344 43 4MB
English Pages 400 Year 2006
MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization By Monique Morrow, Azhar Sayeed
!
" • • • • ( '
'
( )* % & '" # * +, * % & # " '
" " )* *
)# ' ## "
% & * ' . '" "
# $
" ## "
"
% & "
"
'" # " "
#
' *(
% &
# *
" % &
#
% & "
'"
' )
% & .
$
#
"
( $
)
. " " ! % & #' ( " % & / * . ) # % & " $ " *# .# ' ' ' ( " " " # ' % & '" # ' # ( ) ' " ( ' ## " ( # " # ' $ *# " " *# $0 * +, * " $ *# " * *# " # " * ) " # % & '" " # " " # " " " $. ( )* * . ' " '" " " *# ). # " * ) % & " *# * . " " *# ' " " % & ( ) #
"
$
$
Copyright About the Authors About the Technical Reviewers Acknowledgments Icons Used in This Book Foreword Introduction Part 1: The Business Case for MPLS Chapter 1. The Dynamics of Service Creation and Deployment Industry Dynamics and Challenges What About the Enterprise Market? Business Drivers and Requirements Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself Subscribing to a Managed Layer 3 MPLS VPN Service The Case for Building VPNsLayer 2 or Layer 3 Existing TechnologiesFrame Relay, ATM, and IP-Based Networks: What Can They Solve? Service Examples Summary Chapter 2. The Scope of Service Types Overview of Layer 2 Services Next-Generation Network Overview and Interworking Functions Layer 3 Services Remote Access Value-Added Services Summary Part 2: The Technical Case for MPLS Chapter 3. Technology Overview: Making the Technology Case for MPLS and Technology Details Available Technologies and Options Why MPLS? (High-Level Detail) MPLS and Quality of Service Benefits MPLS Technology Details Layer 3 VPNs Carrier Supporting Carrier and Inter-Provider Autonomous Systems Traffic Engineering DiffServ Layer 2 VPNs Summary Part 3: Mpl Services and Components Chapter 4. Layer 2 VPNs Taxonomy
Introducing AToM Layer 2 Interworking Virtual Private LAN Service Provisioning and Signaling Benefits of L2VPNs Inter-AS L2VPNs Supported IETF Standards Summary Standards and References Chapter 5. Layer 3 VPNs Technology Overview Corporate Intranet Corporate Extranet Internet Access Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks Heterogeneous Networks Managed Central Services Supported IETF Drafts Summary Chapter 6. Remote Access and IPSec Integration with MPLS VPNs Technology Overview PE-CE Routing Protocols Scalability and Network Convergence for Remote Access Summary Chapter 7. MPLS Security Security and NGN Security Overview and MPLS MPLS VPN and Security Attack Scenarios IPSec Layer 2 and Unmanaged VPN Service Considerations Overall Best Practice Recommendations Summary Standards and References Chapter 8. Traffic Engineering Problem Statement Technology Overview TE Applications and Examples Protection and Restoration Scaling MPLS TE MPLS Traffic Engineering and Multicast Standards and References Summary Chapter 9. Quality of Service Problem Statement Standards and References Summary Chapter 10. Multicast and NGNs
Problem Statement MPLS Multicast VPN Overview MPLS Multicast VPN Applications and Examples Multicast Security and Management Considerations Standards and References Summary Chapter 11. IPv6 and MPLS Problem Statement Technology Overview Management and IPv6 Summary Part 4: Bringing Your MPLS Plan Together Chapter 12. Network Management and Provisioning Problem Statement Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms Dealing with Equal Cost Multipaths Virtual Circuit Connection Verification and Bidirectional Forwarding Detection A Word About Interworking OAM Generic Failure Types Configuration Management for MPLS-Based Networks Accounting for MPLS-Based Networks Performance Management for MPLS-Based Networks Security Management for MPLS-Based Networks Per-VPN Management Standards and References Summary Chapter 13. Design Considerations: Putting it All Together VRF-Aware Feature NAT-PE System Flow Deployment Guideline Summary Management, Provisioning, and Troubleshooting Equipment Scalability Versus Network Scalability Summary Chapter 14. MPLS Case Studies The Background on Equant VPN Bridge Case Study Summary Chapter 15. The Future of MPLS Integrating IP and Optical Networks (Transport Area) Future Layer 3 Services Future Layer 2 Services Future Enhancements in Provisioning and Management Increasing Enterprise Deployment of MPLS Summary A View from George Swallow A View from Adrian Farrell
Index
Copyright ! %
-
%
#$
(
34
" 12
5
"
#
$ $
* .
"
$ " 6
7
89 #
.
1 * $ #
:94:
! 1
' # $* . * . " #
$ $
' *
&
1*
"
"
! /
"
)* $ # * " " . " ' $ *. ( -
"
4
4
"
* " #$ . ( # * ' (
#
$ "
. *
:;9568
9
$
"
*
4
; ;
Trademark Acknowledgments 1
* * ' "" "
) $" # 2 * $ $
## # "$ '
)
(
*
" ! *
" * '" *
)
$
) * .
'" * " "
)
) )
Warning and Disclaimer ) * ) *#
*
$ (
# )
* * . " # " ) * #
# $
#
' " *#
' '
* ""
< * "
< $ #
)
" ! #
$ 7' .
.
# * *
" $# * " * $ "" *# $
$ (
.
$
"
$
" $
$
"
$
* .
"
Feedback Information 1
"
. 7 "
' ' "
"
#* " " **
+ " **
0
>
(
#
" (( "
$ ##
" " # " . * *
" -
")
"
# *# .$ " * )
$ " *
")=" " # *
$
#
) " ' ' $
$
' "
) *
" $
"
-
$
#
$
'
$
).
(
* )
"
"
Corporate and Government Sales " "
# /
"
*
$% % " #
*
.#
& =#
(
'
#
- -+ ' & / + * '+
?
6
64
: 8
"
=#
" *
( $> ?
1
$
") @ $A
+ &0 + * B
&
"
'
) ' * ) + , &
2 (
$
" '
-
1 1
-
#" * !
.
)(
"
! "
/
+
"
# "
#. *
. 7' &
)
) # 1
' %
.
?
# /
"
)
3 "
$
4 5) * . " * ' . 1 8; : 5 9
5 > ? ! 1 ((( " " " * : 6 ;49 : 6 ;; 7 C9 65D / : 6 ;49 : 3
6 4 5) " $ * . " 96 + + E46 # ( # 968 4 ((( " " " * F9; 9 5 5555 / F9; 9 5 5588 +)
& "
A A
4
5) * # ) ( 8 A 1* * $
((( F / F " *
B
# " " " * 6 4 58 4 ;5 *
4
" ( " >
(
1 777%
.# %
* . 8- 8 66
34 9 " $ * . " 1 ' B . " . " * ) " $ * . "G > $> > ). & ' . $. & '" * ) " $ * . "G 1"" + .1 . H. $ . 1. . 7. . 1. . . " . " ( )7 # . " , " . " $ * . " $ * # . " $ * . " ! $ 7 # I ' .7 .7 / .7 ( " ./ #. / (% ( ./ * .J ' .J "). A * & ). K . , . I B. K 7 # . K . K + " " . K ") $. & *. & ) $ . % " . %JH. ( ) 1" *$. ( )+ . ") . H. " .+ %!H. " # . . %1+ . ")> . / > $ " L K . * ) " $ * . " I ! " " 1
* # " '
(
) *
" * (
#
>
# *# $
#
#
$ #
#
(
"
$
" *#
$ C 9 8+D
Dedications 5) " ( $ " 1 $. *$ # ' * ( '
'
) ' B
*$ # ' $ ' #
* ( 2 )$
, A
% (( *# ( '
M
' # # ( ' # " *$ * $ * * *$ ( * G *$ ( 1 NG *$ # ' . " . ## * . ( ) G *$ % 2 " * ) " ' ' # *$ " * * #. " . # ( * ) # ( $ $$ . ( $ * . *$ $BN $@ * $
39* ' ( ( *$ )
0 *
" * 1 . " $
" *
About the Authors 5) : " " $ 7 $ * . " * 4 $ # " ( " . *# * " *# " * # N " . ' #* '" # ' % ' ' ' * ( ) '" . " * "" &1 ( " # ' ' * % ( ) # " *# ! 7 # 888. % * % & B # $* 7 # '" % %
-
#
'
"
"
% * 1
-
%
-
" ' " " $. % -
0
"
#"
% &
'" '" # ' # N " # '
1
$.
) %
"
"
" ) '" #
"
( '"
" )
) '
7 / ! " ** " '" " # $
#
'
J /
( * *
"
,1% % 1
*
' #* #" % ( " # " ! N "
( ) A " " # % % & C " A .4 D '( ' ( & ) C% @ * . 4 4D
* &* " # " $. B ( "" A # " . ' * *
1"
0 " '" # ' " # ) / " " A ( ) H # N " #
$
)(
.%
" '
" "
0
B *
* # #*
" . " #
* 7" ** "
# " .
!
7( ) 7## '" " H 4;. / * + O& ( #. " # *2 #
'" " % & $. &1 * ) . "$"
"
0
7-
'"
(
" * * " $ 7" % & ." 888. % / "
# # *
.%
( .%
* '" .
" # " ##
.
#
' "
"#
# .
'
/+. 1 %.
.
) $' "
(
)
" % ( / " *# " " *@ (
" 1
/ " ' " " ! ' $. J1
"
. *7
/ " * 0 J7 7&. / " .
% 1
Acknowledgments > ( ") ( * # # ( ' * )# * $ *# $ " $ * . * " * A * "). ' . # #. J * . 1 > ## . )( ' ( > " " ' ( . * " $ * .? / " . # % 7$ $" ' " $ > ( ) ) ' ( * # # ) # " 1 $. ( ( ) ") ( " $ * ' ( ' " C ) ( $D $ G?*J " G J $ 2 N )G % ") G J ( (G ? 1#" G A + ) G ? ) M> ( ) ) " .'" # $ * " $ * ) * ' $ $ " ( ( ) / $. ( * " * + A . $A ) . (. ? * " " . ** ( ) $( ) ) # " # " J "
.
( G+#
)
Icons Used in This Book [View full size image]
Command Syntax Conventions "
" ' "
'
# , "
•
'
"
" ** ** + (
"
" **
C D
* #
$
) **
"
+
) $(
$
( • •
" B
"
( " $ ' .*
* "
## $ " $ "
' '
*
• • •
-
") " " *
RS (
PQ " ")
" # " " PR SQ "
* -
"
" (
#
Foreword 889.
" 2
" $
. " C D1
4
2 $ '
" (
*
) * " # ( " ( " " ** " # ## *# *
" . ( " # " .% # '" ' '" #
> $ % & " ' " * $ # * " *D * " ) # '
(
) CB
D
" -
" # *
A
N •
•
•
$T ( " .% &
4
*
% &
J '
(
" * ) ( ( " C% & D. 4; '" # ' " % & # $ % & *
" *
$ *
" * * #. * % & C
(
#
2#"
$ *#
*"
(
% &
J% &
F ,# "
"
*# " % &
$
888. " *J '" " % & ' # . .' " . ' ( ) '" # 2 ## $* ## " % & " *# ' '" & ' 1 * " ' ' $. ' $. ( )# * " B '" ' " " '" % & B 7'" ( " " # " ## " 7( " * * ( ) '" ( " B " # " ' ' % & # ' " '" ' * " '" * " # # * " " . " '" .* " . " . " *" * ' " .' . " # $ ? # 0 A " # ' " $ ' 0 B # '" # ' *
•
. " & %
"
# ( ) (
' ( # ' " " " * " * ' " $ ' " CK D. ' . ' . ( ' " * " * ' " ## " " " '" # ' ) * * " * ! * $. " ' # ") ( ) ( # ' '" '" "
'"
' ' & $ "
(
( "
'" # /
,/ $ 1 %
"
*
#
'" % & '" " (*
* % & * " **
"
" "
" 2 '
7 /
" • $ (
) '" ' "
>
#
'"
* ). % % % & " $ # " " ** ( '" # ' ( .# " " # " # " # " # " * * # " )(
'"
"
7 $
" .'" # * . "
#$
2
( ' " #
12
$ $" $.
(
. ' " ' $ $
)
$
' '
;
' '
.
$ ( ## "
(" # .
##
'
$
$ * $.
*% &
Introduction % & %
" * 4; ( )
" $ " " & $ 4 '" # ' # " * # ' & $ B . *# * " * # * # ( ) . " ' % & " $ "
*
$
. ( )* " ' * $ " ") / *# . $" " $. $" ( '" '" & $ 4 & $ " $ " " ( " ' ( " $" / ' * ) " ' ' ' ( " '" * * . ( )* * . " ) " # " (& $ 4 & $ '"
.
* * ) ") # $* " *# * * *
" '"
.
* "
& $ '
'"
*
. "
(
' % & . " " '" #
'" # ' " " & $ 4 # # ")
$
#
"
(
)
"
'" ( )
' * ( $ " . $ . " $ ( #" ( )* " % &
" '"
(
Who Should Read This Book? # * '" #
$ '
" # "
# $* " $ ( '
)* * % &
*
$ $ "
) " . " " $ . " )
, . * '" " " ( '" " ** "
" *
)# ' ## "
' *(
#
% & "
.
(
% &
$
#
.
."
' )
"
)* #
"
( $
)
' . " ## " . . " " ! '" " # " % & #' ( " % & ) # % & " $ " *# .# ' ( ' ' ( " " " $ # ' % & '" # ' # ( ) ' " ( ' ## " ( # " # ' $ *# " " *# $0 * + ' * C+, D * " $ *# " * *# " # " * ) " # % & '" " # " " # " . " " $. ( )* * . ' " '" . " $ " *# ). # " * ) % & " *# *
How This Book Is Organized )
'
* N
.< # $* •
# ' *#
•
.
4.
1 " " ' $ " % & '" . " ' & $ % & B " " >1 " " ' $" *
* * * ". . ( ) ( * # " $ # " * TA (* " $ # '" T> # " * " " # " "$. # " * * ' #
" # *T A ( * " " # $ * * '"
Enterprise Segmentation > $
• • •
* ( * $# B
#
@ @ '@
/
$ !'
7
# ' '" * " *# *
; -)
# '
# " # ""
/ ( " #
) ".
' * '"
E% +
*
'
*
&
. * ' " *# "
## " B
2 *
$
(
" "
'"
.
" "
*
/
2
-
( )T "
'
" (
*# .
@
)
( . " B&1 < ( '" .( ( " " # /
) '9
[View full size image]
"
"
.B
< # (
#
# ##
$.
*
* "" "" ,
" ** " "
"
" ) $
## " * ( ) $ # # $ "
*
# ' " " & $ 4 .( " ) # * # # ( ) ' # # ( 2 * ' " ( " D # " ( )( " #
" *# / (
" ( " (
$ *
" & $
( $
&
4 & $
) ( )
.
. #
'
*
) ' $ " *# $ # $ & $ C & $ 4 * $# ( & $ * ( " ' $( C ' & $ 4 ( "
( *
) D" "
.( '
*
"
Central Services with an Enterprise Campus ,
* *# # " # ( ' $B 2 '" # ' " B . $ # "" B . " " *# ( # "" * " *# " ** ( ## " " # ' ( ) $ B
" " *
2 ( $ '" #
'" '
$ #
& $ "
% &
B "
" *# $ '
$
"
$# " * * # ' " B
" *# . " ** # * . -
B "
#
" '
( 2
" ( #
'
B "
$
(
" *
G
" *#
* .
"
"
"
.
