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP transport 11. Providing Multi-VRF CE Service
58
29
Voice and data can be separated out into different VRFs at the PE; Service enabler
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
59
Cable Setup
CE1 Se0/0
PE2
66.3.1.25 44.3.12.1
Traffic Flows
interface Serial0/0 ip address 215.2.0.6 255.255.255.252 ip policy route-map PBR-VRF-Selection ip receive brown ip receive blue ip receive green access-list 40 permit 33.3.0.0 0.0.255.255 access-list 50 permit 44.3.0.0 0.0.255.255 access-list 60 permit 66.3.0.0 0.0.255.255
ip vrf brown rd 3000:111 route-target export 3000:1 route-target import 3000:1 ! ip vrf blue rd 3000:222 route-target export 3000:2 route-target import 3000:2 ! ip vrf green rd 3000:333 route-target export 3000:3 route-target import 3000:3
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
60
30
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP transport 11. Providing Multi-VRF CE Service
61
Remote access services integration with MPLS VPN opens up new opportunities for providers and VPN customers
BRKSEC-2010 Deploying Remote-Access IPSec/SSL VPNs
Remote Access is not to be confused by GET VPN that provides any-to-any (CE-based) security service
BRKSEC-4012 Advanced IPSec with GET VPN
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
62
31
SP Shared Network
SP AAA
Corporate Intranet
Customer AAA VPN A Customer A head office
IKE_ID is IP/MPLS/Layer 2 used to map Based Network the IPSec tunnel to PE the VRF (within the ISAKMP VPN A profile)
Customer A Branch Office MPLS VPN
PE
IP
BRKRST-2102 13902_06_2007_x1
IPSec Session
2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
IP
63
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 19. Providing MPLS/VPN over IP transport 20. Providing Multi-VRF CE Service
64
32
MPLS-VPN Services
7. VRF-Aware NAT Services VPN customers could be using overlapping IP address i.e. 10.0.0.0/8 Such VPN customers must NAT their traffic before using either Extranet or Internet or any shared* services PE is capable of NATting the VPN packets (eliminating the need for an extra NAT device)
65
MPLS-VPN Services
7. VRF-Aware NAT Services Typically, inside interface(s) connect to private address space and outside interface(s) connect to global address space
NAT occurs after routing for traffic from inside-to-outside interfaces NAT occurs before routing for traffic from outside-to-inside interfaces
Each NAT entry is associated with the VRF Works on VPN packets in the following switch paths: IP->IP, IP->MPLS and MPLS->IP
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
66
33
MPLS-VPN Services
CE1 PE11
PE-ASBR
.1
217.34.42.2
Internet
10.1.1.0/24
Blue VPN Site ip vrf green rd 3000:111 route-target both 3000:1 ip vrf blue rd 3000:222 route-target both 3000:2 router bgp 3000 address-family ipv4 vrf green network 0.0.0.0 address-family ipv4 vrf blue network 0.0.0.0 VRF Specific Config
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
MPLS-VPN Services
Src=10.1.1.1 Dest=Internet 10.1.1.0/24
MPLS Backbone
Src=24.1.1.1 Dest=Internet Src=25.1.1.1 Dest=Internet
PE11 PE12 P
Label=40 Src=10.1.1.1 Dest=Internet
PE-ASBR
Internet
IP Packet
Traffic Flows
MPLS Packet
PE-ASBR removes the label from the received MPLS packets per LFIB Performs NAT on the resulting IP packets Forwards the packet to the internet Returning packets are NATed and put back in the VRF context and then routed This is also one of the ways to provide Internet access to VPN customers with or without overlapping addresses
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
68
34
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP transport 11. Providing Multi-VRF CE Service
69
MPLS-VPN Services:
Remember IP Precedence bits are copied to MPLS EXP bits (default behavior) MPLS Traffic-Eng could be used to provide the bandwidthon-demand or Fast Rerouting to VPN customers
BRKRST-2104 BRKRST-1101 Deploying MPLS Traffic Engineering Introduction to MPLS
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
70
35
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP Transport 11. Providing Multi-VRF CE Service
71
MPLS-VPN Services:
9. Providing Multicast Service to VPNs Multicast VPN service is also available for deployment
Current deployment model utilizes GRE encapsulation (not MPLS) within SP network
Multicast VPN also utilizes the existing 2547 infrastructure MPLS multicast i.e., mLDP and P2MP TE, is not far away either Please see the following session for details on mVPN:
BRKRST-2105 Inter-AS MPLS Solutions BRKRST-3261 Advances IP Multicast
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
72
36
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP transport 11. Providing Multi-VRF CE Service
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
73
MPLS-VPN Services:
10. Providing MPLS/VPN over IP Transport MPLS/VPN (rfc2547) can also be deployed using IP transport
NO LDP or MPLS anywhere Useful when the core (P) routers are not capable of MPLS
In this mode, Instead of using the MPLS Tunnel to reach the next-hop, an IP tunnel is used
IP tunnel could be L2TPv3, GRE etc.
