VPLS - DSPCSP Pages

Download Report

Transcript VPLS - DSPCSP Pages

VPLS
Yaakov (J) Stein
November 2004
Chief Scientist
RAD Data Communications
Contents

Tunneling Ethernet

VPNs

MPLS and PWs

L2VPNs

LDP vs. BGP

Generalizations

L3VPNs
Y(J)S VPLS Slide 2
Tunneling Ethernet
Y(J)S VPLS Slide 3
Ethernet limitations
Ethernet LAN is the most popular LAN
but Ethernet can not be made into a WAN

Ethernet is limited in distance between stations

Ethernet is limited in number of stations on segment
Ethernet is inefficient in finding destination address
Ethernet only prunes network topology, does not route


so the architecture that has emerged is Ethernet private networks
connected by public networks of other types (e.g. IP)
LAN
LAN
WAN
Y(J)S VPLS Slide 4
Traditional WAN architecture
this model is sensible when traffic contains a given higher layer
Ethernet header is removed at ingress and a new header added at egress
this model is not transparent Ethernet LAN interconnect
 Ethernet LANs with multiple higher layer packet types
(e.g. IPv4, IPv6, IPX, SNA, CLNP, etc.) can’t be interconnected
 raw L2 Ethernet frames can not be sent
the Ethernet layer is terminated at WAN ingress
the traffic is no longer Ethernet at all
Ethernet
Ethernet
WAN
not Ethernet
Y(J)S VPLS Slide 5
Tunneling Ethernet frames
users with multiple sites want to connect their LANs
so that all locations appear to be on the same LAN
this requires tunneling of all Ethernet L2 frames (not only IP)
between one LAN and another
the entire Ethernet frame needs to be preserved
(except perhaps the FCS which can be regenerated at egress)
Ethernet
Ethernet
X
Ethernet inside X
Y(J)S VPLS Slide 6
Tunneling encapsulation
for simplicity, let’s think of an IP network :
the traditional architecture uses the following packet formats:
WAN
Eth hdr IP hdr payload Eth FCS
Eth hdr IP hdr payload Eth FCS
WAN L2 hdr IP hdr payload
the VPN model (Ether-IP) uses the following packet formats:
WAN
Eth hdr IP hdr payload Eth FCS
Eth hdr IP hdr payload Eth FCS
WAN L2 hdr IP hdr Eth hdr IP hdr payload Eth FCS*
Y(J)S VPLS Slide 7
Ethernet over HDLC/FR/ATM
WAN
Ethernet frames can be carried over various WANs
HDLC: not standardized, Cisco-HDLC
FR: RFC2427 / STD0055 (ex 1490)
ATM: RFC2684 / (ex 1483), LANE
entire Ethernet frame (or IP packet) is used as payload
Y(J)S VPLS Slide 8
Ethernet over SONET/SDH
SONET/SDH
Ethernet over SONET/SDH (EoS) and low-rate TDM
entire Ethernet frame is placed in SONET/SDH payload
Formats:



Generic Framing Procedure (GFP) [SDH&OTN G.7041, PDH - G.8040]
Virtual Concatenation (VC) with/without Link Capacity Adjustment Scheme (LCAS)
Link Access Procedure for SDH (LAPS)
unlike POS, EoS allows bandwidth sharing between Ethernet ports
but SONET/SDH is an expensive infrastructure
Y(J)S VPLS Slide 9
VPNs
Y(J)S VPLS Slide 10
Virtual Private Networks
service
provider
network
Service Providers (SPs) with packet switched networks (PSNs)
want to offer customers site interconnect service
since the private networks are interconnected over
a public PSN
this results in a Virtual Private Network
unlike the traditional WAN architecture
the entire Ethernet frame must be tunneled through the PSN
hence it is sometimes called Transparent LAN Service (TLS)
Y(J)S VPLS Slide 11
Basic (L2,L3)VPN model
physical link
customer
network
customer
network
emulated link
customer
network
Customer
Edge
(CE)
Provider
Provider
provider Edge
Edge
network
(PE)
(PE)
AC = Attachment Circuit
Customer
Edge
customer
network
(CE)
AC = Attachment Circuit
Y(J)S VPLS Slide 12
(L2,L3)VPN in more detail
C
C
C
C
CE
CE
C
C
customer 1 network
P
P
P
C
C
customer 2 network
P
provider network
CE
C
CE
P
PE
customer 2 network
PE
PE
C
P
C
C
CE
C
Key
Customer router/switch
Customer Edge router/switch customer 1 network
Provider router/switch
Provider Edge router/switch
Y(J)S VPLS Slide 13
VPN Challenges
192.115.243.79
192.115.243.19
SP
network
192.115.243.19
Security
Private IP addresses
Multiple higher-layer protocols
SP resource requirements
Complex provider - customer relationship
Y(J)S VPLS Slide 14
VPN types