2
" " "
$ '" B B&1 . ( " # *
2 '"
. " .
* ##
C B
$
" **
" (
"* 2 ( ( B D.
" (
( " ( " "
. '"
$ #
" (
D
)
$# " 2 # " " B C - ' ' (
Subscribing to a Managed Layer 3 MPLS VPN Service ,
*
(
" '"
* (
& $ " * '" # ' . # ( # " % & # " "
( ) $ # " $ ." " " . " * . " # # " * " " " " " ** " ( # $T % " C+ D. 7 J+ . , /. J . " # 7 J+ . # "
*
" * '" # ' . " * ## " /
"
#
#
"
.
$.
*
'" '
( " * " #
"
"
-
* "
#
"
* " > * " >
##
$ *
CJ+7D
* *
*
/
'
'" # " # '" # ' " + ## $ ## 7 /
"
*
'"
.
" "
B
"
"
". * " "
. $
% & # "
.
'
##
( • • •
+ > (
#
( (
• • • • •
>
* "
#
&1 ). I .* # " TA ("
.
* ) $" '
## '" # "( "
# ) "
$ ' ' $ % &
' (
. *
' #
" )
" ) #*
(
(
*# * * 0 ( ) % & # % & " % & ( " ' )T 1 $. ( " T> " * " * ' T, ( '" T * # " &1 T '" #
'
"
" #
. $
")
(
" " ## # $* & $ C J B D '" T > " " '" # ' ## " " # ## " . " K .* " . '" " # T '" ' * " # T # " ' * ) # # $ # % # " " $. ( '" # ' *# * < < &1 T '" # ' " ( '" T 1 *# # $* '" # ' 0 " * " 2 & $ % & B * '" T # ' $ # ' " # " '" # $* T
• • • • • • • • •
• •
• • • • • • • •
>
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
#
'
"
" % &
, #
"
'" #
"
' '
.$ *
-
* # " * 0 ## "
(
## " ( # B T1 # " (& $ % # " ( '" # ' * 1 . '" # ' ' $ ( * " " * T ! . $ A " $ 1"" * " A 11 ( " A 11 " " " ' # # ( " " * ' *# " " ( " * $ * * " # "
" *
(
/ $ &
.
.
T
T
'" *# . # " ' & $ B '"
$ *# . $ 1" CA 11D ( N A 11 2 $ .
"
(
* # '
$ "
A 11 C7 D.
*
#
# * -
)
2 $.
"
1 '" # ' # ' " *# ( T
1 " "$
) " ( '" .
Chapter 2. The Scope of Service Types "
# '" ' # ' ' ' "" G ' '" . " * * '" . ( ## " $ " # " ' * '" " # :. 1 D " * " # (
( "" " *# *
"
$0 " "
$* *
" #
J
% &
B
#
'
" 7
" # " ' ( $" ' '
# .
$ $ # * (
(
* ) *
'" 4G & $ G . ' * *# . # * & $ .
$ ' " C7> D # # ( '" G 7 + $ ' " C7+ D # * # '" ' $ " ' $( ( 7 1"" & $ '" / 4 # " 7+ . ( " * $ * / * + $ / * + $( ) # "# # * ' " " C B D " " " .( # ( " + ., / * + $ ( ) '" ( " " # # $ " ( - ' 7+ B&1 + ( '" # ' # " B&1 * / * + $ )" " C & D. ( " $ ' # # " " " * # * - #* C 7D " # ' $ '" # ' ( " " *# * $ / * + $ 1 %
# " # " # $ '" # '
'
" " *# . 7
; -)
1*
#
* ( (
( "
* " B&1 " " # 7
. " " * * 1
C /
* +
%+ *
# 7
D 1 %"
$
'" # ' 1"" & $ * 7 & / 4 4 " ( * ' * # C # $ " " " 7 . '" # " " (
'"
( *# *
%+ *
$
, ' 0
7
' + C7 +D. ( " '" " 7+ 7 + # ' ** 2 7 + '" " * 0 .( " " %D # " " ' $ C+ +D . " * # " " # # # # A# '
# '
; -)
)
,
-
7
% # ' " C7% D " ** $ ' # ' &1 ' " CB & D '" ( 7 + $% # ' " C7+% D # ' * " # $. ) 7> 7 +. ( / 4 7% '" ( 7 1"" & $ '" " ** '" # $* @ $ 7+% " $ $" " ' $ & $ 4 '" # ' ( ) " * %1 . " * B&1 . 7" '" # " # "" * %1 >1 * ( ) ' 7 ' H. ( H" / * + $ &. *#
; -)
E% + *
)' &
[View full size image]
/
4 :
; -)
**
2
%+ *
'" "
2
@ F
"
< 0
E3
[View full size image]
0
0
Next-Generation Network Overview and Interworking Functions $. '" # ' ' # $ &4B ( " ## * # '" < $ *" '" # $* " " ./ * + $ * . " # $ * $ / * + $B " " ' " " * " * $ 1 $# " / * + $ # " $ " # * " / * " G ( ' . " * '" C # ' I% & (
%
# ) . *# " ' '" ./ * + $ # ( " # " # D"
'" # ' " " / " #
)
"
; -)
$
!
=3
' / * + $ 1 %. ( ) " # < * # ' ( ( " # " $. * * " "
## 4 ;
$ **
( 8
"
"
"$. "
.
( "$. '
# $
'
'"
"
'" '" . '" ##
' 2
"
#
)&&
- 3''
< J 7D > ) J # # ( * " * 7 " ( " # * & $ 4 " # . " $ " " ( 7 # ' C 7D & +$ , > 1 # ( $# # ( . # "
# * & $ 4 " # ( ) " * " # * (
* ' ' '
C )
) D
* ) * " *
# " "
# )
( ( "
"
"$ 1 % ( " * " "
)C *
( • • •
'
" $#
# "$
"
* ( " . # " 1 %. / * + $. 7 * $# " # '
.
• • •
" **
)
$
#
" * 1
. #
" "
"
& $ ( ) #
'" * "
#
4
#
$"
1 % / * + $ / * + $ 7 1 % 7 # $*
*
"
" '
" ## *
$ (
" *
/
*# . " " " # / * + ' % & * # ' "" . * N $ " # # "
# 8 # #
" "
H ' % & & $ 4B ' % & # $ " '" " # ' " " A ( ' .& $ 4B ' ( ' ## "" # ) '" $ / * + $ '" % & * , * " #" $ ( $# '" . B "$ ' " . / . " "* $
"* " "
##
"$.
*
"
' & $ 4% & B $ ' * & $ 4 *# '" # " . /+. 1 %. H4; ( ' " *
/
* +
(. "$ " " 0 & $ 41 % ") '" # ' ' " " $* ") $ . '" # ' 0 ( " 1 %. / * + $. 7 . &* " ( ) * & $ 4" " * . " * ) +
"
5) & " ' $ # T
6 "
> '
* " # % & # # ( "
$
!# # '
•
( (
&4B
$ &4B
(
• •
)D
1 % ' % & C1 % % & D / * + $ ' % & C/+ % & D 7 ' % & C7 % & D
1 $ * '" " ' "
"
( *
$
1 %
' ## *1 % " ' $ * " " ' $ # " "
'"
)
'" # ' - #*
I% & "
'
*
,
• •
& # ' + * 7 # " #
• " #
:
A (* " ( * # ' T ' ' 0% $ '" # ' ( '" . * * ( ) ' % $ '" # ' ) ' $ % & ' * # '" ' * ' $ * 7 '" '6 ) 5) & G +H .# ' .* * . ## # . " " ' " " ' $"
$
6
"
"
$
& $
4B
"
'" *
'" .
"
7 " "
'
% &
Layer 3 Services ** • • • • • •
& $
% &
& $
% &
B
'"
"
(
B
"
'"
K
7 + * B
'" "
"
"" '"
"
#
"
"
1B "
7 "B
( B "
*#
$. (
'"
& $
% &
B
'" " # ' N " " . & $ % & B ' " * " * & $ 4 ' $ " # # $ '" 1
$. '"
"
B *
" # ( " '" .
" **
" "B 2
( .& $
'
"
C' D# ' $" " ' $( *# ' " $ # $ $ '" # ' $ $" " ' $ ## # $* I' " I'
'" "
'
2
.
"
"
#
B & $ " # $ '" "
" J B '
(
'"
$ .& $ 4 '"
" ## " '" % & " *
% & & $ 4
)
& $ "
$
' B . & $ '" 4 '"
' # # ) '
"
*
* " * " $ "
( #
" * " * " " " " B 888 7 # # ' ## "
'
.$ & $ # " ,D '" # ' . " I% & ( ) # '" .' " '
# * # I,# '" .*
.( "
"
#
'
"
* $ & $ % & " * '" " # " * & $ •
. # '" $
.
#
& $ 4B " # " " $. # ") ( & $ * ' " * *
") & $ C &D # . * * ) * "" ' . # 9
; -)
*
%A
& $
% & B " . " & $ "" B ' > / $ C> / D " ( # $ * ( B ' "" &" * * # / 4 9 #" ." . & + * ""
,
3
< '
[View full size image]
1
( .
3.
% &
"
"$
# ' # $# " # B " "
; -)
%
" (
)
). "
" $ /
A66
'" ' " 4 5
3
[View full size image]
" $# (
*
'"
&
@
/
$. '" # ' '" ' '" ( *# "
#
" * " " ") # & $ % & B " $ * C *# . ") # "$D ' & / " # 1 $. " * ") # ( )# * " $ * ") # ( #
; -)
%
2
#)&
,
[View full size image]
" "
# ## # # ' $ *
4 6# ("
'" -
'
A&
*
Value-Added Services B
.( . " *# '" '" # ' $ " ' & $ % & B " $ 1 $. * " $ ( '" . "" .B ( ' " B . ' '" " # $ & $ % & B " $ ## $ * ' # ' '" " ' ' # # $ '" & $ % & B " $ 1 '" # ' " *# * * " '" . " B ( A + IB++ ' "$. B ( 1 . * " B / " "" . ( " 7 ( ) . " . * $ '" # ' $ # / 4 8 ( *# " "" '"
; -)
%
)
(
3
[View full size image]
'" C "
" D#
'" ") . '" C D( " '" '
'" # '
' " #
" " B
' . !+& * 1 & $
# * . *# % &
B
"
$
; -)
(
/
4
%(
@
'
84
-< .
* [View full size image]
'
"
; -)
"
B " '" # '
%(
@
*# * *
* @ 2 -
"
# .
$# '" D
# 2
" '
'" #
/
/ * + $ * + $*
B C& $ 4 & $ 4 B '" # ' # $. . '" '
B
# -
* +
"
$
(
)
$C
* '" ) '" .( " " * ( ( # " * ' ' B " *# $ B " *# $. * . ## "
* ) '" # '
D '" * 7
* " *
* & $ ' '" . # $T '" # ' * # ' *# . B ( ; ( * # 2 B " ' CB # ' " B > ( $ . '" # ' * # ' '" # ' " 1 . " # ' B * " . " ' " $# " * B ( ' '" *
/
'" ./ * + $ & $ 4" "( * ) " * ( *# * ( " # ' # ' # # " B * '" # ' G # # B # $ * C 7D .$ ' " CK D # " . 2 / '" # ' .& $ 4' " " $
#
" *
" #
$6 X
* 4 "
* "
$. " / * + $. '" # ' * B * 44; B D. '" # ' * # $ '" # ' H B * " " * # " * "" # '" # ' " $ '" " " . % & " " " *
Why MPLS? (High-Level Detail) %
#
## "
"
( " ( % &
" # ")
. " * % & $
# % & ( ) .
/7 * # % " * ## *
" # #
" " . # ") ( " " " # G . # ") ( # ( ).
*# * * " # % & * &+ & * /7
1 & " * 2
* " /7 ( "
# ") & .
7 / +/ . 1 % & * # " " # " - ' " " C/7 D $. . $ ( ) C& +D ( "
( " " /7 , 1 /7 . # ") (
( .
#
& + ( "
*
"
$ " ## % &
"
; -)
# ")
. & " > " " *# 1 % & $
E
%
'4
" " & + ( # ") & + % &
* 7 " & + $2 # * & + " & + # # . ( & % & ' & $ 4 / 4 #" ## "
% &
6
[View full size image]
*
#
. .
$ #'
* '
# ## ( "
*
" * $ # ") # ( " % &
$
( " "
'
" "
#
/7 *# # ")
" *# *
"
" ##
*
" # & & # & $ " " " ) $ . + $. 1 % B . ' " " # ") . " " 1% ' " " CB D " / 7 " . # C *D # " . * * * 2 ( # " * " ( ) $ # ** 2 * " * /
* # ")
(
; -)
E E%
"
7
6 4 . " . " " # " # CB D ' . ./ . " ( ) & +# * " # ") " *
A&
[View full size image]
* * '
# (
" *
% &
./
#
"
)
1 # #
'
$*
. "
( " " # $ " $% & "
• •
I " 2!
& @ /
•
• •
I
#
# " 1 '
" & $ -
" # ")
#
" $
% & *
"
# *D.
" (
'
#
# ") *
"
) $
( #
# # ")
$
D # *
( ## *# .
C **
" # $ # # * ## " 7 *# ## " (
"
*# * $ '" * " ( ( J ( $ " C J D . '" # ' " J " ( '" # ' B '" "
66 " ' . " ' # $ ' # $ # )' ) " # " " /7 # " " ) " " " / * + $. 1 %. 7 " "" # " . 1 ( ) . *# *
" -
C *
#
"
(
. #
# %
G
"
'
#
* " (
/7 )( "
"
* " ( $# " C %D ' 4
* " *
(
"
" %
/7 .A .
' ' "$ ( ) '" . & ' & ) CA & D. ( )' ' $ "" # ' " ** % & " * ' ' * *
•
!
'9 $
*# * " " # . # " $ ( 1
' "
'
' $2
# "
* *# )
< < * C $ ## # *
% & " # " $ & C $ " " *
* "
*
) # " $ # * "
J% & *
H
' (. % & ( ## * ## . " * # * ) " $ # *2 " * ' (
* # "
*
" $ . " " " ( ) ,# " " * "# * " J% & # $* ) " # " $# ' * " " ' C # ' D
G! (
$ /
" "
$ # " $
* "* #
' (
( ) " 1 $ ## $ * " .
"
)
# " " " # * ( ' " # " $ ( ) " . * # " . * * ( ) " *# # .( * $ * ' ( * ( ( ) # D ) ( . ' ( .$ " " *# . $ " ' " # " $
# " *# "
' .(
$ # * '
*# .
+ $ #
" ' $
# . (
$ "
"
)* #
) (
" "
" D * *
#
" $
" $
" (
MPLS and Quality of Service /
K . '" " # " ) #
' *#
$ 1 "$ (
& ) $ * * • •
( "
'" * C &D " + ' C 7 / +/ 44
+ " #
"
) C' + B D ' +( * ,
"
'D # " ( " ' " CJ D " C+ B D $. $ D - ' '" $ ( ) A # ") "" $ * "# * * * $ # ") " " " *# " ( " . ## " ## $ ( )( * " $ # * < )$ ") < " $ " ( ) (# " $ ( # * " * *# * &
0 5) ) " * " 7 -* 6 5) ) " # " $ ( " " ( '" " " ## # * " $
'
C
( -
.
#
$-
G7;IH ' . ( ( # # ( .$
,
" '
$ (
&
*
( $ ) ' "" ' # ")
$ #
" '
* # ' "
# * ' ( $ & $ *# * *# # " ") C # ' $ " D D' " " ' "" / ## " ' " ' " '" " " ( (# ' # "
$.
