intek_wp

24
Cisco Systems, Inc. All contents are Copyright © 19 92 20 02 C isco System s, I nc. A ll rights reserved. I m portant Notices and Pri vacy Statem ent. Page 1 of 24 White Paper  Internet Connectivity   O ptions Introduction Internet access is perhaps one of the most popular se rvices that ServiceProvide rs offer their customers. Customers have exibil ity to purchase MPLS VPN services Internet connectivity from separate Service Providers. Customers can a lternatively offer Internet connectivi ty directly from their ne tw ork may it be from one of their remote sites or the c en t ra l site. In thelatter case, the Internet Service Provider (ISP) does not need to distinguish customer’s Internet and VPN trafc, because all trafc traversing through a Service Provider network would be MPLS VPN traf c. Customers who do not purchase Internet connectivity fro m a Service Provider do need to work out additional variables: R o ut ing Appropriate location for Internet access w ithin the netw ork Network Implementation Translation (NAT) implementation, if the network does not use public addresses Secur it y Additional managem en t and monitoring The best way to of oad these responsibil ities isto purchasese rvic es from a Service Provider . ISPs , Se rviceProviders , and customersoften wonder about the best and most highly recommended w ay to set up Internet connectivity. This varies widely, depending on the to pology, requirements, a nd available resources. This paper will illustrate the advantage s and dis advantage s of several methods, while recommending a method for the most popular network topology. This document offers a high-level analysis of themethods used to s ec urenetworks . For further analysis of MPLS security, please refer to t he draft in progress by M ichael Behringer: htt p://w w w.i etf. org / inter net-dra ft s/ draft-behringer-mpls-security-03.txt There are various possible combinations for using a network infrastructure to implement Interne t connectivity, depending on how a Service Provider carrie s MPLS VPN andInternet trafc. Theoptionsat the infrastructure level are: 1. Shared MPLS VPN and Interne t Connectivity 2. Partial ly Shared 3. Ful l Se paration Customersof a ServiceProvider can always choo se to use either multiservice or dedicated C Es, regardless of the infrastructure that the Se rvi ce Provide r has implemented. In add ition, H ub/ Spoke or fully meshed cong uration fo r customers sites can also be implemented over any aforementioned infrastructure.

Transcript of intek_wp

Page 1: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 1/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 1 of 24

White Paper 

Internet C o n n e c t i v i t y   O ptions

Intro duct io n

Internet access is perhaps one of the most

popular services that Service Providers offer

their customers. Customers have flexibility

to purchase MPLS VPN services Internet

connectivity from separate Service

Providers. Customers can a lternativelyoffer Internet connectivity directly from

their netw ork may it be from one of their

remote sites or the centra l site. In the la tter

case, the Internet Service Provider (ISP)

does not need to distinguish customer’s

Internet and VPN traffic, because all t ra ffic

traversing through a Service Provider

network would be MPLS VPN traffi c.

Customers who do not purchase Internet

connectivity fro m a Service Provider do

need to work out additional variables:

• Routing

• Appropria te location for Internet access

w ithin the netw ork

• Network Implementation Translation

(NAT) implementation, if the network

does not use public addresses

• Security

• Addit ional management and

monitoring

The best way to offload theseresponsibilities is to purchase services from

a Service Provider.

ISPs, ServiceProviders, and customersoften

wonder about the best and most highly

recommended w ay to set up Internet

connectivity. This varies widely, depending

on the to pology, requirements, a nd

ava ilab le resources. This paper will

illustrate the advantages and disadvantages

of several methods, while recommending a

method for the most popular network

topology.

This document offers a high-level analysis

of themethods used to securenetworks. For

further analysis of MPLS security, please

refer to t he draft in progress by M ichael

Behringer:

htt p://w w w.ietf. org /internet-dra ft s/

draft-behringer-mpls-security-03.txt

There are various possible combinations

for using a network infrastructure to

implement Internet connectivity, depending

on how a Service Provider carries MPLS

VPN and Internet tra ffic. Theoptionsat the

infrastructure level are:

1. Shared MPLS VPN and Internet

Connectivity

2. Partia lly Shared

3. Full Separat ion

Customersof a Service Provider can always

choo se to use either multiservice or

dedicated C Es, regardless of the

infrastructure that the Service Provider has

implemented. In add ition, H ub/Spoke or

fully meshed config uration fo r customers

sites can also be implemented over any

afo rementioned infrastructure.

Page 2: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 2/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 2 of 24

Let ’s take a look at thesemantics of each of these options and various connectivity implementation options for each

one.

Shared MPLS VPN and Internet Co nnect iv i ty  

Figure 1 shows that both P routers and PE routers support Internet and VPN traffic. A single PE router may connect

both Internet a nd VPN customers.

Figure 1. Shared MPLS V PN and Internet Co nnectivity 

• PE routers may or may not have a full Internet routing table

• PEs and Internet GW in the same iBGP area

• Sha re IG P and EG P

• MP-iBGP among PEs as appropria te

Advantages

• One backbone, one network

• Single edge router

• Easier management

• Can offer centralized services

• Single PEs to manage

Disadvantages

• Security (both EG P in the same DB)

• Performance (memory/CPU)

CE InternetMultiservice

PE

DefaultRoute

MultiservicePE

MultiservicePE

Internet GW

Shared BackboneFW

FW

CE

VPNLink

CE VPN

CE CE

Site with Dual Access

Site with Dual Access

Internet Access Only

CE

Site with IntegratedVPN/Internet Access

VPN Access Only

VPNRoutes

DefaultRoute

VPNRoutes

Multiservice

PE

Page 3: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 3/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 3 of 24

Part ia l Separat io n

Figure 2 demonstr at es tha t P rout ers are shared, b ut use separat e PE routers for Internet and VPN services. Tw ointerfaces w ill be required on a CE t o terminate tw o types of connections on separat e PEs.

Figure 2. Partial Separation

F ull S eparat io n

Figure 3 shows neither PE nor P routers are shared. Internet and VPN traffic run over completely separate backbones.

Figure 3. Full Separation

CE Internet

Internet PE

PE

Internet PE PE VPN

PE

Internet PE

Internet GW

Shared Backbone

FW

FW

CE Internet

VPN

CE VPN

CE CE

Site with Dual Access

Internet Access Only

MultiserviceCE

Site with IntegratedVPN/Internet Access

VPN Access

DefaultRoute

VPN

Routes

DefaultRoute

VPNRoutes

CE Internet

PE Internet

PE VPN

DefaultRoute

PE VPN PE VPN

PE VPN

PE Internet

Internet GW

Internet Domain

VPN Domain

FW

FW

Internet

VPNLink

CE VPN

Site with Dual Access

Site with Dual AccessVPN

Routes   VPNRoutes

DefaultRoute

Page 4: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 4/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 4 of 24

Advantages

• Physical separation between Intranet/Extranet and Internet• Sepa ra te IG P a nd EG P

Disadvantages

• Need to mainta in two separate networks

• May not be an economical solution

Over the infrastructures mentioned ab ove, Internet connectivity can b e obta ined via:

1. Customer Managed Internet Access

2. Simple Solution

3. Sub-interfaces

4. Fir ew a ll5. Mult iple ISPs

6. per VRF NAT w ith a separate Internet G atewa y

7. VRFLite(MultiVRF) CE

These represent a high level implementation. Several additional components need to be selected for each option, as

they play an important role. Rout ing, firewall, and address transla tion are each key components. These could be in

an overlapping or single VPN environment.

Routing

Location o f Internet routing ta ble.

Address Translation

Most ISPs need to solve the issue of address translation deployment, because most customers combine public and

private addresses. NAT could be deployed at CPE side, per VRF at centralized PE that connects to the Internet

gat ewa y (NAT-PE), or any oth er PE in the pa th previous to the NAT-PE.

Firewall

Security is thesinglemost important concern for customers when they connect to public networks; therefore, firewall

deployment is a necessity. An appropriate location should be selected for a firewall to block unauthorized traffic into

a customer’s private netw ork. There are several criteria to select w hen deploying a fi rewa ll:

• Managed vs. unmanaged by an ISP

• Shared vs. dedicated per-customer sites

• Network- vs. router-based

– Netw ork-based: appliance (ie: Cisco PIX)

– Router-based: Cisco IOS Software

Several permutations are possible based on these criteria:

1. No NAT, no firewall

2. NAT, but no firewall

Page 5: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 5/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 5 of 24

3. Firewa ll, but no NAT

4. NAT and firewa l lThis list could continue if combined w ith various locatio ns for d eployment. This document w ill briefly cover a few 

popular scenarios and later focus on the most practical one in detail.

C u s t o m e r M a n a g e d In t e r n e t A c c e s s

This scenario ha s existed since the advent o f the Internet. Custo mers manage their fi rew all, N AT, and ro uting fo r

Internet connectivity. C ustomers can ha ve one or more ga tewa ys to the Internet, depending on their infrastructure

(Centralized o r D istributed). This approach gives customers complete control of the netwo rk.

Simple So lut io n

As the name implies, this is the simplest setup. It is also kno w n as Stat ic Defa ult Ro uting on a PE.

When a customer usesglobal addressspace, NATis not required. If a customer uses privatea ddress space, NATcould

bedeployed a t a CPE, on a PEtha t is direct ly connected to VPN CPE, or on a PE tha t act sas a ga teway to the Internet

within an ISP network.

CPE does not need to receive full Internet rout ing in the simple solut ion. For CPE-PE, rout ing is handled on the PE

that is directly connected to a VPN -CP E for distributing routes within a VPN . Betw een PE and CP E, static route,

RIPv2, OSPF or eBGP can be used to update rout ing informat ion. No addit ional configurat ion isrequired on a CPE,

provided that it ha s a default static route to the PE to reach the Internet.

Figure 4. S imple Solution

Service ProviderCisco MPLS—VPN Network 

VPN-A

Internet

VPN-B

VPN-A

VPN-A

VPN-B

VPN-B

VPN-A

CE

CE

VPN-B

CE

CE

CE

CE

CE

CE

PE1

PE2

Internet GW

Internet Routing Table

PE3

PE4

Page 6: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 6/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 6 of 24

Figure 4 shows a full mesh topo logy w here various VPN sites connect to a djacent PEs. Internet routing tab le is

present o nly o n Internet-G W.

VPN to Internet v ia Sub - inter fac es

Some ISP customers may prefer to exchange routes directly with the Internet . In another words, VPN sites will need

to exchange routes directly with theInternet . I t is important to insta ll routes from customer VPN sites in theG lobal

rout ing table and to advert ise full or part ia l Internet rout ing table to customer VPN site. Thus full or part ia l Internet

routes should be present on PEs that physically connect to VPN sites. For a PE to distribute routes from a global

routing ta ble to a VPN site, there must be a second interface tha t is not bo und to a VRF.

Figure 5. VPN to Internet via S ub-Interface

This interfacecan be a sub-interface, tunnel interface, or separate physical interface. One interfaceor a sub-interface

can carry VPN traffic and other Internet tra ffic. Figure 5 shows various customers sites using separate interfaces for

VPN and Internet tra ffic. In this case, separate BGP sessions are required between PE- and CE-routers for VPN and

Internet tra ffi c. The draw back w ith this implementat ion is VPN customers w ith these requirements will have

recurring costs for additional links. ISPs will need to distribute Internet routes to the participating PEs, which will be

carrying larger routing tab les and in turn requiring more router resources. Co mplexity a lso increases on PE

confi guration side. ISPs w ill need to fi lter Internet routes for non-participating PEs.

Internet ac cess v ia F irew al l

A firewall can be deployed at many points within the network to protect VPN traffic from the Internet traffic. It is

usually present at theISP site, behind theInternet gatewa y facing theInternet. This firewall would be shared amongst

the ISP custom ers, leaving t hem w ith limited choices.

