Cisco Presentation Guide
Download
Report
Transcript Cisco Presentation Guide
DEPLOYING MPLS-VPN
SESSION RST-2602
Rajiv Asati ([email protected])
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
1
Agenda
• MPLS VPN Definition?
Technology
Configuration
• MPLS-VPN Services
Providing load-shared traffic to the multihomed VPN sites
Providing Hub&Spoke service to the VPN customers
Providing MPLS VPN Extranet service
Providing Internet access service to VPN customers
Providing VRF-selection based services
Providing Remote Access MPLS VPN
Providing VRF-aware NAT services
• Advanced MPLS VPN Topics
Inter-AS MPLS-VPN
CsC Carrier Supporting Carrier
• Best Practices
• Conclusion.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
2
Prerequisites
• Must understand basic IP routing, especially BGP
• Must understand MPLS basics (push, pop, swap,
label stacking)
• Must finish the evaluation
http://www.networkers04.com/desktop
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
3
Terminology:
• LSR
: Label Switch Router
• LSP
: Label Switched Path
The chain of labels that are swapped at each hop to get from one LSR to another
• VRF
: VPN Routing and Forwarding
Mechanism in IOS used to build per-interface RIB and FIB
• MP-BGP
: Multi-Protocol BGP
• PE
: Provider Edge router Interfaces with CE routers
• P
: Provider (core) router, without knowledge of VPN
• VPNv4
: Address family used in BGP to carry MPLS-VPN routes
• RD
: Route Distinguisher
Distinguish same network/mask prefix in different VRFs
• RT
: Route Target
Extended Community attribute used to control import and export policies of VPN
routes
• LFIB
: Label Forwarding Information Base
• FIB
: Forwarding Information Base (FIB)
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
4
Agenda
• MPLS VPN Definition?
Technology
Configuration
• MPLS-VPN Services
Providing load-shared traffic to the multihomed VPN sites
Providing Hub&Spoke service to the VPN customers
Providing MPLS VPN Extranet service
Providing Internet access service to VPN customers
Providing VRF-selection based services
Providing Remote Access MPLS VPN
Providing VRF-aware NAT services
• Advanced MPLS VPN Topics
Inter-AS MPLS-VPN
CsC Carrier Supporting Carrier
• Best Practices
• Conclusion.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
5
MPLS-VPN Operation’s Theory
• VPN definition: VRF instance
• VPN Route Propagation (Control Plane)
• VPN Packet forwarding (Data Plane)
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
6
MPLS VPN Connection Model
P
P
PE
PE
VPN Backbone IGP
P
P
MP-iBGP session
PE routers
Edge Routers
P Routers
P routers are in the core of the MPLS
cloud
Use MPLS with P routers
Uses IP with CE routers
Connects to both CE and P routers.
Distribute VPN information through
MP-BGP to other PE router with
VPN-IPv4 addresses, Extended
Community, Label
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
P routers do not need to run BGP and
doesn’t need to have any VPN knowledge
Forward packets by looking at labels
P and PE routers share a common IGP
7
MPLS VPN: Separate Routing Tables in PE
vpn site 2
CE
PE
EBGP,OSPF, RIPv2,Static
CE
MPLS Backbone IGP (OSPF, ISIS)
vpn site 1
VRF routing table
Routing (RIB) and Forwarding table
(CEF) associated with one or more
directly connected sites (CEs)
The routes the PE receives from CE
Routers are installed in the appropriate
VRF routing table(s)
blue VRF routing table or green
The Global routing table
Populated by the MPLS backbone IGP
In PE routers may contain the BGP
Internet routes (standard ipv4 routes)
VRF routing table
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
8
VRF: Virtual Routing and Forwarding
Instance
vpn site 2
CE
VRF green
PE
EBGP,OSPF, RIPv2,Static
CE
vpn site 1
MPLS Backbone IGP (OSPF, ISIS)
VRF blue
• What’s a VRF ?
• Associates to one or more interfaces on PE
Privatize an interface i.e. coloring of the interface
• Has its own routing table and forwarding table (CEF)
• VRF has its own instance for the routing protocol
(static ,RIP,BGP,EIGRP,OSPF)
• CE router runs standard routing software
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
9
VRF: Virtual Routing and Forwarding
Instance
vpn site 2
CE
PE
EBGP,OSPF, RIPv2,Static
CE
MPLS Backbone IGP (OSPF, ISIS)
vpn site 1
• PE installs the routes, learned from CE routers, in
the appropriate VRF routing table(s)
• PE installs the IGP (backbone) routes in the global
routing table
• VPN customers can use overlapping IP addresses.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
10
Additions in BGP: MPLS-VPN Info BGP
8 Bytes
4 Bytes
1:1
10.1.1.0
RD
IPv4
8 Bytes
Route-Target
3 Bytes
Label
VPNv4
MP-iBGP update with RD, RT, and Label
• RD: Route Distinguisher
• VPNv4 routes
• RT: Route Target
• Label
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
11
MPLS VPN Control Plane
MP-BGP Update Components:
8 Bytes
4 Bytes
1:1
10.1.1.0
RD
IPv4
8 Bytes
Route-Target
VPNv4 address
3 Bytes
Label
VPNv4
MP-IBGP update with RD, RT, and Label
• To convert an IPv4 address into a VPNv4 address, RD
is appended to the IPv4 address i.e 1:1:10.1.1.0
• Makes the customer’s IPv4 route globally unique.
• Each VRF must be configured with an RD at the PE
• RD is what that defines the VRF
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
!
ip vrf v1
rd 1:1
!
12
MPLS VPN Control Plane
MP-BGP Update Components:
8 Bytes
4 Bytes
8 Bytes
1:1
10.1.1.0
2:2
RD
IPv4
Route-Target
Route-Target
3 Bytes
Label
VPNv4
MP-IBGP update with RD, RT, and Label
•
Route-target (RT):
•
Each VRF is configured with RT(s) at the PE
Identifies the VRF for the received VPNv4
prefix. It is an 8-byte extended Community (a BGP attribute)
RT helps to color the prefix
!
ip vrf v1
route-target import 1:1
route-target export 1:2
!