Cisco Confidential
74
37
MPLS-VPN Services:
Ingress PE encapsulates the incoming IP packet (on VRF interface) into an MPLS packet and then encapsulates that MPLS packet inside the IP tunnel such as L2TPv3 tunnel Egress PE decapsulates the incoming L2TP packet and recirculates the resulting MPLS packet for usual MPLS packet forwarding Core routers forward the packet based on IP header
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
75
MPLS-VPN Services:
MPLS/IP
CE
CE
IP Network
MPLS/MPLS
IP/MPLS Network
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
76
38
Agenda
MPLS VPN Explained MPLS-VPN Services
1. Providing Load-Shared Traffic to the Multihomed VPN Sites 2. Providing Hub and Spoke Service to the VPN Customers 3. Providing MPLS VPN Extranet Service 4. Providing Internet Access Service to VPN Customers 5. Providing VRF-Selection Based Services 6. Providing Remote Access MPLS VPN 7. Providing VRF-Aware NAT Services 8. Providing QoS Service to VPNs 9. Providing Multicast Service to VPNs 10. Providing MPLS/VPN over IP Transport 11. Providing Multi-VRF CE Service
77
MPLS-VPN Services:
Multi-VRF CE provides multiple virtual routing tables (and forwarding tables) per customer at the CE router
Not a feature but an application based on VRF implementation Any routing protocol that is supported by normal VRF can be used in a Multi-VRF CE implementation
Note that there is no MPLS functionality needed on the CE, no label exchange between the CE and any router (including PE) One of the deployment models is to extend the VRFs to the CE, another is to extend it further inside the Campus => Virtualization
Campus Virtualization blends really well
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
78
39
MPLS-VPN Services:
Vrf green
Campus
Vrf green
MPLS Network
PE Router PE Router Vrf red
Vrf red
Multi-VRF CE Router
*SubInterface Link Any Interface type that supports Sub Interfaces, FE-Vlan, Frame Relay, ATM VCs
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
79
Agenda
MPLS VPN Explained MPLS-VPN Services Best Practices Conclusion
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
80
40
Best Practices
1. Use RR to scale BGP; deploy RRs in pair for the redundancy
Keep RRs out of the forwarding paths and disable CEF (saves memory)
3. Consider unique RD per VRF per PE, if load sharing of VPN traffic is required 4. Don't use customer names as the VRF names; nightmare for the NOC. Use simple combination of numbers and characters in the VRF name
For example: v101, v102, v201, v202, etc. Use description.
5. PE-CE IP address should come out of SPs public address space to avoid overlapping
Use /31 subnetting on PE-CE interfaces
6. Define an upper limit at the PE on the number of prefixes received from the CE for each VRF or neighbor
Max-prefix within the VRF configuration; Do suppress the inactive routes. Max-prefix per neighbor within the BGP VRF af (if BGP on the PE-CE)
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
81
Agenda
MPLS VPN Explained MPLS-VPN Services Best Practices Conclusion
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
82
41
Conclusion
MPLS VPN is a cheaper alternative to traditional l2vpn
Secured VPN
CsC and Inter-AS could be used to expand into new markets VRF-aware services could be deployed to maximize the investment
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
83
Q and A
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
84
42
Recommended Reading
Continue your Networkers at Cisco Live learning experience with further reading from Cisco Press Check the Recommended Reading flyer for suggested books
85
Cisco Confidential
86
43
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
87
Additional Slides
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
88
44
Agenda
Advanced MPLS VPN Topics
Inter-AS MPLS-VPN CsC Carrier Supporting Carrier
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
89
What Is Inter-AS?
Provider X
RR1
MP-iBGP Update:
Provider Y
ASBR1 RR2 ASBR2
???