Service ProviderCisco MPLS—VPN Network 

VPN-A

VPN Traffic

VPN Traffic

VPN Traffic

VPN Traffic

Internet Traffic

Internet Traffic

Internet Traffic

Internet Traffic

Internet

VPN-A

VPN-B

VPN-BCE

CE

CE

CE

PE1

PE2

Internet GW

Internet Routing Table

PE3

PE4

Page 7: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 7/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 7 of 24

If a VPN topology w ere fully meshed, then deploying a fi rewa ll at every site facing the ISP netw ork could be one

solution. If a customer topo logy fo llowed the central site (hub/spoke) model, then deploying a fi rewa ll at the H ub

site w ould be sufficient. In the latter case, VPN sites w ould import a default route to the central site CE, w hich is

generated a nd upda ted by t he central site CE.

Figure 6 shows a hub/spoke topology w here a C isco IO S firew all is deployed on a. C E router at a hub site.

Figure 6. Internet Ac cess via Firewall

Notice, Internet tra ffic from any Spoke VPN sites need to pass through a firewall . Since the centra l site is providing

fi rewa ll services (as show n in fi gure 6), a static default route pointing to the central site firew all should be installed

in associated FIB tables for each spoke sites.

Multiple ISPs

Some customers may choose to obtain Internet Connectivity via different ServiceProviders. Several combinationsare

possible depending o n w hether the custom er netwo rk uses full mesh or hub and spoke model. In either case, exit

points in thenetwork needs to be planned out so that tra ffic load isw ell distr ibuted. Exit point willbe selected based

on the best path determined by a routing protocol.

Figure 7 show s an example wh ere C ustomer1 has Internet connectivity a nd M PLS/VPN services fro m ISP1. MPL S/

VPN and Internet tra ffic is routed over separate interfaces. There is another exit point for Internet tra ffic at the hub

site which is routed via Service Provider ISP2 netw ork.

Service ProviderCisco MPLS—VPN Network 

VPN-ACentral Site Hub Internet

Gateway

Internet

VPN-BCentral Site Hub

VPN-ASpoke

VPN-ASpoke

VPN-B

Spoke

VPN-BSpoke

VPN-ASpoke

CE

CE

CE

CE

CE

PE1

PE2

PE5

PE3

PE4

Page 8: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 8/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 8 of 24

Figure 7.

Internet ac cess v ia per VR F N AT w i th a separate Internet Ga tew ay 

This scenario fo llow s principles of M PLS Ma nag ed Shared Services model. It consists of:

• Centralized single NAT-PE with per VRF NAT for separat e VPNs

• Internet routing table on the Internet G ateway

• To po lo gy

– Fully meshed: non-overlapping VPNs w ith private addresses

– H ub and Spoke: non-overlapping VPNs w ith private add resses

• In fra st ruct ure

– Multiservice (shared) for M PLS VPN and Internet connectivity

This implementation allow s:

• The ISP to load share with Internet Ga teway

• Physically separate VPN and Internet routing tables

• No other PE in the cloud wo uld have to maintain Internet routing table

• No restrictions for the customer of using public or private addresses

• Separat e NAT functionality allow ing more services take adva ntage of one NAT-PE

ISP customers can offload NATresponsibility to their ISPs. ISPs can expand their services portfolio and subsequently

increase revenue.

ISP2

InternetVPN-ASpoke2

VPN-A

ISP1

PE1 PE3

C

PE4

PE2

Customer 1Hub Site

  InternetGateway

Internet

Page 9: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 9/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 9 of 24

Case A: with Fully Meshed Topology

Figure 8 show s part of a typical Service Provider netwo rk. Several geogra phically dispersed customer sites are partof VPN -A and VPN -B. Some of these sites connect directly to the NAT-PE w here address tra nslatio n ta kes place.

Ot hers connect via vario us PEs. The interface directly connecting to the Internet G atew ay w ill be the outside

interface.

The interfaces connecting to other PEs or adjacent VPN sites will be inside interfaces.

Figure 8. Per V RF NAT w ith fully meshed V PN sites

CE-PE

Use static default route for VPN and Internet tra ffi c to directly connected PE.

PE

The PE does not ca rry a ny Internet routes. They only carry routes for a ppropriate VPN sites and t he backbone.

VPN-A

VPN-A

VPN-A   VPN-A

VPN-B

VPN-B

VPN-B

VPN-B

10.1.4x/24

10.1.1x/24

10.1.2x/24 10.1.5x/24

10.1.3x/24

CE4A

NAT-PE

Service Provider

Cisco MPLS—VPN Network 

CE4B

CE1A

VPN-A

CE3A

CE1B

VPN-B

CE3B

CE2A

CE2B

CE5A

CE5B

PE1

PE2

PE3

PE5

InternetGateway

Internet

Page 10: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 10/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 10 of 24

A default static route is applied to participating PEs FIB tables that are associated with customers’ VRFs, which need

to support Internet connectivity service. The next-hop address used in the static route is an address of the interface

from which theInternet routes arelearned, ra ther than an address of theloopbackinterface on theInternet Gateway.

This will eliminate sub-optimal routing a nd t he possibility of black-holing tra ffi c designated for the Internet. The

route to this interface would be know n via IG P.

The oth er optio n is to use the next-hop ad dress of t he NAT-PE. The NAT-PE w ould neighbo r w ith t he Internet

G atew ay, so it can get updates on addresses used on t he Internet Ga tewa y. This will avoid the distribution of a ny

subnets of Internet Gateway to thePEs. The drawback to this option is similar to that of using the next-hop address

of a loopback interface. Alternat ively, this should not be a concern if the back-up interfaces are used on the Internet

Gateway.

Additionally, the next-hop of the default static route w ill be present in the globa l routing ta ble, but not in the VRF

table. Since there is no redistribution between IPv4 and VPN-IPv4 routes, additional technique is required to resolve

thenext-hop address for theInternet Gateway from within a VRF. This isachieved by using ‘global ’ keyword within

the static default route configuration on an appropriate PE.