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
13
MPLS VPN Control Plane
MP-BGP Update Components:
Label
8 Bytes
4 Bytes
8 Bytes
3 Bytes
1:1
10.1.1.0
2:2
50
RD
IPv4
Route-Target
Label
VPNv4
MP-IBGP update with RD, RT, and Label
•
The Label (for the VPNv4 prefix) is assigned only by the PE whose address is the
Next-Hop attribute
PE routers re-write the Next-Hop with their own address (loopback)
“Next-Hop-Self” towards MP-iBGP neighbors by default
•
PE addresses used as BGP Next-Hop must be uniquely known in the backbone
IGP
DO NOT summarize the PE loopback addresses in the core
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
14
MPLS VPN Control Plane:
Putting It All Together
3
Site 1
MP-iBGP update:
RD:10.10.1.0
Next-hop=PE-1
RT=Green, Label=100
Site 2
CE1
10.1.1.0/24
CE2
P
10.10.1.0/24
Next-Hop=CE-1
P
PE1
PE2
P
1
P
MPLS Backbone
1) PE1 receives an IPv4 update (eBGP,OSPF,EIGRP)
2) PE1 translates it into VPNv4 address
• Assigns an RT per VRF configuration
• Re-writes Next-Hop attribute to itself
• Assigns a label based on VRF and/or interface
3) PE1 sends MP-iBGP UPDATE to other PE routers
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
15
MPLS VPN Control Plane:
Putting It All Together
3
Site 1
MP-iBGP update:
RD:10.10.1.0
Next-hop=PE-1
RT=Green, Label=100
5
10.1.1.0/24
Next-Hop=PE-2
CE1
10.1.1.0/24
CE2
P
10.1.1.0/24
Next-Hop=CE-1
Site 2
P
PE1
PE2
P
1
P
MPLS Backbone
4) PE2 receives and checks whether the RT=green is locally
configured within any VRF, if yes, then
5) PE2 translates VPNv4 prefix back into IPv4 prefix,
• Installs the prefix into the VRF Routing table
• Updates the VRF CEF table with label=100 for 10.1.1.0/24
• Advertise this IPv4 prefix to CE2 (EBGP, OSPF, EIGRP)
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
16
MPLS VPN Forwarding Plane:
e
Site 2
Site 1
10.1.1.0/24
CE1
CE2
P1
P2
PE1
PE2
P
Global routing/forwarding table
Dest->Next-Hop
PE2 P1, label: 50
The Global Forwarding table
(show ip cef)
•PE routers store IGP routes
•Associated labels
•Label distributed through LDP/TDP
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
P
VRF Green forwarding Table
Dest->NextHop
10.1.1.0/24-PE1, label: 100
Global routing/forwarding table
Dest->NextHop
PE1 P2, label: 25
VRF Forwarding table
(show ip cef vrf <vrf>)
•PE routers store VPN routes
•Associated labels
•Labels distributed through MP-BGP
17
MPLS VPN Forwarding Plane:
e
Site 2
Site 1
10.1.1.0/24
CE1
CE2
P
10.1.1.1
P
PE1
PE2
100
50
10.1.1.1
100
10.1.1.1
P
P
10.1.1.1
25
100
10.1.1.1
PE2 imposes TWO labels for each packet going to the VPN destination 10.1.1.1
•
The top label is LDP learned and Derived from an IGP route
Represents LSP to PE address (exit point of a VPN route)
•
The second label is learned via MP-BGP
Corresponds to the VPN address
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
18
Agenda
• MPLS VPN Definition?
Technology
Configuration
• MPLS-VPN Services
Providing load-shared traffic to the multihomed VPN sites
Providing Hub&Spoke service to the VPN customers
Providing MPLS VPN Extranet service
Providing Internet access service to VPN customers
Providing VRF-selection based services
Providing Remote Access MPLS VPN
Providing VRF-aware NAT services
• Advanced MPLS VPN Topics
Inter-AS MPLS-VPN
CsC Carrier Supporting Carrier
• Best Practices
• Conclusion.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
19
MPLS VPN Sample Configuration
VRF Definition
ip vrf VPN-A
rd 1:1
route-target export 100:1
route-target import 100:1
Site 1
CE1
10.1.1.0/24
PE1
Se0
PE1
Interface Serial0
ip address 192.168.10.1 255.255.255.0
ip vrf forwarding VPN-A
192.168.10.1
PE-P Configuration
Interface Serial1
ip address 130.130.1.1 255.255.255.252
mpls ip
P
Se0
PE1
s1
PE1
router ospf 1
network 130.130.1.0 0.0.0.3 area 0
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
20
MPLS VPN Sample Configuration
PE:
MP-IBGP
router bgp 1
neighbor 1.2.3.4 remote-as 1
neighbor 1.2.3.4 update-source loopback 0
RR
PE1
RR:
PE2
PE1
address-family vpnv4
neighbor 1.2.3.4 activate
neighbor 1.2.3.4 send-community both
MP-IBGP
router bgp 1
no bgp default route-target filter
neighbor 1.2.3.6 remote-as 1
neighbor 1.2.3.6 update-source loopback0
RR
PE1
RST-2602
9908_06_2004_X2
PE2
© 2004 Cisco Systems, Inc. All rights reserved.
RR
address-family vpnv4
neighbor 1.2.3.6 route-reflector-client
Neighbor 1.2.3.6 activate
21
MPLS VPN Sample Configuration
PE-CE
BGP
Site 1
CE1
10.1.1.0/24
PE1
192.168.10.2
PE1
192.168.10.1
PE-CE
router bgp 1
!
address-family ipv4 vrf VPN-A
neighbor 192.168.10.2 remote-as 2
neighbor 192.168.10.2 activate
exit-address-family
!
OSPF
Site 1
CE1
10.1.1.0/24
192.168.10.2
PE1
PE1
router ospf 1
!
router ospf 2 vrf VPN-A
network 192.168.10.0 0.0.0.255 area 0
!
192.168.10.1
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
22
MPLS VPN Sample Configuration
PE-CE
RIP
router rip
Site 1
CE1
10.1.1.0/24
192.168.10.2
PE1
192.168.10.1
PE-CE
EIGRP
router eigrp 1
Site 1
CE1
10.1.1.0/24
192.168.10.2
PE1
192.168.10.1
RST-2602
9908_06_2004_X2
address-family ipv4 vrf VPN-A
version 2
no auto-summary
network 192.168.10.0
exit-address-family
© 2004 Cisco Systems, Inc. All rights reserved.
address-family ipv4 vrf VPN-A
network 192.168.10.0 0.0.0.255
autonomous-system 1
exit-address-family
23
MPLS VPN Sample Configuration
PE-CE
Static
Site 1
CE1
10.1.1.0/24
ip route vrf VPN-A 10.1.1.0 255.255.255.0 192.168.10.2
192.168.10.2
PE1
192.168.10.1
PE-CE MB-iBGP routes to VPN
Site 1
RR
PE1
CE1
RST-2602
9908_06_2004_X2
router rip
address-family ipv4 vrf VPN-A
version 2
redistribute bgp 1 metric 1
no auto-summary
network 192.168.10.0
exit-address-family
If PE-CE protocol is non BGP then redistribution
of other sites VPN routes from MP-IBGP is required.
© 2004 Cisco Systems, Inc. All rights reserved.
24
MPLS VPN Sample Configuration
PE-RR
(VPN routes to VPNv4)
Site 1
RR
PE1
CE1
router bgp 1
neighbor 1.2.3.4 remote-as 1
neighbor 1.2.3.4 update-source loopback 0
address-family ipv4 vrf VPN-A
redistribute {rip|connected|static|eigrp|ospf}
If PE-CE protocol is non BGP then redistribution
of other sites VPN routes into MP-IBGP is required.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
25
Agenda
• MPLS VPN Definition?