Legacy
– proprietary leased-line (not virtual)
– Frame Relay over E1/T1
– ATM over E1 or multiple-E1

Pure IP
– IPSec tunnel
– L2TP tunnel

MPLS L3VPN
– 2547bis

MPLS L2VPN
– VPWS / VPLS
Y(J)S VPLS Slide 15
MPLS and PWs
Y(J)S VPLS Slide 16
What is MPLS?
the Internet core is now mostly MPLS
label switching adds the strength of CO to CL forwarding
label switching has three stages:
– routing (topology determination) using L3 (IP) protocols
– path setup (label binding and distribution)
– data forwarding
label switching
–
–
–
–
speeds up forwarding
decreases forwarding table size (by using local labels)
load balance by explicitly setting up paths
complete separation of routing and forwarding algorithms
so new routing algorithm needed
but new signaling algorithm may be needed
MultiProtocol Label Switching (MPLS)
–
–
–
–
is multiprotocol - from above and below
can run on IP router or ATM switch with only SW upgrade (but HW helps)
supports a label stack
support for traffic engineering and QoS guarantees
Y(J)S VPLS Slide 17
MPLS Architecture
downstream direction
Label Switched Path
L3 link
ingress
L3 router
upstream direction
L3 link
egress
Label Edge Router
Label Edge Router
Label Switched Routers
L3 router
label switching is needed in the core, access can be L3 forwarding*
core interfaces the access at the edge (ingress, egress)
LSR router that can* perform label switching
LER LSR with non-MPLS neighbors (LSR at edge of core network)
LSP unidirectional path used by label switched forwarding (ingress to egress)
* not every packet needs label switching
(e.g. only small number of packets, no QoS)
1.3
Y(J)S VPLS Slide 18
Where is the MPLS label?
unlike TCP, the CO layer lies under the CL layer
if there is a broadcast L2 (e.g. Ethernet), the CO layer lies above it
higher layers
layer 3 (e.g. IP)
label switching (layer 2.5)
shim header
layer 2 (e.g. Ethernet)
physical layer
hence, MPLS switching is sometime called layer 2.5 switching
Y(J)S VPLS Slide 19
MPLS Shim Header
Label (20b)
Exp(3b) S(1b)
TTL (8b)
when a shim header is needed, its format should be:
Label there are 220 different labels (+ 220 multicast labels)
Special (reserved) labels
0 IPv4 explicit null
1 router alert
2 IPv6 explicit null
3 implicit null
Exp (CoS) left undefined by IETF WG
was CoS in Cisco Tag Switching
could influence packet queuing
S=0
Stack bit S=1 indicates bottom of label stack
S=0
another label
S=0
yet another label
S=1
bottom label
TTL decrementing hop count
used to eliminate infinite routing loops
generally copied from/to IP TTL field
top label
Y(J)S VPLS Slide 20
How are labels used?
binding:
– label assigned by downstream LSR
– per port or per LSR label space
– control driven vs. data driven (traffic driven)
distribution:
– upstream label distribution
– piggyback label distribution on routing protocols (e.g. BGP)
– Label Distribution Protocol (LDP)
forwarding:
–
–
–
–
read top label L
consult Incoming Label Map (forwarding table)
perform label stack operation (pop L, swap L - M, swap L - M and push N)
forward based on L’s Next Hop Label Forwarding Entry
Y(J)S VPLS Slide 21
MPLS solves IP address problem
192.115.243.19
1
2
SP
network
1
192.115.243.19
MPLS label
IP header
payload
assume customers 1 and 2 use overlapping IP addresses
then C-routers have inconsistent tables
ingress PE-router pushes a label
P-routers see only MPLS label
P-routers don’t see IP addresses - no ambiguity
P-routers see only the MPLS label - not LAN IP addresses
PE routers know how to map CE LANs
Y(J)S VPLS Slide 22
Simple MPLS LAN Extension
CE
CE
ACs
CE
PE
P
P
PE
ACs
CE
CE
CE
each LAN mapped to pair of (unidirectional) LSPs
supports all LAN traffic types (CE is Ethernet Switch, not IP router)
each Ethernet frame encapsulated with MPLS label
supports various AC technologies
scaling problem:
 requires large number of LSPs
 P-routers need to reserve resources for each LAN instance
Y(J)S VPLS Slide 23
(Martini) Pseudowires
CE
CE
transport tunnel
ACs
CE
PE
ACs
PE
CE
CE
CE
PWs are bidirectional
transport MPLS tunnel set up between PEs
multiple PWs may be set up inside tunnel
Ethernet frame encapsulated with 2 labels
MPLS (outer) label
PW (inner) label
Ethernet frame
P-routers do not reserve resources for each VPN instance
Y(J)S VPLS Slide 24
More on Pseudowires