All the traffi c is forw arded w ith the appropriate VPN label att ached. The need for this is dictated by overlapping

privat e IP ad dresses that have no t been translat ed to unique public IP ad dresses. When NAT-PE receives these

packets, it needs to recognize the associated VPN , so it can select a ppropriate pools for t ranslation.

NAT-PE

NAT occurs on t he NAT-PE fo r all custo mers that use private ad dresses and need Internet conn ectivity. In this

scenar io, the ISP has only one Internet G at ewa y tha t is directly connected to the NAT-PE.

Since the transla tion occurs on a dedicated N AT-PE, translat ed public addresses could be upda ted by mean s of

routing protocol to the neighbor Internet G atew ay, via IGP to fo rw ard the returned traffi c from the internet toappropriate VPN s. Internet G atew ay w ill forw ard the response traffi c ba ck to t he NAT-PE. N AT-PE w ill translate

add resses back to the original private IP add resses, and then forw ard t he traffi c to the appropriate VPNs.

The other opt ion is to follow the distr ibuted model and deploy per VRF NAT on PEs where VRFs are present . This

would complicate configuration and make management of IP address pools awkward.

Note: thereare no MP-iBGP sessions set up between thePEsand theInternet Gateway. TheInternet Gateway does

not ha ve any know ledge of VPNs. It receives packets as IPv4 packets from t he NAT-PE, and forw ards the return

tra ffi c to the NAT-PE. Upo n receiving the packets, NAT tra nslatio n occurs aga in on out side to inside path.

• The Internet services interfaces should be confi gured as N AT outside on the N AT-PE.

• The VRFinterfaces and core facing MPLS-enabled interface should be configured as NAT insideon theN AT-PE

• The interface connecting to the Internet G ateway is a non-VRF interface.

Inside to O utside packet fl ow on t he NAT-PE:

Tran slatio ns will ta ke place on th e NAT-PE interfa ce that is physically conn ected to the Internet G at ewa y.

As a packet arrives on the NAT-PE destined for the Internet:

• Route lookup occurs

• NAT receives the packet

• NAT translates the packet

Page 11: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 11/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 11 of 24

• Stores the VRF table ID in the translation entry

• Packet is switched to the egress interfaceOutside to Inside packet flow on the NAT-PE:

NAT receives the packet before routing and performs lookup on the translation table. NAT performs the reverse

translation, and also sets the VRF table ID in the packet descriptor header. This enables the subsequent route lookup

to occur on theright Forwarding Informat ion Block (FIB). I f theoutgoing interface is in a VRFon thesamePE, then

the packet is forwarded as an IP packet . I f the dest ina tion is on a remote PE, then the packet is imposed with labels

and forwarded on the core facing interface.

Internet Gateway

The Internet G ateway holds full Internet routes, translated networks, and appropriate backbone routes. It forwards

IP packets to and fro m the NAT-PE to t he Internet.

Configuration Check List

In addition to the basic IGP, VRF, and M P-iBG P configura tion:

1. Static default route with ‘global’ keyw ord option on a participating PE pointing to the next-hop address of the

Internet Gateway.

2. NAT on a NAT-PE for every VRF. C ould use same or dedicated poo l per VRF.

– Dedicated pools are used in this example.

3. Static route pointing to each VRFs on a NAT-PE.

VPN-A and VPN-B use overlapping private address space.

NAT-PE Sample Configurationhostname NAT-PE

!

ip nat pool pool1 171.1.1.2 171.1.254.254 mask 255.255.0.0

ip nat pool pool2 171.2.1.2 171.2.254.254 mask 255.255.0.0

!

ip nat inside source list 1 pool pool1 vrf VPN-A

ip nat inside source list 1 pool pool2 vrf VPN-B

!

ip route vrf VPN-A 171.1.0.0 0.0.255.255 ge1/0

ip route vrf VPN-B 171.2.0.0 0.0.255.255 ge1/0

!(ge1/0 is the Gigbit Ethernet interface on Internet Gateway which is directly

!connected to the NAT-PE).

Interface ge1/0description interface directly connected to the Internet Gateway

ip nat outside

!

Interface ge1/1

description interface to another PE

ip nat inside

!

access-list 1 permit 10.1.0.0 0.0.255.255

No tice, no N AT confi guration required on a ny other C Es or PEs. C onfi gure PEs for a ppropriate MP-iBGP sessions

w ith N AT-PE and other PEs w here additional sites belonging to the same VPNs are locat ed.

Page 12: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 12/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 12 of 24

CASE B: with Hub & Spoke Topology

Figure 9. Hub and Spoke Topology 

Note: in this topo logy (Figure 9), CE1A and C E1B are H ub sites, w hile the rest are spoke sites. The requirement

is that a ll spoke traffic must be forwarded via Hub site to theappropria te dest inat ion. Theonly dif ference hereis that

on PE2, PE3, NAT-PE and PE5, the next hop in the defaul t st a tic route wi ll be tha t o f CE1A’s in ter face for the si tes

in VPN-A and CE1B’s for the si tes in VPN-B. The next hop address used on PE1 will be tha t o f the inter face facing

the Internet on the Internet G atew ay.

The rest of t he process for f orw ard ing/receiving the Internet tra ffi c to an d fro m the NAT-PE fro m PE1 w ill be the

same as described in CaseA. The only dif ference is that a Service Provider must ensure that PE1 (PE serving the Hub

site) can support the traffi c load.

VRFLite(MultiVRF) CE

I f VRF Lite is deployed at a customer site, Internet connectivity st il l can be offered by combining #1 with VRF Lite.

Overlapping address space is supported in VRF Lite, because routing-forwarding tables are kept separate on a VRF

C E for each VPN . If ad dress translat ion is required, it ca n be performed using a N AT-PE (see Ca se #6).

