Deploying MPLS-based IP VPNs

Similar documents
Deploying MPLS-based IP VPNs

Deploying MPLS-based IP VPNs

Deploying MPLS L3VPN. Apricot Cisco and/or its affiliates. All rights reserved. Cisco Public

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

MPLS VPN. 5 ian 2010

VRF, MPLS and MP-BGP Fundamentals

Implementing MPLS Layer 3 VPNs

MPLS VPN--Inter-AS Option AB

Deploy MPLS L3 VPN. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:

Deploying MPLS L3VPN

MPLS VPN Inter-AS Option AB

InterAS Option B. Information About InterAS. InterAS and ASBR

MPLS VPN Carrier Supporting Carrier Using LDP and an IGP

Cisco Training - HD Telepresence MPLS: Implementing Cisco MPLS V3.0. Upcoming Dates. Course Description. Course Outline

MPLS VPN C H A P T E R S U P P L E M E N T. BGP Advertising IPv4 Prefixes with a Label

CCIE R&S Techtorial MPLS

MPLS VPN Carrier Supporting Carrier Using LDP and an IGP

Multiprotocol BGP 1 MPLS VPN. Agenda. Multiprotocol BGP 2

WORKSHOP MPLS.

AToM (Any Transport over MPLS)

Configuring MPLS L3VPN

VRF, MPLS and MP-BGP Fundamentals

Configuring MPLS L3VPN

MPLS VPN Half-Duplex VRF

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution

IPv6 Switching: Provider Edge Router over MPLS

Multiprotocol Label Switching Virtual Private Network

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution

IPv6 Switching: Provider Edge Router over MPLS

Configuring MPLS and EoMPLS

WAN Edge MPLSoL2 Service

Exam : Title : BGP + MPLS Exam (BGP + MPLS)

Configuring MPLS, MPLS VPN, MPLS OAM, and EoMPLS

MPLS VPN Multipath Support for Inter-AS VPNs

MPLS VPN Carrier Supporting Carrier

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model

MPLS design. Massimiliano Sbaraglia

BGP Best External. Finding Feature Information

Implementing MPLS VPNs over IP Tunnels

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

The CCIE Candidate s Introduction to MPLS L3VPN Networks

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

MPLS Layer 3 VPNs Configuration Guide, Cisco IOS Release 12.4T


MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

BGP Cost Community. Prerequisites for the BGP Cost Community Feature

Table of Contents Chapter 1 MPLS L3VPN Configuration

BGP-MVPN SAFI 129 IPv6

MPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012

DMVPN for R&S CCIE Candidates Johnny Bass CCIE #6458

MPLS Introduction. (C) Herbert Haas 2005/03/11

Multi-VRF Support. Finding Feature Information. Prerequisites for Multi-VRF Support

Применение MPLS в сетях связи. (Часть 2)

MPLS for R&S CCIE Candidates

Introduction to External Connectivity

MPLS in the DCN. Introduction CHAPTER

HP A5820X & A5800 Switch Series MPLS. Configuration Guide. Abstract

HP FlexFabric 7900 Switch Series

BGP mvpn BGP safi IPv4

BRKRST Cisco and/or its affiliates. All rights reserved. Cisco Public

Deploying MPLS-VPN. Session RST Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA. 8181_05_2003_c2 RST-2061

Multiprotocol Label Switching (MPLS) Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches)

Concepts and Operation of MPLS VPNs. Francisco Bolanos

Introduction to Segment Routing

Implementing MPLS Layer 3 VPNs

MPLS VPN Inter-AS IPv4 BGP Label Distribution

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Configuring multicast VPN

HP 5920 & 5900 Switch Series

ENTERPRISE MPLS. Kireeti Kompella

UniNets MPLS LAB MANUAL MPLS. UNiNets Multiprotocol label Switching MPLS LAB MANUAL. UniNets MPLS LAB MANUAL

BGP Diverse Path Using a Diverse-Path Route Reflector

HP FlexFabric 5930 Switch Series

Multiprotocol Label Switching (MPLS)

Table of Contents 1 Multicast VPN Configuration 1-1

MPLS VPN Route Target Rewrite

Configuring BGP: RT Constrained Route Distribution

HPE FlexFabric 5940 Switch Series

Managing Site-to-Site VPNs: The Basics

Configuring Scalable Hub-and-Spoke MPLS VPNs

Configuring IPv6 Provider Edge over MPLS (6PE)

BGP Support for the L2VPN Address Family

mpls traffic-eng lsp attributes

CCIE Routing & Switching

What You Will Learn By the end of this appendix, you should know and be able to explain the following:

H3C S10500 Switch Series

CCIE R&S LAB CFG H2/A5 (Jacob s & Jameson s)

MPLS опорни мрежи MPLS core networks

Connecting to a Service Provider Using External BGP

Zero To Hero CCIE CCNP

TELCO GROUP NETWORK. Rafał Jan Szarecki 23/10/2011

MPLS over GRE. Finding Feature Information. Prerequisites for MPLS VPN L3VPN over GRE

L3VPN Configuration. L3VPN Overview. Introduction to L3VPN

Configuring Virtual Private LAN Services

Cisco Implementing Cisco IP Routing v2.0 (ROUTE)

Network Design with latest VPN Technologies

Multi Topology Routing Truman Boyes

Contents. EVPN overview 1

PREREQUISITES TARGET AUDIENCE. Length Days: 5

Configuring Multicast VPN Inter-AS Support

Transcription:

Deploying MPLS-based IP VPNs Rajiv Asati Distinguished Engineer

Abstract This session describes the implementation of IP Virtual Private Networks (IP VPNs) using MPLS. It is the most common Layer 3 VPN technology, as standardized by IETF RFC2547/4364, realizing IP connectivity between VPN site and MPLS network. Service Providers have been using IP VPN to provide scalable site-to-site/wan connectivity to Enterprises/SMBs for more than a decade. Enterprises have been using it to address network segmentation (virtualization and traffic separation) inside the site e.g. Campus, Data Center. This technology realizes IP connectivity between VPN site and MPLS network. The session will cover: IP VPN Technology Overview (RFC2547/RFC4364) IP VPN Configuration Overview IP VPN Deployment Scenarios IP VPN Use-Cases Best Practices 3

MPLS Content at Cisco Live US 2013 BRKMPL-1100 - Introduction to MPLS BRKMPL-2100 -Deploying MPLS Traffic Engineering BRKMPL-2101 - Deploying MPLS-based Layer 2 Virtual Private Networks - Deploying MPLS-based IP VPNs BRKMPL-2108 - Designing MPLS in Next Generation Data Center: A Case Study BRKMPL-2109 - MPLS Solutions for Cloud Networking BRKMPL-2333 - E-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN BRKMPL-3010 - Generalized MPLS - Introduction and Deployment BRKMPL-3101 - Advanced Topics and Future Directions in MPLS LTRMPL-2102 - Enterprise Network Virtualization using IP and MPLS Technologies: Introduction LTRMPL-3100 - Unified MPLS Lab LTRMPL-3102 - Enterprise Network Virtualization using IP and MPLS Technologies: Advanced PNLSPG-3999 - Transport Evolution in SP Core Networks TECMPL-3100 - Unified MPLS - An architecture for Advanced IP NGN Scale TECMPL-3200 - SDN WAN Orchestration in MPLS and Segment Routing Networks v v Labs Techtorials 4