encapsulation via “Martini drafts” draft-ietf-pwe3-xxx-encap
L2 can be Ethernet, but also ATM or FR

setup via PW control protocol draft-ietf-pwe3-control-protocol
based on targeted LDP
Problems:

supports only point-to-point LAN interconnect (VPWS)

need to manually configure PW for every VPN instance
need to setup 2 unidirectional tunnels for every pair of PEs

Y(J)S VPLS Slide 25
Ethernet Pseudowire packet
outer
label
inner
label
control
word
Ethernet Frame
• outer label specifies MPLS tunnel
• inner label contains PW label to support
multiple Ethernet PWs in a single MPLS tunnel
• optional control word
• enables detection of out-of-order and lost packets
0000
reserved
Sequence Number (16b)
• Ethernet Frame
• by default no FCS trailer (but there is separate “FCS retention” draft)
Y(J)S VPLS Slide 26
L2VPNs
Y(J)S VPLS Slide 27
VPWS
CE
AC
PE
PE
AC
CE
provider
network
Virtual Private Wire Service is a L2 point-to-point service
it emulates a wire supporting the Ethernet physical layer
set up MPLS tunnel between PEs
set up Ethernet PW inside tunnel
CEs appear to be connected by a single L2 circuit
(can also make VPWS for ATM, FR, etc.)
Y(J)S VPLS Slide 28
VPLS
AC
PE
CE
AC
CE
PE
for clarity only one VPN is shown
PE
AC
CE
VPLS emulates a LAN over an MPLS network
set up MPLS tunnel between every pair of PEs (full mesh)
set up Ethernet PW inside tunnels, for each VPN instance
CEs appear to be connected by a single LAN
PE must know where to send Ethernet frames …
but this is what an Ethernet bridge does
Y(J)S VPLS Slide 29
VPLS
V B
CE
CE
B V
V B
CE
a VPLS-enabled PE has, in addition to its MPLS functions:

VPLS code module (IETF drafts)