* "
# " '
" ## "
( " ( ) * # $ . "" " .( " ( '" # ' "$. '" # ' " ) . ' .% & # # ( & /7 ( * #
$
*# * ' " " ' # ") ( ). * * ## " * ) ( # $ %B ## ## " $ .+ $ . K ") * B
( #
% & ' '" #
"
# ' " # $ $ '" # * . " " . *
" " # # $' " ' " B. > ( %
'" # ' # $ & $ 4B " % ( " * " 1 % " $ * & $ 4 '" . " / * + $. 1 %. .A & . 7 / ./ + # ' ( ) " # " A / $. J% & " # $ $ 2 ( * ( ) '" " * # " . " # " * ( # ( " ) $ ' J% & *# * * " ( J% & " ") * . " J% & ( ) .
** # $'
$. % &
*
'"
; -)
E
%
"
$ '" " "
'" # ' *# * #" /
; )
6
" # '" 9
@ ')
3
$
' '
# $
MPLS Technology Details "
*
(% & " ' " / 5 " " " *# " & $ '" G& $ 4B GB ' * " J% & G ) $" # " . " C& D. J . + B . . " ' # ' $ " # . ) $ # ( # " * C # D " # # * ## " ' # * & $ '"
B
'
## "
•
"
*# *
I *# * $ '" .( " " 0 E@ ! J '" # " " ( J # " " 1 66 -! ( ) # " $ " 2 )' ) ( # ' 4 %#
• •
• •
0
"
@ $ # "
" " %
$
"
& $ B . '9.
; -)
(
'
.* ( " . " J% &
E
%3
'" * " & ( # ' 0 '" # /7
" (
(
)(
'
"
*
/
"
/7 "
"
" (
)
G /7
4" " ' % & . " ** & $ 4B . . " & $ 4B '"
$ & $ "
4
. $
.
'"
"
"
)
D
"
+ B # *2
"
"
*
* .
,
& $ " .K
% &
/7 "
* ") *
#* ' " $# . " #" % & ' " G " G &1 ' " CB & DG '9. & " '" " 1 * % & " " # ") * C " # # $ "
6
3
[View full size image]
#
.
& $
'" 4B
.
Layer 3 VPNs 1' # ' " ( 1B ' * # ' # " # " B * N " " # " . ' * # ") .N
( (
)" ( ) ( 2 . ' # "$ " " . . " $ " ' 2 " ( ) # " ( 1 '" " ' " *# # " . B " " * " $ # " *# $. '" # ' " ( " # # " * &1 *# . ( ) ' $C * . # . D. * * * * ( . . * * * "$ (
!
" ( $# "
* * "
" ' $
"
% & "
"
$
' " '"
" '
" " " $*
'
$* . ( ' . 2 ' " " # *2 . ' $. *# * " # CJ+7D # " ( )" " *#
; -)
'
E
%
.# '
'
(
) ( # $ $ * * ' $ $ 1 % '" .( " $ ' & $ 4 " # * " $# " $ # *2 * * " " N " " " "
*
# "
1
"
-
(
/
* + ") ' " ( ") . " . * & $ $
" '
' *#
$*
' 0
(
'
& $
'
/
6
" * ;)''0
$ '
*
# '
0
@
Peer-to-Peer Model #
#
# " * '
* *
( * .
)
" " * * -
'" * "
B
." * # ' " " ( '" # ' " *# " * * # ' # * ". # * ' '" # ' 0 J # " # "
'" ' % & " " ** * . % & B # & $ * # " J # B " % & B " " C 7D # ' C 7D # ' C D ' ) (
"
' $* ' " * $ " " * 0 - #* * ## * 7 " " % ' . 2 # * * * * " * B ( " *# (
#
" * "
" 1 "
" . B '" # '
* B
1
" 0 *
* ")
" * # " " $ # " "
' B
" " " $
•
* B " G " *
!'
' "
7# B
7*
% &
)
-
"
; -)
6
* B D
B
*#
E
%
* " *
'" # )
"" @ "
(
' "
•
* "
0
"
% &
7.
$
B
#
'
0
( B
C
D
7
': *# " " ( B+/ * #
(
*#
#
# ' " " $"
G@,;H * ' *
&'
"
C 7
/
#"
'
8
' "
"
## D
C
" 1
'
" " /
B $. ' " *C $ &
)
$. $ ' #
" (
* 7
"
" (
C .0 % & 7
(
B ##
% &
D .
1" (
"B # $ G " * $
"
-
7 "
## $
"
'" 1 D
.
* # # ) "
1 4. ? J "
.B
" " * # D# "
# 7
+ #
. "
.
.
/ *# . $ " C ' ## * .( " ( " * ( ) "
7
*# * B+/
%
& "
7 B&1
" ) "
"
" " # " *
$
7 1
" %
'
&
$" B+/
B+/
"
##
#
7
#
B+/ " "
0
2
>
# $
% "
* " " "
" "
/
"
:
; -)
"
(
E
&
*#
%
)'
B+/ #
* " B+/. "
" " *# '
#
"
K
%
B+/
# $*
@,;8@,;
+3
*
)
< A&
'
' [View full size image]
>
' B "
" > ##
'
"
.(
##
& $
#
"
"
'
*# B+/0
% &
" % & B *# * 1 " " . # " " $
B
J
$#
#
. "
" *
#
#
*
Carrier Supporting Carrier and Inter-Provider Autonomous Systems % & B " " " " 1 / *# . B " " ' $ % & B ( B * # * " B * ") * * # ' B ** 2 1 '" # *
; -)
E
%(
*# * * '" # ' # # ' 0% & ( # ' '" " $ / ' #
3
* ''
[View full size image]
; -)
E
%
)
0
6(
[View full size image]
3
A&
' " # "
$
'" #
. .
. ") #
-
*# $ ' ;
9
" ")
.( % &
* (
" )
*# *
'"
Traffic Engineering " ' ( ) ( "
# . #
) . *
• • • • •
( "
' $
( 7 "
( . 2 #
+ +
# (
D ( #
" (
#
( C 7D $#
2
# ") &4 B ( J # &4 B > ) J # >7 > ) . # . " # # # " I# ( " # ") ( ). ( ) J # " " ' $ # '
" " ( ' & $ 4" " " ( • • • • • •
"
* " *
C 7D " "
J
# &4B #
&4
# ' C1 D 1 1 "
C 7D $
7 7 B&1 / * + $ & 1 % B IB A
& '
" C D" & ) CA & D )
"
# $ "
>7 (
"
• •
") ' * ' I7 " "
. " * '
, 7 C , D ) % # C %D "
" " " "
7
"
( & ) L
#
(
C >D " " " " " ' "
>
& $ 4 ( ( )C D * " * " ( .
7
'"
*
'
7
#
.
(
#
*
* " # * 7
# ( " * "
"
/
( 7 " " ) " * % . & $ 4 * .( ( # ( # I% & ( ) &4 # " " # , $ ( * " #
( # # ") " (
'"
.
% & ")
& $ % &
$" ( 74 7
4B & $
.
I7 I
: 4
*
.
$#
( " * " " / : ( & $ 4 . " * " * . " ' ' # ( . # # *
## * ## * " " 74 * 4B
#
$ " # # ") ( "
* % & . ( " #
1
1 * %
C&
D
Introducing AToM 1
%
1 $ # * ' * " * 1 % " " * * % > ( " # * #
' % & % & ( "
$
& " % . * & ' * / * + $
* )
* " * % & ") & $ $ * % ' #*
*
$
)
" # '
4B $ 1
1
%
& % &
%" *
"
(
" .( & ' ** " . ". ' $ / * + $ '" " * I% & ( ) # $* % " .( ) ( " . # $# ' * " % & " # $# ( * * # N ". * ( " ( * ( ' 1 % 11&; * " % & ( ) * " " # / * + $ ' % & . 1 % 11&; ' % & " * # ( 1 % ' % & " # $ # *# 2 " " # ' & $ 4 * & $ 4 # . " 7 B&1 . 1 % " . * . A & ' & ) CA & D * * ) *. ( # * ." " $1 % 1 7 / ( # . " ' ( $ "" # " " * " () ( * # ( % & ( ) # * " * ) ( * & " %
% ' # (
( $ ( " ' " CB > D $ ' # " * # - ' " C ) ) D # # $# & $ 4 * *
*$ ' ( $# ' # ' &1 # ( " " * B > " $ # $# . ( ) * # $#
*
/ : 4. $ " '" ' # ' ' " CB & D B > " " * '" C D . # ' ' ' * # $# " C $ $D " 7
Pseudowire Systems Architecture &
" /
" : :
* +
*# $B
/
* + ' ( )
$ ' *
% & "
(
(
)
* '
B
(
/
; -)
%;
, ' 0
1
*
'A
"
[View full size image]
1 &
* 4
74 4 (
#
' &
)
% & 8 74. 74 ' * 7 74 " # #( &
(
).
J & 74. ' # ; .8 . , ( " #
&
(" &
(
" * 4
& &
4
,
1
* 7 #
/
" " $ 4 4.
&
% & ;
( " # " ' $ ,
.
74 ' ' % &
: : "
7 .
(
* (
&
"
-
# 4 # ,
74.
"
&
" 4
&
(
.
4
#
(
4.
74 "
-
"
(
" #
(
" ( 7 # *
# 74
( " * 7 " * 7
4
!# #
" ( " (
( #
&
&
4
.
"
4
&
4 4.
"
7 . "
7 & (
74 - '
#
" " "
C/7 D
( #
(
# B $# . 74
# ( )
( ( # ( ' $) ( ( " " ". $ " .
(
" J & # ") (
#
G
4
#
(
* $
( # 74 ' # $
7 ) "
4 (
(
7 # # : : 7 74 4 ( $) ( % & & A ( ' .( &4 '" . # $ " " /
$
Packet Forwarding >
#
" *# . * " ( / * + $ * ( 7 1 * " ' & " ' . ## " ( C+ 7 / +/ 86;. +/ : 6;. +/ :::5. +/ :::6 D " ( : $ " $ * . &4 . " * * " ' ## " " / * + $. " ( " ( / * + $ ( # " " " C/7 D. ")( # " " " C 7 D. " C 7D. " ** I # C I+D # ( *# G " " '
* $. * " ' & 4. 4 *# * ( % & # ") D ( 74 J & ( 74 ; $ 7 ( *# ; % & # ") ( ( ." . ( % & * 4 & $ ( ## ; ( 8 4 * ( " ' # $ 74. ( " # * 4. ( , # . 4 # ( # ( # ") 74 74 ) # # ( . " 2 * " & 4 . * ' . " * $ . ( # $ / * + $ & 4 ( * $ & 4 4. 74 " 2 4 ( ## # $ . * # .& $ 4 * " ( " # ") ( ) C
" B&1 A &
C
" # " ( " ) .1 %B
* &4 " " # ") " ,1%
# # "
$ # IB
# (
.
$# . *
B&1 1 % 11&;
. # " 2 . * # #
" D.
7 .
*
*
" " . * * ## # 4. < ( )%
* " C,1%D ( * * '
* ,1% " %
B & 7 $# * $# " $ * B&1 # * # B . " ( " 7 " " " *# " ,1% * * ##
" " * .
") "
"). $
") . $ .
)
#
## " * * * ")
$ A ( ' . *
* . (
Benefits of L2VPNs '
& $
" •
•
'
I% &
"
'
.
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
•
4B (
•
•
•
•
•
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
2 " / "
& $ 4B ' % & " * * ' " $ " ' ") , ( . * ( ) * ( " *# " * > '" # ' ( )C J D & $ ' " . &4B " * " " '" # . I% & # ' " '
# * # ' & $ 4 # "
' # # "
'" ' J
.
Inter-AS L2VPNs >
# '" # # 1 G '" # * "
' ( " ' *
. "
( " 7 * 1 " (
#
"
( 1 *
( 1
+4
"
$
(
* 7
* #
*. " +
& *
$
( " $
# #
$( "
$ *
' " * *# .
1 '
*
(
"
/
%(
7 " $ ' * " ( 7 * ' 7 . &
7 #
4.
; -)
" "
L
* (
'
#
#
74.
#
"" "
( 1
+ . ( "
. $
1
/ (
# (
: ;
3
)
"
[View full size image]
# # *
* & $ ( ( (
" 4" # *
1
"
( $ #
) " #
(
+
*
# " "
" *# $( $ * # '
" 1 + # " ' &1 (
" $
*
Supported IETF Standards " 0
*# * 2 J #. ( &4B > ) J ( 7 / • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
+/ +/
1
1 %
#
%
B & B &
7 / +/
#
" ' $ " *
7 / ") # " $
#
7 / >7 > ) $ ##
)
8 9. 7 D< :::6. 7 1 " " < +/ : 85. 7 D< 7 / * + * $< D ,1% % % ##
#
#
*
'
' B
J
% & $ B *
7
*. " I * " # '
#
/ .$
* % " $ B ': # ( ) $ " $ * " &+ # # B+/ ( * # ( " # (
7
':
B # # * "
"
* "
: 9:
"
'
'
( " ' $( B
" #
+
*
*
#
6
1
(
-
': #
-
'
$
. $ . $'
B
" 7 / +/
B
.B
$ & B " *
FB -
C+ D * # )
B +
*
# " J D J " ** $ J # .# " ' # "
$
"
'
# *
"
J C% C &+ D 1 " '
7
$ $
$
) # ")
( "
# (
#
" $# A ( ' . # ## " . " # " * " # ' " # "$ " B * "
/
#
# #
" . " -
"
&
.
" -
* * " # * # (
# #
J
$
"
(
' J
"
$
7 .
/
;
Forwarding Packets Through the Network Core 1
C(
. " * J " C J D 7 *# * " C+ "
7
* #* J "
D 1 D.
( $
B
# 7
A ( ' "
.
' ,
# ") $ J
/. #
. 7 J+ . " . "
( $
+ &
+ B "
7 $
7 (
( " # ") D
B
C B
*
#
G
( # ")
C& (
$
"
(
* & ") + * *
* B ")
"
& #
*
*
D
#
(
'
# *
' ' # ") % &
7
*
"
7 # $ # ") B
"
J
.
B
Packet Flow Through the Network #
(
# ")
"
; -)
$.
/
%.
'
; 4
*
[View full size image]
7
B
1 ' 7 C 7
"
( ) ( (
"
7
#
# # ") *( " B
& J (
*D # B + / , # ( " "
"
(
7 D*
*
. # ")
#(
* # ")
7
7 ( ( # ") 7 7 ( D # ") #
# ") 7 > " ' . 7 (* *# ( )" # ")
B
7 ( J . "
(
* '" . 7 # # ) # B
&
" 7 # J .
* ' " * * '
$
"
7 ( # ( 7 $ 7' 7 B " ' # ") . 7 *# B .( " B # ") ( B 7 *# ( C B C 7 * J ( * & ** * ## #* . ) # B . (
* > "
"
7
( ( # $# " ' " * "" J J & * " ' $ J " A ( ' . & ( " ' $ J " . J ( " ' J " C J #" D # ' * ' B * # ' " ( ) > ' " ' " ( " " # .< 1 < &1
Corporate Intranet % &
B
( $ "
#
" #
"
' ( "
# "
* ( ) % & ( ( •
) " ##
)*
* * * * ( *
• • " •
# '
#
# ( ) C>1 D $ . $" ' ' &" " " ' $ * # # " . ' ' " % & B >1 . * * (
( )* " # ## # $# . )7 . / * + $. C D. A & ' CA & D. ") ' , 7 C , D. 1 % # * # B&1 &1 % & B 7 # * # * % & # " " % & B # $ *" # " " 7 7 # " # " # " " * # # ' ( ) % & B " * " $ '
# *
# * $ $
K * $ * *
• • % &
(
# ' " *
"
% &
• • • •
• •
" B
"
" ) C&1 D ") ' * ( " * #
(
B
"
"
#
' ' " CK
"
$
$
#
'
$
-
*
7 B
* B
% &
D* ## ( % & B # $ " $" " " ' $ " $ # " (# # ) B
# $" # #
" & )
$*
.
