Вы находитесь на странице: 1из 14

Ericsson’s network-based IP-VPN solutions

Nail Kavak

The phenomenal success of the Internet and the universal adoption of the Internet proto- ty and reliability as from any other private
col are driving profound changes in the telecommunications industry. The infrastructure network, and can be used to offer the fol-
of the Internet is being used as the foundation for a new public IP network. In addition to lowing services:
existing best-effort applications, the emerging IP networks will offer the functionality need- • intranet—connectivity between corpo-
ed to support a variety of carrier-class and business-quality services, with the advantage of rate sites;
being ubiquitous, easier to access, and of costing less than competing alternatives. • dial-in access—business employees can
Many service providers are expanding the capacity and geographical coverage of their net- access the corporate network remotely;
works to meet rising customer demand. With virtual private networks, they can improve • extranet—secure connectivity between a
asset utilization and return on investments by leasing available capacity and providing new community of users or business partners
services. IP-based virtual private networks provide a means of extending the reach and scal- whose access is restricted to the resources
ability of legacy frame-relay and ATM networks. End-users gain ubiquitous access to the defined for that community; and
corporate intranet or extranet for business-to-business applications, IP telephony, or multi- • Internet access.
cast videoconferencing service. Ultimately, Internet VPNs will be the global means of busi- VPNs can be built in various ways. Some
ness communication just as the voice network is today. consist of routers and firewalls that are inter-
The author describes various virtual private network models and the details of Ericsson’s connected to the physical or logical leased
MPLS-based IP-VPN offering. line of carriers and service providers. Others
might include a combination of application
proxy firewall, encryption, intrusion detec-
tion, tunneling, and key management. Some
VPNs are managed in-house, while others
VPN services and are outsourced to a service provider.
architectures Whether the VPN constitutes remote-
access service to an intranet or extranet, a
VPN services service provider must somehow integrate
A virtual private network (VPN) consists of the VPN services into a common infra-
a set of geographically disparate sites that structure.
can communicate securely over a public or
shared infrastructure. IP-based VPNs (IP- VPN architectures
VPN) enable business customers seamless-
ly to receive the same security, connectivi- Remote access
Remote-access VPNs give end-users access
to a corporate intranet or extranet over a
shared public infrastructure. Ordinarily, a
VPN subscriber or a server in a remote of-
fice dials into a network access server (NAS)
Figure 1
Remote access scenario.
at the service provider’s point of presence
(PoP). After authentication, which is based
Enterprise 2 on the pre-configured user profile, a tunnel
ISDN is dynamically established to the tunnel
xDSL
PoP server on the customer premises (Figure 1).
A tunnel can be
Dial in LAC • client-initiated (voluntary)—in which
Telecommuters (NAS) case the tunnel is opened by the client and
L2TP PE
PE CPE terminated by the corporation without
LNS
any active involvement by the service
P
provider; or
• compulsory—in which case the tunnel is
P
created by the service provider’s network
P
access server and terminated either by a
PE
PE
service provider tunnel server or by a cen-
Enterprise 1 tral customer site server.
Enterprise 3
The security policy database can reside on
LNS the company premises or it can be out-
Tunnel ISP network LNS
end points sourced to the service provider.
A remote-access VPN allows users to take
CPE
advantage of low-cost Internet-access ser-
vices (as opposed to being assessed distance-
CPE sensitive bandwidth charges). Although
most remote-access services are currently

178 Ericsson Review No. 3, 2000


based on dial-in services, other access meth- CPE Router Router CPE
ods—including cable modems, xDSL, and
direct Internet access—are becoming in-
creasingly popular.
CPE Router Router CPE
CPE-based L2 overlay
The traditional way of building a VPN is to
use layer 2 (L2) overlay based on customer
premises equipment (CPE). L2 connectivi- CPE Router Router CPE
ty is provided between customer sites that
use asynchronous transfer mode (ATM) or
frame-relay via virtual circuits. In essence,
the provider furnishes a set of permanent vir- CPE Router Router CPE
tual circuits (PVC) between customer
sites—usually in full or partial mesh, but
sometimes also in hub-and-spoke configu-
rations (Figure 2). The PVCs are treated as Figure 2
“dumb pipes,” since they are not involved Layer 2 overlay VPN scenario.
in routing, packet filtering, or other layer 3
(L3) issues. An L3 overlay network is built
on top of the L2 network by running IP over
virtual interfaces between data link circuit
indentifiers (DLCI) or virtual circuits that
are connected to the CPE. The service
provider is usually responsible for configur-
ing and managing VPN connectivity.
The L2 VPNs described above can also be
used in combination with multiprotocol
label switching (MPLS). To the end-user, BOX A, ABBREVIATIONS
MPLS-based L2 VPNs are identical to tra-
ditional L2 VPNs. In reality, however, the ATM Asynchronous transfer mode LSR Label switch router
L2 circuits (ATM virtual circuits) initiated BA Behavior aggregate MF Multi-field classification
at the customer’s site are terminated at the BGP Border gateway protocol MPLS Multi-protocol label switching
ingress of the service provider’s domain and CBR Constant bit rate NAS Network access server
CCB Customer care and billing system NAT Network address translation
mapped to MPLS tunnels in the backbone. CIR Committed information rate OSPF Open shortest path first
This way, the service provider can offer mul- CoS Class of service P Core router
tiple services, such as public IP, private IP, CPE Customer premises equipment PDA Personal digital assistant
and voice over IP (VoIP), over a single ac- DiffServ Differentiated service PDM Policy deployment manager
DLCI Data link circuit identifier PE Provider edge router
cess circuit. DSCP Differentiated services code point PHB Per-hop behavior
DSL Digital subscriber line PoP Point of presence
CPE-based L3 overlay E-BGP Exterior border gateway protocol POS Packet over SONET
The VPN sites are interconnected via a mesh EXP Experimental POTS Plain old telephone service
of IP-over-IP (IPIP) tunnels that are estab- FEC Forwarding equivalence class PPTP Point-to-point tunneling protocol
FR Frame relay PVC Permanent virtual circuit
lished across the public network using any GRE Generic encapsulation protocol QoS Quality of service
kind of L2 technology (ATM, FR, PPP). In iBGP Internal BGP RD Route distinguisher
CPE-based VPNs, all complex functionali- IGP Internet gateway protocol RFC Request for comments
ty and all hardware needed to construct the INM IP network performance monitor RIP Routing information protocol
IPDA IP destination address RT Route target
VPN reside on the customer premises. The IPSA IP source address rt-VBR Real-time VBR
service provider merely provides access to IPsec IP security protocol SA Scheduling aggregate
the public network (without having to know ISIS Intermediate system-to-intermediate SLA Service-level agreement
anything about the topology of the VPN). system SLS Service-level specification
A VPN gateway is placed at each customer ISP Internet service provider SONET Synchronous optical network
L2FP Layer 2 forwarding protocol SP Service provider
site between the enterprise and the service L2TP Layer 2 tunneling protocol TE Traffic engineering
provider. Practically any tunneling tech- LAN Local area network UBR Unspecified bit rate
nique can be used between VPN sites, in- LER Label edge router VC Virtual circuit
cluding the LL Leased line VoIP Voice over IP
LNS Local network server VPN Virtual private network
• layer 2 forwarding protocol (L2FP); LPM Longest prefix match VR Virtual router
• point-to-point tunneling protocol LSP Label-switched path VRI Virtual router interface
(PPTP);

Ericsson Review No. 3, 2000 179


• layer 2 tunneling protocol (L2TP); via physical or virtual links—through an
• generic encapsulation protocol (GRE); ATM or frame-relay access network. The
and service provider’s backbone routers, which
• IP security protocol (IPsec)—IPsec is be- carry the VPN traffic, are interconnected via
coming increasingly popular since it pro- MPLS label-switched paths (LSP) or tun-
vides tunneling and security through data nels. MPLS is used for forwarding packets,
encryption. It also facilitates confiden- while the border gateway protocol (BGP) is
tiality, authenticity, integrity and key used to distribute routes and VPN mem-
management. bership information. All complex function-
The end-user organization can choose to ality and all hardware needed to build the
manage the VPN in-house or it can out- VPN reside on the service provider’s do-
source the service to an external provider. main. Network-based MPLS VPNs do not
For many VPN user organizations, manag- put any requirements on VPN customers,
ing a VPN is costly and requires the services which means customers can use their own
of skilled, highly sought-after staff. On the routers or an off-the-shelf router to connect
other hand, the management of outsourced to the service provider’s network.
VPNs is a big business opportunity for ser-
vice providers, in particular because they can Network-based L3 VPNs
amortize the cost over several customers. Network-based L3 VPNs are similar to
They can provide basic Internet access with network-based MPLS VPNs—that is, all
best-effort services or they can offer multi- VPN functionality, management, and hard-
ple class-of-service (CoS) and bandwidth ware resides on the service provider’s do-
guarantees, emulating leased-line, frame- main. However, instead of using MPLS tun-
relay, or ATM services. nels to connect to the ingress and egress of
the provider’s edge routers, the network-
Network-based MPLS VPNs based L3 VPN uses IP tunneling mecha-
With a network-based MPLS VPN scenario, nisms, such as IPIP, GRE, and the L2 tun-
the sites that constitute the VPN are con- neling protocol (L2TP). This architecture
nected to the service provider’s edge router relaxes requirements for a fully native MPLS

Figure 3 ISDN access Management center Remote access


Architectural overview of Ericsson’s VPN
backbone.