Bridging module (standard IEEE 802.1D learning bridge)
SP network
(inside rectangle)
looks like a single Ethernet bridge!
Note: if CE is a router, then PE only sees 1 MAC per customer location
Y(J)S VPLS Slide 30
VPLS bridge
PE maintains a separate bridging module for each VPN (VPLS instance)
VPLS bridging module must perform:
 MAC learning
 MAC aging
 flooding of unknown MAC frames
 replication (for unknown/multicast/broadcast frames)
unlike true bridge, Spanning Tree Protocol is not used
 limited traffic engineering capabilities
 scalability limitations
 slow convergence
forwarding loops are avoided by split horizon
 PE never forwards packet from MPLS network to another PE
 not a limitation since there is a full mesh of PWs
so always send directly to the right PE
Y(J)S VPLS Slide 31
VPLS code module
VPLS signaling
establish PWs between PEs per VPLS
VPLS autodiscovery
locates PEs participating in VPLS instance
obtain frame from bridge
encapsulate Ethernet frames
and inject packet into PW
retrieve packet from PW
removes PW encapsulation
and forward Ethernet frame to bridge
Y(J)S VPLS Slide 32
L2VPN vs. L3VPN
PE
CE
PE
CE
?
PE
CE
in L2VPN CEs appear to be connected by single L2 network
PEs are transparent to L3 routing protocols
CEs are routing peers
in L3VPN CE routers appear to be connected by a single L3 network
CE is routing peer of PE, not remote CE
PE maintains routing table for each VPN
Y(J)S VPLS Slide 33
IPLS (IP-only LAN Service)
mechanisms may be simplified if Ethernet frames carry only IP traffic
enables upgrade of IP routers to support VPLS-like services
in this case CE devices are routers, not switches
frames are still forwarded based on MAC DA (not L3VPN)
but MAC forwarding tables updated via PW signaling, not 802.1D
PE snoops IP and ARP frames to discover CEs connected to it
creates (AC,VPN-ID,IP-addr,MAC-addr) entry
creates PWs to all PEs participating in VPN-ID
sends entries to these PEs
Address Resolution Protocol (ARP) messages are proxied
rather than being carried transparently
PE searches entries it has received
can support different AC types (Ethernet and FR)
ARP Mediation ensures proper mapping
Y(J)S VPLS Slide 34
LDP vs. BGP
Y(J)S VPLS Slide 35
LDP vs. BGP
both use TCP for reliable transport (LDP uses UDP for hellos)
both are hard-state protocols
both use TLV format for parameters
BGP
LDP
multiprotocol (IPv4, IPv6, IPX, MPLS)
MPLS only
highly complex protocol
simpler protocol
provides routing / label distribution
only label distribution
built-in autodiscovery mechanism
extendable for autodiscovery
Y(J)S VPLS Slide 36
BGP
header (19B)
marker
(16B)
length
(2B)
marker can be used for authentication
type
(1B)
data
(variable)
(TCP MD5 signature)
length is total BGP PDU length, including header
type
–
–
–
–
OPEN (for session initialization)
UPDATE (add, change and withdraw routes)
NOTIFICATION (return error messages, terminate session)
KEEPALIVE (heartbeat)
KEEPALIVE packet consists of 19B header only
Y(J)S VPLS Slide 37
BGP state machine

idle – no session (awaiting session initialization)

connect – attempting to connect to peer

active – started TCP 3-way handshake (router busy)