"
" ' $
"
( • • • •
•
•
% & B&1 + *
##
) & B B+/ % & B 7 7 "" " * ## % & B $ * " " "" " " $ 7 " " " * # B . " " " B " " * # C 7D B 1 $ " $ *" # " C, /. . + '4. J . 7 J+ D " ( 7 7 " . " 1 B ## C D. " " B ( ) # * # # # ' ( ) / 1 .# 7 / +/ : 9: " 7 $ ) ( * " B .$ "
* ##
"
• •
"
% & B " " ( B . ' . B # ( ) 7 " '" ( ( ) * $ " B I * 7 " ## * B A " . " $ *# $ " * '" $* B ': ' * ' J ## # .$ " $ * # ) B # " " * " &I" $ * ## * ## # $ B+/ * " . " B&1 B+/ * ## B+/ ( 111
.
Corporate Extranet 1 *# * " # $ ( " *# * " $ / *# . * * * ( " # " ** " ( " " ** " " . " " * * " " ** - ") $ " ' $( . ## . * " " 1 * ( " *# * " $ > "
% &
B
. " ** (
"
$
$ &
"
" 0
##
4 I 9 I 9 I 9 1
"
$
")
I 9 * $# " # ' # " * . $
" '
""
/
"" I 9
B+/.
# *
*
*
"
# ") ) ((
+ # ' " "
*
" .
/
' " " *# *
(
0 # ")
B+/G
") 4 I 9
" "
( " N
; -)
$ $#
E% (
*#
B+/
' *
&
% & (
*#
-, )
[View full size image]
" *# " ' $
( "
( ) I 9. 7 ( 4 I 9 ##
. # ")
; *# .
$
"
B
"
@,;
/ * ' * #
$ 0
.$ 7
Internet Access 1 *# '" " * ' ( $ ( " # ' " * " " " * (B "" ( $ % & B " * * * ' ( # & /
$ ; :
( $ "" $"
" ; ;D
; -)
B
"" ""
B ( ( . ( ( $ " " ' $
" "
B
"
( $ 2 *
( $
3
# B
'" ( $G * ' '"
GA&
%(
3
GA&
C
H
[View full size image]
E
7 " '
[View full size image]
; -)
B *# B
.
( $
' * "
% &
'
'
(
%;
( #
H
• • • •
,# ,# ,# ,#
&
" 4
#
" : %
"
B
""
7
B ")
7 "
'"
""
"
Dedicated Per-VPN Internet Access 1
(
/
; :. * B
"" ' ' ( ) * " ( ( $ " " ' $ B " ## $ $ B " * # $ " " " ' $ *# . B # ' # " ' " B # ' ( ) B
B
" "
#
*
" B
"
'" 1
# " $ "
"
" " ' $
B " " ' $. * $# ' . * " " # # '
*
Shared PEInternet and VPN *
" " " "
" ' $ B "
$ " .
"
*#
7 B+/. *
)"
"
7 B
.
( $" B C &
B " D
* I
$
"
*
B
" 1 I "
" (
"
1 B (
# & .B . *# * 7 ( $ D B . "
CAK '
" ' $ ## * " $. 7 . ( " $ #
' $
"
# B
"
.
"
(
* (
"
" "
"
7
'
7 " B #
* -
" " $#
" B
7(
' " ' $
"
7
* *
"
C D (
#
"
$
"
'
" " " ( $
7
' "
( $
*# . " " ' $ A ( ' . # " ' *
$ " " " '
( B
( *# * 7
"
"
"
#
$(
Dedicated PEShared Backbone # " #
B
' " * ") " ' $ " ( B $
" &
B ""
" ' $( "
" $
7 " # $ B A ( ' . $ ( # C& D * # B * . " J ( #
(
" ' $# ' *2 ( " *# " " ' $ / * B " * B
* "
"
7"
" 7*
$
#
*
" 7
. $
7" $ ) " ' ( * ( )" ( # & * # " " $ B 7 & 7 " ( )" *# $ J " " ' $ 7 7
"
* "
* B
$
B
"
7* * ' (. " $* # " "
" #
A ( '
. "
*
Managed Central ServiceShared Internet Access * * ) (
& ( 7"
) B+/
' '"
( B+/ "
* # * ( $I 7 *
B+/ ( " $ C 1 D.
'" *"A ( .
*
' 1
B *
(
$B * I 9
'
"" C A D. # C, 1 D ( D " B+/ "
'" *
#
#
# ' # " B " B 1
* C 1 ., 1 . (
# " # " C $ I 9
* D. B+/
B
(
1 . .
7" * " "
" 1
(
* # .# '
* "" # '
'" " * ( ) ' B "
( $ ( $ 7" $ *
"
'
" ' $ B " # ' ( ( $ "
B $
"
" #
$
"
(
*
). ? J " # .
' " * $ # "$ "
"
)
" * $
"" # #
(
*
.
' *
# (
•
.%" "
.B
$ &
*
4
" %
@
$
*#
'
( D "
( #
•
"
. *
"*
"
"
•
"
" " "
B B+/ CB ( $ 7" " ' $
B
.
' "
" *
&
$** %
-
%
(
.
" /
" " .
1 % #
.
Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks 1 $B * *
" B
" * # ) ! " $. * # B * B * ( ) * ## A " . ( ) * " * (% & B " . *# $ ' B # $* * D # B * C[ D B $* " # "" ** " * ( "" ( )
# " " C[ " (
$*
#
> *
B *
# ##
( J
"
* #
) . "
% & . J
B
" *
) B * C1 D # '
$
'
( .(
0
DB $ "
' (
)
J+7 *
". B
( (
" #
$ *
C
"
B " * 2 >
(
( ) *
$* # * . 1 (
B $
'
* "
" (
"
*
$
*
Inter-AS VPNs +/
: 9:
"
"
$ "*
" ' $ • • •
B
1
") ") B ': " ': "
"
*
#
1 * 1 ( "
" +/ 4;:5
" *#
* ' " * ( '
" ' $
(
1
#
* 1
$
*
# ( " B+/
+ (
#
B&1 # " ' $ " *# . 1 + 4 ( 1 + 1 " 1 1 + ' +. ( ) " # ' A
B
(
* " " "
% & "
( B 1 ")
+ " ") " ( 1
1 1 * "
1 ")
" +
" +4
+ +
B
# .
1 "
") ' B B "
/ " "
" B
" " ' $. 1 + " B . B " # * # 1 . B B: * # 7 ( / ( 1 * * # N B . * . $ # B
': # 1 ( * # " "
*
" (
# " '
" ' $ ## " ' $* . 1 +
(
' ':
"
" "
( "
B
7 " *
$ # ' 1 " 1
' #
': B
" . "
" ' $ ' # " ' 1 # # . " J " " # * * ( " 1 "
* # ' * ( ) ' " *
B
* +
': *
': #
1
.
$ " " $
+
* ': $
( ':
( ") > ( $ .% & B " " ( ) * ) ** * % & B " ' " # $ * $" $
*
"
Carrier Supporting Carrier 1
*
"
* C B
" D
# " " B
. " J
"
"
7 C .( 7 7
0
" ( )
" "
( " $ (
'" ' # " " # $ & ($
" .B (
"
)
" $ " "
"
$ * ( )* '" # ' "
"
* !
7 " / ' #
"
$ 7 "
)
# * "
" " B '" * % & B B ( " * " ( # " " B . " "
" >
" " $.
( )* '" . B " * B * # " * * '" # ( ) C&1 " *
"
B
"
" 0
B
$ B #
" " "
% & " *
B
#
' B 7 D
#
' $ #
(
" $ # "
" 4;:5 $
+/
.
" " " ' $
" "
7
"
* . ) " " * B *# . $ # " D( B ( # '
( . " 4 $ $ "
" '"
% &
/
*# . * # * * '" # " * * C * # ' '" . D ' " ( ) ( ) * * $. " # " * $ B * ( ( B $ " " ' $. B .
* ). ? J "
" " .
$ 0 ,
# B
Heterogeneous Networks .(
' % &
*
A ( ' % &
# .$
* ( " #
* ( )
% & J+7 % & % &
1 7
#
&4
'
# ( "
"
* *#
"
.
/ % &
':
# * " $
. ( .
" '"
" * . * "
( #
"
*# . % & # ") " " " ( ) # ' " # " " (" ( " $ ( ) % & % & # ") % & ( ) " . ' ( ) . # ") ( $ # " $ "
)
" A ( '
.
J "
% &
' ( ) * ##
" . '
&4 '
(
* "
"
$ #
" ' ( +/ : 9:
7 / "
" $ #
$ ( " *
* (
B 7
" #
'"
# #
# " B "# " " *
'
% & "
(
' ( (
)
B "
*
)
)
" * 7 J .N J
" B
(
$ $
)" $
* % & $
/ #
' % & * )
"
7
"
( ' (
* D
*
" *#
)
7 *
J
"
#
*# (
*"
*" *
# ")
*# 7
( $
B
!
B
* $
% & "
"
" ; 4.
"
.
" "
B
': "
"
( ) % & A " .( ( " # C& ' % & "* ' ( $
% & )(
( B
% & * ( )
B
' "
$ 7 B
( " % &
"
( ) % &
" • • • •
( ) *# ( )
)
B
# ") $# 0 #
$.
Managed Central Services >
B+/ B+/ "" " # " . " 1 ." * "# ( " *# # " '" C '" $B ) (
B
#
( #
' * * "
*
"
& (
% & B ( % & " $
( # $ (
B
• • • • • • • •
"
"
(
%
"
(
'"
"
'" #
*
1 * ) " '" " B ' #
* $
B "
B+/ " *# ' # " " # (
" ' $ "
'
" # B
$
B (
D
" # $
B+/
") " * 7 > * >
(
'
$
'"
" * ) *
$
* *
"
% * "$ "
+ % %
* $ $ ""
" ,
* *
7 "
# ' " B+/
" "
*
K
B
$
'"
$# " " " . $ *# $ * ) B
B
'" "
"
"
" "
2
'"
$ * B+/
(
.
Making Applications and Services VRF-Aware " ( ## ' "
'"
( ( (
( ( D
CB > * * *B
)
*
' "
# .
" ## B
"
'" (
G#
*
-
"
" "
B
) * * *B 1 B ( . ' " # B # B ( B ) #G " ( ' B #
B+/ ,
" . '" " " "
( ( /
* . # ") *# . ## ' " " A 4 * # * G *B 1 ( B+/
(
.
' " "
-
*
* * ) # " *# * ) $ B+/ " # " $ J * B+/ ( • • • • • • •
B ' "
( (
B+/ B+/ B+/ B+/ B+/ B+/ B+/
( ( ( ( ( ( (
( ( $ "
) ## "
#
"
-
B+/ ( $ *# * " & $ ( *
*
.
# ##
-
* *
B+/ $
B .( ' *# # "
*
C 1 .
A
(
., 1 .
A
B+/ "
+
$D
1 ( A + IB++ CB IA 4 I%J * * # "$ #
+
+
C% C
.
"$
J
(
" D " D
( $ % D
"
VRF-Aware Address Management & "
* *
" *
# # B " ' '" A 1"
#
*
* ( " # $ ' *B " ( ( "
*
* '"
1
" '" " " * (
A
" A
*
. 1 B+/ ( $ *
.
# " "
* *
'" '"
#
# #
'" # ' ' '
"
# ")
B
* "
( # $ " ' $
(
* * " * ( # " * / " # '" . " ( $ ' * I 9 *B 1' I 9 * *# * * & ( B+/ ( 1 B+/ ( A I A + $
# $ B+/ ( 1 ( $ ' 1 " > " A . ## A " $ 2 B * . " A #$ A #$ #$ B " " *
A *
'" A & B # ( *
(
*
"
"
* " .
1 "
A "
* $
-
A .
+
$
(
(
B B " ( " "
7
7
( A
* A
A ' " ' . * # "#
#
'
A B
7. "
' "
1 7 B
1 # $
B+/ .
( 7
(
. ' # . (
" ( $ . $* ) #
"
'"
+
/
; 9
; 5
%
-
; -)
"
2 6
[View full size image]
; -)
%
-
36
@,; 3"
[View full size image]
% '
I" * ' "
.$
'" $
'
#
" B
(% &
" * )
( $ " ' $ #
'" # ' *
Supported IETF Drafts % &
& B
( ( "
' " #
$ B
"
#
4;:5 ## 1 . +/ : 9: # J+7
' ( "
* * " ## ' ' B . (% & B "
7 / +/ 4;:5 " * +/ 4;:5 ( +/ : 9: +/ : 9: ## " '
Summary "
# B J L % # & B B ( ) "
( % & ' ' " ( B " ' $
" ( ) % & & B ( ( ) '" " ( B '" " " ' $ " # # (% & $ * * $ * * # ' $ " ( ) " 7 * & $. $ ' (' '" " ( % & & B * " '" L
& B ' (
"
"
(
*
Standards and References J " #
. ? *. ? .
1#" "
.
'
#
N )
$ &
Chapter 6. Remote Access and IPSec Integration with MPLS VPNs #
' " ' $.
" "
( " # * " ' /
* *
" "
*
" ' $
"
# + *
(
D* $# ' " * "" " ( ) 7 # " * " N " ' $ * $ * "" " 1 " " # * " * "" " " ' $. " " * *
( $
'" # "" "
+ * " " ' #
B
# ' * B ) C>1 D " *
" "
'
C D# " ' $ * " # B ""
"
( " ""
" " )
# .
(
*
) CB
' (. $ " # B " # B $ # #( B "*
"" *
/ % &
"
"" '"
&. " (
" " *
# *# . " * "" B # '
"
#
'
" " $#
*#
.
(
"
& $
*
( B
% &
Technology Overview . *
.( "
*
" C 7D
*
- ") $ " " " $ *
"
; -)
%,
" * ( ""
"
# (
3
## # " " $. '" " '" # ' ( . ## " . /
* ( $
)
J "
" "
' ' "
" # "
"
# (
'" # ' $ " ** " # * " # *# * " *C D. * $
" *
$ 1
#
(
$
)
* .
#
" J
" ""
*
.
* $ "
" '
" #
,
$. " $ ) ' *# " ( # $ * , $ 1 , $ # " $ " $ * . 7, /, * # $ " *# ' # # < " < ( " " *# " $ ' $ $ * * * ( " 1 " *# $0 "" $ * # " # $ * . $ * " . " ( ' ( ' $ $ ' * " $ " "" , $ ' ( # * . % & " $ # " # ' # # " * ( )
$
Security Overview and MPLS >
)
* ")
" $
$" " # . $ * ( T< * * $ . *# . " $ N ( 0 #. . " . )* ' ' $ " . # G # " $ " ( ) # *
*
"
-
"
$* ' "
7
$
" (
% &
B " $ " $# " % $ *. * ( ' (# "
- ' " ( " $# ( )
B -
" $ , " # . # "
# .( ( '
*
*
. (
" )
.