VPN-A

Spoke

Spoke

Spoke Spoke

Spoke

Spoke

Spoke

Spoke

HUB

HUB

VPN-A

VPN-A   VPN-A

VPN-B

VPN-B

VPN-B

VPN-B

10.1.4x/24

10.1.1x/24

10.1.1x/24

10.1.2x/24

10.1.2x/24

10.1.5x/24

10.1.3x/24

10.1.3x/24

CE4A

NAT-PE

Service ProviderCisco MPLS—VPN Network 

CE4B

CE1A

VPN-A

CE3A

CE1B

VPN-B

CE3B

CE2A

CE2B

CE5A

CE5B

PE1

PE2

PE3

PE5

InternetGateway

Internet

Page 13: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 13/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 13 of 24

The follow ing example demonstra tes a Service Provid er offering Internet connectivity over VRF Lite:

• There are 2 PE routers in the network and one CE, 2611 configured for VRF-lite• In this case study, all sub-interfaces off the 2621-CE6 can communicate w ith VXR-CE, but not with each

other.2611-CE5 can communicate with VXR-CE, but not with any host off 2621-CE6All tra ffic off 2611-CE-4

is segmented into 5 separate VRFs (labeled vrflite1-5)

• These two connections use OSPF as therouting protocol to exchange updates with 2611-CE4, (but other rout ing

protocols may be used a s well).

• All other hosts off 2611-CE4 use a combination of O SPF, EBGP, RIPv2 and static routes.

Topology

Figure 10. VRF Lite

SeparateFIB tables are maintained on 2611-CE-4 for each VRFs. Figure 11, shows detailed connectivity information

betw een 3640-PE1 and 2611-C E-4(VRF Lite C E). Not ice, there is no separa te sub-interfa ce for Internet tra ffi c.

VXR-CEVRF V1510.15.44.4

10.13.1.483640-PE2

3640-PE110.13.1.65

NAT-PE

InternetGW

10.13.1.61

10.1.65.x

10.13.1.742611-CE-4VRF Lite

VRF Lite1

VRF Lite2

2621-CE-6-e0/1.1110.10.1x

2621-CE-6-e0/1.1210.10.2x

VRF Lite32621-CE-6-e0/1.1310.10.3x

VRF Lite4

2621-CE-6-e0/1.14

10.10.43x

VRF Lite5

2621-CE-5

MPLS Core

Internet

Page 14: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 14/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 14 of 24

Internet a nd VPN traffi c from each VRFLite sites(VRFLite1, VRFLite2… etc.), w ill be sent on their associated

sub-interfaces from 2611-CE-4 to 3640-PE1. Default static route for the Internet, is present in each FIB table on

2611-C E-4 and 3640-PE1. Thus returning Internet tra ffi c for each o f the VRF Lite Site, w ill go over the associated

sub-interfa ce from 3640-PE1 to 2611-CE-4. Appropria te FIB tab les w ill be consulted on 2611-CE-4 before

forw arding the traf fi c to remote VRFLite sites (ie: VRFLite1, VRFLite2.).

Figure11. VRF Lite CE-PE

M appings betw een VRFs on 2640-PE1 and 2611-C E-4:

Configurations for Some CE and PE Routers

3640-PE1

3640-PE-WEST-1#sh run

hostname 3640-PE-WEST-1

ip subnet-zero

!

ip vrf v11

 rd 11:1

 route-target export 11:1

 route-target import 11:1

!

ip vrf v12

 rd 12:1

 route-target export 12:1

 route-target import 12:1

!

ip vrf v13

 rd 13:1

 route-target export 13:1

 route-target import 13:1

!

ip vrf v14

 rd 14:1

 route-target export 14:1

3640-PE1 VRFs 2611-C E-4 VRFs

v11 vrflite1

v12 vrflite2

v13 vrflite3

v14 vrflite4

v15 vrflite5

VRF v11int s2/0:0.1, 10.1.65.5

3640-PE1

VRF v12int s2/0:0.2, 10.1.65.9

VRF vrflite1int s0/0.1, 10.1.65.6

VRF vrflite2

int s0/0.1, 10.1.65.10

Internet & VPN traffic fromVRFLite2 site: 10.10.1.x

Internet & VPN traffic from

VRFLite2 site: 10.10.2.x

Page 15: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 15/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 15 of 24

 route-target import 14:1

!

ip vrf v15 rd 15:1

 route-target export 15:1

 route-target import 15:1

!

ip cef

!

controller T1 2/0

 framing esf

 linecode b8zs

 channel-group 0 timeslots 1-24

!

interface Loopback0

description Router ID 

 ip address 10.13.1.65 255.255.255.255

!

interface FastEthernet1/0

description FE to GSR-P-CENTRAL-A - 4.16 

 ip address 10.13.4.18 255.255.255.252

 duplex auto

 speed auto

!

interface Serial2/0:0

description T1 connection to CE - VRF_Lite

 no ip address

 encapsulation frame-relay

!

interface Serial2/0:0.1 point-to-point

description PE to VRF_Lite CE connection 1

 ip vrf forwarding v11 ip address 10.1.65.5 255.255.255.252

 frame-relay interface-dlci 21

!

interface Serial2/0:0.2 point-to-point

description PE to VRF_Lite CE connection 2

 ip vrf forwarding v12

 ip address 10.1.65.9 255.255.255.252

 frame-relay interface-dlci 22

!

interface Serial2/0:0.3 point-to-point

description PE to VRF_Lite CE connection 3

 ip vrf forwarding v13

 ip address 10.1.65.13 255.255.255.252

 frame-relay interface-dlci 23

!

interface Serial2/0:0.4 point-to-point

description PE to VRF_Lite CE connection 4

 ip vrf forwarding v14

 ip address 10.1.65.17 255.255.255.252

 frame-relay interface-dlci 24

!

interface Serial2/0:0.5 point-to-point

description PE to VRF_Lite CE connection 5

 ip vrf forwarding v15

 ip address 10.1.65.21 255.255.255.252

Page 16: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 16/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 16 of 24

 frame-relay interface-dlci 25

!