Router

AXI 520/ PSTN


AXD 301 Router
AXI 520/
AXD 301
AXI 540
AXI 540

SGSN

GGSN AXI 520/


AXD 301
Frame relay Router
network

AXI 540
BSC
BSC
Router

Central site
Mobile network Telecommuters

180 Ericsson Review No. 3, 2000


backbone, and in cases of inter-provider op- lows, we will more closely examine
eration, it also relaxes the requirements to Ericsson’s support for IP-VPNs deployed
support inter-provider MPLS. over L3 infrastructures with either packet-
over-SONET (POS) or ATM cores.
Why network-based Ericsson’s VPN architecture makes use of
edge components such as the AXI 510 and
VPNs? AXI 512 access routers and the AXI 540
End-user organizations can reap significant edge aggregation router, as well as core com-
advantages from outsourcing the operation ponents such as the AXD 301 ATM switch
and management of their virtual private net- and the AXI 520 core router. Figure 3 gives
works to service providers. Service providers an overview of the available network com-
have solid network-management expertise. ponents.
They also have better resources and exper-
tise to provide cost-effective, carrier-class re-
liability, capacity, scalability, and global
VPN Requirements
reach. Moreover, service providers can offer Ericsson’s VPN offering addresses the re-
the services at a lower cost, by consolidat- quirements put on CPE functionality, pri-
ing them over a common infrastructure. vate addressing, security, quality of service
Network-based VPNs can be imple- (QoS) and service level agreements (SLA),
mented on gigabit routers, or MPLS, ATM scalability, mobile or remote access, global
or frame-relay switches—which is to say Internet access, inter-VPN connectivity and
that service provider investments in back- policy, inter-provider operation, manage-
bone equipment are protected. At the same ability, and interoperability.
time, corporate customers need not invest
in special VPN hardware or software—any CPE complexity
off-the-shelf CPE router can be used to con- A primary goal of the IP-VPN solution is
nect to the service provider network. to minimize the configuration costs associ-
In particular, network-based MPLS VPNs ated with the CPE. Service providers who
provide more flexibility and scalability than offer a turnkey service want to minimize the
conventional VPN techniques (frame relay, management complexity and availability
ATM, leased lines, and so on), since the edge concerns associated with managed CPE ser-
nodes of the network are “VPN aware.” Also, vices. Customers who manage their own
MPLS better integrates IP and L2 networks CPE typically want to minimize the re-
(FR, ATM) without the need for point-to- quirements put on internal technical staff.
point mesh configurations. Another requirement is that typical CPE
With respect to the IPsec-based L3 over- routers should be able to participate in the
lay, the additional security that is offered by VPN without a software upgrade. Ericsson’s
deploying CPE-based equipment does not IP-VPN solutions, which make use of stan-
necessarily outweigh the costs of deploying dard customer CPE (routers), do not require
and managing the equipment. special configurations or features, except
The MPLS network can differentiate be- where service differentiation is required be-
tween services according to application type tween customer equipment and the service
and VPN membership. It can also provide provider’s network. When this is the case,
quality of service and privacy for delivering the CPE must be configured to perform all
value-added and closed user group services differentiated service-related (DiffServ)
over existing infrastructures. Furthermore, edge functions, including classification,
it enables the service provider to utilize marking, shaping, and scheduling. Cus-
backbone resources more efficiently thanks tomers can enhance the security of the basic
to the advanced traffic-engineering mecha- VPN solution by introducing IPsec. Fur-
nisms that are an integral part of MPLS. thermore, to gain access to the global Inter-
net via a single service provider connection,
customers with private address space must
Ericsson’s MPLS VPN implement a centralized network address
Ericsson’s MPLS VPN solutions, which span translation (NAT) function within their
L2- and L3-based networks, offer compre- VPN.
hensive support for network-based and op-
erator-managed MPLS VPNs, but do not re- Private addressing
quire service providers or customers to pro- The service provider must be able to sup-
vide specialized CPE. In the section that fol- port a customer’s use of addresses that are

Ericsson Review No. 3, 2000 181


PE PE
CPE CPE

PE PE

CPE CPE
Figure 4
Pipe model: Specified distribution of traf-
fic between each site.

not globally unique (for example, the local tunneling within the service provider net-
addresses defined in RFC 1918, or address- work. In this case—provided it is possible
es that rightfully belong to another organi- to limit the topology with which the data is
zation). Addresses are solely guaranteed exposed when under the administrative con-
unique within the scope of a given VPN. An trol of a single service provider—the ad-
address might, for example, be used in mul- vantages of operational simplicity outweigh
tiple VPNs, on the global Internet, or both. the security risks of breached confidentiali-
Thus, an address must always be interpret- ty. That is, topology control enhances data
ed within the scope of the VPN on which a confidentiality—the routing-decision pro-
packet is traveling. The Ericsson IP-VPN cesses that include VPN constraints are
solutions support multiple instances of leveraged as part of the packet-forwarding
overlapping address space without requir- decision process.
ing network address translation. The NAT
function is only required when two business QoS/SLA
customers with overlapping address space Customers who build private leased-line
communicate with each other or when a networks can be guaranteed specific band-
business customer who uses private ad- width on each link. Similarly, customers
dresses wants to access the global Internet. who share public networks, such as frame
relay or ATM, receive service provider guar-
Security antees of bandwidth through, for example,
IP-VPNs replace private backbones with committed information rates (CIR). Obvi-
the shared backbone of a public network ously, customers who migrate to a shared IP
provider. Consequently, VPN customers network must also be given the same kind
might be concerned about the confidential- of assurances.
ity of data passing between VPN sites, wor-
rying that traffic originating from an unau- QoS models
thorized source outside the VPN can enter Ericsson’s VPN solution can be based either
the VPN (possibly masquerading as a legit- on a pipe or hose QoS model. The pipe model
imate VPN host). Security violations could is analogous to conventional leased-line
result in the exposure or corruption of sen- VPNs in which the customer knows the traf-
sitive corporate data, unauthorized access to fic matrix or how traffic is distributed be-
computing resources, and denial of service tween VPN sites. The traffic matrix is trans-
or electronic vandalism. While the utmost lated into a set of pipes that meets the cus-
security is obtained by implementing IPsec tomer requirements.
or like technologies within the CPE, cus- The hose QoS model guarantees perfor-
tomers who use IP-VPNs in place of frame mance based on aggregate traffic specifica-
relay or ATM L2 VPN services obtain ade- tions. In this model, the customer does not
quate security via L2 (MPLS or ATM) or L3 necessarily know the traffic matrix. Instead,

182 Ericsson Review No. 3, 2000


PE PE
CPE CPE

PE Service provider network PE

CPE CPE Figure 5


Hose model: Performance characteristics
specified for traffic from customer site to
the network.