Prerequisites Reference Must understand basic IP routing, especially BGP Must understand MPLS basics (push, pop, swap, label stacking) Should understand MPLS IP/VPN basics Must keep the speaker engaged by asking bad questions 5

Terminology Reference LSR: label switch router LSP: label switched path The chain of labels that are swapped at each hop to get from one LSR to another VRF: VPN routing and forwarding Mechanism in Cisco IOS used to build per-customer RIB and FIB MP-BGP: multiprotocol BGP PE: provider edge router interfaces with CE routers P: provider (core) router, without knowledge of VPN VPNv4: address family used in BGP to carry MPLS-VPN routes RD: route distinguisher Distinguish same network/mask prefix in different VRFs RT: route target Extended community attribute used to control import and export policies of VPN routes LFIB: label forwarding information base FIB: forwarding information base 6

Agenda IP/VPN Overview IP/VPN Deployment Scenarios Best Practices Use-Cases Conclusion 7

Agenda IP/VPN Overview Technology Overview (How It Works) Configuration Overview IP/VPN Deployment Scenarios Best Practices Use-Cases Conclusion 8

IP/VPN Technology Overview More than one routing and forwarding tables Control plane VPN route propagation Data or forwarding plane VPN packet forwarding 9

IP/VPN Technology MPLS based IP/VPN Topology / Connection Model MPLS Network CE PE P P PE CE CE P P CE MP-iBGP Session CE Routers PE Routers P Routers Sit at the Edge Sit at the Edge of MPLS Network Sit inside the network Use IP with PE routers (and C routers) Exchange IP routes with PE routers using IP routing protocol Use MPLS with P routers Use IP with CE routers Distributes VPN routes using MP-BGP sessions to other PE routers Forward packets by looking at labels Share a common IGP with PE 10

IP/VPN Technology Overview Separate Routing Tables at PE CE2 VPN 2 VPN 1 CE1 PE MPLS Network IGP (OSPF, ISIS) Customer Specific Routing Table Routing (RIB) and forwarding table (CEF) dedicated to VPN customer VPN1 routing table VPN2 routing table Referred to as VRF table for <named VPN> IOS: show ip route vrf <name> IOS-XR: sh route vrf <name> ipv4 NX-OS: sh ip route vrf <name> Global Routing Table Created when IP routing is enabled on PE. Populated by OSPF, ISIS, etc. running inside the MPLS network IOS: show ip route IOS-XR: sh route ipv4 unicast NX-OS: sh ip route 11

IP/VPN Technology Overview Virtual Routing and Forwarding (VRF) Instance CE2 VPN 2 VPN 1 CE1 VRF Green Ser0/0 VRF Blue PE MPLS Network IGP (OSPF, ISIS) VRF = Representation of VPN customer inside the MPLS network Each customer VPN is associated with at least one VRF VRF configured on each PE and associated with PE-CE interface(s) Privatize an interface, i.e., coloring of the interface No changes needed at CE IOS_PE(conf)#ip vrf blue IOS_PE(conf)#interface Ser0/0 IOS_PE(conf)#ip vrf forwarding blue 12

IP/VPN Technology Overview Virtual Routing and Forwarding Instance EIGRP, ebgp, OSPF, RIPv2, Static CE2 Routing Advertisements VPN 2 VPN 1 CE1 VRF Green PE VRF Blue MPLS Network IGP (OSPF, ISIS) PE installs the VPN customer routes in VRF routing table(s) VPN routes are learned from CE routers or remote PE routers VRF-aware routing protocol (static, RIP, BGP, EIGRP, OSPF) on each PE PE installs the internal routes (IGP) in global routing table VPN customers can use overlapping IP addresses BGP plays a key role. Let s understand few BGP specific details.. 13

IP/VPN Technology Overview VPN Control Plane MP-iBGP Session PE PE MPLS Networ PE PE routers exchange VPN routes with other PE routers using BGP Multi-Protocol BGP aka MP-BGP PE routers advertise the routes to their CE routers 14

IP/VPN Technology Overview VPN Control Plane = Multi-Protocol BGP (MP-BGP) 8 Bytes 4 Bytes 1:1 10.1.1.0 RD IPv4 VPNv4 8 Bytes Route-Target 3 Bytes Label MP-BGP UPDATE Message Showing VPNv4 route, RT, Label only MP-BGP on PE Customizes the VPN Customer Routing Information as per the Locally Configured VRF Information using: Route Distinguisher (RD) Route Target (RT) Label 15

IP/VPN Technology Overview: Control Plane MP-BGP UPDATE Message Capture Visualize how the BGP UPDATE message carrying VPNv4 routes looks like. Notice the Path Attributes. Reference Reference Route Target = 3:3 VPNv4 Prefix 1:1:200.1.62.4/30 ; Label = 23 16

IP/VPN Technology Overview: Control Plane Route-Distinguisher (rd) 8 Bytes 4 Bytes 1:1 200.1.64.0 RD IPv4 VPNv4 8 Bytes Route-Target 3 Bytes Label MP-BGP UPDATE Message Showing VPNv4 route, RT, Label only VPN customer IPv4 prefix is converted into a VPNv4 prefix by appending the RD (1:1, say) to the IPv4 address (200.1.64.0, say) => 1:1:200.1.64.0 Makes the customer s IPv4 address unique inside the SP MPLS network. Route Distinguisher (rd) is configured in the VRF at PE RD is not a BGP attribute, just a field. IOS_PE# ip vrf green rd 1:1 * After 12.4(3)T, 12.4(3) 12.2(32)S, 12.0(32)S etc., RD Configuration within VRF Has Become Optional. Prior to That, It Was Mandatory. 17

IP/VPN Technology Overview: Control Plane Route-Target (rt) 8 Bytes 4 Bytes 8 Bytes 3 Bytes 1:1 RD VPNv4 10.1.1.0 1:2 IPv4 Route-Target Label Route-target (rt) identifies which VRF(s) keep which VPN prefixes rt is an 8-byte extended community attribute. Each VRF is configured with a set of route-targets at PE Export and Import route-targets must be the same for any-to-any IP/VPN Export route-target values are attached to VPN routes in PE->PE MP-iBGP advertisements IOS_PE# ip vrf green route-target import 3:3 route-target export 3:3 route-target export 10:3 18

IP/VPN Technology Overview: Control Plane Label 8 Bytes 4 Bytes 8 Bytes 3 Bytes 1:1 RD VPNv4 10.1.1.0 2:2 50 IPv4 Route-Target Label PE assigns a label for the VPNv4 prefix; Next-hop-self towards MP-iBGP neighbors by default i.e. PE sets the NEXT-HOP attribute to its own address (loopback) Label is not an attribute. PE addresses used as BGP next-hop must be uniquely known in IGP Do not summarize the PE loopback addresses in the core 19

IP/VPN Technology Overview: Control Plane Putting it all together Site 1 10.1.1.0/24 10.1.1.0/24 Next-Hop=CE-1 1 CE1 2 PE1 3 MP-iBGP Update: RD:10.1.1.0 Next-Hop=PE-1 RT=1:2, Label=100 P P P P PE2 CE2 Site 2 MPLS Backbone 1. PE1 receives an IPv4 update (ebgp/ospf/isis/rip/eigrp) 22. PE1 translates it into VPNv4 address and constructs the MP-iBGP UPDATE message Associates the RT values (export RT =1:2, say) per VRF configuration Rewrites next-hop attribute to itself Assigns a label (100, say); Installs it in the MPLS forwarding table. 33. PE1 sends MP-iBGP update to other PE routers 20

IP/VPN Technology Overview: Control Plane Putting it all together Site 1 10.1.1.0/24 10.1.1.0/24 Next-Hop=CE-1 1 CE1 2 PE1 3 MP-iBGP Update: RD:10.1.1.0 Next-Hop=PE-1 RT=1:2, Label=100 P P P P 10.1.1.0/24 Next-Hop=PE-2 4 PE2 5 CE2 Site 2 MPLS Backbone 4. PE2 receives and checks whether the RT=1:2 is locally configured as import RT within any VRF, if yes, then PE2 translates VPNv4 prefix back to IPv4 prefix Updates the VRF CEF Table for 10.1.1.0/24 with label=100 55. PE2 advertises this IPv4 prefix to CE2 (using whatever routing protocol) 21

IP/VPN Technology Overview Forwarding Plane Site 1 Site 2 10.1.1.0/24 CE1 P P CE2 PE1 P P PE2 MPLS Backbone Customer/VPN Forwarding Table Stores VPN routes with associated labels VPN routes learned via BGP Labels learned via BGP IOS: show ip cef vrf <name> NX-OS: show forwarding vrf <name> IOS-XR: show cef vrf <name> ipv4 Global Forwarding Table Stores next-hop i.e. PE routes with associated labels Next-hop i.e. PE routes learned through IGP Label learned through LDP or RSVP IOS:show ip cef NX-OS: show forwarding ipv4 IOS-XR: show cef ipv4 22

IP/VPN Technology Overview: Forwarding Plane Packet Forwarding Site 1 Site 2 CE1 10.1.1.0/24 CE2 P3 P4 PE1 PE2 10.1.1.1 10.1.1.1 IP Packet 100 10.1.1.1 P1 P2 IP Packet 50 100 10.1.1.1 25 100 10.1.1.1 MPLS Packet PE2 imposes two labels (MPLS headers) for each IP packet going to site2 Outer label is learned via LDP; Corresponds to PE1 address (e.g. IGP route) Inner label is learned via BGP; corresponds to the VPN address (BGP route) P1 does the Penultimate Hop Popping (PHP) PE1 retrieves IP packet (from received MPLS packet) and forwards it to CE1. 23

IP/VPN Technology Overview: Forwarding Plane MPLS IP/VPN Packet Capture Reference Visualize an MPLS VPN Packet on the wire. Reference Ethernet Header Outer MPLS header Inner MPLS Header IP Header 24

Agenda IP/VPN Explained Technology Overview Configuration Overview (IOS, IOS-XR and NX-OS) IP/VPN Services Best Practices Use-Cases Conclusion 25

MPLS based IP/VPN Sample Configuration (IOS) Reference VRF Definition Site 1 10.1.1.0/24 CE1 Se0 192.168.10.1 PE1 PE 1 ip vrf VPN-A rd 1:1 route-target export 100:1 route-target import 100:1 interface Serial0 ip address 192.168.10.1/24 ip vrf forwarding VPN-A vrf definition VPN-A rd 1:1 address-family ipv4 route-target export 100:1 route-target import 100:1 interface Serial0 ip address 192.168.10.1/24 vrf forwarding VPN-A PE-P Configuration P PE1 Se0 s1 PE 1 Interface Serial1 ip address 130.130.1.1 255.255.255.252 mpls ip router ospf 1 network 130.130.1.0 0.0.0.3 area 0 26

MPLS based IP/VPN Sample Configuration (IOS) Reference PE: MP-IBGP Config PE1 R R PE2 PE 1 router bgp 1 neighbor 1.2.3.4 remote-as 1 neighbor 1.2.3.4 update-source loopback0 address-family vpnv4 neighbor 1.2.3.4 activate neighbor 1.2.3.4 send-community both RR: MP-IBGP Config PE1 R R PE2 RR router bgp 1 no bgp default route-target filter neighbor 1.2.3.6 remote-as 1 neighbor 1.2.3.6 update-source loopback0 address-family vpnv4 neighbor 1.2.3.6 route-reflector- client neighbor 1.2.3.6 activate 27

MPLS based IP/VPN Sample Configuration (IOS) Reference PE-CE Routing: BGP Site 1 CE1 10.1.1.0/24 192.168.10.2 192.168.10.1 PE1 PE1 router bgp 1 address-family ipv4 vrf VPN-A neighbor 192.168.10.2 remote-as 2 neighbor 192.168.10.2 activate exit-address-family PE-CE Routing: OSPF Site 1 CE1 10.1.1.0/24 192.168.10.2 PE1 PE1 router ospf 1 router ospf 2 vrf VPN-A network 192.168.10.0 0.0.0.255 area 0 redistribute bgp 1 subnets 192.168.10.1 28

MPLS based IP/VPN Sample Configuration (IOS) Reference PE-CE Routing: RIP Site 1 CE1 10.1.1.0/24 192.168.10.2 192.168.10.1 PE1 PE1 router rip address-family ipv4 vrf VPN-A version 2 no auto-summary network 192.168.10.0 redistribute bgp 1 metric transparent PE-CE Routing: EIGRP router eigrp 1 Site 1 10.1.1.0/24 CE1 192.168.10.2 192.168.10.1 PE1 PE1 address-family ipv4 vrf VPN-A no auto-summary network 192.168.10.0 0.0.0.255 autonomous-system 10 redistribute bgp 1 metric 100000 100 255 1 1500 29

MPLS based IP/VPN Sample Configuration (IOS) Reference PE-CE Routing: Static Site 1 10.1.1.0/24 CE1 PE1 ip route vrf VPN-A 10.1.1.0 255.255.255.0 192.168.10.2 192.168.10.2 PE1 192.168.10.1 If PE-CE Protocol Is Non-BGP (Such as RIP), then Redistribution of VPN Routes from MP-IBGP Is Required (Shown Below for RIP) - PE-CE: MB-iBGP Routes to VPN Site 1 CE1 PE1 R R PE1 router rip address-family ipv4 vrf VPN-A version 2 redistribute bgp 1 metric transparent no auto-summary network 192.168.10.0 exit-address-family 30

MPLS based IP/VPN Sample Configuration (IOS) Reference If PE-CE Protocol Is Non-BGP, then Redistribution of Local VPN Routes into MP-IBGP Is Required (Shown Below) PE-RR (VPN Routes to VPNv4) Site 1 CE1 PE1 R R PE1 router bgp 1 neighbor 1.2.3.4 remote-as 1 neighbor 1.2.3.4 update-source loopback 0 address-family ipv4 vrf VPN-A redistribute {rip connected static eigrp ospf} For hands-on learning, please attend the lab sessions: LTRMPL-2104 Implementing MPLS in SP Networks (Intro Level) LTRMPL-2105 Implementing MPLS in SP Networks (Advanced Level) Having familiarized with IOS based config, let s peek through IOS-XR and NX- OS config for VPNs 31

MPLS based IP/VPN Sample Config (IOS-XR) Reference VRF Definition Site 1 CE1 GE 0 192.168.10.1 10.1.1.0/24 PE1 PE 1 vrf VPN-A address-family ipv4 unicast import route-target 100:1 export route-target 100:1 router bgp 1 vrf VPN-A rd 1:1 Interface GE0 ipv4 address 192.168.10.1 255.255.255.0 vrf VPN-A PE-P Configuration GE 0 PE1 GE1 P PE 1 mpls ip int GE1 router ospf 1 area 0 interface GE1 32