router ospf 15 vrf v15 log-adjacency-changes

 area 15 virtual-link 220.1.65.22

 redistribute bgp 1 subnets

 network 10.1.65.20 0.0.0.3 area 15

!

router ospf 11 vrf v11

 log-adjacency-changes

 area 11 virtual-link 220.1.65.6

 redistribute bgp 1 subnets

 network 10.1.65.4 0.0.0.3 area 11

!

router ospf 12 vrf v12

 log-adjacency-changes

 redistribute bgp 1 subnets

 network 10.1.65.8 0.0.0.3 area 12

!

router ospf 13 vrf v13

 log-adjacency-changes

 redistribute bgp 1 subnets

 network 10.1.65.12 0.0.0.3 area 13

!

router ospf 14 vrf v14

 log-adjacency-changes

 redistribute bgp 1 subnets

 network 10.1.65.16 0.0.0.3 area 14

!

router ospf 1

 log-adjacency-changes

 network 10.13.1.65 0.0.0.0 area 6 network 10.13.4.16 0.0.0.3 area 6

!

router bgp 1

 no synchronization

 no bgp default ipv4-unicast

 bgp log-neighbor-changes

 neighbor 10.13.1.48 remote-as 1

 neighbor 10.13.1.48 update-source Loopback0

 neighbor 10.13.1.48 activate

 neighbor 10.13.1.61 remote-as 1

 neighbor 10.13.1.61 update-source Loopback0

 neighbor 10.13.1.61 activate

 no auto-summary

 !

 address-family ipv4 vrf v15

 redistribute ospf 15

 default-metric 10

 no auto-summary

 no synchronization

 exit-address-family

 !

 address-family ipv4 vrf v14

 redistribute ospf 14 match internal external 1 external 2

 default-metric 10

 no auto-summary

Page 17: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 17/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 17 of 24

 no synchronization

 exit-address-family

 ! address-family ipv4 vrf v13

 redistribute ospf 13 match internal external 1 external 2

 default-metric 10

 no auto-summary

 no synchronization

 exit-address-family

 !

 address-family ipv4 vrf v12

 redistribute ospf 12 match internal external 1 external 2

 default-metric 10

 no auto-summary

 no synchronization

 exit-address-family

 !

 address-family ipv4 vrf v11

 redistribute ospf 11

 default-metric 10

 no auto-summary

 no synchronization

 exit-address-family

!

 address-family vpnv4

 neighbor 10.13.1.48 activate

 neighbor 10.13.1.48 send-community extended

 neighbor 10.13.1.61 activate

 neighbor 10.13.1.61 send-community extended

 no auto-summary

 exit-address-family

!ip classless

no ip http server

ntp clock-period 17179973

end

2611-CE-4

2611-CE-4#sh run

hostname 2611-CE-4

!

ip vrf vrflite1

 rd 81:81

 !

ip vrf vrflite2

 rd 82:82

 !

ip vrf vrflite3

 rd 83:83

 !

ip vrf vrflite4

 rd 84:84

 !

ip vrf vrflite5

 rd 85:85

!

ip cef

Page 18: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 18/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 18 of 24

frame-relay switching

cns event-service server

!interface Loopback0

description Router ID 

 ip address 10.13.1.74 255.255.255.255

!

interface Serial0/0

description T1 connection to PE - VRF_Lite

 no ip address

 encapsulation frame-relay

 no fair-queue

 service-module t1 clock source internal

 service-module t1 timeslots 1-24 speed 56

 frame-relay intf-type dce

!

interface Serial0/0.1 point-to-point

description VRF_Lite CE to PE connection 1

 ip vrf forwarding vrflite1

 ip address 10.1.65.6 255.255.255.252

 frame-relay interface-dlci 21

!

interface Serial0/0.2 point-to-point

description VRF_Lite CE to PE connection 2

 ip vrf forwarding vrflite2

 ip address 10.1.65.10 255.255.255.252

 frame-relay interface-dlci 22

!

interface Serial0/0.3 point-to-point

description VRF_Lite CE to PE connection 3

 ip vrf forwarding vrflite3

 ip address 10.1.65.14 255.255.255.252 frame-relay interface-dlci 23

!

interface Serial0/0.4 point-to-point

description VRF_Lite CE to PE connection 4

 ip vrf forwarding vrflite4

 ip address 10.1.65.18 255.255.255.252

 frame-relay interface-dlci 24

!

interface Serial0/0.5 point-to-point

description VRF_Lite CE to PE connection 5

 ip vrf forwarding vrflite5

 ip address 10.1.65.22 255.255.255.252

 frame-relay interface-dlci 25

!

interface Ethernet0/1

description Subinterfaces to Host CE 

 no ip address

 half-duplex

!

interface Ethernet0/1.11

description VRF_Lite CE to host 1 (dup addr)

 encapsulation dot1Q 11

 ip vrf forwarding vrflite1

 ip address 10.10.1.1 255.255.255.0

!

Page 19: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 19/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 19 of 24

interface Ethernet0/1.12

description VRF_Lite CE to host 2

 encapsulation dot1Q 12 ip vrf forwarding vrflite2

 ip address 10.10.2.1 255.255.255.0

!

interface Ethernet0/1.13

description VRF_Lite CE to host 3

 encapsulation dot1Q 13

 ip vrf forwarding vrflite3

 ip address 10.10.3.1 255.255.255.0

!

interface Ethernet0/1.14

description VRF_Lite CE to host 4

 encapsulation dot1Q 14

 ip vrf forwarding vrflite4

 ip address 10.10.4.1 255.255.255.0

!

interface Ethernet1/0

description VRF_Lite CE to host 5 (dup addr)

 ip vrf forwarding vrflite5

 ip address 10.10.1.1 255.255.255.0

 half-duplex

!

router ospf 11 vrf vrflite1

 log-adjacency-changes

 area 11 virtual-link 220.1.65.5

 network 10.10.1.0 0.0.0.255 area 0

 network 10.1.65.4 0.0.0.3 area 11

!