to simplify the customer’s task of specifying Serv connectivity model, the virtual cir-
the performance requirements of the VPN, cuit connectivity model supports only a
performance characteristics are defined sole- few forwarding classes in the network.
ly for traffic entering into a hose stub link Different LSPs that belong to the same
or exiting a hose to any other hose forwarding class are mapped to the same
(Figure 5). Apart from being very straight- buffer or queue. Distinct admission con-
forward, this model allows customers to trol policies and traffic conditioning
vary, without changing their contract, the apply to each forwarding class.
volume of traffic that is sent to any other To properly enforce service differentiation,
hose endpoint, provided that the aggregate Ericsson products employ technologies that
traffic entering and exiting each of the end- identify, regulate, and isolate traffic.
points does not exceed the capacity of each • Identification is accomplished by means
hose. of packet classification—that is, by
The two VPN models put different re- matching the components of a packet
quirements on header against a list of filters. In some cir-
• the engineering and provisioning of re- cumstances, such as when a customer has
sources in the backbone; and stringent security requirements or wants
• the description and monitoring of the ser- to differentiate service to the stub link,
vice level agreement. the classification must be performed at the
customer site.
Connectivity models • Regulation is accomplished by traffic con-
However, regardless of the QoS model used, ditioning—that is, by shaping, dropping,
Ericsson offers two different connectivity or re-marking packets based on the tem-
models for controlling QoS in IP-VPNs: poral characteristics of the associated
• Differentiated services—either the Diff- packet stream (identified by a classifier)
Serv code point (DSCP) in the packet (for relative to the traffic profile of the SLA.
pre-encapsulated packets, the router uses • Isolation is achieved by using several
the DSCP value in the clear-text header) queuing or policy-based routing mecha-
or the MPLS label+CoS is used to map the nisms that provide dedicated router for-
packet to the behavior aggregate (and cor- warding resources (buffers, output link
responding per-hop behavior) with strict- bandwidth) or special network paths that
ly configured scheduling parameters. isolate enhanced-service traffic from con-
• Virtual circuit (VC)—traffic parameters gestion that has been induced by tradi-
and a QoS service class (delay and tional best-effort traffic.
throughput sensitivity) are assigned to a
label-switched path or ATM VC with dy- Scalability
namic per-hop admission control, pre- Obviously, service providers want to know
emption priority, and so on. Like the Diff- what impact VPN services will have on

Ericsson Review No. 3, 2000 183


backbone resources. Concerns include the subset of resources). One VPN might also
scalability of routing protocols, stub link function as a transit VPN which passes traf-
density (with physical or logical interfaces), fic that originates at a second VPN and is
and the per-packet processing required to destined for a third VPN. When multiple
forward VPN traffic. Ericsson’s IP-VPN so- VPNs connect, their addresses must be
lutions support techniques for increasing unique.
scalability in carrier backbones.
Inter-provider operation
Mobile and remote access Some customers want separate providers to
Besides fixed-site access, end-users should maintain distinct parts of their VPN. For
be able to access the VPN over plain old these customers, the IP-VPN solution must
telephone service (POTS) dial-up, digital span multiple provider networks and ensure
subscriber line (DSL), cable modem, and that all VPN forwarding, route propagation
eventually, from truly mobile devices such and QoS/SLAs function across provider
as personal digital assistants (PDA). Since boundaries. Initially, these inter-provider
access is not necessarily tied to a physical VPNs will only be encountered where the
location, security is a major concern—for primary service provider cannot offer full
instance, access might originate from an- coverage for all customer sites or for all cus-
other provider’s network, such as a local tomer access technologies. Inter-provider
dial-up Internet service provider (ISP) who operation stipulates that the VPN models
operates in a wholesale scenario. Moreover, used must have minimum impact on
because the CPE can be a laptop, cell phone, provider core networks, and that they sup-
or PDA, the CPE functionality must be port standards-based operation.
simple and ubiquitous. Ericsson’s IP-VPN
solutions support multiple tunneling Manageability
mechanisms (MPLS and L2TP) that permit Making the configuration of equipment in
users who are connected via a fixed-site local the service provider’s network less complex
area network (LAN) or traditional dial-up, will have a good effect on scalability, oper-
DSL, and so on, to participate in the same ational functionality and operating costs. In
IP-VPN. particular, this applies to the configuration
of provider edge (PE) routers that imple-
Global Internet access ment key parts of the IP-VPN service.
Customers might want to access the global
Internet and the VPN from the same service Interoperability
provider connection. Ericsson’s IP-VPN so- Ericsson’s IP-VPN solutions are designed to
lutions support customer networks with operate within multi-vendor networks. To
globally unique addresses. If parts of the minimize the impact on interoperation with
VPN use non-unique addressing that con- different core devices (some of which may
flicts with globally assigned addresses, the not support native MPLS), the solutions
VPN addresses take precedence over their support MPLS and L3 tunneling technolo-
global counterparts. gies. They also comply with industry stan-
dards for MPLS-VPNs in order to ensure in-
Inter-VPN connectivity and policy teroperability within networks composed of
Some customers require more than one VPN multi-vendor PE solutions. Ericsson be-
for inter-site communications. Some sites lieves that compliance with appropriate
might have to participate in multiple VPNs. requests for comments (RFC) on MPLS VPNs
For example, a site could participate in and dedicated interoperability testing will
• an intranet VPN that connects it with yield implementations which are interoper-
other corporate sites; able with other PEs that adhere to the MPLS
• an extranet that connects it with suppli- VPN RFC. There is no current standard for
ers; and non-MPLS VPNs (called IP overlay VPNs);
• a third extranet that connects it with other however, given the obvious benefit of sup-
organizations in the industry. porting multiple tunneling technologies, it
The site must communicate with each of the is believed that the industry’s standard fo-
VPNs simultaneously, and access must be rums can be induced to generate support for
tightly controlled (an industry-wide ex- them. Ericsson will consider accelerating
tranet might include competitors who support for non-L2 tunneling mechanisms
should not be granted access to the corpo- if doing so accelerates interoperability with
rate Intranet or who have access to only a third-party equipment.

184 Ericsson Review No. 3, 2000


Ericsson IP-VPN MPLS-VPNs
The CPE sends standard IP packets to the
architecture ingress edge router, which routes the pack-
The section that follows describes the inter- ets across MPLS tunnels to the egress edge
network part of Ericsson’s IP-VPN solu- router. The core network (between the
tions. The main concepts of this architec- ingress and egress edge router) is composed
ture are based on RFC 2547. of several routers or switches (P) that func-
tion as standard label switch routers. The
Overall topology backbone that connects the ingress and
The VPN backbone is composed of the ser- egress edge routers is fully compliant with
vice provider’s core routers (P) and edge native MPLS.
routers (PE) as illustrated in Figure 6. The A two-layer label stack is used across the
edge routers (AXI 510, AXI 512 or AXI backbone: the top layer identifies a single
540) are LSP connecting the ingress and egress edge
• connected to customer edge routers via router, whereas the bottom layer, which de-
stub links (a physical or logical leased line) notes the CPE destination, is considered
and can run dynamic routing protocols only by the egress edge router. Since the
(routing information protocol, RIP, open routers (P) are only concerned with the top
shortest path first, EBGP) to communi- label, they only need to know the internal
cate reachability information between the topology of the backbone that connects the
customer and service provider; or edge router—that is, they do not require in-
• statically configured with site reachabili- formation on customer connections or
ty information for the stub link. VPNs. The MPLS solution uses multi-
Each edge router maintains separate for- protocol extensions to BGP to communicate
warding tables—every site to which the VPN-specific routing information between
edge router is attached is mapped to one of edge routers. The edge routers are fully
these tables, which are used to determine meshed and communicate through iBGP
how a packet is to be routed. The core routers sessions.
(P) are unaware of the existence of VPNs at
the network’s edge boundaries. Two basic IP-overlay VPNs
architectures are supported: MPLS-VPNs The IP-overlay model is similar to the MPLS
and IP-overlay VPNs. model, but instead of using MPLS tunnels

VPN B1 VPN B2
Figure 6
MPLS-BGP/VPN architecture and compo-
nents.
MPLS backbone

PE P P
CPE CPE
VR
VR PE

VPN A2 VR
VR
Global P P
VR
VR VPN A3
PE Global

VR
CPE VR
VR
VPN A1 CPE
Global

Internet

CPE

Ericsson Review No. 3, 2000 185


tunnels originate on the access server). The
• Do lookup in VPN table tunnels can be terminated at an entry point
• Determine path to egress router of the VPN within the service provider’s
• Encapsulate in two-layer deep MPLS stack Internet
network or they can be terminated at the
customer premises.
• Label swapping Basic forwarding path operation
based on top level
VR The CPE router sends standard L3 IP pack-
VR ets to the edge router, usually without spe-
cial encapsulation or tagging. Using the vir-
tual router interface (VRI) scope that has
VR
been configured for the virtual interface on
which the packet arrives, the edge router
performs standard longest prefix match
(LPM) lookup on the packet’s IPDA in a
• Bind the label to
VRI-specific forwarding table. The for-
corresponding VR warding table contains all reachable prefix-
es that reside in any of the VPNs of which
the interface is a member. If a matching pre-
fix is found, the packet is forwarded to a net-
work that resides in one of the VPNs; if no
matching prefix is found, the edge router
might look up the LPM in a global for-
Figure 7 warding table, which consists of global In-
VPN forwarding plane in action. ternet prefixes—the complete BGP table.
This table is only searched if the customer
interface has full global Internet connectiv-
ity. If the LPM lookups fail to return a
to connect ingress and egress edge routers, match, the packet is dropped and an “ICMP
the service provider employs IP tunneling unreachable” message is generated
mechanisms. Initially, the IP-overlay model (Figure 7). If a match is returned from the
supports L2TP tunneling, since this mech- VRI-specific table, the packet is encapsu-
anism facilitates the multiplexing of VPN lated in
traffic onto a single tunnel, thereby allevi- • a two-layer MPLS label stack (for MPLS
ating scalability concerns. The use of L2TP VPNs) and forwarded along the LSP that
allows IP-VPNs to be deployed on back- connects the ingress edge router with the
bones that do not fully support native egress edge router; or
MPLS. And in cases of inter-provider oper- • L2TP headers (for IP-overlay VPNs) and
ation, it relaxes the requirements for sup- sent to the egress edge router over an IP
porting inter-provider MPLS. tunnel—a single L2TP tunnel that con-
In either architecture, fixed-site corpora- nects a pair of ingress and egress edge
tions are connected into the VPN via a stub routers is used to multiplex traffic from
link that terminates at the edge router. Traf- many VRI contexts (using the tunnel ID
fic on the stub links can be transmitted in field and a session ID field to identify the
the clear (assuming the customer site in- VRI context).
cludes minimal CPE services) or it can be Core devices are unaware of the existence and
tunneled or encrypted. Tunneling is used configuration of VPNs (and associated per-
across the service provider’s backbone to customer topology information) within the
support security, topology control, and cus- PEs. Where the ingress edge router is at-
tomer-addressing limitations. A combina- tached to a two-layer MPLS label stack on
tion of DiffServ, ATM QoS, and MPLS+CoS each packet, the router (P) forwards the pack-
is used to guarantee quality of service. et using regular MPLS label-switched router
VPN customers with dial-up and broad- (LSR) pop-and-swap on the top label. Since
band access connect to the network either the top label defines the LSP that connects
via CPE services—Windows PC supporting the ingress edge router to the egress edge
point-to-point tunneling protocol (PPTP) router, the router (P) only needs topology in-
or IPsec over L2TP—or via AXI 510 or formation on the ISP backbone. This infor-
AXI 512 access servers at the edge of the ser- mation is usually obtained via an Internet
vice provider’s network (in which case the gateway protocol (IGP), such as OSPF or in-