MPLS based IP/VPN Sample Config (IOS-XR) Reference PE: MP-IBGP Config PE1 R R PE2 PE 1 router bgp 1 router-id 1.2.3.1 address-family vpnv4 unicast neighbor 1.2.3.4 remote-as 1 update-source loopback0 address-family vpnv4 unicast send-community extended RR: MP-IBGP Config PE1 R R PE2 RR router bgp 1 router-id 1.2.3.4 address-family vpnv4 unicast neighbor 1.2.3.1 remote-as 1 update-source loopback0 address-family vpnv4 unicast send-community extended route-reflector-client 33

MPLS based IP/VPN Sample Config (IOS-XR) Reference PE-CE Routing: BGP Site 1 CE1 10.1.1.0/24 192.168.10.2 192.168.10.1 GE0 PE1 PE1 router bgp 1 vrf VPN-A neighbor 192.168.10.2 remote-as 2 address-family ipv4 unicast route-policy pass-all in out PE-CE Routing: OSPF Site 1 CE1 10.1.1.0/24 192.168.10.2 192.168.10.1 GE0 PE1 PE1 router ospf 2 vrf VPN-A address-family ipv4 unicast redistribute bgp 1 area 0 interface GE0 34

MPLS based IP/VPN Sample Config (IOS-XR) Reference PE-CE Routing: RIP Site 1 CE1 10.1.1.0/24 192.168.10.2 GE0 PE1 PE1 router rip vrf VPN-A interface GE0 redistribute bgp 1 192.168.10.1 PE-CE Routing: EIGRP Site 1 CE1 10.1.1.0/24 192.168.10.2 192.168.10.1 GE0 PE1 PE1 router eigrp 1 vrf VPN-A address-family ipv4 as 10 default-metric 100000 100 255 1 1500 interface GE0 redistribute bgp 1 35

MPLS based IP/VPN Sample Config (IOS-XR) Reference PE-CE Routing: Static Site 1 CE1 10.1.1.0/24 192.168.10.2 GE0 PE1 PE1 router static vrf VPN-A address-family ipv4 unicast ip route 10.1.1.0/8 192.168.10.2 192.168.10.1 36

MPLS based IP/VPN Sample Config (IOS-XR) Reference If PE-CE Protocol Is Non-BGP, then Redistribution of Local VPN Routes into MP-IBGP Is Required (Shown Below) PE-RR (VPN Routes to VPNv4) Site 1 CE1 PE1 R R PE1 router bgp 1 vrf VPN-A address-family ipv4 unicast redistribute {rip connected static eigrp ospf} 37

MPLS based IP/VPN Sample Config (NX-OS) Reference VRF Definition Site 1 CE1 GE 0 192.168.10.1 10.1.1.0/24 PE1 PE 1 vrf context VPN-A rd 1:1 address-family ipv4 unicast route-target import 1:1 route-target export 1:1 Interface GE0 ip address 192.168.10.1 255.255.255.0 vrf member VPN-A PE-P Configuration GE 0 PE1 GE1 P PE 1 Interface GE1 ip address 130.130.1.1 255.255.255.252 mpls ip ip ospf 1 area 0 router ospf 1 38

MPLS based IP/VPN Sample Config (NX-OS) Reference PE: MP-IBGP Config PE1 R R PE2 PE 1 router bgp 1 router-id 1.2.3.1 neighbor 1.2.3.4 remote-as 1 update-source loopback0 address-family vpnv4 unicast send-community extended RR: MP-IBGP Config PE1 R R PE2 RR router bgp 1 router-id 1.2.3.4 neighbor 1.2.3.1 remote-as 1 update-source loopback0 address-family vpnv4 unicast send-community extended route-reflector-client 39

MPLS based IP/VPN Sample Config (NX-OS) Reference PE-CE Routing: BGP Site 1 CE1 10.1.1.0/24 192.168.10.2 GE0 PE1 PE1 router bgp 1 vrf VPN-A neighbor 192.168.10.2 remote-as 2 address-family ipv4 unicast 192.168.10.1 PE-CE Routing: OSPF Site 1 CE1 10.1.1.0/24 192.168.10.2 192.168.10.1 GE0 PE1 PE1 router ospf 2 vrf VPN-A address-family ipv4 unicast redistribute bgp 1 route-map name interface GE1 ip address 192.168.10.1/24 ip router ospf 2 area 0 40

MPLS based IP/VPN Sample Config (NX-OS) Reference PE-CE Routing: RIP Site 1 CE1 10.1.1.0/24 192.168.10.2 192.168.10.1 GE0 PE1 PE1 router rip ripxyz1 vrf VPN-A address-family ipv4 unicast redistribute bgp 1 route-map name interface GE0 vrf member vpn1 ip router rip ripxyz1 PE-CE Routing: EIGRP router eigrp 100 vrf VPN-A Site 1 10.1.1.0/24 CE1 192.168.10.2 GE0 192.168.10.1 PE1 PE1 address-family ipv4 redistribute bgp 1 route-map name interface GE0 vrf member vpn1 ip router eigrp 100 site-of-origin 1:11 41

MPLS based IP/VPN Sample Config (NX-OS) Reference PE-CE Routing: Static Site 1 10.1.1.0/24 CE1 PE1 vrf context VPN-A ip route 10.1.1.0/8 192.168.10.2 192.168.10.2 GE0 PE1 192.168.10.1 42

MPLS based IP/VPN Sample Config (NX-OS) Reference If PE-CE Protocol Is Non-BGP, then Redistribution of Local VPN Routes into MP-IBGP Is Required (Shown Below) PE-RR (VPN Routes to VPNv4) Site 1 CE1 PE1 R R PE1 router bgp 1 vrf VPN-A address-family ipv4 unicast redistribute {rip direct static eigrp ospf} route-map name 43

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 44

IP/VPN Deployment Scenarios: 1. Multi-homing & Loadsharing of VPN Traffic RR PE11 171.68.2.0/24 CE1 PE2 CE2 Site A PE12 MPLS Backbone Site B Route Advertisement VPN sites (such as Site A) could be multihomed VPN sites need the traffic to (the site A) be loadshared 45

IP/VPN Deployment Scenarios: 1. Multi-homing & Loadsharing of VPN Traffic 1 rd 300:11 route-target both 1:1 PE11 RR 2 <BGP> address-family ipv4 vrf green maximum-paths eibgp 2 171.68.2.0/24 CE1 PE2 CE2 1 Site A rd 300:12 route-target both 1:1 PE12 MPLS Backbone rd 300:13 route-target both 1:1 Site B Configure unique RD per VRF per PE for multihomed site/interfaces Assuming RR exists Enable eibgp multipath within the relevant BGP VRF address-family at remote PE routers such as PE2 (why PE2?). 46

IP/VPN Deployment Scenarios: 1. VPN Fast Convergence PE-CE Link Failure Supported in IOS, and IOS-XR Traffic Is Dropped by PE11 PE11 RR VPN Traffic Redirected VPN Traffic 171.68.2.0/24 Site A CE1 PE12 MPLS Backbone PE2 CE2 Site B What if PE11-CE link fails? Wait for BGP convergence (~seconds) 47

IP/VPN Deployment Scenarios: 1. VPN Fast Convergence PE-CE Link Failure PIC Edge Feature Supported in IOS, and IOS-XR 3.4 Traffic Is Redirected by PE11 PE11 RR VPN Traffic Redirected VPN Traffic 171.68.2.0/24 CE1 PE2 CE2 Site A PE12 MPLS Backbone Site B BGP PIC Edge feature provides fast convergence (~msec). PE11 temporarily redirects the CE1 bound traffic to PE12 until BGP has converged BGP PIC Edge is independent of whether multipath is enabled on PE2 or not 48

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 49

IP/VPN Deployment Scenarios: 2. Hub and Spoke Service Many VPN deployments require hub and spoke topology Spoke to spoke communication via Hub site only Example: ATM Machines to HQ, Router Management traffic to NMS/DC Despite MPLS based IP/VPN s implicit any-to-any, i.e. full-mesh connectivity, hub and spoke service can easily be offered Uses different import and export of route-target (RT) values Requires unique RD per VRF per PE Independent PE-CE routing protocol per site 50

IP/VPN Deployment Scenarios: 2. Hub and Spoke Service Two configuration Options : 1. 1 PE-CE interface to Hub & 1 VRF; 2. 2 PE-CE interfaces to Hub & 2 VRFs; Use option#1 if VPN Hub site advertises default or summary routes towards the Spoke sites, otherwise use Option#2 * HDVRF Feature Is Discussed Later 51

IP/VPN Deployment Scenarios: 2. Hub and Spoke Service: IOS Configuration Option#1 <VRF GREEN for Spoke A> rd 300:111 route-target export 1:1 route-target import 2:2 Spoke A 171.68.1.0/24 CE-SA PE-SA <VRF GREEN for HUB> rd 300:11 route-target export 2:2 route-target import 1:1 Supported in IOS, NXOS and IOS-XR Import and Export RT Values Must Be Different PE-Hub Eth0/0 Spoke B 171.68.2.0/24 CE-SB PE-SB MPLS VPN Backbone CE-Hub <VRF GREEN for SPOKE B> rd 300:112 route-target export 1:1 route-target import 2:2 Note: Only RD and RT Configuration Shown Here 52

IP/VPN Deployment Scenarios: 2. Hub and Spoke Service: IOS Configuration Option#2 <VRF GREEN for Spoke A> rd 300:111 route-target export 1:1 route-target import 2:2 Spoke A 171.68.1.0/24 CE-SA PE-SA <VRF IN for Hub> rd 300:11 route-target import 1:1 Supported in IOS, NXOS and IOS-XR Import and Export RT Values Must Be Different Spoke B 171.68.2.0/24 CE-SB <VRF GREEN for Spoke B> rd 300:112 route-target export 1:1 route-target import 2:2 PE-SB PE-Hub MPLS VPN Backbone Eth0/0.1 Eth0/0.2 <VRF IN for Hub> rd 300:12 route-target export 2:2 CE-Hub Note: Only RD and RT Configuration Shown Here 53

IP/VPN Deployment Scenarios: 2. Hub and Spoke Service: Configuration Option#2 Supported in IOS, NXOS and IOS-XR If BGP is used between every PE and CE, then allowas-in and as-override* knobs must be used at the PE_Hub** Otherwise AS_PATH looping will occur * Only If Hub and Spoke Sites Use the Same BGP ASN ** Configuration for This Is Shown on the Next Slide 54

IP/VPN Deployment Scenarios: 2. Hub and Spoke Service: Configuration Option#2 Supported in IOS, NXOS and IOS-XR <BGP> address-family ipv4 vrf HUB-IN neighbor <CE> as-override Spoke A 171.68.1.0/24 CE-SA PE-SA Eth0/0.1 PE-Hub Eth0/0.2 Spoke B 171.68.2.0/24 CE-SB PE-SB MPLS VPN Backbone CE-Hub <BGP> address-family ipv4 vrf HUB-OUT neighbor <CE> allowas-in 2 55

IP/VPN Deployment Scenarios: 2. What If Many Spoke Sites Connect to the Same PE Router? Supported in IOS and IOS-XR 3.6 If more than one spoke router (CE) connects to the same PE router (within the same VRF), then such spokes can reach other without needing the hub. Defeats the purpose of hub and spoke Half-duplex VRF is the answer Uses two VRFs on the PE (spoke) router : A VRF for spoke->hub communication (e.g. upstream) A VRF for spoke<-hub communication (e.g. downstream) CE- SA1 CE- SA2 CE- SA3 PE-SA PE-Hub Note: 12.2(33) SRE. XE 3.0S Support Any Interface Type (Eth, Ser, POS, Virtual-Access, etc.) 58

IP/VPN Deployment Scenarios: 2. Hub and Spoke Service: Half-Duplex VRF Supported in IOS ip vrf green-up description For upstream traffic (to Hub) rd 300:111 route-target import 2:2 ip vrf green-down description - For downstream traffic (from Hub) rd 300:112 route-target export 1:1 Spoke A 171.68.1.0/24 CE-SA GE0/0 GE0/1 PE-SA MPLS Backbone ip vrf HUB-IN description VRF for traffic from HUB rd 300:11 route-target import 1:1 Hub Site Spoke B 171.68.2.0/24 CE-SB PE-Hub Interface GigEthernet 0/0-1 ip address 172.18.13.x 255.255.255.0 ip vrf forward green-up downstream green-down.. CE-Hub ip vrf HUB-OUT description VRF for traffic to HUB rd 300:12 route-target export 2:2 Upstream VRF Downstream VRF 1. PE-SA installs the Spoke routes only in downstream VRF i.e. green-down 2. PE-SA installs the Hub routes only in upstream VRF i.e. green-up 3. PE-SA forwards the incoming IP traffic (from Spokes) using upstream VRF i.e. green-up routing table. 4. PE-SA forwards the incoming MPLS traffic (from Hub) using downstream VRF i.e. green-down routing table 59

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 61

MPLS-VPN Deployment Scenarios 3. Extranet VPN MPLS based IP/VPN, by default, isolates one VPN customer from another Separate virtual routing table for each VPN customer Communication between VPNs may be required i.e. extranet External intercompany communication (dealers with manufacturer, retailer with wholesale provider, etc.) Management VPN, shared-service VPN, etc. Implemented by sharing import and export route-target (RT) values within the VRFs of extranets. Export-map or import-map may be used for advanced extranet. 62

MPLS-VPN Deployment Scenarios 3. Extranet VPN Simple Extranet (IOS Config sample) Supported in IOS, NXOS and IOS-XR MPLS Backbone VPN_A Site#1 71.8.0.0/16 PE1 P PE2 192.6.0.0/16 VPN_A Site#2 180.1.0.0/16 VPN_B Site#1 <VRF for VPN_A> route-target import 3000:111 route-target export 3000:111 route-target import 3000:222 <VRF for VPN_B> route-target import 3000:222 route-target export 3000:222 route-target import 3000:111 All Sites of Both VPN_A and VPN_B Can Communicate with Each Other 63

MPLS-VPN Deployment Scenarios 3. Extranet VPN Advanced Extranet (IOS Config sample) Supported in IOS, NXOS and IOS-XR MPLS Backbone VPN_A Site#1 71.8.0.0/16 PE1 P PE2 192.6.0.0/16 VPN_A Site#2 180.1.0.0/16 VPN_B Site#1 <VRF for VPN_A> route-target import 3000:111 route-target export 3000:111 route-target import 3000:1 import map VPN_A_Import export map VPN_A_Export route-map VPN_A_Export permit 10 match ip address 1 set extcommunity rt 3000:2 additive route-map VPN_A_Import permit 10 match ip address 2 access-list 1 permit 71.8.0.0 0.0.0.0 access-list 2 permit 180.1.0.0 0.0.0.0 <VRF for VPN_B> route-target import 3000:222 route-target export 3000:222 route-target import 3000:2 import map VPN_B_Import export map VPN_B_Export route-map VPN_B_Export permit 10 match ip address 2 set extcommunity rt 3000:1 additive route-map VPN_B_Import permit 10 match ip address 1 access-list 1 permit 71.8.0.0 0.0.0.0 access-list 2 permit 180.1.0.0 0.0.0.0 Lack of Additive Would Result in 3000:222 Being Replaced with 3000:1. We Don t Want That. Only Site #1 of Both VPN_A and VPN_B Would Communicate with Each Other 64