Technology
Configuration
• MPLS-VPN Services
Providing load-shared traffic to the multihomed VPN sites
Providing Hub&Spoke service to the VPN customers
Providing MPLS VPN Extranet service
Providing Internet access service to VPN customers
Providing VRF-selection based services
Providing Remote Access MPLS VPN
Providing VRF-aware NAT services
• Advanced MPLS VPN Topics
Inter-AS MPLS-VPN
CsC Carrier Supporting Carrier
• Best Practices
• Conclusion.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
26
MPLS VPN Services:
1. Loadsharing for the VPN traffic
RR
PE11
PE2
CE1
CE2
171.68.2.0/24
PE12
Site A
Site B
MPLS Backbone
Route Advertisement
• VPN sites (such as Site A) could be multihomed
• VPN customer may demand the traffic to the multihomed sites be
loadshared
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
27
MPLS VPN Services:
1. Loadsharing for the VPN traffic: Cases
1 CE 2 PEs
RR
PE11
PE2
CE1
CE2
171.68.2.0/24
PE12
Site A
Site B
MPLS Backbone
Traffic Flow
2 CEs 2 PEs
RR
PE11
PE2
CE1
171.68.2.0/24
CE2
CE2
PE12
Site B
MPLS Backbone
Site A
RST-2602
9908_06_2004_X2
Traffic Flow
© 2004 Cisco Systems, Inc. All rights reserved.
28
MPLS VPN Services:
1. Loadsharing for the VPN Traffic: Deployment
How to deploy the loadsharing ?
1.
Configure different VRFs i.e RDs for multihomed site/interfaces.
2.
Enable BGP multipath within the relevant BGP VRF addressfamily at Remote/Receiving PE2.
2
1
ip vrf green
rd 300:11
route-target both 1:1
RR
PE11
router bgp 1
address-family ipv4 vrf green
maximum-paths eibgp 2
PE2
CE1
CE2
171.68.2.0/24
PE12
Site A
1
ip vrf green
rd 300:12
route-target both 1:1
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
MPLS Backbone
1
Site B
ip vrf green
rd 300:13
route-target both 1:1
29
MPLS VPN Services:
1. Loadsharing for the VPN Traffic(实验)
RR
Route Advertisement
PE11
PE2
CE1
CE2
171.68.2.0/24
PE12
Site A
Site B
MPLS Backbone
• RR must advertise all the paths learned via PE11 and PE12 to the
remote PE routers
With different RD per VRF, RR does the Best path
RD and advertise them to remote PE
calculation per
• Watch out for the increased (~20%) memory consumption (within
BGP) due to multipaths at the PEs
• “eiBGP multipath” implicitly provides eBGP and iBGP multipath for
VPN paths
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
30
MPLS-VPN Services:
2. Hub & Spoke Service to the VPN Customers
• Traditionally, VPN deployments are Hub&Spoke.
Spoke to spoke communication is via Hub site only.
• Despite MPLS VPN’s implicit any-to-any i.e fullmesh connectivity, Hub&Spoke service can easily
be offered.
Done with import and export of Route-Target (RT).
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
31
MPLS-VPN Services:
2. Hub & Spoke Service - Configuration
ip vrf green-spoke1
description VRF for SPOKE A
rd 300:111
route-target export 1:1
route-target import 2:2
Spoke A
CE-SA
ip vrf HUB-OUT
description VRF for traffic from HUB
rd 300:11
route-target import 1:1
PE-SA
171.68.1.0/24
Eth0/0.1
PE-Hub
Spoke B
PE-SB
CE-SB
MPLS VPN Backbone
171.68.2.0/24
ip vrf green-spoke2
description VRF for SPOKE B
rd 300:112
route-target export 1:1
route-target import 2:2
RST-2602
9908_06_2004_X2
Eth0/0.2
© 2004 Cisco Systems, Inc. All rights reserved.
ip vrf HUB-IN
description VRF for traffic to HUB
rd 300:12
route-target export 2:2
32
MPLS-VPN Services:
2. Hub & Spoke Service – Control Plane
MPLS Backbone
Spoke A
CE-SA
PE-SA
171.68.1.0/24
Adv 171.68.1.0/24
Label 40
Route-Target 1:1
VRF RT and LFIB at PE-SA
0.0.0.0
PE-Hub
35
171.68.1.0/24 CE-SA
Adv 0.0.0.0
Label 35
Route-Target 2:2
VRF RT and LFIB at PE-SB
0.0.0.0
PE-Hub
35
171.68.2.0/24 CE-SB
171.68.2.0/24
CE-SB
VRF HUB-OUT RT and LFIB
Destination
NextHop Label
171.68.1.0/24
PE-SA 40
171.68.2.0/24
PE-SB 50
VRF HUB-OUT
PE-Hub
VRF HUB-IN
PE-SB
Adv 171.68.2.0/24
Label 50
Route-Target 1:1
VRF HUB-IN Routing Table
Destination
NextHop
0.0.0.0
CE-H1
Spoke B
• All traffic between spokes must pass through the Hub/Central Site.
Hub Site could offer FireWall, NAT like applications.
• Two VRF solution at the PE-Hub:
• VRF HUB_OUT would have knowledge of every spoke routes.
• VRF HUB_IN only have Default Route and advertise that to Spoke PEs.
• Import and export Route-Target within a VRF must be different.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
33
MPLS-VPN Services(实验内容):
2. Hub & Spoke Service – Forwarding Plane
MPLS Backbone
Spoke A
171.68.1.1
CE-SA
PE-SA
LA
40
171.68.1.1
171.68.1.0/24
VRF HUB-OUT
PE-Hub
Spoke B
PE-SB
CE-SB
LH
35
171.68.1.1
VRF HUB-IN
171.68.2.0/24
171.68.1.1
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
34
MPLS-VPN Services
3. Extranet VPN
• MPLS VPN, by default, isolates one VPN customer
from another.
Separate Virtual Routing Table for each VPN customer
• Communication between VPNs may be required i.e.
Extranet.
External Inter-company communication (dealers with
manufacturer, Retailer with wholesale provider etc)
Management VPN, Shared-service VPN etc.
• Needs right import and export route-target (RT)
values configuration within the VRFs
export-map or import-map should be used
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
35
3. MPLS-VPN Services: Extranet VPN
Goal: Only VPN_A site#1 to be reachable to VPN_B
MPLS Backbone
192.6.0.0/16
VPN_A Site#2
VPN_A Site#1
171.68.0.0/16
so PE1
PE2
P
180.1.0.0/16
VPN_B Site#1
ip vrf VPN_A
rd 3000:111
export map VPN_A_Export
import map VPN_A_Import
route-target import 3000:111
route-target export 3000:111
route-target import 3000:1
!
route-map VPN_A_Export permit 10
match ip address 1
set extcommunity rt 3000:2
!
route-map VPN_A_Import permit 10
match ip address 2
!
access-list 1 permit 171.68.0.0 0.0.0.0
access-list 2 permit 180.1.0.0 0.0.0.0
ip vrf VPN_B
rd 3000:222
export map VPN_B_Export
import map VPN_B_Import
route-target import 3000:222
route-target export 3000:222
route-target import 3000:2
!
route-map VPN_B_Export permit 10
match ip address 2
set extcommunity rt 3000:1
!
route-map VPN_B_Import permit 10
match ip address 1
!
access-list 1 permit 171.68.0.0 0.0.0.0
access-list 2 permit 180.1.0.0 0.0.0.0
Only Site#1 of both VPNs will communicate to
each other, Site#2 won’t.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
36
MPLS-VPN Services
4. Internet Access Service to VPN Customers
• Could be provided as another value-added service.