186 Ericsson Review No. 3, 2000


termediate system-to-intermediate system applies to the egress edge router that assigns
(ISIS). The backbone-forwarding path is also it, is opaque to other routers. In IP-overlay
completely protocol-independent. Thus, VPNs, packets received by the egress edge
any protocol that can be encapsulated in router from the upstream routers (P) arrive
MPLS can be forwarded between edge over an IP tunnel for which the edge router
routers. serves as a termination point. The edge
In IP-overlay VPNs, most packets that router uses the IPSA, IPDA, and IP proto-
traverse the core are IP packets with the col field to identify the tunnel, and then uses
IPSA and IPDA set to addresses that belong the L2TP tunnel ID and session ID to iden-
to the ingress and egress edge routers. The tify the CPE router to which the packet is
routers (P) must be able to route to addresses to be forwarded.
that belong to edge routers, but require
no information on VPNs or customer Routing and processing route updates
topology. In VPN environments, the ISP backbone
The egress edge router, which acts as an serves as the core of an enterprise network.
MPLS label edge router (LER), uses the sec- The service provider is therefore responsible
ond label in the stack to forward the pack- for propagating reachability information
et to the appropriate egress interface for the between each customer site, while preserv-
destination CPE. The second label encodes ing the VRI-specific context of prefixes, and
the VRI scope of the packet and the next creating customized forwarding tables for
hop, and provides the information that is each distinct VRI.
needed to forward the packet to the appro- Ericsson’s IP-VPN solutions support the
priate CPE. If the CPE is in multiple VRIs, exchange of routing information with CPE
the packet is forwarded across the appropri- devices using standard IP routing protocols
ate DLCI, VCI, or subinterface (or using the (static routing, BGP, RIP, OSPF, or ISIS).
appropriate tunneling or VLAN tagging In all likelihood, given the requirements for
mechanism to denote the VRI scope of the simple configuration of the CPE, static rout-
packet). The second label, which is assigned ing or RIP will become common methods
by the egress edge router, is propagated via of communicating routing information.
the routing protocols (multiprotocol-BGP, Since the edge router is configured to con-
MP-BGP). This label, whose scope solely tain the VPN membership of each sub-

Figure 8
• Translate IPv4 to VPN-unique address VPN control plane in action.
• Send MP-iBGP update to all
Internet

EBGP, IGP VR
(Static) VR

iBGP/MP
VR

VR VR
• Import from BGP
• Translate VPN-unique
address to IPv4
• Import from BGP • Distribute to CE
• Translate VPN-unique address to
IPv4
• Distribute to CE

Ericsson Review No. 3, 2000 187


interface, routes learned via a sub-interface tribute), denotes the list of VPNs to which
can be associated with the appropriate VRI the route must be announced.
without requiring any special protocol sup-
port on the CPE. There is no one-to-one re- Scalability
lationship between a customer site and In traditional connection-oriented networks
VPN, since customers can be members of (leased line, frame relay or ATM), circuits
multiple VPNs. The edge router inserts are overlaid between each customer router
routes obtained from a CPE into the appro- to provide VPN connectivity. For VPNs
priate VRI table, and then announces these that include many sites, this approach gen-
prefixes to other edge routers on the back- erates numerous circuits that must be man-
bone using multiprotocol extensions to aged and processed. In contrast, with MPLS-
BGP that allow each prefix to be qualified based VPNs, the label-switched paths are
with its VRI context. Similarly, each edge established from peer to peer based on the
router obtains VRI-specific reachability in- L3 topology. Thus, customer routers need
formation via the internal BGP (iBGP) with only peer to a single edge router, regardless
other edge routers, and propagates these pre- of the number of sites within a VPN.
fixes to the CPE using standard IGP or EGP In addition, MPLS tunnels can be shared
protocols (Figure 8). An isolated instance of by different VPNs (VR). Thus, a rise in the
the IGP is used with each customer site to number of customers or VPNs has no im-
ensure that routing domains are maintained pact on the number of LSPs. L2TP tunnels
as distinct. can also be multiplexed using the session or
Prefixes are obtained from customers who tunnel ID to reduce the number of tunnels
use conventional protocols (or static routing in the backbone.
information), but when non-unique prefix- In MPLS, the edge routers must only keep
es are propagated across the provider’s back- information on the VPN of directly attached
bone, they must be qualified with the VRI routers. In addition, sites that share the same
context to which they belong. Standard routing information or sites that belong to
BGP4 can announce only one unique in- the same VPN can share the same VPN rout-
stance of a prefix over a BGP session, and ing table. Furthermore, thanks to label
BGP NEXT_HOP information is inher- stacking, the core routers (P) need not know
ently an IPv4 address. MP-BGP makes it anything about VPNs.
possible to announce a VPN-IPv4 prefix, To further reduce the burden on edge
which is a standard IPv4 prefix qualified routers, existing BGP techniques, such as
with a 64-bit route distinguisher that com- route reflectors, can be used to scale route
municates the VRI-specific context of that distribution. In this case, edge routers will
prefix. When an edge router originates a peer with route reflectors that serve the same
route into iBGP, either via a static an- set of VPNs, so that individual edge routers
nouncement or by means of redistribution need not store all VPN information.
from interior gateway protocol/external
gateway protocol (IGP/EGP) with a CPE, it Security
includes BGP NEXT_HOP, which points MPLS-based VPNs provide a level of secu-
to one of its own addresses and an MPLS rity that is similar to that provided by L2
label. This label is essential to the edge ATM or frame-relay networks. Because the
router. In traffic received from from the entire label-switched path of the packet is
backbone and destined to this prefix, the pre-determined at the ingress point, cus-
MPLS label—the second in the label tomers are assured that traffic injected into
stack—is used to forward the packet to the an MPLS tunnel will not diverge from that
appropriate CPE (Figure 4). In IP-overlay tunnel. The packet itself will not diverge
VPNs, the egress edge router attaches an from the provider’s backbone; therefore, as-
identifier (L2TP tunnel and session IDs) to suming appropriate security procedures by
the MP-BGP announcement of the route. the service provider, exposure is limited to
All VPN prefixes carried via MP-BGP service provider staff. The label-swapping
across the backbone are qualified with the nature of MPLS makes it impossible for a
VPN in which they originated. These BGP third party to inject a packet into an MPLS
routes must only be announced (via an IGP tunnel.
or EGP) to customers who are members of At the edge of a service provider network,
the VPN from which the route originated. customer packets must enter through the
A new BGP attribute, target VPN (effec- correct logical or physical interface. Packets
tively a 64-bit extended communities at- entering through an interface for which