PE1
AS #1
AS #2
PE2
CE-1
CE2
VPN-A
149.27.2.0/24
VPN-A
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
90
45
ASBR2
PE1
AS #1
AS #2
PE2
CE1
CE2
VPN-A
Each Option Is Covered in Additional Slides
BRKRST-2102 13902_06_2007_x1
VPN-A
Cisco Confidential
91
ASBR-2
VPN-v4 update: RD:1:27:10.1.1.0/24, NH=ASBR-2 RT=1:1, Label=(92)
PE-1
PE-2
BGP, OSPF, RIPv2 10.1.1.0/24,NH=PE-2
CE-2
CE-3
VPN-B
10.1.1.0/24
VPN-B
92
46
ASBR-1
ASBR-2
92
10.1.1.1
P2
P1
10.1.1.1
20
92
10.1.1.1
PE-1
10.1.1.1
CE-2
PE-2
10.1.1.1
VPN-B
10.1.1.0/24
VPN-B
Pros
Per-customer QoS is possible It is simple and elegant since no need to load the Inter-AS code (but still not widely deployed)
Cons
Not scalable. # of interface on both ASBRs is directly proportional to #VRF No end-to-end MPLS Unnecessary memory consumed in RIB/(L)FIB Dual-homing of ASBR makes provisioning worse
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
93
AS #1
PE1
AS #2
PE2
ASBR VRF and BGP config ip vrf green rd 1:1 route-target both 1:1 ! Router bgp x Address-family ipv4 vrf green neighbor 1.1.1.x activate
Note: ASBR must already have MPiBGP session with iBGP neighbors such as RRs or PEs.
CE-1
CE-2
VPN-A
VPN-A
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
94
47
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
95
ASBR-2
MP-iBGP update: RD:1:27:10.1.1.0/24, NH=ASBR-2 RT=1:1, Label=(30)
PE-1
PE-2
BGP, OSPF, RIPv2 10.1.1.0/24, NH=PE-2
CE-2
CE-3
VPN-B
10.1.1.0/24
VPN-B
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
96
48
ASBR-1
ASBR-2
30
10.1.1.1
P2
P1
40
10.1.1.1
20
10.1.1.1
20
30
10.1.1.1
PE-1
PE-2 CE-3
10.1.1.1
VPN-B
10.1.1.0/24
VPN-B
10.1.1.1
More scalable
Pros
Cons
Only one interface between ASBRs routers No VRF configuration on ASBR Less memory consumption (no RIB/FIB memory)
97
ASBR2
AS #1
PE1
AS #2
PE2
CE-1
VPN-A
ASBR MB-EBGP Configuration Router bgp x no bgp default route-target filter neighbor 1.1.1.x remote-as x ! address-family vpnv4 neighbor 1.1.1.x activate neighbor 1.1.1.x send-com extended
CE-2
VPN-A
Note: ASBR must already have MPiBGP session with iBGP neighbors such as RRs or PEs.
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
98
49
Exchange IPv4 routes with labels between directly connected ASBRs using eBGP 499-0753 Only PE loopback addresses need to be exchanged (they are
BGP next-hop addresses of the VPN routes)
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
99
Scenario 3: Multihop MP-eBGP Between RRs for VPN Routes: Control Plane
RR-1
VPN-v4 update: RD:1:27:10.1.1.0/24, NH=PE-1 RT=1:1, Label=(90)
VPN-v4 update: RD:1:27:10.1.1.0/24, NH=PE-1 RT=1:1, Label=(90)
RR-2
VPN-v4 update: RD:1:27:10.1.1.0/24, NH=PE-1 RT=1:1, Label=(90)
AS#1
IGP+LDP: Network=PE-1 NH=PE-1 Label=(40)
ASBR-1
ASBR-2
AS#2
PE-1
CE-2
PE-2
BGP, OSPF, RIPv2 10.1.1.0/24,NH=PE-2
CE-3
VPN-B
10.1.1.0/24
VPN-B
Note - Instead of IGP+Label, iBGP+Label can be used to exchange PE routes/label. Please see Scenario#5 on slide#49 and 50.