open sent – have sent OPEN message

open confirm – after receiving TCP SYN for OPEN message

established – BGP session up and running
Y(J)S VPLS Slide 38
BGP OPEN
version
(1B)
my AS
(2B)
hold time
(2B)
BGP-ID
(2B)
op len
(1B)
opt parameters
(variable)
version (3 or 4)
my AS – identifier of autonomous system
hold time – max time (sec) between receipt of messages
BGP ID – sender’s BGP identifier
op len – length (bytes) of optional parameters
opt parameters - TLVs
Y(J)S VPLS Slide 39
BGP UPDATE
WR len withdrawn
routes
(2B)
(var)
PA len
(2B)
path
attributes
(var)
Withdrawn Routes – list of routes no longer to be used
NLRI
(var)
(NLRI format- see below)
Path Attributes – route specific information (see next page)
Network Layer Reachability Information – (classless) routing information
len
(1B)
prefix
(variable)
the NLRI is a list of address-prefixes
each prefix must be masked from the left to the length specified
Y(J)S VPLS Slide 40
BGP UPDATE - Path Attributes
flags
(1B)
type code
(1B)
flags
O – optional/well-known bit
if 1 must be recognized by all BGP implementations
if W=1 and unrecognized attribute, BGP sends notification and session closed
T – transitive/nontransitive bit
if 1 and attribute unrecognized it is passed along, else silently ignored
well-known attributes are always transitive
C – complete/partial bit
L – attribute length bit
(for optional transitive attributes only)
(=0 attribute length is 1B, =1 length is 2B)
type code
ORIGIN, AS_PATH, NEXT_HOP, MED, LOCAL_PREF,
AGGREGATOR, COMMUNITY, ORIGINATOR_ID…
Y(J)S VPLS Slide 41
BGP NOTIFICATON
error
code
(1B)
error
subcode
(2B)
data
(var)
all notification messages cause BGP session to close
error codes include:
–
–
–
–
–
–
message header error
open message error
update message error
hold timer expired
state machine error
other fatal error
Y(J)S VPLS Slide 42
LDP
header (10B)
version
(2B)
length
(2B)
LDP-ID
(6B)
messages
(variable)
version – presently 1
length - PDU length, excluding version and length fields
LDP-ID – identifies label space of sending LDP peer
– LSR-ID(4B) globally unique LSR ID
– label space ID (2B) for per-port label spaces
(zero for per-platform label spaces)
messages – zero or more TLVs (see next page)
Y(J)S VPLS Slide 43
LDP messages
type
(2B)
length
(2B)
message-ID
(4B)
mandatory
parameters
(variable)
optional
parameters
(variable)
type U
message code
U – unknown message bit
if message type unknown to receiver
U=0 – receiver returns notification to sender
U=1 – receiver silently ignores
length - message length, excluding type and length fields
Message-ID – unique ID for message (for matching with returned notification)
if there are mandatory parameters, they most appear in a specific order
optional parameters may appear in any order
Y(J)S VPLS Slide 44
LDP message types
Hello (UDP, for discovery)
Initialization (specifies LDP version, label space range, parameters)
KeepAlive (heart beat)
Notification (error, e.g.unsupported version, unknown/malformed msg, timer expired)
Address (LSR advertises its interface IP address(es) to peers)
Address Withdraw (LSR revokes previously advertised interface IP address)
Label Mapping (downstream LSR advertisement of a label mapping for a FEC )
Label Withdraw (downstream LSR informing that binding is revoked)
Label Request (upstream LSR request for binding in downstream-on-demand mode)
Label Release (upstream LSR informing that binding no longer needed)
Label Abort Request (upstream LSR asks to revoke request before satisfied)
Y(J)S VPLS Slide 45
LDP state machine

LSR periodically transmits hello UDP messages
– multicast to “all routers on subnet” group
– targeted to preconfigured IP address

LSRs listen on this UDP port for hello messages

when LSR receives hello from another LSR
– it opens a TCP connection to that other LSR
or (for extended discovery)
– it unicast transmits a hello back to the other LSR

LSR with higher ID sends session initialization message

other LSR LDP accepts (sends keepalive) or rejects

informative or keepalive messages sent
3.2
Y(J)S VPLS Slide 46
Provisioning VPLS
Y(J)S VPLS Slide 47
Provisioning
customers may want their SP to take an active role
in managing their networks
Provider Provisioned VPN (PPVPN) refers to VPN
for which SP participates in management and provisioning
by provisioning we mean (at least) :
 setting up the ACs (often manual configuration)
 assigning global VPN-ID to VPN instances
 discovery of all PEs that participate in a VPN instance
 associating AC with VPN at PE
 providing PEs with information needed to set up tunnels
 configuring tunnels with necessary characteristics
Y(J)S VPLS Slide 48
Autodiscovery
we have assumed that each PE knows
which PEs participate in particular VPN instance
manual configuration is problematic logistically
autodiscovery refers to automatically finding all PEs in a given VPN
each PE "discovers" other PEs by means of some protocol