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 65

MPLS-VPN Deployment Scenarios 4. Internet Access Service to VPN Customers Internet access service could be provided as another value-added service to VPN customers Security mechanism must be in place at both provider network and customer network To protect from the Internet vulnerabilities VPN customers benefit from the single point of contact for both Intranet and Internet connectivity 66

MPLS-VPN Deployment Scenarios 4. Internet Access: Design Options Three Options to Provide the Internet Service - 1. VRF specific default route with global keyword 2. Separate PE-CE sub-interface (non-vrf) 3. Extranet with Internet-VRF 67

MPLS-VPN Deployment Scenarios 4. Internet Access: Design Options VRF specific default route Separate PE-CE Interface Extranet with Internet-VRF Static default route to move traffic from VRF to Internet (global routing table) Static routes for VPN customers to move traffic from Internet (global routing table) to VRF Besides VRF interface, a global interface also connect to each VPN site May use ebgp on the global interface, if dynamic routing pr internet routes are needed Internet routes inside a dedicated VRF (e.g. Internet-VRF) Extranet between Internet-VRF and Customer VRFs that need internet access Works well, but doesn t scale well (limited to default routing) Works well and scales well, despite the operational overhead 68

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 77

IP/VPN Deployment Scenarios: 5. Providing MPLS/VPN over IP Transport Reference Supported in IOS, NXOS and IOS-XR MPLS/VPN (rfc2547) can also be deployed using IP transport No MPLS needed in the core PE-to-PE IP tunnel is used, instead of MPLS tunnel, for sending MPLS/VPN packets MPLS labels are still allocated for VPN prefixes by PE routers and used only by the PE routers MPLS/VPN packet is encapsulated inside an IP header IP tunnel could be point-to-point or Multipoint GRE encapsulation based. http://www.cisco.com/en/us/docs/ios/interface/configuration/guide/ir_mplsvpnomgre.html 78

IP/VPN Deployment Scenarios: 5. Providing MPLS/VPN over IP Transport Supported in IOS, NXOS and IOS-XR CE1 PE1 GRE/IP Tunnel PE2 CE2 VRF IP VRF IP Header GRE Header VPN Label IP Packet Src Add Dst Add Src Add Dst Add Src Add Dst Add Data Data Data GRE/IP header and VPN label imposed on VPN traffic by PE1 VPN traffic is forwarded towards egress PE using IP forwarding Egress PE2 decapsulates, and uses VPN label to forward packet to CE2 Source -- http://www.cisco.com/en/us/docs/ios/interface/configuration/guide/ir_mplsvpnomgre.html 79

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 80

IP/VPN Deployment Scenarios: 6. IPv6 VPN Service Supported in IOS, NXOS and IOS-XR Similar to IPv4 VPN, IPv6 VPN can also be offered. Referred to as IPv6 VPN Provider Edge (6VPE). No modification on the MPLS core Core can stay on IPv4 PE-CE interface can be single-stack IPv6 or dual-stack IPv4 and IPv6 VPNs can be offered on the same PE-CE interface Config and operation of IPv6 VPN are similar to IPv4 VPN v4 and v6 VPN A CE VPN A v4 and v6 CE VPN B v6 Only CE PE PE P MPLS/VPN Network P P P PE PE ibgp Sessions in VPNv4 and VPNv6 Address-Families v4 and v6 VPN A CE v6 Only VPN B CE 81

IP/VPN Deployment Scenarios: 6. IPv6 VPN Service IOS_PE# vrf definition v2 rd 2:2 address-family ipv6 route-target export 2:2 route-target import 2:2 router bgp 1 address-family vpnv6 neighbor 10.13.1.21 activate neighbor 10.13.1.21 send-community both address-family ipv6 vrf v2 neighbor 200::2 remote-as 30000 neighbor 200::2 activate IOS-XR_PE# vrf v2 address-family ipv6 unicast route-target export 2:2 route-target import 2:2 router bgp 1 address-family vpnv6 unicast neighbor 10.13.1.21 remote-as 30000 address-family vpnv6 unicast vrf v2 rd 2:2 address-family ipv6 unicast neighbor 200::2 remote-as 30000 address-family ipv6 unicast NXOS_PE# vrf context v2 rd 2:2 address-family ipv6 unicast route-target export 2:2 route-target import 2:2 router bgp 1 neighbor 10.13.1.21 remote-as 1 update-source loopback0 address-family vpnv6 unicast send-community extended vrf vpn1 neighbor 200::2 remote-as 30000 address-family ipv6 unicast Supported in IOS, NXOS and IOS-XR v4 and v6 VPN A CE VPN A v4 and v6 CE VPN B v6 Only CE PE PE P MPLS/VPN Network P P P PE PE ibgp Sessions in VPNv4 and v4 and v6 VPN A CE v6 Only VPN B CE 82

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 83

IP/VPN Deployment Scenarios: 7. Providing Multi-VRF CE Service Supported in IOS, NXOS and IOS-XR Is it possible for an IP router to keep multiple customer connections separated? Yes, multi-vrf CE a.k.a. vrf-lite can be used Multi-VRF CE provides multiple virtual routing tables (and forwarding tables) per customer at the CE router Not a feature but an application based on VRF implementation Any routing protocol that is supported by normal VRF can be used in a multi-vrf CE implementation No MPLS functionality needed on CE, no label exchange between CE and any router (including PE) One deployment model is to extend the VRFs to the CE, another is to extend it further inside the Campus => Campus Virtualization 84

IP/VPN Deployment Scenarios: 7. Multi-VRF CE aka VRF-Lite Supported in IOS, NXOS and IOS-XR One Deployment Model Extending IP/VPN to CE Building Vrf Red Vrf Green Multi-VRF CE Router SubInterfaces* Vrf Red <VRF for Green> rd 3000:111 route-target both 3000:1 <VRF for Blue> rd 3000:222 route-target both 3000:2 <VRF for Red> rd 3000:333 route-target both 3000:3 PE MPLS Network Vrf Red PE Router Vrf Green Campus <VRF for Green> <VRF for Blue> <VRF for Red> *SubInterfaces Any Interface Type that Supports Sub Interfaces = Ethernet Vlan, Frame Relay, ATM VCs 85

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 86

IP-VPN Deployment Scenarios 8. VRF-Aware NAT Supported in IOS VPN customers could be using overlapping IP address i.e.,10.0.0.0/8 Such VPN customers must NAT their traffic before using either Extranet or Internet or any shared* services PE is capable of NATting the VPN packets (eliminating the need for an extra NAT device) * VoIP, Hosted Content, Management, etc. 87

IP/VPN Deployment Scenarios 8. VRF-Aware NAT Supported in IOS Typically, inside interface(s) connect to private address space and outside interface(s) connect to global address space NAT occurs after routing for traffic from inside-to-outside interfaces NAT occurs before routing for traffic from outside-to-inside interfaces Each NAT entry is associated with the VRF Works on VPN packets in the following switch paths: IP->IP, IP->MPLS and MPLS->IP 88