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
100
50
Scenario 3: Multihop MP-eBGP Between RRs for VPN Routes: Forwarding Plane
RR-1 P1
40
90
10.1.1.1
90
10.1.1.1
RR-2
P2
ASBR-1
ASBR-2
30
90
10.1.1.1 50 90 10.1.1.1
PE-1
20
10.1.1.1
90
10.1.1.1
PE-2 CE-3
10.1.1.1
CE-2
VPN-B
10.1.1.0/24
VPN-B
Cisco Confidential
101
Scenario 3: Pros/Cons
Pros
More scalable than Scenario 1 and 2
Separation of control and forwarding planes
Cons
Advertising PE addresses to another AS may not be acceptable to few providers
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
102
51
PE1
ASBR-2
AS #1
CE-1 eBGP IPv4 + Labels
AS #2
PE2
CE-2
VPN-A
RR Configuration
router bgp x neighbor <RR-x> remote-as x neighbor <RR-x> ebgp-multihop neighbor <RR-x> update loopback 0 ! address-family vpnv4 neighbor <RR-x> activate neighbor <RR-x> send-com extended neighbor <RR-x> next-hop-unchanged
ASBR Configuration
router ospf x redistribute bgp 1 subnets ! router bgp x neighbor < ASBR-x > remote-as x ! address-family ipv4 Network <PEx> mask 255.255.255.255 Network <RRx> mask 255.255.255.255 neighbor < ASBR-x > activate neighbor < ASBR-x > send-label
VPN-A
iBGPipv4+label could also be used in within each AS (instead of network <x.x.x.x>) to propagate the label information for PEs.
BRKRST-2102 13902_06_2007_x1 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
103
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
104
52
ASBR-2
iBGP IPv4 + Labels
VPN-B
RR-2
CE-3
VPN-B
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
105
ASBR(conf)#router bgp 1000 ASBR(conf-router)#neighbor 1.1.1.1 route-map route-target-deletion out ASBR(conf-router)#exit ASBR(conf)#route-map route-target-delete ASBR(conf-route-map)#match extcommunity 101 ASBR(conf-route-map)#set extcomm-list 101 delete ASBR(conf-route-map)#set extcommunity rt 123:123 additive ASBR(conf)# ip extcommunity-list 101 permit rt 100:100
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
106
53
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
107
Agenda
Advanced MPLS VPN Topics
Inter-AS MPLS-VPN Carrier Supporting Carrier (CsC)
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
108
54
If number of VPN routes can be reduced somehow (without loosing the functionality), then the existing investment can be protected
The same PE can still be used to connect more VPN customers
Carrier Supporting Carrier (CsC) provides the mechanism to reduce the number of routes from each VRF by enabling MPLS on the PE-CE link
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
109
PE2
CE-2 Full-Mesh iBGP for External Routes ISP PoP Site-2 ASBR-2 R2 C1
Internal Routes = IGP Routes
ASBR-1 R1
INTERNET
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
55
Benefits of CsC
Provide transport for ISPs ($)
No need to manage external routes from ISPs
Sell VPN service to subsidiary companies that provide VPN service ($)
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
111
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
112
56
IGP+LDP
PE2
ASBR-1
INTERNET
R1
ISP customers = external routes
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
113
Model 1 and 2 are less common deployments. Model 3 will be discussed in detail.
BRKRST-2102 13902_06_2007_x1
Cisco Confidential
114
57
CsC: ISP Sites Are Running MPLS-VPN Hierarchical MPLS-VPN Control Plane
MP-iBGP update: 1:1:30.1.61.25/32, RT=1:1 NH =PE-1, Label=51
PE1
P1
IGP+LDP, Net=PE-1, Label = 16
PE2
Carriers Core
30.1.61.25/32, NH=CE-1, Label = 50
30.1.61.25/32, NH=PE-2, Label = 52
CE-1
CE-2
MP-iBGP update: 1:1:10.1.1.0/24, RT=1:1 NH =30.1.61.25/32, Label = 90
ASBR_PE-1 30.1.61.25/32
10.1.1.0/24, NH=R1
C1
10.1.1.0/24, NH =ASBR_PE-2
Network = 10.1.1.0/24
BRKRST-2102 13902_06_2007_x1
R1 VPN Site-1
2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
R2 VPN Site-2
115
PE1
PE2
Carriers Core
50 90
10.1.1.1
52 90
10.1.1.1
CE-1
CE-2
90
10.1.1.1 60 90 10.1.1.1
ASBR-1
10.1.1.1
ASBR-2
10.1.1.1
70 90 10.1.1.1
Network = 10.1.1.0/24
BRKRST-2102 13902_06_2007_x1
R1 VPN Site-1
2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
R2 VPN Site-2
116
58