Vous êtes sur la page 1sur 5

Building Trusted VPNs with Multi-VRF Introduction

Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several years. Driving this need has been the requirement for secure transport of sensitive information, controlling information access to those who need it, etc. In large enterprises, particularly those distributed across disparate locations, sensitivity to information pertinent to a department drives the requirement for an IT manager to logically demarcate information flows to be within that department. The need for privacy is another driver behind deployment of VPN solutions.

What is Multi-VRF?
Central to Multi-VRF is the ability to maintain multiple Virtual Routing and Forwarding (VRF) tables on the same Provider Edge (PE) Router. Multi-VRF uses multiple instances of a routing protocol such as BGP or OSPF to exchange route information for a VPN among peer PE routers. The Multi-VRF capable PE router maps an input customer interface to a unique VPN instance. The router maintains a different VRF table for each VPN instance on that PE router. Multiple input interfaces may also be associated with the same VRF on the router, if they connect to sites belonging to the same VPN. This input interface can be a physical interface or a virtual Ethernet interface on a port. Multi-VRF routers communicate with one another by exchanging route information in the VRF table with the neighboring PE router. This exchange of information among the PE routers is done using BGP or OSPF. The PE routers that communicate with one another should be directly connected at Layer 3. Customers connect to PE routers in the network using Customer Edge (CE) routers as shown in Figure 1. Different routing protocols may be used for exchanging information between the PE-PE routers and between the adjacent PE-CE routers. Further, different PE-CE routing protocols may be used in a VPN to exchange customer routes with the various customer sites in that VPN. The routes learnt from the PE-CE protocol are added to the corresponding VRF instance and redistributed via the PE-PE protocol to the peer router in the backbone network. Figure 1 depicts a network using Multi-VRF to provide connectivity among sites that belong to multiple VPNs. To share the VPN route table information with remote PEs, each PE creates separate virtual interfaces and run different instances of the PE-PE routing protocol for each VRF. Some vendors also use the terminology of MultiVRF CE or VRF-Lite for this technology.

VPN Options
VPN technologies can be broadly classified into 2 typessecure VPNs and trusted VPNs. Secure VPNs require traffic to be encrypted and authenticated and are most important when communication occurs across an infrastructure that is not trusted (e.g. over the public Internet). The most commonly deployed types of secure VPNs are IPSec VPNs and SSL (Secure Sockets Layer) VPNs. Both offer encryption of data streams. While IPSec VPNs operate at the network layer and require special client software, SSL VPNs are more application centric and can generally work with any SSL-enabled browser. On the other hand, trusted VPNs ensure integrity and privacy of the data transfers but do not provide any encryption capabilities. Trusted VPNs are most useful when the goal is to leverage a shared infrastructure to allow virtual networks to be built. Examples of such trusted VPN technologies include IP/MPLS based Layer 2 VPNs (VPLS, VLL), BGP/MPLS VPNs, ATM or Frame Relay circuits, Layer 2 Tunneling Protocol (L2TP), etc. In short, all these technologies allow a shared infrastructure to be used without compromising the privacy needs of different users or user groups.

2006 Foundry Networks, Inc.

CE Customer A, Site 1

CE Customer A, Site 1

CE Customer B, Site 1
NE TWORKS

L2 network
NetIron XMR 8000
NE TWORKS

CE
NetIron XMR 8000

Customer B, Site 1

PE

PE

CE Customer A, Site 2

CE Customer A, Site 2

CE Customer B, Site 2

CE Customer B, Site 2

Figure 1: A network deploying Multi-VRF

Multi-VRF and BGP/MPLS VPNs Compared


Multi-VRF and BGP/MPLS VPNs share some common aspects. For instance, in both cases the edge router maintains a VRF for all directly connected sites that are part of the same VPN. In both cases, the PE and CE routers share customer route information using a variety of PE-CE routing protocols, such as OSPF, RIP, E-BGP or static routes. Overlapping address spaces among different VPNs are allowed in both cases. However, there are several differences between the two VPN technologies. The fundamental difference between the two technologies is that

Multi-VRF requires the peering PE routers to be directly connected at Layer 3. A Layer 2 network may however be present between the PE routers. On the other hand, BGP/MPLS VPNs have no such restriction. In BGP/MPLS VPNs, the MPLS network determines the path to the peer router. In order to disambiguate overlapping IP addresses, route targets are used in BGP/MPLS VPNs. Multi-VRF uses the input interface to uniquely identify the associated VPN, which is why the two PE routers should be directly connected at Layer 3. Figure 2 compares Multi-VRF and BGP/MPLS VPNs in more detail.