router ospf 12 vrf vrflite2

 log-adjacency-changes redistribute rip subnets

 network 10.1.65.8 0.0.0.3 area 12

!

router ospf 13 vrf vrflite3

 log-adjacency-changes

 redistribute bgp 13 subnets

 network 10.1.65.12 0.0.0.3 area 13

!

router ospf 14 vrf vrflite4

 log-adjacency-changes

 redistribute connected

 redistribute static subnets

 network 10.1.65.16 0.0.0.3 area 14

!

router ospf 15 vrf vrflite5

 log-adjacency-changes

 area 15 virtual-link 220.1.65.21

 network 10.10.1.0 0.0.0.255 area 0

 network 10.1.65.20 0.0.0.3 area 15

!

router rip

 version 2

 !

 address-family ipv4 vrf vrflite2

 version 2

Page 20: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 20/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 20 of 24

 redistribute ospf 12

 network 10.10.2.0

 default-metric 1 no auto-summary

 exit-address-family

!

router bgp 13

 bgp log-neighbor-changes

 !

 address-family ipv4 vrf vrflite5

 no auto-summary

 no synchronization

 exit-address-family

 !

 address-family ipv4 vrf vrflite4

 no auto-summary

 no synchronization

 exit-address-family

 !

 address-family ipv4 vrf vrflite3

 redistribute ospf 13 match internal

 neighbor 10.10.3.2 remote-as 3

 neighbor 10.10.3.2 activate

 no auto-summary

 no synchronization

 network 10.10.3.0

 exit-address-family

 !

 address-family ipv4 vrf vrflite2

 no auto-summary

 no synchronization

 exit-address-family !

 address-family ipv4 vrf vrflite1

 no auto-summary

 no synchronization

 exit-address-family

!

ip classless

ip route vrf vrflite4 10.4.4.0 255.255.255.0 10.10.4.2

2611-CE-5

2611-CE-5#sh run

hostname 2611-CE-5

!

ip cef

!

interface Loopback0

description Router ID 

 ip address 10.13.1.75 255.255.255.255

!

interface Ethernet1/0

description Host to VRF_Lite CE 5 (dup addr)

 ip address 10.10.1.2 255.255.255.0

 half-duplex

!

router ospf 5

Page 21: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 21/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 21 of 24

 log-adjacency-changes

 network 10.10.1.0 0.0.0.255 area 0

!ip classless

2621-CE-6

hostname 2621-CE-6

!

memory-size iomem 30

ip subnet-zero

ip cef

!

interface Loopback0

description Router ID 

 ip address 10.13.1.76 255.255.255.255

!

interface Loopback41

description Host 4 loopback 1

 ip address 10.4.4.1 255.255.255.252

!

interface Loopback42

description Host 4 loopback 2

 ip address 10.4.4.5 255.255.255.252

!

interface Loopback43

description Host 4 loopback 3

 ip address 10.4.4.9 255.255.255.252

!

interface Ethernet0/1

description Subinterfaces to VRF-Lite CE 

 no ip address

 half-duplex!

interface Ethernet0/1.11

description Host to VRF_Lite CE 1 (dup addr)

 encapsulation dot1Q 11

 ip address 10.10.1.2 255.255.255.0

!

interface Ethernet0/1.12

description Host to VRF_Lite CE 2

 encapsulation dot1Q 12

 ip address 10.10.2.2 255.255.255.0

!

interface Ethernet0/1.13

description Host to VRF_Lite CE 3

 encapsulation dot1Q 13

 ip address 10.10.3.2 255.255.255.0

!

interface Ethernet0/1.14

description Host to VRF_Lite CE 4

 encapsulation dot1Q 14

 ip address 10.10.4.2 255.255.255.0

!

router ospf 1

 log-adjacency-changes

 network 10.10.1.0 0.0.0.255 area 0

!

Page 22: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 22/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 22 of 24

router rip

 version 2

 network 10.10.2.0!

router bgp 3

 bgp log-neighbor-changes

 neighbor 10.10.3.1 remote-as 13

 neighbor 10.10.3.1 update-source Ethernet0/1.13

!

ip classless

ip route 10.1.65.16 255.255.255.252 10.10.4.1

C l o s i n g R e m a r k s

Internet accessis the most basic and common requirement for many businesses. By offering additional sets of services

to their customers across VPNs, Service Providers can increase services portfolio, differentiate themselves from their

competition, increase customer satisfaction, and increase revenue.

This document assessed several methods available to provide Internet connectivity; including the advantages and

drawbacks associated with each method.

In any case, Service Providers can select themost appropria te way of providing this service, based on their topology

and customer requirements.

An Enterprise (ISP) customer should consider these fact ors w hen selecting Internet a ccess:

1. Multiple ISPs, only getting Internet connectivity: set up Enterprise netw ork to use the best BG P path to t he

Internet exit points.

2. Mult iple ISPs, get t ing MPLS VPN and Internet connectivity through one and only Internet connectivity through

other: set up their network t o use best BPG path to Internet exit points.

3. Same ISP for MPLS VPN and Internet connectivity:

– Two sub-Interfaces from a CE to thesame PE or two sub-interfaces to two separate PEs: default route for the

Internet tra ffi c over one sub-interface. Static or dy namic routes with a PE for M PLS VPN over another

Sub-interface.

– Over one Interface: stat ic route for Internet tra ffi c, dynam ic routes for M PLS VPN.

4. SameISP, but want a ll INET routes: do eBGP session with ISP ’s Internet GW. This could be done with 3a or 3b.

ISPs must consider the follow ing checklist wh ile designing a netw ork to support Int ernet connectivity service:

1. Shared, full separat ion, or part ia l separat ion (multiservice or not?)at theinfrastructure level for VPN traffic and

Internet traffic

2. Overlapping or non-overlapping VPNs

3. VRF or non-VRF interface for Internet a ccess

4. Huba nd spoke or fully-meshed topology

5. Public versus private addresses

6. Centralized or d istributed N AT; single or multiple centralized N AT PEs

Page 23: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 23/24

Cisco Systems, Inc.