188 Ericsson Review No. 3, 2000


there is no associated VRF are dropped. Fi-
nally, service providers assign a route dis-
tinguisher (RD) to each customer. These are
unknown to end-users, which makes it im-
possible for malefactors to enter the network
via another port.
VPN traffic remains separate at the back-
bone. Inter-VPN communication can be
tightly controlled in many ways, including
via route filters, firewalls, access lists, or au-
thentication servers.
In IP-overlay VPNs that employ L2TP
tunneling, an unauthorized third-party
might feasibly insert a packet into the IP
tunnel, forging a packet using the appro-
priate IPSA and IPDA addresses and prop-
er encapsulation. Consequently, when the
egress edge router receives the packet, it
processes the packet as if it had originated
at the ingress edge router. To prevent in-
trusion, packets destined for the L2TP tun-
nels are authenticated using an IPsec au-
thentication header (IPsec-AH).
DiffServ, MPLS and CoS
Due to the high processing and manage-
ment costs in carrier networks, it is not pos-
sible to scale
• quality of service when applied on a flow-
by-flow basis; or
• point-to-point virtual circuits when used
to implement class of service (CoS).
However, traffic that is placed into man-
ageable sets of service classes is more effi-
Figure 9
cient and scales well. In Ericsson’s VPN so- Ericsson AXI 540.
lutions, the QoS implementation is essen-
tially based on the DiffServ mechanisms
(RFC 2474 and RFC 2475). Where the
backbone is based on MPLS transport, Diff-
Serv is also applied in the edge in conjunc-
tion with MPLS trunking in the core. • network control intended for routing pro-
Traffic sent from the CPE must be classi- tocol signaling;
fied in accordance with the service commit- • best-effort service;
ted to the customer and might be subject to • assured service based on a subset of the as-
metering, policing, and shaping before it is sured forwarding PHB group; one for-
queued or scheduled for transmission by the warding class with two drop classes—a
edge router. token-bucket-style traffic-conditioning
Traffic in violation of the negotiated rate function at the network ingress handles
is either dropped or re-marked to ensure that policing and marks traffic according to
the appropriate level of service is provided. parameters (bandwidth per drop class) in
Several service classes are supported in the the sevice level specification (SLS);
core. The core of the network enforces the • strict QoS based on expedited forwarding
service classes based on the EXP value in the PHB. The ingress traffic-conditioning
MPLS header, MPLS label, or both. Each function is defined for the PHB; the band-
service category corresponds to an ordered width policing function is defined in the
traffic aggregate (OA) and a per-hop behav- SLS. For this service category, VC-style
ior (PHB) group that defines the forward- QoS is suitable, since admission can be
ing behavior. Ericsson’s current network so- controlled in each node during path sig-
lutions define four service categories: naling.