$
. .% & $ " *
$
* # ' " '
$C N
B #
" (
"
% & B * 0 #
) * '
# ' "
% &
' '
'" # ' # & .( " *# . # $ " " $C * ") * "" " * % & .
$ .
" B
.
$
$"
/
" B
* / ( ) ") ( )
" '"
# "
$ ( ) $ * " "
" $
$ # " *# " D
$"
* D
( ) * *
$ '
' ( * ( * '" # ' 0 # # " ' * . *# . * B '" # ' . ) $ . * '" # " *# % & B *# *
" * ( " " ( )2 * " ! 7 " 2 ( " $ # "$ * . * $" " ( $ " " $ 2 ' ' # * " 2 ' " * " * * . # " $ * " $ # " ' $ *" # " " 7 $ * " # " " * $ " * " ' '
'
* * * " *#
*# . * 7'
, $
*
" $# " #
) $ $ ) $ " #
" *
" #
' /
' * # " ' * *
"
,
*. " '"
" $# * (
# $ " $# ' " " $#
#
" *
. #
"
" ) $ "
" $# *
*
'
" $# ) $ A ( ' . . " ")
(
#
.
'
$
*(
'
#
"
" # $ (
*
""
$ *
*# * *
(
' #
##$
) "
.
,
. #
1 ( "
( ) < *
* $ * '
.
$#
# *
"
'
(# N " " .< # ' " * . "
M/ 2
$. $
' '
"
# * . ' $ ' " ( * * " " . " $ ' " ' " ' # " 1* ## " $ * < " $ " # " ' < " $ # "$ * " * " $* ( $ * # " ' % $ " % & B " $ ' " ** " $ $2 " " , *# $" * " * ( ) " * B " '" # ' " ( "" # # ") * '" # ' ( ) " * " ' # * " # ' C 7D. B # ( $ " " . . % & " " " " " . . " # * * " # # *. ( " " "" $ " $ " " " " # " " $
7' * # # " # ' # '
"
.( (
.( ). $
( •
)
* * *# ( # "
" '
B
$ " , " .
$
" * # ( (
$ ( *
' $
'
'
"
$ *
$2
. * .$
" "
•
, "
.
" "
$
. A ( '
.
*# "
*
T *
' **
$ #
' (
*.
" " *#
3 * ) '* ) * # " " " $# # $. 0 * G " % & B . * # " " +/ 4;:5 ( &' 6 * * ) '* *# * ( " " * " $ *# * ** # $ A& * 6 / " $# # $. ) $ ' ' G ( ) . *# ( ) # (
•
1 %.
$"
" # " #
(
)
% &
B $
0
$ "
*
$ •
6 "
' 0 $C * .$ "
-
0
'
*
#
"
"# D >
' 0 " $
) $
( "
# "
$#
#
*
-
( " " $# # $ *#
*# "
/ $ # . . ## "
/ #
*# #
"
% & #
" * D
C" •
. 6 " $
"
• ( # $
$B *
"
" $
1 % *
* $
$
(
#
(
$
# '
(
*
(
) ) " " ** # " " " " ' . " " *# ) . *# # ( ) " *# $ $ $# " ") "" ' . ") * ' " * ( )
*.
' #
"
" " # "
'
$ #
6
# * (
')
") # * " " $
$* "
"
' "#
*#
# A ( ' .( ## # C AD
") # * $
% &
* ).
$ % &
)
) "
( ""
* # "
'
B
2 2 . '
# (
. '
& * ' $
$
* A ( ' (
,'
*# . * $ $" $ ' * *# . ( ' . ' $" $
) * B
"" ") # *
*#
'" $" / * + $ " *
' " # '
* #
" $ '
$
$ " # * "
$ $*
" ** G ( ' . A ' # # "#
" " .* $ ' "
$ '
$ .
$ $
, 4B . " " ' # "
MPLS VPN and Security ,
% & % &
" "
B
B "
*
#
. "
# " "
'
#
$ J B > # "
. * "
$
#
' B
$#
.% &
" " ' "
B
" % & *
% & ( ). $# " $ #
' " * ' "
$ * ( ). " * ## " " " " * *
"
" B
. (
. "
"
"
•
•
$' " '" # ' B " * " % & ' ( " $ " " * ( ) $* "
B
* $ *# " $ , 1 % ( ). ( * ' " " " " A ( ' . ' " " " ' " ' " * " " , % & ( ). # ( " " ( ) " ( ( " " " # ' " *# $ " A ( ' . " * 1 '" # ' " * " $ B " * * $ (
' " # " $( '" " " # % & " $. " # % & " ( ( " " # " " "
"
$ *# . * " *
"
"
-
*
B
# '
" (
* " "
-
*
* % & # ") ' ' ' '
$ $
)
'" " #
")
*
' "
$ ( $
#
6 -) " . " " " " $
# " " % & B * ## . " " " " $ "" A ( ' . $ # " * " " " . @ 6 ' 0 ' # ") ' % & " % & " '" *# " " # $ B '" # ' C D " ' % & " C
" *# * $# " $
' "
&
' #
# /
"
" " " *# . . 7.
. "
$
# " ** # *
" 7 " )
"
$
# 0
" # '
.
B *#
(
) * # ( $ # '" # ' " ## # $ ". "
B '
$
" " $#
" •
3
# # 6
D *
")
#
(
B # ")
#
)-* # "" B . ") " # % & ) B . '" ' ( ' .( " # % & ' B " B
") ")
.
" # " "
)
" * B
% & " " # ")
"
% &
" "
" ) * ") "
"
"
"
"
"
"
$ "
*
% & B ' (
'
$ ")
( ' "
" ( "" # '" # ' * " # $ " ""
-
"
* % &
*
" "
"
$ "
$)
) 0 7' $ ") * B " # ( # ") ( B # ") .( " " # ( B
#
(
>
% &
*
$ *
1
•
(
'
(
" % & G
* $
"
B
")
) ." )
" ( ) *#
7(
( ")
$ '
#
"
#
$
#
(
(
#
% #
$
#
' "
#" B
"
$
1
'
* ' * '
%
B
)
B % &
'" B "
/ ! 5
* + $. " *#
$ "
1 % # "
"
0 & 31 8;
2 " , ' 0 31 8; , ' 0
,
) #
4
-
-
6 * ) )
6 (
&
' 0
&
6
+
+
6@
L
L
L
L
L
L
' 0 % &
+
"
"
(% & # • • • J
#
# II((( * " & $
B + A B "
#" # # C J D *#
#
" $# "
"
/ ( " "
#
% &
$
B
D#
#
#
* " % & D
#
*# * # 5 5 4D '" # ' 7 " * *# . * * )
; -)
IO'Z 9O Z "
B
L
-
O Z' B
'"
*
"D ") "
% &
G$ *
(
Z
C
& $ " .( #
B
" * " *IT
" C
%& #
%3
'
"
B
#
( " * *
. '" # ' ' % & " $C *# . ' " " " * J ( $ " * (
"
") "
" ")
.
(
$
#
" "
Attack Scenarios ' '
"
$ "
2 "
* 2
* "
#
2
1 " *#
*
( * "
. " *# ' " '" / " "
% & .$
"$D * " * " # " " * $ " * / *# . * " * * " . $ # # * $ # * " * $ $ . " *# * * ) " $ " . " 2 "" ( ) # " . * ) . ( ) " . ' * 1 ( ) # " C , D '" # ' # # $ * ( ) " ## ,1% " $# "
$ *
$
C
"
"
*
% &
"
$#
2
B * *#
.
$
* "
2
'
# *
.
B (
> " $ . " ( ) ( . * " ") " ( ) . " 1+ # ." ( " ' % & B ' / * + $ A ( ' . # . " * * " " * B . 2 * * " # " " *# / * + $ & ) " C & D' " " ( ## * B # " $ " " ' $2 ") C&1 D ( " "
" 1 $B $2 "
•
(
)
•
. " (
.
•
/
5
"
* .
$ % &
"
' ( % & B
)
B
" '" .
B B 6
'
#
6
"
"
*
)
G. # / '" # '
#" " " * # * $ '
* "
H6
"
#
$
(
/
*# . *
B /
)
.
"
.
*# .
*# .
*( " B '
*
B
.
* "
C D. #
* "
" * B
.
*
$
# " "B C4D. "
C D (
)
*
.
' "
.
. "
( ) B
- #* *#
E% 3
#
"
.$
"
# ")
B
; -)
[View full size image]
1
* "" & $ 4 # ") (
/
$0 .
5 :
( "
C4D. $* . (
'9 # ") * *
") ) .
#
) .
; -)
$" * C D > # "
" $ " * #
"
#
%
'
. " $
)
B B C D. $ ' " ** " 2 . " 2 ( " ( ) * $ *
*
' "
#
$ (
.
': # ") ( ) #
*
0
63
[View full size image]
#
" B " "
% &
B
'
*
. (
# "
$
"
(
)
* # "
"#
#
'
# ' B > % &
"
.
$
#
"
A ( ' . * % & '" # " * * *
" '
1
" # * " B .( "
% & 7
.
") B
"
. B (
(
.
*
*
"
A ( '
.
") B
"
)
" ' $# # * " ' B
* #
B
.
1
)
"
"
B "
)
.
" "
) $
" *
")
2
(
( *
B * (
" .
"
B
* #
.
A ( ' . ## " $ / *# . B " "
B
*
'
'
# ") "
$
"
"
. ")
") .
( ") " ").
7 7. '
")
" $
B & : 9:. < J I% & B ( ). B " * " " • •
( .
)
6 '
6
% & *
"*
$
' "
"
* " $
. C/
" D
' (
"
111 .
7"
#
$
' *
.
"
' * (
1 %
( " '" #
" , " '" # ' ( / * + $
(
" *
$*
) .
. 111.
*
'
"
" *#
" (
" .
" " " $ - ' ( ) A ( ' . ) # $ ( ) . # " " ( B % & " # $' ") * . # " ## # $ " " " $" % & " . " " $ # " *# * .B . 1 ' . ' ( " ' " ' # ' * # * A ( ' . # * " '
'
##
'
* % & B " 1 $#
- #* " *# $# " $#
" * "
"
"
B "
) .
'"
- #* " " $*
" % &
#
# $*
*
" ""
B
"
) #
(
"
B
. ) $# " B
$*
)
,
*
" .
. " " *#
" ( )
" .(
" $
* " " B
"
") "
## # " $ * " *# $. ( * " ' "* ' " CK D * '" '
% & " * " " " $ "
( ( "
"
( ) ") * B 2 # ") . " " * # "# ## # ' " # " . ) * C &1D
. ' * * " "
)
") * B
B
$ "
" '" # " * "
$" '
7
1 "
' $ $"
""
$
"
*# -
* " " / *#
*
B+/ 5
( " " **
'
B+/ ) #
+ &' , ) 1
(
$ "
CB+/D B
" ' $# " "
* "
' # )0 B
.
B
"
7 *# " ** (
" " . #
7 " C & D ( B+/ - #* C 7D "
.
" .
*# " " B+/
A # " ' B+/
% -
6 -) + , )
6 1"
"
. " ( B+/ ( .
7
@,; " *
ip vrf bank_A rd 1234:10 route-target both 1234:33 ip vrf bank_B rd 1234:11 route-target both 1234:34 interface serial 0/1 ip vrf forwarding bank_A interface serial 0/3 ip vrf forwarding bank_B
1 4
+ *
* ( )
(
#
""
$ $# " " **
(" #
&'
(
(
%( @,;
6 -)
7 & A ) 1.
" " 7 .# ( 7 * * B IB ( # ( ' * * G . B 1 " B *# # " $ ( . " $ * B B " $" " * " * B ' $ * # $ " ' " (
" "
* $ *# " *#
* # '
" # "
( *
'
* " "
*# .
#
.
#
* " ") B "
$ ( " *
"
" *
"
" " ( "
# " . # " .
. (
*
* * ( "
*
$ $ ' $ ##
B
. .
*#
(
A ( ' . $# * " '" # ' . # # $ ) ( * " '
'
# "
* # ' )
( " * ( " . 1
# )1
'
" * $
$
*
# * .
"
"
# *# * "
,
*
*# ( # '
"
" "
' "
'" # .
# (
'" # ' ) $
' "
(
'" . #
"
# ' * " # " " . # " " " J $. , , . $
. * " *
*
" ' $
$
" * "
* "" # $
)
" $ $ #
"
#
" *#
) #
A
# (
# " " .* $ * " * " " ' * " " * " ( , " 1
(
$
( ). )
( " * " . " " $ # ( " "
# "
" *
*
#
" .
.
"
.
$
( '
* )* . 111
( * '
$
/ * * # * "
)
'
$
.
* $
*
" '
,
# *
" * . * $ ( )
"
/
I / "
$ *
$
"
% & . * # * $ * ( # " ) B . N B ( ) # " *# # * " $# *
'
#
"# $ $# $.
1 # ' (
( ") ,'
.
"
) #
. $
, (
)"
Internet/Extranet and MPLS Security $# * $" * " *# # ' (. ( ( ) /
$
* $
; #
( ) # $* . " *# $" ". . " $. * " * *< .< ( " ( " '" # ' ( )% & * ( ) ( , " ; # " *
* # $ "
' *
$
"
#
"
$
$ ' (
1
2 * '
'" # "
'
)
' (
#
( $ ## # # "# * # " " $. ") * " '" # ' ( ) ( . " ' ( ( * #
.
"
"
" /
. "
* "
* .(
$ * . (
"" '" # ' *
$ .
"
'" # ' # * $ .
*
" *
$
"
$
"
/
. #
" #
( ) * . " +/ 4645 C
" #
'
"
# " "" (
% & B " ' $ " ' $ * #
"
" ' " $ # '
" "
1
#
#
•
"# #
(
•
*
"
6 $*
-
) 7
" #1 . " B "
•
1
" . *
$
" 2
.
)
" 2
#
.
2
. " " $ " " $ # ) " # ' " # 2
$
$*
$ " B *(
"
.
"
*
* 2 "
$
"
"
"
*
.
$
."
*#
$ )
# $*
" $
" (
* N $ #
B
@
"
"
(
% &
#
#
$B " * ( " '"
'"
*
* ( $
" 1
%
) .
## $
1* 9 # ' 1* " > 2 ;
•
(
* "
* ' % & B % & # ' . "
# $
" $ ## $ 6D
.
#
"" *
"
% &
(
(
""
#
#
.( "
% &
B
'" •
•
•
1 B ( # '
( ' '" # ' * " " ' $ ' B . ") B * * B # $* . " / * + $ 1 % 1 * % & B B " *# * " * 0 " # $* " $ ( . " $ # ( > * " * B ( # $ " " $ " . ( " $ # " " # ( * ( $ *
**
")
*
$. ( # " " " #
2 $ "
. .
#
"
( $ "
' .
"
B % & " (
( ). ( " % & " ' $"
* " .( $# " .#
"
$
" "
$
" " # $
" ' $ "
$
" ' $ ( 2 " " " ' $ " $ . "
(
.
#
$2 *
-
"
$
'
1 % (
"
) $ *
'
( "
*
( "
'" # # * ( )
. "
' "
"
* " # B
'
$
*
") 2
"
*
B
.
*
"
(
2
$
.
B
# ' " $"
(
'
*
"" ## " " *# 0 *# " " * " " ( ) '" # ' (" $" #
" ") ' ' "
.
)
% & # . (
"
"
$
( ) ' $ *# " ' * " # " *# " A ( ' . # " '" . " ## *
'" # ' " $ # " " ") .$ * " # C " # ' ( )D ' ( , " . C " . * ") # D " " $# " $ ' ( "( " . # * " $ * N 1 # * "$ N " .* ( # " "# * " $
$
" .