All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.

Page 23 of 24

7. Fir ew a ll:

– Ma naged or unmanaged– Location

– Type (integrated in C isco IOS Softw are o r a ppliance-based)

8. Use of a global routing table or a static route to separate and forward traffi c

9. Internet routing table location

– CEs or PEs

– Single or multiple Internet ga tewa ys

10. Static or dynamic routing between CEs and PEs

Security Considerations

In a multiservice environment, VPN a nd Internet traf fi c share the same wire. It is critical that a Service Providerimplement strong security policies to ensure VPNs a re not threatened by Internet t raffi c.

When possible, use several o f the fo llow ing techniq ues:

• Mult iple layers of filtering

• An ti-spo ofin g

• SSH

• Intrusion detection

• Mult i-virus scanning

• R a te-lim it in g

• Route filtering within a VPN

• Limiting numbers of routes within a VPN

• R out e da mpen in g

• MD 5 authentication for routing protocols

• Physical separation of Internet and VPN routes

In any case, the provider should assure invisibility of edge and core to the Internet, a s well to the VPN netw orks.

As specifi ed in RFC 2547 (and a s discussed in draf t-behringer-mpls-security-07.tx t) MPLS netw ork guar ant ees:

• Address space, Routing and Traffi c separation

• Inv isible SP core

• Resist ance to a t tacks

MP LS netwo rk do es not a ddress basic security concerns such as securing netw ork elements aga inst:• M isco nfigur ed C o re

• Interna l core a tt acks

• Externa l core a tt acks

• Attacks to VPNs from the same VPNs

• Unauthorized access

Thus, additional security measurements as mentioned above should be considered.

Page 24: intek_wp

8/12/2019 intek_wp

http://slidepdf.com/reader/full/intekwp 24/24

Corporate HeadquartersCisco Systems, Inc.170 West Tasm an D riveSan Jo se, CA 95134-1706USAwww.cisco.comTel: 408 526-4000

800 553-NETS (6387)Fax: 408 526-4100

European HeadquartersCisco Systems International BVHaarlerbergparkHaarlerbergweg 13-191101 CH AmsterdamThe Netherland swww-europe.cisco.comTel: 31 0 20 357 1000Fax: 31 0 20 357 1100

Americas HeadquartersCisco Systems, Inc.170 West Tasma n D riveSan Jo se, CA 95134-1706USAwww.cisco.comTel: 408 526-7660Fax: 408 527-0883

Asia Pacific HeadquartersCisco Systems, Inc.Ca pital Tow er168 Robinson Road#22-01 to #29-01Singapore 068912www.cisco.comTel: +65 317 7777Fax: +65 317 7799

Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the

Cisc o Web site at www.ci sco.com/go/offi ces

Argent ina • Austra lia • Aust ria • Belgium • Bra zil • Bulga ria • C a na da • C hile • C hina PR C • C o lombia • C ost a R ica • C roa t ia

C zech R epublic • D enma rk • D uba i, UAE • Finla nd • Fra nce • G erma ny • G reece • H ong Kong SAR • H unga ry • Ind ia • Indonesia • Irela nd

Isra el • Ita ly • Ja pa n • Korea • Luxembourg • M ala ysia • M exico • The N etherla nds • N ew Z ea la nd • N orw ay • Peru • Philippines • Po la nd

Portuga l • Puerto R ico • R oma nia • R ussia • Sa udi Ara bia • Sco t la nd • Singa pore • Slova kia • Slovenia • South Africa • Spa in • Sw eden

Sw it z er l a nd • Ta iw a n • Th a i l a nd • Tu r k ey • U k r a in e • U n i t ed K in g d o m • U n i t ed S t a tes • Ven ez u el a • Vi et n a m • Z im b a bw e

All contentsare Copyright© 1992–2002, Cisco Systems, Inc. All rightsreserved. CCIP, the CiscoArrow logo, the Cisco  Powered Networkmark, theCisco Systems Veri f iedlogo, Cisco Uni ty , Follow Me Browsing,FormShare

iQ Breakthrough, iQ Expertise , iQ FastTrack, the iQ logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet , TransPa th, and VoiceLAN are trademarks of Cisco Systems, Inc. ; Changing th

Way WeWork, Live , Play, and Learn, Discover All That ’s Possible , The Fastest Way to Increase Your Internet Quot ient , and iQuick Study are service marks of Cisco Systems, Inc. ; and Aironet , ASIST, BPX, Ca ta lys

C C D A, C C D P, C C IE, C C NA, C C NP, C i sc o, t h e C i s co C e rt if i ed In te rn et w o rk Ex per t l o go , C i sc o IOS, t h e C i s co IOS l o go , C i sc o Pres s, C i sc o S ys te ms , C i sc o S ys tems C a p it a l, t h e C i s co S ys te ms l o go , Emp o w er in g t h

Internet Genera t ion Enterprise/Solver EtherChannel EtherSwi tch Fast Step GigaStack Internet Quot ient IOS IP/TV LightStream MGX MICA the Networkers logo NetworkRegistra r Packet PIX Post Rout ing

The follow ing dra fts, w hich discuss additiona l security methods, are in progress:

• http: //w w w.ietf. org/internet-draft s/dra ft-ietf-ppvpn-ipsec-2547-02.tx t

Scalability Considerations

Internet ga tewa y must b e correctly sized to handle the Internet Ro uting Table.

Provider edge routers must be correctly sized to support numbers of sites connected to a PE.

References

ht tp://w w w.cisco .co m/go /mpls

ht tp://w w w.cisco .co m/go /securi ty

htt p://w w w.ietf. org /internet-dra ft s/draf t-ietf-ppvpn-ipsec-2547-02.txt

Book “ M PLS and VPN Architectures” releases by C isco Press.