Ericsson Review No. 3, 2000 189


used to set up explicit paths to interconnect
edge router routers, in order to optimize net-
Customer care and billing (CCB) system work performance and to facilitate more ef-
ficient and reliable management of network
resources. Traffic engineering enables ser-
vice operators to move traffic flows away
Network Policy Internet Service from the shortest path selected by the IGP
resource deploym. network level and onto potentially less congested physical
manager manager manager manager
(NRM) (PDM) (INM) (SLM) paths across the network. Explicit paths can
be set up based on the QoS/bandwidth, pol-
Management platform icy and administrative constraints instead of
(Comms, discovery, topology,
management, etc) IGP topology alone.
Ericsson’s traffic engineering solutions
enable operators to establish label-switched
paths either manually or automatically. To
configure an LSP manually, the paths are
calculated off-line and all label switch
Router routers are manually pre-configured to in-
Router
stall the forwarding state in routers. The
Figure 10
paths can also be computed online and es-
Router
A high-level view of the Ericsson VPN tablished semi-dynamically whereby only
management system. the edge LSR is pre-configured, and from
there a signaling protocol (resource reserva-
tion protocol/contraint-based LDP,
RSVP/CRLDP) is used to install the
forwarding state in each LSR. The ad-
mission control procedures defined by
RSVP/CRLDP check the availability of re-
Core routers provide separate queues for sources when the path is established.
each service category. Traffic is scheduled
and buffered or queued according to service Extranets
categories and traffic mix. The AXI 520 and The MPLS VPN architecture does not make
AXI 540 employ the weighted round-robin any distinction between intranets and ex-
scheduling discipline. On some interface tranets. Certain sites within a VPN can be
types, the AXI 540 can also manage sched- allowed to communicate directly, whereas
uling using a combination of fair round-robin others might have restricted connectivity or
and priority scheduling (for EF PHB). might have to pass through a firewall before
The AXD 301 can separate and isolate communicating with other sites. Connec-
DiffServ/MPLS and native ATM traffic as tivity between VPN sites is a matter of pol-
defined in the MPLS ships-in-the-night icy. While some sites might only be mem-
concept. Besides the ATM service cate- bers of an intranet VPN, others might be
gories, additional categories (output members of the intranet and an extranet.
queues) are provided for MPLS/DiffServ The MPLS VPN architecture accommodates
traffic. By default, network control and as- complex VPN topologies provided the ex-
sured service traffic are mapped to separate tended attributes of BGP have been config-
dedicated queues, while best-effort traffic is ured properly.
handled together with unspecified bit rate
(UBR) traffic; strict QoS service is handled Management and service provisioning
as constant bit rate (CBR) or real-time vari- Although not the main focus of this article,
able bit rate (rt-VBR). the following section briefly describes the
In IP-overlay VPNs, the appropriate management components and procedure for
DSCP field is marked in the outer IP pack- deploying VPNs. Ericsson’s IP manage-
et header (encapsulating the UDP/L2TP ment architecture was described in greater
packet) to ensure that the appropriate ser- detail in Ericsson Review no. 1, 2000.
vice is provided within the core.
Management components
Traffic engineering and MPLS The Ericsson VPN management system
If the core network is based on MPLS, traf- consists of the following components (Fig-
fic engineering (TE) mechanisms can be ure 10):

190 Ericsson Review No. 3, 2000


• The customer care and billing system terface to customer service representa-
(CCB) contains a billing system and fa- tives. A service-level agreement is nego-
cilitates the definition of customers and tiated—this agreement specifies VPN
the provisioning of new customer services. sites, connectivity, QoS, time frame, and
A service-level specification (SLS), which so on. The information in this agreement
is also part of the CCB, includes the sites is then passed on to the policy deployment
of a VPN, requested bandwidth and QoS, manager.
VPN topology, activation/deactivation 3. The policy deployment manager receives
time, and so on. high-level information from the CCB and
• The policy deployment manager (PDM) determines the physical configuration to
receives high-level service requirements be applied to the network.
from the CCB and maps them to appro- 4.Once a customer site is configured (in-
priate configuration (CLI) commands that cluding virtual router instances, route tar-
are necessary to configure a VPN. The get, route distinguisher, packet classifi-
PDM configures the VPN elements (vir- cation rules and corresponding actions),
tual routers, stub links, route targets, information pertaining to the newly cre-
route distinguishers) that are affected by ated VPN is passed to the INM. This ini-
the addition or subtraction of a customer tiates performance monitoring in the net-
site. Based on the service-level specifica- work and guarantees conformance with
tion from the CCB, the PDM is also re- the SLA.
sponsible for configuring QoS-related el- 5.If events or alarms occur in the network—
ements, such as access lists, and packet- for example, faults or performance-
classification rules and actions for each related events from the INM—the SLM
customer site. informs the CCB of correlated events that
• The network resource manager (NRM) lead to SLA violations.
takes steps that are necessary for deploy-
ing a VPN. This includes the configura-
tion of MPLS tunnels between PEs, iBGP
Conclusion
sessions, queues, schedulers/drop levels in Network-based IP-VPNs give business cus-
routers, and so on. tomers the same services and benefits as they
• The service level manager (SLM) collects enjoy with their current networks, but use
network events and alarms. It can corre- shared public infrastructure instead of pri-
late network events and automatically fil- vate equipment, and external service
ters out unimportant alarms. It also in- providers instead of expensive in-house spe-
forms the CCB of events that violate the cialists.
SLA. Ericsson’s MPLS VPN solution is scalable
• The IP network-performance monitor and simple to deploy. It can seamlessly in-
(INM) measures network performance. For tegrate customer routers into the service
example, it measures one-way delay, tests provider’s backbone, thereby reducing the
connectivity, and monitors thresholds. cost of deploying and operating VPN ser-
vice. The implementation does not require
Deploying VPN service any changes or additional functions on the
1.The underlying network must be config- customer’s intranet. At the same time, the
ured before the VPN sites can be config- service provider’s backbone can be used in a
ured. This also applies to the configura- reliable and cost-effective way as a platform
tion of BGP, iBGP sessions, MPLS tun- for providing profitable value-added ser-
nels, and QoS components (schedulers, in- vices, such as telephony, centralized Web
terfaces, drop levels). hosting, multicast, e-commerce, and secu-
2.A high-level CCB system provides the in- rity services for extranets.

Ericsson Review No. 3, 2000 191

Вам также может понравиться