'
" -
*#
"
) $
"
* " ## "
-
. % &
" " 7 " " " . " # " * + $
/
#
, *
*
B % & % &
"
# ' B *# " $
'
2
.
"
$ '
2
*# " # '
"
$"
" " # ( 1 % & B
* B
"
") # " ' ' ( '"
* ' . '
* ( • • •
$ 1
( ) ( )(
#
7
7 " *#
"
"
" $.
'
# "
( ( $. '
" "
' $' ( ) "
$
#
(
( ' $" " # " "
' N
)
$
" $ ##
*
( '" #
" "
*
*
" "
0
#
(
" ' " "
" # . . '"
. ""
" ** '
## " $
D.
. "" ( #
'" # '
' ")
*
D
'
#
*# " " "
"
"
* " * $
"
* "
'
$# " "
##
" "
" " # * " * * $
## # ( * *2
"
" * $ ")
"" ( ""
%Y '
"
# " (
* ##
*2
" " 7
.
. 7.
") 7 "
7
"
'
.
$# #
$
" **
$
$. .(
7
* "
(
1 ( 1 ( 1 ( ## "
' ( $
"" *# " "
" $
( "
*
2
$( ")
$* " 7
*
'
" "
$ " *# *
$
""
7 '"
( *
#
" 7 "
*
(
'" ' " " ( *# *
"
# ' '
" (
7
# " '
# " ' "
'
J
$ "
'" B+/ "
- ")
" " **
) '
7
(
) #
.
(
* *
$
"
"$ .
"
" $" .
*B "
*
(
"
B * "* "
(
*
( D*
""
" #
.( " "
"
"
A ( ' . C% & IB " " $ ( # " * * "
" 7
#
#
' # $*
" '
# 7
#
• • •
" $
( # $ # #
"
""
'
"
# 2
B
B
"
"
"
C * '
"
B " $
"
7 B 1 ( . # "
' -
"
) 2
( "$ " ** %Y
#
( #
"
7 $# '
#
'"
7
"
"
#
B
C (
B ) *#
#
")
#
.
.* $" # '
*# * # " $
" " " (
C 1 D '"
#
'
* " * 1
. "
(
)
' -
* " "
( ) $" *
*# * $
IPSec " % & " *# 9. " ( C # * 7# # / $ " " " # " ' # ") ( " # ( " # C& D. J+7 1 * 66
*
" D.
- " **
"
# ")
6 &
(
66
*
) " @,;
" &
"
$
B
""
7. " B " ( . $# " $ ' ) (
*
B
B
':
.
" " # ") B
(
B
B # " "# # " " " (
B
# '" #
'
"
# " ':
"
""
** 1 A +
# "
* ' $B
B ':
"
7
> " • • •
" B
2
# " % & "
" ")
% & # "
"
$
-
*
(
7
•
*# $
$
B
). " *# * "# " ' "D ( ) ( ) D 1
"
(
#
$"
' ' C
"" ( )D )' " D C# $. * " $ ' "
$ ( * " ") $
C C
* ' "
* #
.(
$ A ( ' (
$ . *
(
* ( *2 # '
( "
" $. " *# *
$
( #
(
# " '" # ' ' ## . ( )*
•
'
0 "
"
)
" #
'
$
" $ .
$
$ ' (# " . " " " *# $ "
2
(
" '"
* '
*
'
$. ""
* C &1D " *# * " * * '" ( "
" (
"
"
'"
# " # # " ' ( #
## $
*
) " *# " ") $ '"
"
"
") $. " **
$ " *
. #
'
.
" .* 7 7 % B
) * # " ' " * "
'" #
• • • •
* *2 " " * $ $. ( $ (
$# .
$ ' *( "
* ""
( (
. $
" '
$.
*
$
*
#
" '
*
"
*
• • • • • • •
7 ## 7 7 ' 7 # 7 #
* (
0 "
"
#
"
# " '
)
*
'"
(
I #
(
$
# I $
) '" # #
'
'" # " **
' &1
"
* *
( )# * $ # * $ $ " * " * " * " * " *# * # " * * '" # ' $ " * ( ) ( " 0 " * % " * I# " " * " *# * # " * * * '" # ' ( )
Layer 2 and Unmanaged VPN Service Considerations $. ' $ #
$#
# $ " "
' "
$ "
"
#
' ' * ( ' " " '
" "
*
" $ C
$# " "
" 7
*
"
" * "
D "
D
"
7. #
" "
- #* $ " $ * (
" * "
#
* " " " "
*
" '
7 # (
* "
/ * + $ $" $ ( " # " # " " " .* )
# $ " $. ""
"
' $
A ( ' ( "
$ "
#
$
1 %. (
. # $ " $#
-
$
# $ " "
"
""
C B "
B *
'
•
( "
' #
'
'"
#
&1 . $ * # # " * # * " * $# " $. # * " # C $. ' '" " " # " '" * * B ( " $ " $( " . " ## *# " ## " ( ) #
)
& ' -0 "
. $
*# " * # ' * "
Design Option Examples % & B # $*
7
# $ " $
' " *
.
")
B B
"" # " * (
"
$ " *# * ( ) * " $" ""
(
( '
(
" D"
" $ -
.$ " ' $ *
## # " 7 # "
) . $* #
* '" (
*
B&1 #
"
( $
* " ) *
*
.
7 * 1 " > - ") $
-
C B D
( " " " ** " *
" " * " $
'
"
, " #
) ' "
"
#
7 #
(
# (
'
" 2
. "
$
"
"
*
* ""
$'
B C 1 D "
/ $ N
" "
"
## * " *# * 4) & #
•
"
# ""
*# . #
# " (
" ' & ' -0 "
'" $#
*# . " # ' % & " " ( ## " "
( '" # '
(
# )
.
#
" *#
" '
B ""
"
'
'
"
'" * I 1 * " * " " ( # ) . ##
$
# " "
'" # "
"
* • • •
' . * 0 " .
" " ) $# ' * (
B
'
" # A ( ' . " # ( )#
# " * " . $# "
. ( $
7
" " ** *# * > " 7"
1"" ( (
(
7 "
• #
' "
*
* 0 * "
7
*
"
' ")
* "
.
*
J
" *
(
"
*#
"
#
0 *
.
-
( #
0
B
" "
0 7
$
* $ '" # # " # " " # $* '" # ' * . "
" " "
* *# " "
*
*
# " ""
(
* 0 " J *
#
"
" ) " *
' . *
*
# ( B
#
* • •
" "
* # * ## ' *
# •
"
" *# $ C D ' "" * # ( ) " ** " $ " * * ( # ' * N $ " ' $C " ( "" * ( * * $
'" $.
* #
*
' $
* (
"
*
* "
" *
)
" ' $ # ' '"
3 0 0 & ' -0 > "# " " ** " ( . $ $" " ' $* ## # *# # $ *# * * % & # # " ' *# I # # " C+ D * ( ' B
# ' (
1
' *
# 7
#
"
# $"
*# *
/
•
* # % & B ) "" $* B
J $ $ D
"
* .
#
" "
(
# " 1"
* B " $ " * 1 * * C # # " "" # * ( ) * ' " * $ " ** " " $# ' " * " 0 ( ) ' * * " * *
)
• • • / "
$* '
' ( "
* " "
* " $
.
#
# * 7
#
( 1
*
"
*
B
( "
( " $ # ) " "# # " ' D. ( $ * * 7 . * " # ( " * # * C & $ % & B # ' D 7 " ( * (
*
* # 7 ( ) # * 7
'
A ( ' *
' *
'
" (
# * $
) #
"
" .
* 0 # * 0
) $"
"
#
' *
*
*
#
"
*
(
( +
" *# ' % *2 #
*
"
I *
# " ' . $ ##
"
# " & $ " # ' # " C D * " # " * .
• -
J $
0 # "
• •
"
"
* *
* "
* ( B
'
*
*# "
(
#
7 '" #
"
* "
" *
"
( $ .
( *
7 #
"
&1
#
"
# "
7 & $
4 (
# "
'
""
)
$
7
" " ( '
" # "
$
'
Carrier's Carrier Network and Inter-Autonomous Considerations 0 B # '
C
D '
( *
) " .
" " ' " ( " * " * 0 " *# $ 1 # ' % & B '" * # " " ( ). * " " " 1 " . ( ) '
' ( # " " " $ '" # ' # $ " * .( ( * ' " # " *# . * * ' " * A ( ' . * " * 0 " # # ' " * " " ( " $# * -
* " $ * ' # # ( $.
" "
" #
' ( * *
"
" '
0
"
"
*
' ( "
.
% * "
*
* $ "" *# * * " * ## B " $ $ "
* (
# )
'
"
* "
( • • •
" "
. $# "
#
' " .
" ( * ##
$
$#
"
. "
&1 $
$
( " (
7
" *
* # ' *# * $
(
*
*
"
.
$" G
" "
" $ .
* "
* "
( .
* * "" " & $ 4 "
" & $
4
2 *
*
".
7
#
"
" . *
" " *#
*
!
*
1+ "
$
# * *
2 $
"
"
"
" $ "
" *#
""
( $" ( )
.
4 ) "
" $ "" . $
& $
## " # "
"
7
" *
'
#
"
"
& $ '
*
.
"
" $ *# " 4 . 1+ ( *
"
*
* " 4
"
' " *
-
"
#
#
" ' $ $# " & $ .& $ *
$
$ #
## " $ ' $" * ( ( ( ) ( $" *# $ 0 # # & $ ' * ( " * 0 ( ) & $ 4 ' " $# # * ' * . " * # & $ " ".# $ * B&1 . 7& $ ( 7 ) ") # & $ '" " * & $ "" ( ( ( ) *# * ( " * " # ( " ( ) " *# "
" $
"" *#
"
"
.( *
1
" . (
#
&1 (
"
$
# " ' $
( (
+
$ &
B
## "
"
B *
B
* B .
'
" . *# . " ## # " " ) # " * # & $ 4 ( ) " * ' "" * " . .
*
B
C
#
.
" " & $
' "
" * & $ * &4 # C " 1 % &
B&1 & $ 4 # " . * ") ( 4 *
.K
B
"
G
$
1
# ") B+/ "
"
"
* •
.
#
*
7 " '
"
* *#
$
# " "
" ' $ " & # $. * # ' 7' # $
" "
" ' $ 1. #
#
.
: 9:
*
"
" **
# #
$
. #
* "
. .1 $ I
' . $ * $ *. # '
'
" * $ "
* + *# * * " # # "
#
$
' "
B $) (
" *
"
" ' $( " $ " " " * #
# * J
" .
( # .
#
'
" *
"
(
C *
' # (
"
'
(
( N "
*
# 1
' ( " '
"
+/
+
$ +
(
"
( 1
7 '
"
* * N "
*# .
(
" "
" "
"
" ' $* "
"
1
/
D
(
#
* "
"
' "
#
' *# "
*
,# . " ' $ ( " * ' " # 1 )
> " ' " *# I # ## " D
##
"
" * ': 1
& $
( **
( # #
* "
# B
. 7
# # . # ' " * " * ## * . " B " " ' $ ' ' " . * # * $ *
1
,#
*
" * * * $
*
,# ")
'
'
* *# . # #
.
'
#
4
D
$
# " * ( $ " " ' $" ( )* #
-
*
2 "
(
( " * + ( 7 ( " B " " * # " " ' $' ' $ " ' 1 +
# $ 7
'
* ) A ( ' .
*
$ "
"
*
" *# " " B
"
"
(
' "
•
" *# " " # '
*
" *
"
$ # "
7 " * ' " B * $ * " * * " * $ * * " * ( C D! ' .( " # ' .* " " ( " * $ # ' G C4D ' $# " " " * N $ B # 1 " * * * E7 " " 7 ( ) & * * " ) & * ' B ( N " * $ * " ** " * " " * 0 # ' 0 ' " ( " B # " * . ( ' . * # ' # B+/ " ' 7 ( ' B " * 1 B % # $* " ** " ( # 1 ") ") B+/ * ' # * " $ ,# " # $ 1 * ( " # ' * * ' * " .( $ " $ " " * " " # ' '" *
"
•
Customer Edge Router Security Considerations / + '
7
. (
/ 7 *#
+ /
" # ") + /
0
" 7
"
( *
$ •
" * "
( " ( * # *
*
" " * * . B
7
K *
" '
$ '
•
$ ## " '
7 ( + /* " * " "'
#'
" C $"
#
. *
# ") ( # ( ( )
* " * 1 *# $
$
! "
" * ")
0
7
# ") 7/
"
" "" D#
" ' ( "
*
" *
*# * ## # **
"
7
. " .
'
"
"
' $ *( " (
"
# ) #
C + /D
# ") 0 # ") "
"
" (
' #
" (
"
# )"
"
(
.(
"
#
) &
" *
( ) A ( ' . * (
% & $
" # "
"
"
7 * "
B
"
.
" *
7 (*
" '"
* (
(
( ) A ( ' . # . $ # * 1 '
( ( "
" ' " . '
*# "
* " * # ")
## *
( "
7
7*
N " #
"
#
"
( ##
$
7 ( * " ' * # *# . * # " * B * # ' " $ # . " *# # ' "$ ( * *# " '" # ' A 7 " $ # " " * ( 7 7. * & $ # * . " . ( # " # " " ( & $ ## $ $ % & B ( ) A ( ' . % ' ' # ( # " # * ' " $ $ *# " *# . " " " " ( " • •
(
"
*
'
"
* #
*
"
$
# G 7 / *
"
&
" $ # " "
(
B . " "
* $ *" ' * 7 7" " " " " (
* '
$
"
/
!
2 •
'
N " # *
( "
) # " "
"
"
( .
#
* " $* '" # ' D $. $ J " " # $ $# " $ $ $ J # # % & B " * * * " * J G ." ' * * *# / # " $. 7. +/ " ** 7 + / ) # " " 7 0 7 " " 7 0 7 " " + / *# ' $ " " * # ") "" ' " *( " ( " ' C $ " ") 7/ D # ( " # ")
C
*# *
" C
$ ;65 ;
7 :
4.
"
D
$
" # " **
Overall Best Practice Recommendations ( •
/
•
!
** " " 7 7
) •
• • •
#
"
(
#
" "
% &
(
"
# *
*
#
B
"
""
"
1 *# * " D " # $* * # * # . # $ 2
/ # '
.
( 1 " # '
$(
") $( $ * D. $ 1
1 #
# $*
$ C1 & D
"
*
" . J J ( * " *. " % ; C% ;D 7 " # 7 7 ) ( # " * B *# * & " C& D ( / B+/. * * * * # # ( B ! J * * *# " " * " * ( " * ,
•
/ B
C 7F D.
2
# "
( " C% ;D " ' $* J
"
") B+/ *# * C " # * # C( " * " " ( " # / * * '
. *# *
'
1 ,
*
$
&1
C( B&1
" **
"
# ")
"
" **
"
"
"
"
"
"
"
/
'
B&1
D.
/
5 9 # $*
5 5 % &
**
; -)
; -)
2
#
" "
"
%2
%
)
- *
[View full size image]
$
" **
)
0A
"
Summary " J
# ' "
"
" " "
$( J ' ' ( " . *# * # % & " " ** * # ") " "
$# #
% & > '
. C J
B
• • • •
B
"
'
# #
" " "
" 1
' # $
1
# ' - ' / * + $ "
"
" ( ) " " " $ ( "
*
"
$
B
% & ")
.
$ #
% & (
+/
" B #
$
# " '"
" "
: 9:. % &
B
"D
B
( * ' " % &
"
"
" $.