• Security mechanism must be in place at both
provider network and customer network
To protect from the Internet vulnerabilities
• VPN customers benefit from the single point of
contact for both Intranet and Internet connectivity
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
37
MPLS-VPN Services
4. Internet Access: Different Methods of Service
•
Four ways to provide the Internet service
1. VRF Specific default route with “global” keyword
2. Separate PE-CE sub-interface (nonVRF)
3. Extranet with Internet-VRF
4. VRF-aware NAT
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
38
MPLS-VPN Services(实验内容)
4. Internet Access: Different Methods of Service
1. VRF Specific default route
1.1 Static default route to move traffic from VRF to Internet (global
routing table)
1.2 Static routes for VPN customers to move traffic from Internet
(global routing table) to VRF
2. Separate PE-CE sub-interface (non VRF)
May run BGP to propagate Internet routes between PE and CE
3. Extranet with Internet-VRF
VPN packets never leave VRF context ; issue with Overlapping
VPN address
4. Extranet with Internet-VRF along with VRF-aware NAT
VPN packets never leave VRF context; works well with
overlapping VPN address
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
39
MPLS-VPN Services:
4.1 Internet access: VRF Specific Default Route (Config)
MPLS Backbone
Site1
Internet
CE1
171.68.0.0/16
so PE1192.168.1.2
ip vrf VPN-A
rd 100:1
route-target both 100:1
Interface Serial0
ip address 192.168.10.1 255.255.255.0
ip vrf forwarding VPN-A
Router bgp 100
no bgp default ipv4-unicast
redistribute static
neighbor 192.168.1.1 remote 100
neighbor 192.168.1.1 activate
neighbor 192.168.1.1 next-hop-self
neighbor 192.168.1.1 update-source loopback0
ASBR
P
192.168.1.1
Internet GW
•
A default route, pointing to the ASBR, is installed
into the site VRF at each PE
A single label is used for packets forwarded
according to the default route
The label is the IGP label corresponding to the
IP address of the ASBR known via the IGP
•
The static route, pointing to the VRF interface, is
installed in the global routing table and
redistributed into BGP
ip route vrf VPN-A 0.0.0.0 0.0.0.0 192.168.1.1 global
ip RST-2602
route 171.68.0.0 255.255.0.0 Serial0
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
40
MPLS-VPN Services:
4.1 Internet access: VRF Specific Default Route (Forwarding)
MPLS Backbone
Internet
Site1
171.68.0.0/16
IP packet
D=171.68.1.1
IP packet
D=Cisco.com
so
Label = 30
IP packet
D=Cisco.com
IP packet
D=Cisco.com
PE1
PE2
so
P
192.168.1.2
192.168.1.1
Global Routing/FIB Table
Destination
Label/Interface
192.168.1.1/32 Label=30
171.68.0.0/16
Serial 0
VRF Routing/FIB Table
Destination
Label/interface
0.0.0.0/0 192.168.1.1 (global)
Site-1
Serial 0
Label = 35
IP packet
D=171.68.1.1
Pros
Different Internet gateways
can be used for different VRFs
PE routers need not to hold
the Internet table
Simple Configuration
IP packet
D=171.68.1.1
Global Table and LFIB
Destination Label/Interface
192.168.1.2/32
Label=35
171.68.0.0/16
192.168.1.2
Internet
Serial 0
Cons
Using default route for Internet
routing does NOT allow any other
default route for intrA_VPN routing
Increasing size of global routing
Table by leaking VPN routes.
Static configuration
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
41
MPLS-VPN Services
4.2 Internet Access
1. VRF Specific default route
1.1 Static default route to move traffic from VRF to Internet (global
routing table)
1.2 Static routes for VPN customers to move traffic from Internet
(global routing table) to VRF
2. Separate PE-CE sub-interface (non VRF)
May run BGP to propagate Internet routes between PE and CE
3. Extranet with Internet-VRF
VPN packets never leave VRF context ; Overlapping VPN
addresses could be a problem
4. Extranet with Internet-VRF alongwith VRF-aware NAT
VPN packets never leave VRF context; works well with
overlapping VPN addresses
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
42
4.2 Internet Access Service to VPN Customers
Using Separate Sub-Interface (Config)
Site1
171.68.0.0/16
MPLS Backbone
CE1
Internet
Internet
BGP-4
S0.2
PE1
ASBR
192.168.1.1
192.168.1.2
S0.1
ip vrf VPN-A
rd 100:1
route-target both 100:1
Interface Serial0.1
ip vrf forwarding VPN-A
ip address 192.168.20.1 255.255.255.0
frame-relay interface-dlci 100
!
Interface Serial0.2
ip address 171.68.10.1 255.255.255.0
frame-relay interface-dlci 200
!
Router bgp 100
no bgp default ipv4-unicast
[snip]…
RST-2602
neighbor
171.68.10.2 remote
502
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
P
Internet GW
One sub-interface for VPN routing
associated to a VRF
Another sub-interface for Internet routing
associated to the global routing table.
Could advertise full Internet Routes or a
default route to CE.
The PE will need to advertise VPN routes
to the Internet (via global routing table)
43
Internet Access Service to VPN Customers
4.2 Using Separate Sub-Interface (Forwarding)
Site1
171.68.0.0/16
Internet
IP packet
D=Cisco.com
S0.2
PE1
MPLS Backbone
Label = 30
IP packet
D=Cisco.com
PE2
192.168.1.1
192.168.1.2
S0.1
P
PE-Internet GW
CE routing table
VPN routes
Serial0.1
Internet routes
Serial0.2
PE Global Table and FIB
Internet routes
192.168.1.1
192.168.1.1
Label=30
Pros
CE could dual home and
perform optimal routing.
Traffic separation done
by CE.
RST-2602
9908_06_2004_X2
IP packet
D=cisco.com
© 2004 Cisco Systems, Inc. All rights reserved.
Cons
PE to hold full Internet routes.
BGP complexities introduced
in CE.
44
Internet Access Service
4.3 Extranet with Internet-VRF
• The internet routes could be placed within the VRF
at the Internet-GW i.e. ASBR
• VRFs for customers could ‘extranet’ with the
internet VRF and receive either default, partial or
full internet routes
• Be careful if duplicating the internet routes in
each VRF
• Works well when the VPN customers don’t have
overlapping addresses
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
45
Internet Access Service
4.4 Internet Access using VRF-aware NAT
• If the VPN customers need Internet access without
internet routes, then VRF-aware NAT can be used at
the Internet-GW i.e. ASBR
• The Internet GW doesn’t need to have internet
routes either
• Overlapping VPN addresses is not a problem
• More in the “VRF-aware NAT” slides,…..