PE-PE routing protocol PE-CE routing protocol PE-PE router connectivity Determination of VRF instance Number of routing protocol instances

Multi-VRF OSPF or BGP BGP, OSPF, RIP or Static routing PE routers should be directly connected at Layer 3 Based on input interface only Unique routing protocol instance for each VRF instance

BGP/MPLS VPN BGP BGP, OSPF, RIP or Static routing PE routers are interconnected via an IP/MPLS network Based on route target (network interface ) or input interface (CE) Single routing protocol instance

2006 Foundry Networks, Inc.

Building trusted VPNs with Multi-VRF Multi-VRF No need for route targets to be used. BGP/MPLS VPN Route targets used to identify the customer VPN in advertised routes. The destination PE filters the routes advertised from a peer PE by comparing the route target with the VPNs maintained locally on that PE. Unique VRF instance for each VPN Yes Highly scalable

Controlling advertisement of routes

Number of VRF instances Overlapping private addresses allowed across VPNs? Scalability

Unique VRF instance for each VPN Yes Reasonably scalable

Figure 2: Multi-VRF and Layer 3 BGP/MPLS VPNs compared

Benefits and Applications of Multi-VRF


Multi-VRF provides a reliable mechanism for a network administrator to maintain multiple virtual routers on the same device. The goal of providing isolation among different VPN instances is accomplished without the overhead of heavyweight protocols used in secure VPN technologies or the administrative complexity of MPLS VPNs. It is particularly effective when operational staff has expertise in managing IP networks but may not have the same familiarity in managing MPLS networks. Overlapping address spaces can be maintained among the different VPN instances. As the two examples in the following sections demonstrate, the simplicity of Multi-VRF allows for several interesting applications.

trusted servers should not be allowed to directly communicate at all. The figure only shows some servers; in practice, the number of servers could run into tens or hundreds. A common way to accomplish this is by using Policy Based Routing (PBR). However, PBR becomes very difficult to administer and manage as the network begins to grow, may require frequent configuration changes, and is prone to operator errors. MPLS VPNs can also be used to accomplish this. However, it may be too heavy-weight for what needs to be accomplished in this scenario. In addition, operational staff in enterprise data centers may not always be conversant with administering MPLS. Secure VPN technologies like IP-Sec are not required here because the infrastructure is already secure. Therefore, the overhead of encryption is not needed. Multi-VRF is an ideal solution for such an application. Servers that are allowed to communicate can be placed in the same Multi-VRF instance. If server access is to be controlled at a more granular level (e.g. at the application layer), then traffic from specific applications on that server can be sent on a specific tagged interface to the router in Cluster A. As shown in Figure 3, a highly redundant cluster is achieved by ensuring that no single node becomes a point of failure within this network.

Example of Multi-VRF Usage in an Enterprise Data Center


Figure 3 shows an example of Multi-VRF in an enterprise data center. Each server farm is used for a dedicated application or set of applications. For security reasons, only specific servers in this farm may be allowed to communicate with other servers. Some accesses may be completely prohibited whereas certain others may be allowed through the firewall. Each server is placed on a different subnet. To ensure optimal performance of the data center, trusted servers should be allowed to communicate directly whereas un-

