Vlan-tunleling

  • Upload
    xiway

  • View
    220

  • Download
    0

Embed Size (px)

Citation preview

  • 8/3/2019 Vlan-tunleling

    1/27

    Virtual Links: VLANs and

    Tunneling

    CS 4251: Computer Networking IINick FeamsterSpring 2008

  • 8/3/2019 Vlan-tunleling

    2/27

    Why VLANs?

    Layer 2: devices on one VLAN cannotcommunicate with users on another VLANwithout the use of routers and network layeraddresses

    Advantages

    Help control broadcasts (primarily MAC-layerbroadcasts)

    Switch table entry scaling Improve network security

    Help logically group network users

    Key feature: Divorced from physical networktopology

  • 8/3/2019 Vlan-tunleling

    3/27

    VLAN basics

    VLAN configuration issues: A switch creates a broadcast domain

    VLANs help manage broadcast domains

    VLANs can be defined on port groups, users or protocols

    LAN switches and network management software provide amechanism to create VLANs

    VLANs help control the size of broadcast domainsand localize traffic.

    VLANs are associated with individual networks. Devices in different VLANs cannot directly

    communicate without the intervention of a Layer 3routing device.

  • 8/3/2019 Vlan-tunleling

    4/27

    VLAN Trunking Protocol

    VLAN trunking: many VLANs throughout anorganization by adding special tags to framesto identify the VLAN to which they belong.

    This tagging allows many VLANs to becarried across a common backbone, or trunk.

    IEEE 802.1Q trunking protocol is thestandard, widely implemented trunking

    protocol

  • 8/3/2019 Vlan-tunleling

    5/27

    Trunking: History

    An example of this in a communications networkis a backbone link between an MDF and an IDF

    A backbone is composed of a number of trunks.

  • 8/3/2019 Vlan-tunleling

    6/27

    VLAN Trunking

    Conserve ports when creating a link betweentwo devices implementing VLANs

    Trunking will bundle multiple virtual links over

    one physical link by allowing the traffic forseveral VLANs to travel over a single cablebetween the switches.

  • 8/3/2019 Vlan-tunleling

    7/27

    Trunking Operation

    Manages the transfer of frames from differentVLANs on a single physical line

    Trunking protocols establish agreement for the

    distribution of frames to the associated ports atboth ends of the trunk

    Two mechanisms

    frame filtering frame tagging

  • 8/3/2019 Vlan-tunleling

    8/27

    Frame Filtering

  • 8/3/2019 Vlan-tunleling

    9/27

    Frame Tagging

    A frame tagging mechanism assigns anidentifier, VLAN ID, to the frames

    Easier management

    Faster delivery of frames

  • 8/3/2019 Vlan-tunleling

    10/27

    Frame Tagging

    Each frame sent on the link is tagged toidentify which VLAN it belongs to.

    Different tagging schemes exist

    Two common schemes for Ethernet frames 802.1Q:IEEE standard

    Encapsulates packet in an additional 4-byteheader

    ISLCisco proprietary Inter-Switch Link protocol

    Tagging occurs within the frame itself

  • 8/3/2019 Vlan-tunleling

    11/27

    VLANs and trunking

    VLAN frame tagging is an approach that has beenspecifically developed for switched communications.

    Frame tagging places a unique identifier in theheader of each frame as it is forwarded throughoutthe network backbone.

    The identifier is understood and examined by eachswitch before any broadcasts or transmissions aremade to other switches, routers, or end-stationdevices.

    When the frame exits the network backbone, theswitch removes the identifier before the frame istransmitted to the target end station.

    Frame tagging functions at Layer 2 and requires littleprocessing or administrative overhead.

  • 8/3/2019 Vlan-tunleling

    12/27

    Inter-VLAN Routing

    If a VLAN spans across multiple devices atrunk is used to interconnect the devices.

    A trunk carries traffic for multiple VLANs.

    For example, a trunk can connect a switch toanother switch, a switch to the inter-VLANrouter, or a switch to a server with a specialNIC installed that supports trunking.

    Remember that when a host on one VLANwants to communicate with a host on another,a router must be involved.

  • 8/3/2019 Vlan-tunleling

    13/27

    Inter-VLAN Issues and Solutions

    Hosts on different VLANs must communicate

    Logical connectivity: a single connection, ortrunk, from the switch to the router

    That trunk can support multiple VLANs This topology is called a router on a stick because

    there is a single connection to the router

  • 8/3/2019 Vlan-tunleling

    14/27

    Physical and logical interfaces

    The primary advantage of using a trunk link is areduction in the number of router and switchports used.

    Not only can this save money, it can also reduceconfiguration complexity.

    Consequently, the trunk-connected routerapproach can scale to a much larger number ofVLANs than a one-link-per-VLAN design.

  • 8/3/2019 Vlan-tunleling

    15/27

    Why Tunnel?