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
46
MPLS VPN Service
5. VRF-Selection
• The common notion is that the VRF must be
associated to an interface
• “VRF-selection” breaks this association and
associate multiple VRFs to an interface
• Each packet on the PE-CE interface could be
handled (based on certain criteria) via different VRF
routing tables
Criteria such as source/dest IP address, ToS, TCP port etc.
specified via route-map
• Voice and Data can be separated out into different
VRFs at the PE
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
47
MPLS VPN Service
5. VRF-Selection – Based on Source IP Address
Global Interface
PE1
33.3.14.1
Cable
Setup
CE1
RR
VRF Interfaces
MPLS Backbone
(Cable Company)
Se0/0
VPN Brown
33.3.0.0/16
PE2
VPN Blue
44.3.0.0/16
66.3.1.25
Traffic Flows
44.3.12.1
VPN Green
66.3.0.0/16
ip vrf brown
rd 3000:111
route-target export 3000:1
route-target import 3000:1
!
ip vrf blue
rd 3000:222
route-target export 3000:2
route-target import 3000:2
!
ip vrf green
rd 3000:333
route-target export 3000:3
route-target import 3000:3
RST-2602
9908_06_2004_X2
interface Serial0/0
ip address 215.2.0.6 255.255.255.252
ip policy route-map PBR-VRF-Selection
ip receive brown
ip receive blue
ip receive green
access-list 40 permit 33.3.0.0 0.0.255.255
access-list 50 permit 44.3.0.0 0.0.255.255
access-list 60 permit 66.3.0.0 0.0.255.255
© 2004 Cisco Systems, Inc. All rights reserved.
route-map PBR-VRF-Selection permit 10
match ip address 40
set vrf brown
route-map PBR-VRF-Selection permit 20
match ip address 50
set vrf blue
route-map PBR-VRF-Selection permit 30
match ip address 60
set vrf green
48
MPLS VPN Service
6. Remote Access Service
• Remote access users i.e. dial users, IPSec users
could directly be terminated in VRF
PPP users can be terminated into VRFs
IPSec tunnels can be terminated into VRFs
• Remote Access services integration with MPLS
VPN opens up new opportunities for Providers
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
49
MPLS VPN Service
6. Remote Access Service– IPSec to MPLS VPN
Branch
Office
SP Shared Network
Access
Corporate Intranet
SP AAA
SOHO
Internet
Customer
AAA
PE+IPSec
Aggregator
VPN A
Internet
PE
Customer A
head office
PE
IP/MPLS/Layer 2
Based Network
Local or Direct
Dial ISP
VPN B
PE
Customer B
Cable/DSL/
ISDN ISP
VPN C
Remote Users/
Telecommuters
IP
RST-2602
9908_06_2004_X2
VPN A
Cisco IOS VPN Routers or
Cisco Client 3.x or higher
IPSec Session
© 2004 Cisco Systems, Inc. All rights reserved.
Customer A
branch office
MPLS VPN
Customer C
IP
50
MPLS-VPN Services
7. VRF-Aware NAT Services
• VPN customers could be using ‘overlapping’ IP
address i.e. 10.0.0.0/8
• Such VPN customers must NAT their traffic before
using either “extranet” or “internet” or any shared*
services
• PE is capable of NATting the VPN packets
(eliminating the need for an extra NAT device)
RST-2602
9908_06_2004_X2
* VoIP, Hosted Content, Management etc/
© 2004 Cisco Systems, Inc. All rights reserved.
51
MPLS-VPN Services
7. VRF-Aware NAT Services
• Typically, inside interface(s) connect to private
address space and outside interface connect to
global address space
NAT occurs after routing for traffic from inside-to-outside
interfaces
NAT occurs before routing for traffic from outside-to-inside
interfaces
• Each NAT entry is associated with the VRF
• Works on VPN packets in the following switch
paths : IP->IP, IP->MPLS and MPLS->IP
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
52
MPLS-VPN Services:
7. VRF-Aware NAT Services – Internet Access
CE1
PE11
MPLS Backbone
10.1.1.0/24
P
Green VPN Site
Internet
PE-ASBR
.1
217.34.42.2
PE12
CE2
ip nat inside
10.1.1.0/24
Blue VPN Site
ip nat outside
ip vrf green
rd 3000:111
route-target both 3000:1
ip vrf blue
rd 3000:222
route-target both 3000:2
ip nat pool pool-green 24.1.1.0 24.1.1.254 prefix-length 24
router bgp 3000
address-family ipv4 vrf green
network 0.0.0.0
address-family ipv4 vrf blue
network 0.0.0.0
ip access-list standard vpn-to-nat
permit 10.1.1.0 0.0.0.255
RST-2602
9908_06_2004_X2
ip nat pool pool-blue 25.1.1.0 25.1.1.254 prefix-length 24
ip nat inside source list vpn-to-nat pool pool-green vrf green
ip nat inside source list vpn-to-nat pool pool-blue vrf blue
ip route vrf green 0.0.0.0 0.0.0.0 217.34.42.2 global
ip route vrf blue 0.0.0.0 0.0.0.0 217.34.42.2 global
VRF specific Config
© 2004 Cisco Systems, Inc. All rights reserved.
VRF-aware NAT Specific Config
53
MPLS-VPN Services:
7. VRF-Aware NAT Services – Internet Access
Src=10.1.1.1
Dest=Internet
CE1
10.1.1.0/24
Green VPN Site
PE-ASBR
PE11
IP Packet
P
CE2
10.1.1.0/24
Src=10.1.1.1
Src=24.1.1.1
Dest=Internet
Internet
Src=25.1.1.1
Dest=Internet
PE12
Blue VPN Site
MPLS Backbone
Label=30
Src=10.1.1.1
Dest=Internet
Label=40
Src=10.1.1.1
Dest=Internet
IP Packet
Traffic Flows
Dest=Internet
MPLS Packet
•PE-ASBR removes the label from the received
MPLS packets per LFIB
•Performs NAT on the resulting IP packets
VRF IP Source
10.1.1.1
10.1.1.1
NAT Table
Global IP VRF-table-id
24.1.1.1
green
25.1.1.1
blue
•Forwards the packet
• This is also one of the ways to provide Internet access to VPN
customers with or without overlapping addresses
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
54
Agenda
• MPLS VPN Definition?
Technology
Configuration
• MPLS-VPN Services
Providing load-shared traffic to the multihomed VPN sites
Providing Hub&Spoke service to the VPN customers
Providing MPLS VPN Extranet service
Providing Internet access service to VPN customers
Providing VRF-selection based services
Providing Remote Access MPLS VPN
Providing VRF-aware NAT services
• Advanced MPLS VPN Topics
Inter-AS MPLS-VPN
CsC Carrier Supporting Carrier
• Best Practices
• Conclusion.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
55
What Is Inter-AS?
Provider X
Provider Y
RR2
RR1
ASBR1
ASBR2
???
MP-iBGP update::
PE-1
AS #2
AS #1
Problem:
PE2
BGP, OSPF, RIPv2
149.27.2.0/24,NH=CE-1
CE-1
VPN-A
How do Provider X
and Provider Y
exchange VPN
routes ?
VPN-A
149.27.2.0/24
RST-2602
9908_06_2004_X2
CE2
© 2004 Cisco Systems, Inc. All rights reserved.