BGP (to be discussed later)
RADIUS (Remote Authentication Dial In User Service)
CE = RADIUS users, PEs = Network Access Servers (NAS)
PE can authenticate CEs and find other PEs

targeted LDP (“Stokes draft” – now abandoned)
advertise FEC in LDP
new TLV in label mapping message contains VPN-id, P or PE, capabilities
Y(J)S VPLS Slide 49
PWE control
a PW is a bidirectional entity (two LSPs in opposite directions)
a PW connects two forwarders
PW setup via targeted LDP signaling
2 different LDP TLVs can be used
– PWid FEC
– Generalized ID FEC
PWid FEC
to use both sides of PW provisioned with a unique (32b) value
each of PW endpoint independently initiates LSP set up
LSPs bound together into a single PW
Y(J)S VPLS Slide 50
Generalized ID
for each forwarder we have a PE-unique Attachment Identifier (AI)
<PE, AI> must be globally unique
frequently useful to group a set of forwarders into a attachment group
where PWs may only be set up among members of a group
then Attachment Identifier (AI) consists of
– Attachment Group Identifier (AGI) (which is basically a VPN-id)
– Attachment Individual Identifier (AII)
the LSPs making up the PW are
< PE1, (AGI, AII1), PE2, (AGI, AII2) >
< PE2, (AGI, AII2), PE1, (AGI, AII1) >
and
we also need to define
– Source Attachment Identifier (SAI = AGI+SAII)
– Target Attachment Identifier (TAI = AGI+TAII)
receiving PE can map TAI uniquely to AC
Y(J)S VPLS Slide 51
VPWS Provisioning
Double Sided Provisioning
each AC provisioned with local name, remote PE address, and remote name
during signaling, local name is sent as SAII, remote name as TAII (AGI = null)
to connect 2 ACs by a PW:
local name = remote name(PWid FEC) or
local name of each must be remote name of the other
Single Sided Provisioning with Discovery
each AC provisioned with local name (VPN-id) and AII
during signaling, local name is sent as AGI
to connect 2 ACs by a PW:
both must have the same VPN-id
only one needs to be provisioned with remote name (local name of other AC)
neither needs to be provisioned with the address of the remote PE
during auto-discovery procedure:
each PE advertises its <VPN-id, local AII> pairs
each PE compares its local <VPN-id, remote AII> pairs
with <VPN-id, local AII> pairs from other PEs
if match then need to connect
local name sent as SAII, remote AII sent as TAII, VPN-id as AGI
Y(J)S VPLS Slide 52
VPLS Provisioning
every VPLS instance is assigned a unique VPN-id
PEs are preconfigured or find each other using auto-discovery
if PE detects VPN-id to which it belongs
it sets up a PW
during signaling
– VPN-id is send as the AGI field
– SAII and TAII are set to null
Y(J)S VPLS Slide 53
LDP VPLS
ex-“Lasserre-VKompella draft”, now draft-ietf-l2vpn-vpls-ldp
authors: Marc Lasserre - Riverstone and Vach Kompella – Alcatel
supported by Cisco, Nortel, Alcatel, Riverstone, Extreme, Luminous, Corrigent, Hatteras, Overture, RAD
use LDP for
– PW setup and tear-down signaling
– explicit withdrawal of MACs (force relearning)
full mesh of targeted LDP sessions between VPLS-enabled PEs
automatically establish a full mesh of Ethernet PWs
 participating PE sends an unsolicited label mapping message
to every other PE, specifying VPN-ID (preferably with generalized PWid FEC element)

if receiving PE accepts,
it sends a label mapping message back
Y(J)S VPLS Slide 54
BGP VPLS
ex-“Kompella draft”,
now draft-ietf-l2vpn-vpls-bgp
authors: Kireeti Kompella, Yakov Rekhter – Juniper
uses BGP4 (with multiprotocol extensions) for:



autodiscovery (uses Route Target extended community as VPN-ID)
PW setup and tear-down (uses Network Layer Reachability Information)
force MAC relearning (uses Relearn Sequence Number TLV)
protocol essentially identical to RFC2547bis (to be discussed later)
Y(J)S VPLS Slide 55
BGP VPLS signaling
define demultiplexor = VPN-ID + ingress PE
VPLS Edge (VE) advertises VPLS NLRIs for each VPLS instance
NLRI defines demultiplexors for all PEs in VPLS instance
extended attribute encodes PE capabilities
if new PE joins VPLS
new NLRI seamlessly adds new label
coalesce to a single NLRI with temporary service disruption
PE sets up PW when it receives an NLRI for VPLS
to leave VPLS instance PE withdraws NLRI
remote PEs remove PWs
Y(J)S VPLS Slide 56
Generalizations
Y(J)S VPLS Slide 57
Distributed (Generic) VPLS
CE
U-PE
PE
access
N-PE network
VPLS
CE
CE
U-PE
PE
CE
L2VPN framework allows decomposition of PE

User-Facing PE (U-PE) performs Bridge functions

MAC learning, forwarding decisions
Network-Facing PE (N-PE) performs VPLS functions
establishes tunnels, PWs
V B
U-PE is inexpensive CLE, good for MTU applications
Y(J)S VPLS Slide 58
Hierarchical VPLS
PE
VPLS
MTU
PE
MTU
VPLS
HVPLS
PE
MTU
VPLS
straight VPLS has a problem – N2 PWs are used
which means N2 LDP sessions, and N2 floods and replications
to improve scalability, can use hub-and-spoke topology
if VPLS is in multi-tenant buildings, local PE is MTU
HVPLS PEs are full mesh, but do not perform bridging
spoke PW set up between PE and MTU (note end-point is virtual bridge)
Y(J)S VPLS Slide 59
L3VPNs
Y(J)S VPLS Slide 60
BGP MPLS VPNs (2547bis)
presently most popular provider managed VPN
originally specified in RFC 2547, update in draft called 2547bis
transports IPv4 (IPv6) traffic in MPLS tunnels
uses BGP for route distribution
since SPs commonly use BGP for routing
2547 is not an overlay model
– CE routers at different sites are not routing peers
– they do not directly exchange routing information
– they don’t even need to know of each other
– so customer needn’t manage a backbone or virtual backbone
– no inter-site routing problems
Y(J)S VPLS Slide 61
BGP MPLS VPNs (cont.)
only PE routers maintain VPN information
P routers needn’t maintain any customer routing information
C routes either manually configured in PE
or advertised to PE using BGP, OSPF, etc.
PE advertises routes to remote PEs using BGP
remote PEs advertise routes to their CEs using BGP, OSPF, etc.
IP address overlap solved using Route Distinguisher (RD)
Y(J)S VPLS Slide 62
2547bis architecture
CE not peer to CE
CE peer to PE
C
C
C
CE
C
PE
P
P
PE
C
CE
C
CE is IP router
SP label
ext label
IP Packet
Virtual router (peering) model, not tunneling
PE maintains Virtual Route Forwarding table for each VPN
BGP (with multiprotocol extensions) used for label distribution
in order to support private IP addresses
PE prepends 8B Route Distinguisher (unique to site) to IP address
Y(J)S VPLS Slide 63
L2VPN
vs.
L3VPN

C switch connects to L2 circuits

C router peers with SP router

BGP or LDP

BGP

all L3 traffic types

limited to IP traffic

only Ethernet L2

supports different L2 technologies

Cs responsible for routing

SP responsible for routing
 “overlay model”

“peer model”

simple customer-SP interface

complex customer-SP interface

C peering scales as VPN size

C peering independent of VPN size
 scaling problem

scales well
Y(J)S VPLS Slide 64