** " # B
'
1 "
" $. *
C
* "
"
"
.% & B 1 %
>
#
#
B
.
"
D"
* ( ) # *# 1 . # $ > # B ' " **
"
$ " *#
$ -
1 " "
#
' " *#
B * #
& $
% &
4
0 ." " /
* *
) " .
( " *
"
"
" 1* B . '
B '
$ B
( ) ( )
" #
"
$( " $
(
) *# *
"
"
Standards and References .%
% %
+/
: 6 1
$
+/
: 9: J I% &
+/
4 64+
4% ;1
+/
4 ;:,
/(
+/
4 6;
% &
+/
% &
+/
4:
J 4
# " 1 " * .
* -
"
"
& "
$ " $
#
# "
.*
* + B #
"
#
(
2
7
*
"
$ $
" * # "
"
(
" 1
( (" .
" #
2
>
(
#
( * ( $* 2 ( '
( " "" # "
-
# (
'
.
(#
*
* #
. *
"
#
N "
7
(
" "
*
2
" "
" " ( ( ' #
""
'
$
"
$
( # " * # " * ( "
#
# % ' " 1 " #
*
.
( *
7
% $* 7
%
#
(
# " " *# " / % &
% & " * C J! (
" . . $7 ",
7 ( )* %D # " # '
$. $ #
* $ # ' 7 " * ) # *2 " # *2 " # " ' . # $ " " ) # ' # *2 " " " # ' ( ) * $ # " $ # "
" 4
")
'
"
' $
( " 1N $
*
2 C
"
'
* % * " # " "
" ** " " 0 " * " *# # # " * # * " # 7
# *2 )( . 4 4D " C & D *
$ "
") # # *
' " 7&
'
TE Applications and Examples $ (
' )'
( 7 # " $
" *#
( ( -
" (
7 #
" ( 7
"
7 "
* * "
# (
" #
# 7 K
*
$"
# " $ *
"
# " .
( " $
$
*
G
#
* #
( 7
#
#
) * ) / *# . # " $# " ( )
( ) $ * . A ( 7 "
"
* "
'
" .(
7
"
" (
* " K
( 1
# $
$
$ ) ) #
( "
*
##
" (
*
7
"
"
) ( ). % &
*
" # "
(
$(
* )
$
*
(
Intra-Area TE > * 7 ' .
.
% & (
" "
7 ) J
* *
J "
' #
'
( #
" '
" " *# $ # " . #
" *#
$' #
$
# *
7 '
# )# " # ")
) # * $ # ") " . " '
:
; -)
%
#
.
"
. *# " * ") #
) ") # ") # ( $ * # * ( /
. $ 6
[View full size image]
/
# # . *# . ( $ ( ( # " % ' " 1 " ' / 6 :. # " ' >
"" '
(
' " * # $ # " ) ( ' " ' ' " ' # * $ " ( ' ") # (# " # " ) ( * '
. "
(
% &
# ") ") # " ( # % & # ") $. "
/
#
(
, 7
(
*
) '
" ) " )
*# (
( A
" *
( "
#
" ") # #
!#
" " .
"
. # * " ( $
") # * * " #
'
( $
# "
* $
*
.
# *
, 7 )# " #
#
"
" # .
#
# (
# # ")
Node Protection )#
$
( '
(
' ( *# " # * $
(
" )
'
*
" ' ") # " ) # * $
"
C &+D
(
% &
' " ) ( # " " (
" # ")
") # * *
# " $ ") # . D ( # # * *# ") #
" # $ * % & # ") ( " / 6 ;
#C ") # "
#
" # " * "
#
#D A ( ' . $* ' ") #
C
$ ") # " $
" $
"
; -)
.
" *#
% [View full size image]
1 $ . "
#
*# " $. ( " * # " # * $ ( $ ( # ' ") # # " ( 1 ( *. " ( ( #
" '
' "
* $ .
(
>
# ")
##
'
$ .
C ") #
)
( (L # "
"
*
"
$
*#
*# . ( '
* 1 " (L
"
# $
# *
.
"
' (
$ "
'
" ' L ) ' # ")
#
" # (L )
*1
) $ D ( .
. (
$
'
# * "
$
G (
. $#
(L *
)
(
( "
Path Protection $# # * ( $ 1 % # * $ .
* # 6 9
" # (
* " ' # "
) .
*. " #
#
"
; -)
%
"
.
#
* ") # $ * "
$
#
* ( B )
C
)
D ") # #
.
$ # " ") # * ' # * $ ( /
*
[View full size image]
% "
$ " * .
*
") # " ") # ") # *# ") #
* # * A ( '
" # * $ ( ' $# * $ # # "
* # ") # (" *
$ .
" "
"
.
* $
# ( "
)
#
*
" #
7
* "
*
. "
Usage Scenarios % &
/++ "
*
# $ ") #
. ). *
. .
( #
#
*# A . )
# # # /++
% &
( #
(
7 # / # *
"
" #
,
(
# * #
"
" # $*
7 (
# *
$
$ # # * $ ") # ) . # * $ ") # * )# " ' % &
> " # $ (
#
1 ( ) ") # "
" $
$
$
" )
Scalability of Protection Mechanisms "
#
* " # " $"
" * " & )# " 7 7I * $ -
* 7I
#
"
##
*. $
") # " ") ( " ' $# " ") # ") #
" . ") #
* #
" ") #
#
.(
* -
"
" *# (
. V* & ) #
" "
) % "
#
( $
"
# )
'
$ $ .
"
"
( * " $* ( )(
*
" $
) )
# * "
* (
") # )
* ( # ") # (
-
-
## #
" .
Z
*
* .( #
$
" $
)
#
"
" ##
*
* *
* " *#
" * .
" ' $. ( *
" ' $
" ' $ -
" (
*
*. ") #
") #
"
# # # * $ # $ .
"
*
* #
# # )
.
#
* # * " #
# *
# " " "
$
") # * " # * *
") # "
"
" *
#
* #
*
(
.
*
.
* ( #
* /
*# .
(
)
+
"
=,
4
*
" # * $ ") # # " ' * ( )(
2
/ *
B #
") # " *
# *
"
" ( $0 1 %
* . * . G ( ' . ( # # .
/
* *
") # " *
"
. ( 1 %I/ * + $ ( B * * + $ ( )
2
" * * .
* *
2
(
* ) '
( '
$ #
'
' * # " B
Scaling MPLS TE ,
* " ** 0 *< % &
' 0< 1" % & . $# / %
7
"
"
"
"
7 " ;.
+ B
"
# ' 0< L 7
"
.+ B
7
#
" (
(
#
.
("
"
A ( ' #
.
*
"
#
% &
7 "
" "
##
$
% &
.
. " * * *
#
'
"
*
* ). %
( (
"
7 '
"
"
*
# $ '
A ( '
* "
.
# "
,
T
.
( #
0 *< %
-
(# " # "
"
.(
' 0< L . * # " ( ' * * 1 * .( *
#
"
" '
*
$
# " *
%
% &
#
0 *< + B
,
$
(
+ B $.
#
( ' " ( ( )" " " ( ( " " . ' " " ( ( ( ( ' .+ B % & 7 *+ B '" C 'D '. + B ' # *# ' G % & 7+ B " ' # " . $ 7' * " " ( ( , # ( ** $. + B ( ( " # 4 * # "
,
# -
" ** N "
. '
# ." #
#
( "
*# *
"
7
# "
$
(
1 *
MPLS Traffic Engineering and Multicast 1 *
* "
## "
% &
'
(
)
'
' $ #
#
* #* A
"
" *#
1 $
* 1 A* +7 B * .
& *
# ' #
#
.% & * # " 1 A*
#
(
"
" $. * " + " ' * # 7 ( (
+ B * " .$
#
%
% & "
) "
' *
# * (
#
. *
. * "
#
' * $
*
; -)
& " % & 7" # ") # "
#* 7
#
" ' $ > +7 B * . " " # * " # * (
*( "
( "
)' & [View full size image]
C
/
1
66
") "
(
.
" 6 5D
* *
+ -
-
*# . (
*
"
" *
1 A* 1 (
. (L +7 B * "
* (
). #
*
" 1 A # # * "
)
$ ") +7 B * ( * +7 B * ( " * * (L ) ( +7 B * * " +7 B * " # "
")
# " "
$
)
# " # " (
)
" # " * * # " " "
.
(L
).
< < ") ( ( +7 B * *1 ' ") +7 B ' ") ( ' ' " " * * C
"
J $
#
#
*
.
% ( 7
"
* J
.( "
% "
**
* B 7 J
.
"
(
# "
* #
#
7
•
# ' " " ' $' J *
"
. + /"
*
7 #
% # $ # $
%
'
" # $*
" "
) #
' "
. *
" "
L # # ' * 0 * ( )
( ). # " %B A ( ' .* " * * " * 0 0 * " ( ) / * " # ") * $
MPLS Multicast VPN Applications and Examples " ## " # ' " #
"
( $
. 0 0 *
##
$
"
"
# "
' A
0 0
" " ( * N " *# 0 0 $ * . ## * " . # "" *# " # # " " # ' $ ( ) '" # ' $# " $. " " C " * D 0 0 ( " ( .# )C D # ) # ) ( " * # I # ) > * # # ) . " ** - #* C 7D " $ # ( " * " ' # ( $ # ( " " .$ * * C " * " ' D 7 # ' " $ " .
$. * " " " ** " $ " G ## 0 0
0 0
"
" **
1
( (
) . #
B *# * "
; -)
' 5# /
* *
) #
*
' "
' "
*
* #
(
* " *# "
* $ * . ' ( %B * .
" *# B. '
'
' 5. (
" "
"
%
)
)'
"
+ 3
# $ '" # " " # *
# '
)
" # * ] *
" ]4
* 0 0
$" #
$
N
( # $ " " $ ' " * " $ A 0 0 " ' ## " * * , ## " %B " * " # $ / 9 '" * " 1 & " # * G ( '" $ *" 2 # * "
'
@
< +66 2
[View full size image]
"
*
$
6
; -)
% A&
9
-@
.
[View full size image]
)
.0
)'
Multicast Security and Management Considerations 1 #
*
'" $
" " . # +/
*
"
" B
.
*
"
" % & "
"
+ 7 # + " / ")
#
* "
C +D
.
#
7 D(
B "
7
+ )
)
$
"
.
*#
* * * #
. "
-
$ "
#
G
,
"
# %B+/
.
*
$ B
G
"
# * * ")
"
" #
(
" .$
"
* "
# *B
%" *
"
.
"
.
* "
(
#
"
I# '
B "
"
#(
"
+
N
"
""
'
" '
" '
*
"
")
7
&* ' P + /QD &*
•
7 #
"C '"
"
• •
*
%* " ## % * ( $ 7 " B " * "
" *
2
* #"
"
*
$. ( * ( B . * " ! " % # ")
. "
**
7 " B "
•
"
"
(
1 # %B
"
$
: 9:
• • • • •
" *
# )
(
2' " $"
#
* *
" '"
C
" "
" '
I
P1 &QD #
(
'
#
C1 & '
" 2'
D #
C+ D
* 7
" I#
" "
C "" "
.$ " I " '
")
. CV.JD N
#
# (
") # #*
(
*
( G
# # * "" # .
. " **
&&
-
2' '
+ C 1
+
D
*
* (
# # * "
C
" *
"
." " ' $ " ") ## # *# . 6 " '' " "
' # # &'
#* &
* D
( # * %
7 / ' ' ( " " "
$
Standards and References 1 * % & I J %B •
( B
"
$ $
# @ ( .)
• •
" "
##
)' -
%
). 7 /
* *
% %
( "
'# *" ' #* # $ %B
.
' '9 9B 7 / C *
.( ) # '9
(
) ( #
$ ' ( '9
(
" * " *
' ## & " $(
" '9
"* + B (
D* '9
&
'9 " )( 7
"
'9 # #
&
7 #
'9
#
" "
(
9 7. J
7
+ B $
" " (
9B 7
# & " * ## #
7
'9 " # .& " # .&
. J + B ( 9 7
.
" '9 # . "
* ## * -
(
'
"
#
.
'
" #
"
"
'9
'9 # # " . 2 .
"
*
) *
.
': # "
(
% & (
'
Inter-AS Networks for 6PE and v6VPNs 1 " # * $ ( 7 C1 +D ': '9 : 9: ## $
•
2
$ *# * C1 D ( ) # * * ': # * ': '9
#
-B
#&
# " @
& " 1
( ':. ( •
( ': # ( ( '9 $
* -1 &
# ' * * " "
'9 (
'9 •
" '9 1 .
+ #
( ) * " $ * 1 + * " * " *
"
" " '9
" # B "
(
'9 .
+
* " 1 $+ ( +/ $ "
" "
(
B+/
(
1
+
'" " 1 " ( B '9 . * " ( " 1
# ") # " 1 + ( # B 1 + * '9 " # & * . $ ': # " $ ' ( 1 ") ' '9 " " C++D " 1 * . ") * '9 '" ) # " ' # $ 1 $ *# $ * " ++ "
(
1
) ## 1
+ 7 $
+
0 ': 7 (
( '9
':
*
IPv6 QoS K " # '9 * "
* $
'9. "" "
': ':
$
'"
$. "
. .
# ': G *
4:
' * +/ ( $
$ '9 ( ) # $ '9 "" % & ( ). " .# " . " .
)
1 "
' $ " . "
'9
" #
.
*
( ( "
G *
6 * '"
* ##
* " " # 8.
(
' " *# L * # " "
" % &
L
* '"
*
( # " * " ( $ #
$ #
)
' .(
" *
# ' " ( # " "
( $ "" " * " .
.
"
"
(
"
) CB $
" *# "
B
*$ * ' I% & " # " *
"
" '" & ' "
#
D" " ' $# * )7 # C 7D ' " CK D " " *# " * % & I
(
1 %" ( ) " $.
(
)
* I% &
"
,1% " *# # " .* . ' $ &1 ## " " * # " *# ' ## " A ' * * ( ) * " ** " ** C & D ." . "" . G
" *
" ( $
*
(
( )* G #
( ) &1 * ( *
. (
# * " ' , " ' $ ) ( ( " ( # ( ) (
•
J
' )
• •
# ' ( )
' " . 1 %. / * * & # * '" ' ' % & $ # ' * $ "
" # * # "
" % & 7* % * # ' " *# % & ." " # C/ 1 D % & 7*
* "
. "" %
*
( ) .# * " . " "
" (
$
)
/
4
G
" *#
; -)
*
%
#"
"
-
3
#
*
)
[View full size image]
%
% & ' # *
" '
> *
"
> "
" %
'
*# * ( ) *# * * ( )
" *#
.
* "
*
# $* # ' " ** ## " * " * "
. (
" .# ' ) . " " / 1 # "
# " / 1 * # % & ,1% ( ) > " ** " ( * * * " * . " & # . " . ' " " " " ' $' " CB BD. > " * " * . " " ( " C / D. & + . ,1% * * ## C ( ) ,1% * D # % & ,1% ) > # ' ' ' ( B # ' ' " C D * "" # * " * " * $ ( " , '" & ' 1 * C " &1D *
* * B
/ 1
" ; C%
2 # " *
B
* ## *
"
( ;D (
*# * * * B * *#
" ** "
" #
& $
#
$* "
* .
"
"
B . * $ J ( ) # .