56
Inter-AS Deployment Scenarios
Following options/Scenarios for deploying Inter-AS :
ASBR1
1. Back-to-back VRFs
ASBR2
2. MP-eBGP for VPNv4
AS #2
AS #1
PE1
PE2
3. Multihop MP-eBGP between RRs
CE1
4. Non-VPN Transit Provider
CE2
VPN-A
VPN-A
•2 and 3 are more common and will be discussed.
1 and 4 are in backup slides.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
57
Scenario 2: MP-eBGP between ASBRs to
Exchange VPNv4 Routes
• New CLI “no bgp default route-target filter” is
needed on the ASBRs.
• ASBRs exchange VPN routes using eBGP
(VPNv4 af)
• ASBRs store all VPN routes –
But only in BGP table and LFIB table
Not in routing nor in CEF table
• ASBRs don’t need VRFs to be configured on them
LDP between them
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
58
Scenario 2: MP-eBGP bet ASBRs for VPNv4
Control Plane (实验内容)
ASBR-1
MP-iBGP update:
RD:1:27:10.1.1.0/24,
NH=PE-1
RT=1:1, Label=(40)
ASBR-2
MP-iBGP update:
RD:1:27:10.1.1.0/24,
NH=ASBR-2
RT=1:1, Label=(30)
MP-eBGP update:
RD:1:27:10.1.1.0/24,
NH=ASBR-1
RT=1:1, Label=(20)
PE-1
PE-2
BGP, OSPF, RIPv2
10.1.1.0/24, NH=CE-2
CE-2
CE-3
VPN-B
BGP, OSPF, RIPv2
10.1.1.0/24, NH=PE-2
VPN-B
10.1.1.0/24
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
59
Scenario 2: MP-eBGP bet ASBRs for VPNv4
Forwarding Plane
30
40
10.1.1.1
ASBR-1
ASBR-2
30
10.1.1.1
P2
P1
40
10.1.1.1
20
PE-1
10.1.1.1
10.1.1.1
20
MPLS Packets
between ASBRs
CE-2
VPN-B
30
10.1.1.1
PE-2
CE-3
VPN-B
10.1.1.1
10.1.1.0/24
Pros
•More scalable.
Only one interface between ASBRs routers
No VRF configuration on ASBR.
Less memory consumption (no RIB/FIB
memory)
•MPLS label switching between providers
Still simple, more scalable & works today
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
Cons
•Automatic Route Filtering must be disabled
But we can apply BGP filtering.
•ASBRs are still required to hold VPN routes
60
Cisco IOS Configuration
Scenario 2: External MP-BGP between ASBRs for VPNv4(
实验内容)
MP-eBGP for
VPNv4
ASBR1
ASBR2
1.1.1.0/30
Label exchange
between ASBRs using
MP-eBGP
AS #1
AS #2
PE1
CE-1
VPN-A
ASBR MB-EBGP Configuration
Router bgp x
no bgp default route-target filter
neighbor 1.1.1.x remote-as x
!
address-family vpnv4
neighbor 1.1.1.x activate
neighbor 1.1.1.x send-com extended
PE2
CE-2
VPN-A
Note: ASBR must already have MPiBGP session with iBGP neighbors
such as RRs or PEs.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
61
Scenario 3: Multihop MP-eBGP between
RRs to exchange VPNv4 routes
• Exchange VPNv4 prefixes via the Route Reflectors
Requires Multihop MP-eBGP (with next-hop-unchanged)
• Exchange IPv4 routes with labels between directly
connected ASBRs using eBGP
Only PE loopback addresses need to be exchanged (they
are BGP next-hop addresses of the VPN routes)
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
62
Scenario 3: Multihop MP-eBGP between
RRs for VPN routes : Control Plane
RR-1
VPN-v4 update:
RD:1:27:10.1.1.0/24,
NH=PE-1
RT=1:1, Label=(90)
AS#1
VPN-v4 update:
RD:1:27:10.1.1.0/24,
NH=PE-1
RT=1:1, Label=(90)
ASBR-1
IGP+LDP:
Network=PE-1
NH=PE-1
Label=(40)
PE-1
BGP, OSPF, RIPv2
10.1.1.0/24,NH=CE-2
CE-2
IP-v4 update:
Network=PE-1
NH=ASBR-1
Label=(20)
RR-2
VPN-v4 update:
RD:1:27:10.1.1.0/24,
NH=PE-1
RT=1:1, Label=(90)
ASBR-2
AS#2
PE-2
IGP+LDP:
Network=PE-1
NH=ASBR-2
Label=(30)
BGP, OSPF, RIPv2
10.1.1.0/24,NH=PE-2
CE-3
VPN-B
VPN-B
10.1.1.0/24
Note - Instead of IGP+Label, iBGP+Label
can be used to exchange PE routes/label.
Please see Scenario#5 on slide#49 and 50.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
63
Scenario 3: Multihop MP-eBGP between
RRs for VPN routes : Forwarding Plane
RR-1
RR-2
P2
P1
40
90
10.1.1.1
90
ASBR-2
ASBR-1
10.1.1.1
30
90
10.1.1.1
50
90
10.1.1.1
PE-1
20
10.1.1.1
90
10.1.1.1
PE-2
CE-2
CE-3
VPN-B
10.1.1.1
VPN-B
10.1.1.0/24
Note - Instead of IGP+Label, iBGP+Label
can be used to exchange PE routes/label.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
64
Scenario 3: Pros/Cons
Pros
•More scalable than Scenario 1 and 2.
Separation of control and forwarding planes
Cons
•Advertising PE addresses to another AS
may not be acceptable to few providers.
•Route Reflector exchange VPNv4 routes+labels
RR hold the VPNv4 information anyway
•ASBRs now exchange only IPv4 routes+labels
ASBR Forwards MPLS packets
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
65
Cisco IOS Configuration
Scenario 3: Multihop MP-eBGP between RRs for VPNv4(实
验)
Multihop MP-eBGP
for VPNv4 with
next-hop-unchange
RR-1
ASBR-1
PE1
RR-2
ASBR-2
PE2
AS #1
CE-1
AS #2
eBGP IPv4 + Labels
RR Configuration
VPN-A
router bgp x
neighbor <RR-x> remote-as x
neighbor <RR-x> ebgp-multihop
neighbor <RR-x> update loopback 0
!
address-family vpnv4
neighbor <RR-x> activate
neighbor <RR-x> send-com extended
neighbor <RR-x> next-hop-unchanged
RST-2602
9908_06_2004_X2
CE-2
ASBR Configuration
router ospf x
redistribute bgp 1 subnets
!
router bgp x
neighbor < ASBR-x > remote-as x
!
address-family ipv4
Network <PEx> mask 255.255.255.255
Network <RRx> mask 255.255.255.255
neighbor < ASBR-x > activate
neighbor < ASBR-x > send-label
VPN-A
iBGPipv4+label could also be used in within each AS (instead of
“network <x.x.x.x>”) to propagate the label information for PEs.
© 2004 Cisco Systems, Inc. All rights reserved.
66
Inter-AS Deployment Guidelines
1. Use ASN in the Route-target i.e. ASN:xxxx
2. Max-prefix limit (both BGP and VRF) on PEs
3. Security (BGP MD5, BGP filtering, BGP max-prefix
etc) on ASBRs
4. End-to-end QoS agreement on ASBRs
5. Route-Target rewrite on ASBR
6. Internet connectivity on the same ASBR ??
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
67
Agenda
• MPLS VPN Definition?