2006 Foundry Networks, Inc.

Building trusted VPNs with Multi-VRF

Application Router Server Farm Cluster A


NET WORKS

NetIron XMR 4000

NET WORKS

NetIron XMR 4000

Router Cluster B
NETWORKS

NET WORKS

NetIron XMR 4000

NetIron XMR 8000

NET WORKS

NetIron XMR 4000

Firewall

NET WORKS

NetIron XMR 4000

Public network
NETWORKS

NET WORKS

NetIron XMR 4000

NetIron XMR 8000

NET WORKS

NetIron XMR 4000

NET WORKS

NetIron XMR 4000

Figure 3: Example of Multi-VRF usage in an enterprise data center application

CE Customer A, Site 1

E-BG

P
NETWOR KS

P BG ENetIron XMR 8000


NETWORK S

CE

NetIron XMR 8000

OSP

PE

PE

RIP

Customer A, Site 3

CE Customer B, Site 1

Layer 2 Network for direct PE-PE connectivity at Layer 3


PF OS
NETWOR KS
NETWOR KS

CE Customer B, Site 3

CE Customer A, Site 2

CE

NetIron XMR 8000

NetIr on XMR 8000

N E T W O R K S
25F F Link 26

F a s tIro nE d g eX 4 2 4
1 3 5 7 9 11 13 15 17 1 9 21 23

Static
14 16 18 2 0 22 24

P ow er Co n sole 1F 2F 3 F 4 F

10

12

OSPF

PE

PE

Customer A, Site 4 EBG P CE

CE Customer B, Site 2

CE: Customer Edge PE: Provider Edge

Customer B, Site 4

Figure 4: Multi-VRF in a service provider application

2006 Foundry Networks, Inc.

Example of Multi-VRF Usage in a Service Provider Network


Figure 4 depicts the use of Multi-VRF in a typical service provider application. The service provider here owns a Layer 2 network connecting the PEs and offers managed VPN services to end users. As shown in the Figure above, a host of PE-CE routing protocols can be usedE-BGP, OSPF, RIP or Static Routing. It is also possible that a site (such as site 2) may have several customers in close geographical proximity as in a business park. This may warrant a dedicated MTU to be placed on-site, which is owned by the service provider. In such a scenario, the different customers may share the same MTU and still use overlapping private address spaces. The MTU is a switch that adds a unique VLAN tag for each connected customer. The PE router (labeled PE2) maps a Layer 3 tagged interface to a unique VRF. Thus, it could be sharing routes using OSPF with one CE and just using Static Routing with another CEboth can occur over different virtual interfaces on the same physical interface. Layer 3 BGP/MPLS VPNs could also be used in a network such as the above. However, if one of the PE routers does not support MPLS or if the operational staff is not conversant with MPLS operations, Multi-VRF provides an alternative mechanism to achieve the same objective.

Foundrys support for Multi-VRF allows unparalleled scalability to be achieved by a service provider. For example, the NetIron XMR series of routers allows up to 2000 VRFs and up to 1 million VPN routes to be maintained in its VRF tables.

Summary
Multi-VRF provides a reliable mechanism for trusted virtual private networks to be built over a shared infrastructure. The ability to maintain multiple virtual routing/forwarding tables allows overlapping private IP addresses to be maintained across VPNs and accomplish goals very similar to those of more complex VPN technologies such as BGP/MPLS VPNs.

Author: Ananda Rajagopal Document version 1.1 Foundry Networks, Inc. Headquarters 4980 Great America Parkway Santa Clara, CA 95054 U.S. and Canada Toll-free: (888) TURBOLAN Direct telephone: +1 408.586.1700 Fax: +1 408.586.1900 Email: info@foundrynet.com Web: http://www.foundrynet.com Foundry Networks, AccessIron, BigIron, EdgeIron, FastIron, IronPoint, IronView, IronWare, JetCore, NetIron, ServerIron, Terathon, TurboIron, and the Iron family of marks are trademarks or registered trademarks of Foundry Networks, Inc. in United States and other countries. All other trademarks are the properties of their respective owners. Although Foundry has attempted to provide accurate information in these materials, Foundry assumes no legal responsibility for the accuracy or completeness of the information. More specific information is available on request from Foundry. Please note that Foundry's product information does not constitute or contain any guarantee, warranty or legally binding representation, unless expressly identified as such in a duly signed writing. 2006 Foundry Networks, Inc. All Rights Reserved.

Foundry Products Supporting Multi-VRF


Foundry Networks has a broad range of products in its product line that support Multi-VRF. o NetIron XMR Series, a family of high-end, carrier-class, backbone routers that scales from the network edge to the core. This includes the NetIron XMR 4000, XMR 8000, XMR 16000, and XMR 32000 routers. o NetIron MLX Series, a family of advanced switching routers with unique scalability for Layer 2 metro applications. This includes the NetIron MLX-4, MLX-8, MLX-16, and MLX-32 routers. o NetIron IMR 640, a Terabit MPLS router that is ideal for both service provider and large enterprise applications.

2006 Foundry Networks, Inc.

Vous aimerez peut-être aussi