framework fig 3 2
play

framework fig 3.2 +----------+ +----------+ - PowerPoint PPT Presentation

framework fig 3.2 +----------+ +----------+ +-----+ |PE router | |PE router | +-----+ | CE | | | | | | CE | | dev | Access | +------+ |


  1. framework fig 3.2 +----------+ +----------+ +-----+ |PE router | |PE router | +-----+ | CE | | | | | | CE | | dev | Access | +------+ | | +------+ | Access | dev | | of | conn. | |VFI of| | VPN tunnel | |VFI of| | conn. | of | |VPN A|----------|VPN A |======================|VPN A |----------|VPN A| +-----+ | +------+ | | +------+ | +-----+ | | | | +-----+ Access | +------+ | | +------+ | Access +-----+ | CE | conn. | |VFI of| | VPN tunnel | |VFI of| | conn. | CE | | dev |----------|VPN B |======================|VPN B |----------| dev | | of | | +------+ | | +------+ | | of | |VPN B| | | | | |VPN B| +-----+ +----------+ +----------+ +-----+ Figure 3.2: Relationship between entities in reference model (1).

  2. fig 3.3 +----------+ +----------+ +-----+ |PE router | |PE router | +-----+ | CE | | | | | | CE | | dev | Access | +------+ | | +------+ | Access | dev | | of | conn. | |VFI of| | | |VFI of| | conn. | of | |VPN A|----------|VPN A | | | |VPN A |----------|VPN A| +-----+ | +------+\| VPN tunnel |/+------+ | +-----+ | >==================< | +-----+ Access | +------+/| |\+------+ | Access +-----+ | CE | conn. | |VFI of| | | |VFI of| | conn. | CE | | dev |----------|VPN B | | | |VPN B |----------| dev | | of | | +------+ | | +------+ | | of | |VPN B| | | | | |VPN B| +-----+ +----------+ +----------+ +-----+ Figure 3.3: Relationship between entities in reference model (2). this vpn tunnel is a different thing

  3. vpn tunnels defined they keep packets destined to different vfi s separate the vpn tunnel header gets a packet to: ! vfi on the remote pe ! perhaps also next hop

  4. proposed layering +--------------------+ +--------------------+ | PE Node | | PE Node | | | VPN | | | +--------+ | Control | +--------+ | | | VPN | | Protocol | | VPN | | | | Client |<-------------------------->| Client | | | | Appl. | | | | Appl. | | | +---+----+ | | +---+----+ | | | | | | | | +-+-+-+----------+| |+-----+-+-+------+ | | | |SAP| || || |SAP| | | | | +---+ || || +---+ | | | | Core || Core || Core | | | | Connectivity || Protocols || Connectivity | | | | Services ||<============>|| Services | | | | || || | | | +----------------+| |+----------------+ | +--------------------+ +--------------------+

  5. for example + - - +---------------------------+--------+-------------+ | Private | VPN | Core | | CPT | User | Tunnel | Protocol | | Payload | Header | Headers | + - - +---------------------------+--------+-------------+ | Examples of | Exmpls.| Examples | Private User | of VPN | of Core CPT | Payload Protocols | Tunnels| Protocols ------+---------------------------+--------+-------------- -AAL5 | -Priv. addr. IPv4 | -MPLS | -MPLS LSE(s) Trlr | -Pub. addr. IPv6 | LSP | -1483 | -IPSec | -? | -IPv4 | -IPX | | -GRE | -NetBEUI | | -IPSec | -Appletalk | | -L2TP

  6. benefit ppvpn solutions must support ! without layering • n-by-m matrix of protocol interactions ! with the proposed layering • encapsulation into the vpn tunnel and of the vpn tunnel control protocols only refer to vpn tunnels vpn app. uses core connectivity

  7. ascii art rules! +---------+ +------------------------------------+ +---------+ | | | | | | | | | +------+ +------+ : +------+ +------+ : | | | | | | : | CE | | CE | : | | | P | | PE | : |device| |device| : +------+ VPN tunnel : |router| |router| : | of | | of |-:--| |================:===============| |--:-|VPN A| |VPN A| : | | : +------+ +------+ : +------+ +------+ : | PE | : | | : | +------+ : |router| Network interface | | : | | CE | : | | : +------+ : +------+ |device|-:--| |================:===============| |--:-| CE | | of | : +------+ : VPN tunnel | PE | : |device| |VPN B| : | | |router| : | of | +------+ : | | +------------+ +------------+ | | : |VPN B| | : | | | Customer | | Network | +------+ : +------+ |Customer | | | management | | management | | | : | |interface| | | function | | function | | |Customer | | | | +------------+ +------------+ | |interface| | | | | | | +---------+ +------------------------------------+ +---------+ | Access | |<---------- SP network(s) --------->| | Access | | network | | Somebody set up us the bombs | | network |

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend