Chapter II
Chapter II
Introduction
The Role of MPLS
MPLS Operation
FECs, LSPs, and Labels
Traffic Engineering
Elements of MPLS Traffic Engineering
Constrained Shortest-Path First Algorithm
Virtual Private Networks (Layer 2 and Layer 3)
3 Definition
Consider the network to the right, where a route has to be computed from router-A to the router-C
satisfying bandwidth constrained of x- units, and link cost for each link is based on hop-count (i.e.,
1).
If x = 50 units then CSPF will give path A → B → C.
If x = 55 units then CSPF will give path A → D → E → C.
If x = 90 units then CSPF will give path A → D → E → F → C.
In all of these cases OSPF (open shortest path first)and IS-IS (intermediate system to intermediate
system)will result in path A → B → C.
29 Virtual Private Networks (Layer 2 and
Layer 3)
VPNs are private data networks over public network – usually the
Internet.
VPNs extend corporate networks to remote offices, mobile users,
telecommuters and other extranet partners.
VPNs use advanced encryption and ‘tunneling’ technology to establish
secure, end-to-end private network connections over Internet.
30 VPN- MODEL
31
Server based
Windows
Routing and Remote Access Service
NT supports only PPTP, W/2000 supports PPTP, L2TP and IPSec
comes with everything needed to establish a VPN
Linux
Blowfish, Free S/WAN, PPP over SSL, PPTP, L2TP
with IP masquerading/IP Chains and additional open source software can be used to create
a very robust VPN
UNIX
many incorporating IPSec into their TCP/IP stacks
Be aware that VPN traffic leaving your LAN traverses the LAN twice
once to the RRAS service as regular LAN traffic, once encapsulated to the firewall
34
Firewall based
Since firewalls already do all kinds of packet analysis, adding IP
tunneling is relatively easy
Rapid acceptance of IPSec and IKE are making VPNing at the
firewall more common
not all vendors versions of IPSec+IKE work together
make sure that remote clients software works with your firewall VP
35
NEXT
CHAPTER-3