B
* "
"
#
>
*
%
%
*
*
*
" / (
$. ( #
# '
' )
' (
$
C% D " ' $ '
## "
% &
(
)
Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management '
" #
* ( % # * -
" * " )
% & * * * / 1 *
" $ N " ' * " $
$
*
*
% & # * *
) $ " " $
( I% &
$ $* "
* )
' " ' ) (
(
-
* '"
*2
% & #
# ) $
,1% % * &
)
#
"
MPLS OAM ,1% •
•
•
#
'
(
H 1 $ ,1% ) & " " # # " $ " . " " ' " 7 % " # 1* A3 * " ## (
" #
. G
'
'9 # '
6 )
# " $ $
#
" # &
' $
'
"
*
&
* "
* " $ * % & & 1 ## " * # " '
" .( " * . $. # " C7 % D # -
* )' )&& 5) ' )' & * 7 % ' & " " $ * # " . ,1% * " * " ' $ # * # ( * * ! $. *. $ " " # " # # " $ " " ". * 1* ' 0 ' "* 6 ') 1 " ' ( $ " * # * " # $ * ## " $ " !#
" & + &
*
" *
# * "
) & . " ( )* * $& $ 4" " . & $ 4 ' *
-
*
" $ "
*I * / &
" )
*# .
'
# "
&1 .
"
N ,
. #
' "$ D
'
"$. * % ' (. $
# ") '" # # "
'
) $
* "
# N
( ) ' ' . # ") .
$ C 1
VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms B+/
(
# ) #. *
# ")
*
#
$
" $ .(
# ' "
L " " # " " $ * " $
"
"
" (
" (
)
* % & % & $ # #
$ * '
# $* ! *
. " # " *# % & & ' $ #
# #
* (
# ") ( " "
" - ' # " * " ' *
% & " " & & +. ( " # & + *
" " /7 #
" . " "
# " * ' #
. " / /7
%
% &
C #
(
I
"
# "
2 "
$ "
. " * &
'
"
$ # # ") ") " * . "
' '" .# *
" # ( $
" .# " "
" ' $' # $
% &
" B+/
. ""
2
" '
'
(
& # #
.
/7
'
"
" #
" ". #
" # ") .
/7
# #
"
"
#
B+/
(
"
.
$
"
" &
$ C/7 D
"
" $ B+/ (
* ' ( )
"
D "
"
% & " /7 > # % & " ' & # *
" ' $
# & +. -
#
" "
(
& + C
"
.
'
"
#
& # I " # ' & > & ' % & " # / % & . # ' " ( ) % & ( ) I " # * % & # $ % & ( )
'
" ** " -
*# * #
"
% & # # # # ") *
*# ( )
# #
" B+/
(
# ") *# * * & + " # % # ") C # % # ") " * #
# 7 .
( " D # ")
"
" B+/ .
B+/ #
/7 D
* *# . # * #
# " ") "
# #
" ( * *
")
" " # ' C
'
# D
(
)
* " " *
&D % &
% &
#
(
,1% " #
*
C
"
#
( #
'
* #
"
'
Dealing with Equal Cost Multipaths /
-
$. & .& "
' ' # *
) #
/7 " ") # #
$&
* # "
. "
" ' 45I6 *
"
"
*
& +
' * *" # ")
* " /
' $
#
" .
*
-
< . % & # " # ")
#
"
(
#
" " " '
.
" " & +# '
"
" "
# < "
#
"
(
I
" % & " & + "
*
(
"
.
*
% & *&
" '
"
Noncompliant Routers "
% & & +
" * $ * #$ 4
#
I " /7 ") " * * & + * " & + (
**
2
1 + -
&
'
*
" *# ( " . # ## % & # . #$ & + ## % & # . #$ & $. & + " ( & Z F . F 4. F) # ** ## % & " -
#
"
"
%
-81
" % &
"
)
")
*
% & B
$
#
" % !
"
% &
% &
&
#
C
% &
&
"
% &
&
"
&
#
#
% D
" # #
" ' $" $
# "
"
' #
% &
" #
& + ' # "
#
( .
#
*
' * .
") "
2
1## "
': &
#
.B
': #
7 % & 7. B .% & 7 /
+/
" " ' $ 7 ## "
% &
#
.% &
: 58
LSR Self-Test & +
(
# $ )
"
* ' 7 % * ) (
$ ' * " * & + *
" * #
' ( .*
'
$
* 1 & + .( " C / & + #
" " # . " 7 % " & + % & *& + . $* # ) ( A ( ' . & +. * ) #
$ < '
4 4D
$
' #
'
" #
" * ' (
%
,
'6 1
" % & ( ) .$ $ " * / ( "* " * " # I " B B. / # ' " ** 2 B B. / " "
1 + -
*
'
%
1
$
) # "
,
0
6@
@ 3&&' "
* ' *
#
(
$#
(
% & & # " C 7 7" " ' $D.
* B
B #
# ")
( (
"
'"
C >D
( " *# " *# # ( "
% &
' 0
'
"
B
*
" ** #
" *#
"
B
B
B "
># $
& 4 4
" $#
!
#
$# 4 ! $# 1## "
"
>"
(
% &
%
& $
# ")
#
4
&
#
'
% &
/+ % & . 1 % % & . 7 % & 7 /
#(
>
'
'" # B+/ (
'"
' #
7 "
! !
.
"
% & B .( ,1% . " % & # I "
# "
.%
"
4
'""'
# B+/
I (
% &
#
.
# " (
$
" #
* I "
7
'
" (
B "
"
#
I
,1%. "
.
1
*#
*
" ' $ " ' $ (
B 7
' B
' ! :
* *
I#
I $
"
&
*
#"
"
( #
"
"
" * "
"
/
" " #
# ") ( ! #
# / "
B "
% & B
B " "
&
B B ( * #
B / #
*
( & + "
7 "
*2
#
*
#
"
* " ( (
"
' %
% &
1 / . # ") # "
# # ")
*#
" (
' #
1
" # ! * # 56: :84;4 9;; ;. ( " # ") " 56; B B / " " *# * B B " ( # # ( , # ( % & & * " * " * / * G . / *# * $ ' " ' ( * / " " # ' ( # / $. . / " ' ( " ' * 4 " *# B B / * ( * " " *# * B B " # # ( B B / * ( ) ' % & ( ) . $# % & . ". &4 . J+7.
1
'
%
E% @
@ 2;.
) @
/
B #
B
L
B
B
L
@ " ,'
"
/
@ "$
L
A & (
/
A Word About Interworking OAM >
" * " " C1 D # ( C >D $# . &4B * " # * C ) ) D. # " # 7' # ( ) . * * ) ( ) ( ) " # > # # ( ) * ( " * " " " "$ 1 % ( )C ( )D # ( * * " " "$ ( )
* .
'"
( • • •
$#
)
) &4B
'
" * &4 ' ' " C1 D
% &
1 % % & /+ % & 7 % &
Any to Any 1 $ *
$ &4B $
* & $
( #
)
C"
(
4
'
'" *
# '" . " $#
"
#
**
$
$ "
• • •
1 % /+ /+ 7 1 % 7
1
" . 1 %. /+. 7 D" '
. 1 '"
# . # "
* #
#
(
Local Switching > "
1 %
&4B
"
"
*
*
.
&
Encapsulation Types and Modes ATM over MPLS * " D % & I •
1 %
.
1 %" ( (
) *
" 7 * $. "
( *
* ## $#
CB . B . #
D
# * # ")
> C
" "
*
$
"
'
•
1 %
*
CB IB D
* # ") • •
*
##
"
# ")
#
"
"$
*
$. (
" #
1 % 1 %
!* !*
C C
11&;D 11&;D
ATM N:1 Mode " # ( " .
#
## " " # B IB * * *
" " # ")
"
* "
*
* . ' ") * ##
# B IB $B .B . * " B >
# >
"
$. *
ATM 1:1 Mode *
.
" "
B >. >
* ## I B >
B
>
" 1 %B
$ B
1 %B "
B '
*
AAL5 SDU Mode 11&; " #
!
" # "
*
" "
*
$
11&;
$ 11&; '" 11&; *
!
11&; . "
! .
B + .
"
# AAL5 PDU Mode # * # * 1 %
$ ## " ## " 1 % $ * ' " $ ## "
* " # 11&; "
' $ #
$ 1 % ,1%
Frame Relay over MPLS $. ( *
#
#
/
* +
$ '
% & •
A #
•
B
* . / * + $" > C " " D ( 7 /+ # * # ' # ( # " *# /+ * " . ' ' $ 7G " 7
1 >" # A ( '
$ .
* "
$
. *
' '
"
( " 0 * " "
" (
* ##
7# * "
. ") /+ B ' /+
" " **
$ "" ""
. # (
. " $ "" #
" ,1%
$" *
I 7'
"
$
. #
( " $ # *
." ) . ,1% ( *
.
Generic Failure Types " )
(
"
" "
$# "
( .#
" (
% & .
&
"
Interface Failure "
'
.
"
"" C J D
( " "$.
* .
) N "
.
, 7 1 . 7 7 ) J ( $
$ "" "
$ &
Pseudowire Failures >
( •
>
•
>
•
&
) N " "$ ' # % & ,1% & #
)
#
# J
"
'
(
""
7
" "
(
*
( ) "
" % &
,1%
"
"
. >
"
B
B. % & .
Tunnel LSP Failures 1 $ J % & " / "
" N "
#
*
"
" "
% & ' (
'
.
"
"
)
& &
'
"
" (
# " "
( ) (
#
"
"
#
$.
* #
$
"
" (
'"
( • • • • • •
' " " $ D ** ' $# >/D % * * ' # *# $ " " ' ' " * " "
$ # (
* )
"
" ' $ ' * # # # $D * * ( " W [ >W [ " *
" C C
*# . "
(
"$
"
* "
#
C
' ( " "
D
)
C
*
•
* % &
>
)
(
.$ * ##
)
" * " '"
*
"
* * ## "
" (
$(
) ,1% # $ 1 $
,1% #
'
Configuration Management for MPLS-Based Networks # $ " # . ( ) * "" '" # " *# ' # ' * B '" '" # ' G
; -)
% & B '" # " ( # $* .* " . '" * # " " ' ' # * ) / " *# '" - ") $ " ' $# .# ' $ / 4 *# $ # . * # $*
E%
* "
-
* " * . ( ' . # " "
-
(
)
* # '"
.
* ''
. % &
-
[View full size image]
*
#
#
• • • • • • & $
. B 1 1 &
B
* " * * ## * "
'
(
,1% 7 '" " ,1% '" #
*& $
"
(
)
'"
#
7.
" " ' "
$
# '"
& $
" ' * % .#
4B
**
"
"
'" #
'
"
( '"
# 4 "" # ' /
" .
& $
B & $
" * ( " & $ B # " "
" $
. *
•
. '" # $
'
B % & %
% & 7
# * 1
2
"$ %
' B "
• •
'" # ' $. .7
- #* 7 * "
* "
'" '"
&1 C7 D B
* # " ""
•
*
" '
% &
# *
(
$#
7' *# " 1 % & . * 1 $ # *
C
.
'
B
)*
" " * " *
*
)
7 ( (
- ") $. " "
$ "
". 1 % '
% & . B
"
7*
*
>
'
"
$ ' '"
C7B
DG
)
.
.
( " ( " % & B " $ ( " ' $ - ") $ $2 . # " " * " ( ) # " C , D B ' (
"
" $ "
"
* +
" * .
7
"
$ .
/
#
( "
" $ *# $. # ' " * & $ B # ' $ " C J :D. . ## " " # B ( )
" 7 C & DG
*
#
C 7D " * *# * ( $
.
'" " & $ &1 .
'
B .*
.
% & % & " *
.
" ' $
"
D % & B
( " ' *
"
B * +
J .
#
" #
'
'" # ' '" # $ "" " * '" ## $ * C D & $ 4 % &
"
#
#
"
# " *#
(
& $ 1 %. /
* "
"
"
"
•
" B "
# "
" " & $ '" # ' 0 ( ) C & $ 4D B " " ' ( J ( $
& $
# ,
.
#
(
#
& $
$ '" # ' . " " ' $
" "
"
*
(
B
" $" # * * ' % ' "
"
" - ") $ # * " '
. % &
"
$ "
* '" ' " "$" ' ( ) . "
$ , # '
$ .
/
,
"
*
* ** '" #
"
*
( • •
* # " '
"
. " " CH%& ' ,
0
" '
( A
D
#
'
" *
*
## "
"
*
*
" $"
.
'
"
#
$
*
"
"
( "
#I
B+/ #I
(
(
B+/
* C*
B+/
/ "
.
#I
$
* '
" . B+/. C
%
#
$
* "
" .
$ " '"
."
*
' "
$# • • •
D
(
.
B
)"
"
#
.
B&1 D. "
" *# "
#
'
.
*
" & $ 4 "" % & B & $ 47 "" * B&1 7 + $ ' " C7+ D. 7 > % & B '" " $ ## % $" * " '" 1
*
"
B&1
$' *
.*
.
" " & $ 7
' " C7> D. " % * & $ 47
$ *# " * "
$" *
* "" 4 "" '" "
* $"
"
.
*
*#
" #I ( B&1 # ( '" #I (
% & B & " I ( "
( # &4 B
" ' * " * " '" # $ . ( ) # " " # $ '" 1" ' ' ' '" -
$ " "
# "
( #
) / , "
" '
#
"
, / "
& " ** % &
B
( '"
#
"
)
'" .
"
#
*
" 7
7 * * )
#
.
"
( "
Network-Wide Scale A '
"
' $
•
#
"
* *
"
' ' ( ) " * " ( ( ) ( /
$ ( # "
(
* )
# *# * ' *# * ( ) * # B+/ ( '" " * $ (
* ( ) (
"
( ) " ** $
*
"
(
)
*
C* ' ( )DA ' $ A ( ' .( * ' # " . # $ " " " " $# * * '" " " '" " # " * $ ' " $ # ) '" " " # # " " . * " * ) " '" ## # $ . '" ## # B+/ '" " # " * $
.
.
* # /
•
#
"" # # '
'
*
*
" 1 #" $ " # ). ( / * J ( # * ( # A ( ' . * # " ## # '" * * J * ( ) " * 7 . ' * J * # + " ( " B 7 " " " " # " $( 7 . $" # $# ( * 7 , 7 . $ # $( ( " * 7 " * J 7 " J # " # * ( )" ' " ( ( " *# * J . $ " ' " " $ A # ) ' * % / * + $ 1 %B # ) . ( % & & B . * " " ' $ * * " A ( ' .( B . * " . " " * *# . " * # ) * ( " * * "
•
* " " #
" J
"
.
Management and Scalability ( ) ## "
*
*
. $ . & ) * * '" $ * % " #
# ") (
" ,
%
. ## ##
" " "
(
* B # $ # A ' # ' 7 " " B * " " ** $* " * " $ N "
< # * * *
"
##
) ' (
" )
I * # (
; * # '
*
* * *. * $( % "" # # # ' &7 % ## ( " * # B # " '" A ( ' . ( ( )* * C %D # $ # " % "" $ " ' % " ( ) *
( ) " $ * " *# 1 * * $. *
( ( # ' ,# * $
)
# 7
" * ( )
$ (
C* * $ * D " $ $ , " ( " " # " . ( . ( ) " $" " ' $ ( ) " $ '" A ( ' . $ * " . *# $ $ ' " * $ *0 * $ % ' . # ( * * .( # # # ' $ *. ( # * " 1 * '" " ' $ * * $
&
"
* * " * ) '
" "
> *# ( (
J . # ) # "
( ) *
*
# ") ( ' * " / ## P% 7Q
' "
* # * + * ( )
.
B ( $"
( *
" * # '