Technology
Configuration
• MPLS-VPN Services
Providing load-shared traffic to the multihomed VPN sites
Providing Hub&Spoke service to the VPN customers
Providing MPLS VPN Extranet service
Providing Internet access service to VPN customers
Providing VRF-selection based services
Providing Remote Access MPLS VPN
Providing VRF-aware NAT services
• Advanced MPLS VPN Topics
Inter-AS MPLS-VPN
CsC Carrier Supporting Carrier
• Best Practices
• Conclusion.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
68
Carrier Supporting Carriers: CsC
• Benefits of CsC
• What do I need to do to enable CsC ?
• Deployment models
• Security in CsC
• Deployment Guideline
• Deployment Scenarios
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
69
MPLS/VPN Networks without CsC
Large Number of VPN Routes at the PE May
Pose Limitation to the PE
• Unwanted routing updates in the Carrier’s network
=> CPU+memory
• Label/prefix consumptions at PE => memory
• Scalability issue at PE
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
70
MPLS/VPN Networks without CsC
• The no of VPN routes is one of the biggest limiting
factor in scaling the PE router
Few SPs are running into this scalaing limitation
• If no of VPN routes can be reduced somehow
(without loosing the functionality), then the existing
investment can be protected
The same PE can still be used to connect more VPN
customers
• Carrier Supporting Carrier (CsC) provides the
mechanism to reduce the no of routes from each
VRF by enabling MPLS on the PE-CE link
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
71
Benefits of CsC
• Provide transport for ISPs ($)
No need to manage external routes from ISPs
• Build MPLS Internet Exchange (MPLS-IX) ($$)
Media Independence; POS/FDDI/PPP possible
Higher speed such OC192 or more
Operational benefits
• Sell VPN service to subsidiary companies that
provide VPN service ($)
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
72
What Do I Need to Enable CsC ?
1. Build an MPLS-VPN enabled carrier’s network
2. Connect ISP/SPs sites (or PoPs) to the Carrier’s PEs
3. Exchange internal routes + labels between Carrier’s PE &
ISP/SP’s CE
4. Exchange external routes directly between ISP/SP’s sites
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
73
CsC Deployment Models
MP-iBGP for VPNv4
P1
PE1
IGP+LDP
PE2
IGP+LDP
Carrier’s MPLS Core
IPv4 routes with
label distribution
IPv4 routes with
label distribution
MPLS enabled VRF int
CE-1
CE-2
Full-mesh iBGP
for external routes
ISP PoP
Site-1
internal routes
= IGP routes
ISP PoP
Site-2
C1
ASBR-2
ASBR-1
Internal routes =
IGP routes
R2
INTERNET
R1
ISP customers =
external routes
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
74
CsC Deployment Models
1. Customer-ISP not running MPLS
2. Customer-ISP running MPLS
3. Customer-ISP running MPLS-VPN
•Model 1 and 2 are less common deployments.
•Model 3 will be discussed in detail.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
75
CsC: ISP Sites Are Running MPLS-VPN
Hierarchical MPLS-VPN Control Plane
MP-iBGP update:
1:1:30.1.61.25/32, RT=1:1
NH =PE-1, Label=51
IGP+LDP,
Net=PE-1,
Label = pop
PE1
P1
IGP+LDP,
Net=PE-1,
Label = 16
PE2
Carrier’s Core
30.1.61.25/32,
NH=CE-1, Label = 50
30.1.61.25/32,
NH=PE-2, Label = 52
CE-1
CE-2
MP-iBGP update:
1:1:10.1.1.0/24, RT=1:1
NH =30.1.61.25/32, Label = 90
ISP PoP
Site-1
ISP PoP
Site-2
IGP+LDP
30.1.61.25/32,Label = pop
C1
ASBR_PE-1
30.1.61.25/32
10.1.1.0/24, NH=R1
Network =
10.1.1.0/24
RST-2602
9908_06_2004_X2
IGP+LDP,
30.1.61.25/32
NH=CE-2, Label=60
ASBR_PE-2
10.1.1.0/24,
NH
=ASBR_PE-2
R2
IGP+LDP,
30.1.61.25/32 NH=C1,
Label=70
R1
VPN Site-1
© 2004 Cisco Systems, Inc. All rights reserved.
VPN Site-2
76
CsC: ISP Sites Are Running MPLS-VPN
Hierarchical MPLS-VPN Forwarding Plane
P1
51
90
10.1.1.1
16
PE1
51
90
10.1.1.1
PE2
Carrier’s Core
50
90
10.1.1.1
52
90
10.1.1.1
CE-1
CE-2
ISP PoP
Site-1
90
10.1.1.1
60
90
10.1.1.1
ISP PoP
Site-2
C1
ASBR-1
10.1.1.1
Network =
10.1.1.0/24
RST-2602
9908_06_2004_X2
R1
VPN Site-1
© 2004 Cisco Systems, Inc. All rights reserved.
ASBR-2
10.1.1.1
70
90
10.1.1.1
R2
VPN Site-2
77
Security Mechanism in CsC
• BGP/LDP MD5 on PE-CE
To prevent label “spoofing”, PE
• Maintains Label <=> VRF table association
• Checks during LFIB lookup that received packet’s label is
what was allocated
If the check fails, then the packet is dropped.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
78
CsC Deployment Guideline
•
Two choices for deploying CsC
1. IGP+LDP on the PE-CE, or
2. eBGP ipv4 +label on the PE-CE (RFC3107)
•
Choice selection is driven by the choice of routing
protocol on the PE-CE
•
CE has to run MPLS-aware code
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
79
CsC: IOS Commands/Configs
Choice 1: What All You Need to Configure?
Choice1: Enable LDP on PE-CE;
• Sh mpls interface [vrf <name>] all
PE1
int
Sh mpls ldp disc [vrf <name>] all
ser0/0
Sh mpls ldp bind vrf <name>
ip vrf forwarding green
Sh mpls ip bind vrf <name>
Sh mpls ldp neighbor [vrf <name>] all
mpls ip
Sh mpls forward [vrf <name>]
mpls ldp protcol ldp
PE-1
CE1
Sh mpls interface
int ser0/0
Sh mpls ldp discovery
mpls ip
mpls ldp protcol ldp
Sh mpls ldp bind
VRF Int
IGP+LDP
CE-1
Sh mpls ldp neighbor
Sh mpls forward
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
80
CsC: IOS Commands/Configs
Choice 2: What All You Need to Configure?
Choice2: Enable eBGP+label on PE-CE;
router bgp 1
PE1
address-family ip vrf green
PE-1
neighbor 200.1.61.6 remote-as 2
neighbor 200.1.61.6 send-label
VRF Int
eBGP+label
CE-1
router bgp 2
CE1
neighbor 200.1.61.5 remote-as 1
1. No IGP needed on PE-CE
2. No LDP needed on PE-CE
neighbor 200.1.61.5 send-label
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
81
IOS Commands/Configs
Choice 2: eBGP+label on the PE-CE
• On PE
Sh ip bgp vpn vrf <vrf> neighbor
Sh ip bgp vpn vrf <vrf> label
Sh mpls forward vrf <vrf>
• On CE
Sh ip bgp neighbor
Sh ip bgp labels
Sh mpls forward
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
82
Agenda
• MPLS VPN Definition?