IP/VPN Services: 8. VRF-Aware NAT Services: Internet Access Supported in IOS CE1 10.1.1.0/24 Green VPN Site CE2 10.1.1.0/24 Blue VPN Site PE11 PE12 MPLS Backbone PE- P ASBR.1 IP NAT Inside 217.34.42.2 IP NAT Outside Internet ip vrf green rd 3000:111 route-target both 3000:1 ip vrf blue rd 3000:222 route-target both 3000:2 router bgp 3000 address-family ipv4 vrf green network 0.0.0.0 address-family ipv4 vrf blue network 0.0.0.0 VRF Specific Config ip nat pool pool-green 24.1.1.0 24.1.1.254 prefix-length 24 ip nat pool pool-blue 25.1.1.0 25.1.1.254 prefix-length 24 ip nat inside source list vpn-to-nat pool pool-green vrf green ip nat inside source list vpn-to-nat pool pool-blue vrf blue ip access-list standard vpn-to-nat permit 10.1.1.0 0.0.0.255 ip route vrf green 0.0.0.0 0.0.0.0 217.34.42.2 global ip route vrf blue 0.0.0.0 0.0.0.0 217.34.42.2 global VRF-Aware NAT Specific Config 89

IP/VPN Services: 8. VRF-Aware NAT Services: Internet Access Supported in IOS 10.1.1.0/24 Src=10.1.1.1 Dest=Internet Green VPN Site IP Packet CE2 10.1.1.0/24 CE1 Blue VPN Site Src=10.1.1.1 Dest=Internet PE11 PE12 Label Stack 30 Src=10.1.1.1 Dest=Internet P MPLS Packet PE-ASBR removes the label from the received MPLS packets per LFIB Performs NAT on the resulting IP packets Forwards the packet to the internet Returning packets are NATed and put back in the VRF context and then routed This is also one of the ways to provide Internet access to VPN customers with or without overlapping addresses Label Stack 40 Src=10.1.1.1 Dest=Internet PE- ASBR MPLS Backbone Src=24.1.1.1 Dest=Internet Src=25.1.1.1 Dest=Internet IP Packet Internet NAT Table VRF IP Source Global IP VRF-Table-ID 10.1.1.1 24.1.1.1 Green 10.1.1.1 25.1.1.1 Blue Traffic Flows 90

IP/VPN Services: 8. VRF-Aware NAT Services: Internet Access Supported in IOS The previous example uses one of many variations of NAT configuration Other variations (few below) work fine as well Extended vs. standard ACL for traffic classification PAT (e.g. overload config) Route-map instead of ACL for traffic classification Single NAT pool instead of two pools http://www.cisco.com/en/us/partner/tech/tk648/tk361/technologies_tech_note09186a0080093fca.shtml 91

Agenda IP/VPN Explained IP/VPN Deployment Scenarios 1. Multihoming & Load-sharing 2. Hub and Spoke 3. Extranet 4. Internet Access 5. IP/VPN over IP Transport 6. IPv6 7. Multi-VRF CE 8. VRF-Aware NAT 9. VRF-Selection Based 10. Remote VPN Access 11. QoS 12. Multicast VPN IP/VPN Use-Cases Best Practices Conclusion 92

MPLS based IP/VPN Service 9. VRF-Selection Supported in IOS The common notion is that a single VRF must be associated to an interface VRF-selection breaks this association and enables multiple VRFs associated to an interface Each packet on PE-CE interface is classified in real-time and mapped to one of many VRFs Classification criteria could be source/dest IP address, ToS, TCP port, etc. specified in the ACL Voice and data traffic on a single PE-CE interface can be separated out into different VRFs at the PE; Service enabler 93

MPLS based IP/VPN Service 9. VRF-Selection: Based on Source IP Address Supported in IOS Global Interface RR VRF Interfaces VPN Brown 33.3.0.0/16 33.3.14.1 Cable Setup CE1 Se0/0 PE1 MPLS Backbone (Cable Company) PE2 VPN Yellow 44.3.0.0/16 33.3.1.25 VPN Green 44.3.12.1 Traffic Flows 66.3.0.0/16 ip vrf red rd 3000:111 route-target export 3000:1 route-target import 3000:1 ip vrf yellow rd 3000:222 route-target export 3000:2 route-target import 3000:2 ip vrf green rd 3000:333 route-target export 3000:3 route-target import 3000:3 interface Serial0/0 ip address 215.2.0.6 255.255.255.252 ip policy route-map PBR-VRF-Selection ip vrf receive red ip vrf receive yellow ip vrf receive green access-list 40 permit 33.3.0.0 0.0.255.255 access-list 50 permit 44.3.0.0 0.0.255.255 access-list 100 permit udp 33.3.1.0 0.0.0.255 any dscp ef range 30000 31000 ip route vrf red 33.3.14.0 0.0.0.255 Se0/0 ip route vrf yellow 44.3.1.0 0.0.0.255 Se2/0 ip route vrf green 33.3.1.0 0.0.0.255 Se2/0 route-map PBR-VRF-Selection permit 10 match ip address 40 set vrf red route-map PBR-VRF-Selection permit 20 match ip address 50 set vrf yellow route-map PBR-VRF-Selection permit 30 match ip address 100 set vrf green 94

Agenda IP/VPN Explained IP/VPN Services 1. Load-Sharing for Multihomed VPN Sites 2. Hub and Spoke Service 3. Extranet Service 4. Internet Access Service 5. IP/VPN over IP Transport 6. IPv6 VPN Service 7. Multi-VRF CE Service 8. VRF-Aware NAT Services 9. VRF-Selection Based Services 10. Remote VPN Access Service 11. QoS Service 12. Multicast VPN Service Best Practices Conclusion 95

MPLS based IP/VPN Service 10. Remote Access Service Supported in IOS Remote access users i.e., dial users, IPSec users could directly be terminated in VRF PPP users can be terminated into VRFs IPSec tunnels can be terminated into VRFs Remote access services integration with MPLS based IP/VPN opens up new opportunities for providers and VPN customers BRKSEC-4054 DMVPN Deployment Models Remote Access is not to be confused by GET VPN that provides any-to-any (CE-based) security service BRKSEC-3053 Deploying GET to Secure VPNs 96

MPLS based IP/VPN Service 10. Remote Access Service: IPSec to MPLS VPN Supported in IOS Branch Office SOHO Local or Direct Dial ISP Cable/DSL/ ISDN ISP Remote Users/ Telecommuters Access Internet Cisco IOS VPN Routers or Cisco Client 3.x or Higher PE+IPSec Aggregator PE SP Shared Network SP AAA IP/MPLS/Layer 2 Based Network PE VPN A Customer A Branch Office PE Corporate Intranet Customer AAA VPN A Customer A Head Office VPN B Customer B VPN C Customer C IKE_ID Is Used to Map the IPSec Tunnel to the VRF (Within the ISAKMP Profile) IP IPSec Session MPLS VPN IP 97

Agenda IP/VPN Explained IP/VPN Services 1. Load-Sharing for Multihomed VPN Sites 2. Hub and Spoke Service 3. Extranet Service 4. Internet Access Service 5. IP/VPN over IP Transport 6. IPv6 VPN Service 7. Multi-VRF CE Service 8. VRF-Aware NAT Services 9. VRF-Selection Based Services 10. Remote VPN Access Service 11. QoS Service 12. Multicast VPN Service Best Practices Conclusion 98

