Overlay, Peer-to-Peer and MPLS VPN
The traditional peer-to-peer model requires strict
uniqueness of IP address space. The overlapping addresses, usually resulting
from usage of private IP addresses in customer networks, are one of the major
obstacles to successful deployment of peer-to-peer VPN implementations.
Three solutions have been proposed to overcome this
limitation.
1.
It can persuade the customers to re-number their
networks. Most customers would not be willing to do that and would rather find another
service provider.
2.
It can implement the VPN service with IP-over-IP
tunnels, where the customer IP addresses are hidden from the service provider routers(Layer
3 overlay model)
3.
It can implement a complex network address
translation (NAT) scheme that would translate customer addresses into a
different (but unique) set of addresses
at the provider edge router and then translate those addresses back to the
customer addresses before the packet would be sent from the egress PE router to
the CE router. Although such a solution is technically feasible, the
administrative overhead is prohibitively large and difficult to troubleshoot.
Types of VPN
Overlay
VPN
In the overlay VPN model, the service provider network is a
connection of point-to-point links or virtual circuits (VCs). Routing within
the customer network is transparent to the service provider network, and
routing protocols run directly between customer routers. The service provider
has no knowledge of the customer routes and is simply responsible for providing
point-to-point transport of data between the customer sites.
Figure illustrates
the deployment of an overlay VPN. The scenario adopts a hub-and-spoke topology
whereby the Paris site is the hub, and both the London and Zurich sites are the
spokes. The London site is linked up to the Paris site via a point-to-point VC
#1. Likewise, the Zurich site is linked up to the Paris site via a
point-to-point VC #2. In this instance, the layer-3 routing adjacencies are
established between the CE routers at the various customer sites, and the
service provider is not aware of this routing information at all. From the
perspective of the CE routers, the service provider infrastructure appears as
point-to-point links between Paris to London and Paris to Zurich.
These VPNs can be implemented at layer-1 using leased/dialup
lines, at layer-2 using X.25/frame relay/ATM Virtual Circuits, or at layer-3
using IP (GRE) tunneling or IPSEC tunnels. Below implementations are used in
Overlay Model
1.
Layer 1:
Service Provider established Layer 1 connectivity between customer sites
via ISDN, DS0, T1, E1, SONET or SDH and further customer is responsible for
implementations of all higher layers (data link and IP layer). Generally
customer uses PPP or HDLC to establish connection.
2.
Layer 2: It adopts traditional switched WAN
solution. Service Provider is responsible for establishing layer 2 VCs between customer
sites via X.25, FR or ATM and customer is further accountable for IP layer and
above
3.
Layer 3: VPN is implemented with Point to Point
IP -over IP tunnels. This is referred as IP tunneling where a destination can
be reached transparently without the source having to know the topology.
Tunnels also enable the use of private network addressing across a service
provider's backbone without the need for NAT (Network Address Translation).
Tunnels are either GRE (Generic routing Encapsulation) or IP security (IPSEC).
·
GRE: it’s simpler, less overhead and of course
less secure. These tunnels do not provide true confidentiality but can carry
encrypted traffic. It is capable of handling IP multicast traffic between two
sites.
·
IPSEC: its deployment is more complex and
resource intensive (CPU) but it provides more robust security. It is IETF standard
(Internet Engineering Task Force). It operates at layer 3. Since IPSec
encryption works only on IP unicast frames so for better protection and to
alleviate this deficit GRE can be used in conjunction with IPSec.
Overlay VPN model has a few major problems.
1.
One is the high level of configuration overhead.
2.
Requirement of a fully meshed deployment of
point-to-point links or VCs over the service provider’s backbone to attain
optimal routing.
3.
Customer routes are propagated in provider core.
4.
Provider is responsible for addressing so
private addressing is not an option.
Peer-to-Peer
VPN
The peer-to-peer model adopts a simple routing scheme for
the customer. Both provider and customer network use the same network protocol
and all the customer routes are carried within the core network (service
provider network). The PE routers exchange routing information with the CE
routers, and layer-3 routing adjacencies are established between the CE and PE
routers at each site. Because peer-to-peer routing has been implemented, routing
between sites is now optimal. Fully meshed deployment of point-to-point links
or VCs over the service provider backbone is no longer applicable to attain
optimal routing. Since there is no overlay mesh to contend with, the addition
of new sites is easier, and circuit capacity sizing is not an issue. Because
the service provider now participates in customer routing, provider-assigned or
public address space needs to be deployed at the customer’s network, so private
addressing is no longer an option.
Two approaches have
been adopted:-
1.
Shared PE approach: common PE router that
carries all customer routes. Routes are separated with communities and route filters
(access list, route maps) on PE to CE interface. The complexity of the
configuration results high maintenance cost, CPU utilization, memory requirement.
2.
Dedicated PE approach: In this model, each customer has a dedicated
PE router that carries only its own routes. Customer segregation is achieved
through lack of routing information on the PE router. The P router contains all
customer routes and filters routing updates between different PE routers using
Border Gateway Protocol (BGP) Communities. Because each customer has a
dedicated PE router, this approach is expensive to deploy, and hence it is not
a cost-effective solution.
MPLS IP VPN
MPLS VPN is a true peer-to-peer model that combines the best
of both worlds. It unites the customer security and segregation features implemented
in the overlay model with the simplified customer routing deployed in the
traditional peer-to-peer model. The MPLS VPN architecture is very similar to
the dedicated PE router model, except the dedicated per customer routers are implemented
as virtual routing tables within the PE router. In other words, customer
segregation is achieved through the concept of virtual routing and forwarding
(VRF) whereby the PE router is subdivided into virtual routers serving different
VPNs (or customer sites). This establishes overlapping addresses in different
customer sites since each customer is now assigned an independent routing table.
The PE routers hold the routing information only for
directly connected VPNs. As a result, the size of the PE routing table is significantly
reduced. The amount of routing information is proportional to the number of
VPNs attached to the PE router. As such, the PE routing table will still grow
when the number of directly connected VPNs increases. In addition, the PE
routers participate in customer routing, ensuring optimal routing between sites
and easy provisioning. Full routing within the service provider backbone is no
longer required because multi protocol label switching (MPLS), and not
traditional IP routing, is used to forward packets.
Two types of routing tables are used in PE router. One VPN
routing table for its respective customers and Global routing table for non VPN
(IGP) routes for the routing between various PE and P routers.
No comments:
Post a Comment