    Security E.g., VPNs

    Flexibility Topology Protocol

    Bypassing local network engineers Oppressive regimes: China, Pakistan, TS

    Compatibility/Interoperability Dispersion/Logical grouping/Organization

    Reliability Fast Reroute, Resilient Overlay Networks (Akamai SureRoute)

    Stability (path pinning) E.g., for performance guarantees

  • 8/3/2019 Vlan-tunleling

    16/27

    MPLS Overview

    Main idea: Virtual circuit

    Packets forwarded based only on circuit identifier

    Destination

    Source 1

    Source 2

    Router can forward traffic to the same destination on

    different interfaces/paths.

  • 8/3/2019 Vlan-tunleling

    17/27

    Circuit Abstraction: Label Swapping

    Label-switched paths (LSPs):Paths are named by

    the label at the paths entry point At each hop, label determines:

    Outgoing interface

    New label to attach

    Label distribution protocol: responsible fordisseminating signalling information

    A 1 2

    3

    A 2 D

    Tag Out New

    D

  • 8/3/2019 Vlan-tunleling

    18/27

    Layer 3 Virtual Private Networks

    Private communications over a public network

    A set of sites that are allowed to communicate with

    each other

    Defined by a set of administrative policies

    determine both connectivity and QoS among sites

    established by VPN customers

    One way to implement: BGP/MPLS VPNmechanisms (RFC 2547)

  • 8/3/2019 Vlan-tunleling

    19/27

    Building Private Networks

    Separate physical network Good security properties

    Expensive!

    Secure VPNs Encryption of entire network stack between endpoints

    Layer 2 Tunneling Protocol (L2TP)

    PPP over IP No encryption

    Layer 3 VPNs

    Privacy andinterconnectivity(not confidentiality,integrity, etc.)

  • 8/3/2019 Vlan-tunleling

    20/27

    Layer 2 vs. Layer 3 VPNs

    Layer 2 VPNs can carry traffic for many differentprotocols, whereas Layer 3 is IP only

    More complicated to provision a Layer 2 VPN

    Layer 3 VPNs: potentially more flexibility, fewer

    configuration headaches

  • 8/3/2019 Vlan-tunleling

    21/27

    Layer 3 BGP/MPLS VPNs

    Isolation: Multiple logical networks over asingle, shared physical infrastructure

    Tunneling:Keeping routes out of the core

    VPN A/Site 1

    VPN A/Site 2

    VPN A/Site 3

    VPN B/Site 2

    VPN B/Site 1

    VPN B/Site 3

    CEA1

    CEB3

    CEA3

    CEB2

    CEA2CE1B1

    CE2B1

    PE1

    PE2

    PE3

    P1

    P2

    P3

    10.1/16

    10.2/16

    10.3/16

    10.1/16

    10.2/16

    10.4/16

    BGP to exchange routesMPLS to forward traffic

  • 8/3/2019 Vlan-tunleling

    22/27

    High-Level Overview of Operation

    IP packets arrive at PE

    Destination IP address is looked up in

    forwarding table

    Datagram sent to customers network using

    tunneling (i.e., an MPLS label-switched path)

  • 8/3/2019 Vlan-tunleling

    23/27

    BGP/MPLS VPN key components

    Forwarding in the core:MPLS

    Distributing routes between PEs:BGP

    Isolation:Keeping different VPNs from routingtraffic over one another Constrained distribution of routing information

    Multiple virtual forwarding tables

    Unique addresses: VPN-IP4 Address extension

  • 8/3/2019 Vlan-tunleling

    24/27

    Virtual Routing and Forwarding

    Separate tables per customer at each router

    10.0.1.0/24RD: Green

    10.0.1.0/24

    RD: Blue

    10.0.1.0/24

    10.0.1.0/24

    Customer 1

    Customer 2

    Customer 1

    Customer 2

  • 8/3/2019 Vlan-tunleling

    25/27

    Routing: Constraining Distribution

    Performed by Service Provider using route filtering basedon BGP Extended Community attribute

    BGP Community is attached by ingress PE route filteringbased on BGP Community is performed by egress PE

    Site 1

    Site 2

    Site 3

    Static route,RIP, etc.

    RD:10.0.1.0/24

    Route target: GreenNext-hop: A

    A

    10.0.1.0/24

    BGP

  • 8/3/2019 Vlan-tunleling

    26/27

    Forwarding PE and P routers have BGP next-hop reachability

    through the backbone IGP

    Labels are distributed through LDP (hop-by-hop)corresponding to BGP Next-Hops

    Two-Label Stack is used for packet forwarding

    Top label indicates Next-Hop (interior label)

    Second level label indicates outgoing interface or

    VRF (exterior label)

    IP DatagramLabel

    2

    Label

    1

    Layer 2

    Header

    Corresponds to LSP ofBGP next-hop (PE)

    Corresponds toVRF/interface at exit

  • 8/3/2019 Vlan-tunleling

    27/27

    Forwarding in BGP/MPLS VPNs

    Step 1: Packet arrives at incoming interface

    Site VRF determines BGP next-hop and Label #2

    IP DatagramLabel

    2

    Step 2: BGP next-hop lookup, addcorresponding LSP (also at site VRF)

    IP DatagramLabel2

    Label1