Technology
Configuration
• MPLS-VPN Services
Providing load-shared traffic to the multihomed VPN sites
Providing Hub&Spoke service to the VPN customers
Providing MPLS VPN Extranet service
Providing Internet access service to VPN customers
Providing VRF-selection based services
Providing Remote Access MPLS VPN
Providing VRF-aware NAT services
• Advanced MPLS VPN Topics
Inter-AS MPLS-VPN
CsC Carrier Supporting Carrier
• Best Practices
• Conclusion.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
83
Best Practices
1.
Use RR to scale BGP.
2.
Deploy RRs in pair for the redundancy
3.
Keep RRs out of the forwarding paths and disable CEF (saves memory).
4.
Consider Unique RD per VRF per PE, if Load sharing of VPN traffic is reqd.
5.
RT and RD should have ASN in them i.e. ASN : X
Reserve first few 100s of X for the internal purposes such as filtering
6.
Don't use customer names as the VRF names; Nightmare for the NOC. Use
simple combination of numbers and characters in the VRF name
For example - v101, v102, v201, v202 etc. Use description.
7.
Define an upper limit at the PE on the # of prefixes received from the CE for
each VRF or neighbor
max-prefix within the VRF configuration
max-prefix per neighbor within the BGP VRF af (if BGP on the PE-CE)
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
84
Conclusion
• MPLS VPN is a cheaper alternative to traditional l2vpn
• MPLS-VPN paves the way for new revenue streams
VPN customers could outsource their layer3 to the provider
• Straightforward to configure any-to-any VPN topology
partial-mesh, hub&spoke topologies can also be easily deployed
• CsC and Inter-AS could be used to expand into new markets
• VRF-aware services could be deployed to maximize the
investment
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
85
Complete Your Online Session Evaluation!
WHAT:
Complete an online session evaluation
and your name will be entered into a
daily drawing
WHY:
Win fabulous prizes! Give us your feedback!
WHERE: Go to the Internet stations located
throughout the Convention Center
HOW:
Winners will be posted on the onsite
Networkers Website; four winners per day
http://www.networkers04.com/desktop
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
86
Q&A
Thanks for your time.
Eval http://www.networkers04.com/desktop
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
87
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
88
BACK UP SLIDES
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
89
Scenario 1: Back-to-back VRF
Control Plane
ASBR-1
VPN-v4 update:
RD:1:27:10.1.1.0/24
NH=PE-1
RT=1:1, Label=(29)
VPN-B VRF
Import routes with
route-target 1:1
BGP, OSPF, RIPv2
10.1.1.0/24
NH=ASBR-2
PE-1
BGP, OSPF, RIPv2
10.1.1.0/24,NH=CE-2
CE-2
ASBR-2
VPN-v4 update:
RD:1:27:10.1.1.0/24,
NH=ASBR-2
RT=1:1, Label=(92)
VPN-B VRF
Import routes with
route-target 1:1
CE-3
VPN-B
PE-2
BGP, OSPF, RIPv2
10.1.1.0/24,NH=PE-2
VPN-B
10.1.1.0/24
VRF to VRF Connectivity between ASBRs
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
90
Scenario 1: Back-to-back VRF
Forwarding Plane
30
29
ASBR-2
ASBR-1
10.1.1.1
92
10.1.1.1
P2
P1
10.1.1.1
92
20
PE-1
10.1.1.1
PE-2
IP Packets between
ASBRs
10.1.1.1
CE-2
CE-3
VPN-B
10.1.1.0/24
Pros
•Per-customer QoS is possible
•It is simple and elegant since no need to load
the Inter-AS code (but still not widely
deployed).
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
10.1.1.1
VPN-B
Cons
•Not scalable. #of interface on both ASBRs is
directly proportional to #VRF.
•No end-to-end MPLS.
•Unnecessary memory consumed in RIB/(L)FIB
•Dual-homing of ASBR makes provisioning
worse
91
Cisco IOS Configuration
Scenario 1: Back-to-Back VRF between ASBRs
ASBR1
ASBR2
1.1.1.0/30
VRF routes exchange via
any routing protocol
AS #1
AS #2
PE1
ASBR VRF and BGP config
CE-1
VPN-A
ip vrf green
rd 1:1
route-target both 1:1
!
Router bgp x
Address-family ipv4 vrf green
neighbor 1.1.1.x activate
PE2
CE-2
VPN-A
Note: ASBR must already have MPiBGP session with iBGP neighbors
such as RRs or PEs.
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
92
IOS Configuration
Scenario 2.5: Multi-Hop MP-eBGP for VPNv4
ASBR1
Multi-Hop MP-eBGP
for VPNv4
so
so
IGP & LDP
AS #1
ASBR2
AS #2
PE1
PE2
Multi-Hop MP-BGP session between ASBRs
CE-1
VPN-A
RST-2602
9908_06_2004_X2
interface serial 0
ip address 1.1.1.x/30
mpls ldp protcol ldp
router bgp x
no bgp default route-target filter
neighbor < ASBR-x > remote-as x
neighbor < ASBR-x > update loopback0
neighbor < ASBR-x > ebgp-multihop
!
address-family vpnv4
neighbor < ASBR-x > activate
neighbor < ASBR-x > send-comm extended
© 2004 Cisco Systems, Inc. All rights reserved.
CE-2
VPN-A
93
Scenario 4: Non-VPN Transit Provider
• Two MPLS VPN providers may exchange routes via
one or more transit providers
Which may be non-VPN transit backbones just running
MPLS
• Multihop MP-eBGP deployed between edge
providers
With the exchange of BGP next-hops via the transit
provider
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
94
Option 4: Non-VPN Transit Provider
eBGP IPv4 + Labels
ASBR-1
ASBR-2
iBGP IPv4 + Labels
Non-VPN MPLS
Transit Backbone
MPLS VPN Provider
#1
RR-1
PE1
ASBR-3
ASBR-4
CE-2
VPN-B
eBGP IPv4 + Labels
next-hop-unchanged
Multihop MP-eBGP OR
MP-iBGP for VPNv4
iBGP IPv4 + Labels
RR-2
MPLS VPN Provider
#2
PE2
CE-3
VPN-B
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
95
Route-Target rewrite at ASBR
• ASBR can add/delete route-target associated with a
VPNv4 prefix
• Secures the VPN environment
ASBR(conf)#router bgp 1000
ASBR(conf-router)#neighbor 1.1.1.1 route-map route-target-deletion
out
ASBR(conf-router)#exit
ASBR(conf)#route-map route-target-delete
ASBR(conf-route-map)#match extcommunity 101
ASBR(conf-route-map)#set extcomm-list 101 delete
ASBR(conf-route-map)#set extcommunity rt 123:123 additive
ASBR(conf)# ip extcommunity-list 101 permit rt 100:100
RST-2602
9908_06_2004_X2
© 2004 Cisco Systems, Inc. All rights reserved.
96