IP/VPN Services: 11. Providing QoS to VPN Customers Supported in IOS, NXOS, and IOS-XR VPN customers may want SLA so as to treat real-time, mission-critical and best-effort traffic appropriately QoS can be applied to VRF interfaces - Just like any global interface - Same old QoS mechanisms are applicable Remember IP precedence bits are copied to MPLS TC/EXP bits (default behavior) MPLS Traffic-Eng could be used to provide the bandwidth-on-demand or Fast Rerouting (FRR) to VPN customers Please refer to the following sessions on QoS for more details: BRKMPL-2100 Deploying MPLS Traffic Engineering BRKRST-2509 Mastering Data Center QoS TECRST-2501 QoS Design Strategy 99

Agenda IP/VPN Explained IP/VPN Services 1. Load-Sharing for Multihomed VPN Sites 2. Hub and Spoke Service 3. Extranet Service 4. Internet Access Service 5. IP/VPN over IP Transport 6. IPv6 VPN Service 7. Multi-VRF CE Service 8. VRF-Aware NAT Services 9. VRF-Selection Based Services 10. Remote VPN Access Service 11. QoS Service 12. Multicast VPN Service Best Practices Conclusion 100

IP/VPN Services: 12. Providing Multicast Service to VPNs Supported in IOS, NXOS, and IOS-XR Multicast VPN (mvpn) service is available for deployment MPLS Multicast (e.g. Label Switched Multicast) is now available GRE encapsulation for mvpn is also available Multicast VPN (mvpn) utilizes the existing 2547 infrastructure Please see the following session for details on mvpn: BRKIPM-2011 MPLS Multicast BRKIPM-2008 Advanced Topics in IP Multicast Deployment TECIPM-1008 Understanding and Deploying IP Multicast Networks 101

Agenda IP/VPN Explained IP/VPN Deployment Scenarios Best Practices Use-Cases Conclusion 102

Best Practices (1) 1. Use RR to scale BGP; deploy RRs in pair for the redundancy Keep RRs out of the forwarding paths and disable CEF (saves memory) 2. Choose AS format for RT and RD i.e., ASN: X Reserve first few 100s of X for the internal purposes such as filtering 3. Consider unique RD per VRF per PE, Helpful for many scenarios such as multi-homing, hub&spoke etc. Helpful to avoid add-path, shadow RR etc. 4. Don t use customer names (V458:GodFatherNYC32ndSt) as the VRF names; nightmare for the NOC. Consider v101, v102, v201, v202, etc. and Use VRF description for naming 5. Utilize SP s public address space for PE-CE IP addressing Helps to avoid overlapping; Use /31 subnetting on PE-CE interfaces 103

Best Practices (2) 6. Limit number of prefixes per-vrf and/or per-neighbor on PE Max-prefix within VRF configuration; Suppress the inactive routes Max-prefix per neighbor (PE-CE) within OSPF/RIP/BGP VRF af 7. Leverage BGP Prefix Independent Convergence (PIC) for fast convergence <100ms (IPv4 and IPv6): PIC Core PIC Edge Best-external advertisement Next-hop tracking (ON by default) 8. Consider RT-constraint for Route-reflector scalability 9. Consider BGP slow peer for PE or RR faster BGP convergence 10. Use a dedicated L3VPN for CE Management 104

Agenda IP/VPN Overview IP/VPN Services Best Practices Use-Cases Conclusion 105

Use-Cases 1. SP Business VPN Service 2. SP Internal Usage (e.g. IT) 3. Enterprise Campus Virtualization/Segmentation 4. Data Center Multi-Tenancy 5. Data Center Virtualization/Hypervisor [Futuristic] 106

Use-Case #1 SP Business VPN Services SPs can use IP/VPN to offer L3 site-to-site connectivity to Enterprises/SMB customers == SPs can even offer Remote Access integrated with L3VPN Enterprise Green Site 1 Enterprise Green Site 3 CE1 PE1 P P P P PE2 CE2 Enterprise Green Site 2 CE4 Enterprise Green Site 4 SP Network 107

Use-Case #2 SP Internal Usage (e.g. IT) SP/ISPs can overlay its Enterprise and/or IT WAN connectivity over its MPLS network (that is used to offer L3VPN services to its customers) SP IT Site 1 SP IT Site 2 Enterprise Green Site 1 Enterprise Green Site 3 CE1 PE1 PE4 P P P P PE5 PE2 CE2 Enterprise Green Site 2 CE4 Enterprise Green Site 4 SP IT Site 3 SP Network 108

Use-Case#3 Enterprise Campus Segmentation/Virtualization IP/VPN can be used to create multiple logical topologies in the Campus Allows the use of unique security policies per logical domain Provides traffic isolation per application, group, service etc. per logical domain IP/VPN segmentation in the Campus can also be extended over the WAN 109

Use-Case#4 Data Center Multi-Tenancy IP/VPN can be used by Cloud or Hosted DC providers for multi-tenancy Data Center services to B2B customers One MPLS network infrastructure for all services MPLS PE boundary in POD EoR/ToR access/aggregation layer PE L2 Internet Global Interconnect Campus /WAN Edge MPLS Layer-2 POD POD POD

Agenda IP/VPN Overview IP/VPN Services Best Practices Use-Cases Conclusion 112

Conclusion MPLS based IP/VPN is the most optimal L3VPN technology Any-to-any IPv4 or IPv6 VPN topology Partial-mesh, Hub and Spoke topologies also possible Various IP/VPN deployment scenarios for additional value/revenue IP/VPN paves the way for virtualization & Cloud Services Benefits whether SP or Enterprise. 113

Complete Your Online Session Evaluation Give us your feedback and you could win fabulous prizes. Winners announced daily. Receive 20 Cisco Daily Challenge points for each session evaluation you complete. Complete your session evaluation online now through either the mobile app or internet kiosk stations. Maximize your Cisco Live experience with your free Cisco Live 365 account. Download session PDFs, view sessions on-demand and participate in live activities throughout the year. Click the Enter Cisco Live 365 button in your Cisco Live portal to log in. 114

Complete Your Online Session Evaluation Receive 25 Cisco Preferred Access points for each session evaluation you complete. Give us your feedback and you could win fabulous prizes. Points are calculated on a daily basis. Winners will be notified by email after July 22nd. Complete your session evaluation online now (open a browser through our wireless network to access our portal) or visit one of the Internet stations throughout the Convention Center. Don t forget to activate your Cisco Live and Networkers Virtual account for access to all session materials, communities, and on-demand and live activities throughout the year. Activate your account at any internet station or visit www.ciscolivevirtual.com. 115

Meet the Expert To make the most of your time at Cisco Networkers 2010, schedule a Face-to- Face Meeting with a top Cisco Expert. Designed to provide a "big picture" perspective as well as "in-depth" technology discussions, these face-to-face meetings will provide fascinating dialogue and a wealth of valuable insights and ideas. Visit the Meeting Centre reception desk located in the Meeting Centre in World of Solutions 116

Recommended Reading Source: Cisco Press 117

Final Thoughts Get hands-on experience with the Walk-in Labs located in World of Solutions, booth 1042 Come see demos of many key solutions and products in the main Cisco booth 2924 Visit www.ciscolive365.com after the event for updated PDFs, on-demand session videos, networking, and more Follow Cisco Live using social media: Facebook: https://www.facebook.com/ciscoliveus Twitter: https://twitter.com/#/ciscolive LinkedIn Group: http://linkd.in/ciscoli 118