Internet DRAFT - draft-dunbar-vpn4dc-problem-statement
draft-dunbar-vpn4dc-problem-statement
VPN4DC L. Dunbar
Internet Draft Huawei
Intended status: Information Track N. So
Expires: April 2012 Verizon
October 24, 2011
VPN4DC Problem Statement
draft-dunbar-vpn4dc-problem-statement-00.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 24, 2011.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the BSD License.
So Expires April 24, 2012 [Page 1]
Internet-Draft Problem statement for VPN4DC 2011-10-05
Abstract
VPN4DC is for extending an existing VPN to connect hosts in public
data center(s) which are purchased or leased by VPN client. This
draft describes the issues and problems associated with this kind of
services.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 0.
Table of Contents
1. Introduction ................................................ 2
2. Terminology ................................................. 3
3. Connecting hosts in public Data Centers with a VPN .......... 4
4. Hosts connectivity for VPN Oriented Data Center Service...... 4
5. APIs between VPN PEs and Data Center Gateways ............... 6
5.1. What to be communicated between VPN PEs and Data Center
Gateways? ................................................... 6
6. Conclusion and Recommendation................................ 7
7. Manageability Considerations................................. 7
8. Security Considerations...................................... 7
9. IANA Considerations ......................................... 8
10. Acknowledgments ............................................ 8
11. References ................................................. 8
Authors' Addresses ............................................. 8
Intellectual Property Statement................................. 8
Disclaimer of Validity ......................................... 9
1. Introduction
VPN4DC lets VPN clients to connect to their leased or purchased
computing resources in public data centers via their own VPNs. In
another words, VPN4DC is elastic which allows a VPN to extend its
connectivity to (or shrink its connectivity from) resources in one or
multiple public data centers.
This kind of service is attractive to VPN customers who often do not
want to use public Internet to access purchased or leased resources
in public data centers.
Dunbar Expires April 24, 2012 [Page 2]
Internet-Draft Problem statement for VPN4DC 2011-10-05
For ease of description, this problem statement focuses on making
today's L3VPN to seamlessly extend to client's hosts in public data
centers.
2. Terminology
Aggregation Switch: A Layer 2 switch interconnecting ToR switches
Bridge: IEEE802.1Q compliant device. In this draft, Bridge is used
interchangeably with Layer 2 switch.
DC: Data Center
DA: Destination Address
EOR: End of Row switches in data center.
FDB: Filtering Database for Bridge or Layer 2 switch
Public data center: internet data center which offers hosting or
computing resources to many different clients
SA: Source Address
ToR: Top of Rack Switch. It is also known as access switch
VDCS: VPN oriented data center services
VM: Virtual Machines
VPN: Virtual Private Network
VPN-o-CS: VPN oriented Computing Service
VPN4DC: Elastic VPN which can extend its VPN connectivity to, or
shrink some of its connectivity's from, computing resources
in public data centers
Dunbar Expires April 24, 2012 [Page 3]
Internet-Draft Problem statement for VPN4DC 2011-10-05
3. Connecting hosts in public Data Centers with a VPN
Hosts in data centers are managed by data center operators which are
assisted by their own resource and network management systems. VPNs
are managed by network service providers, which are most likely
different organizations. If enterprises want to offload their
applications to public data centers and connect those
purchased/leased resources with their own intranet via VPN, the
enterprises have to do following steps separately:
1. Contact data center operators to purchase computing resources
2. Get network configuration from the data center operators on how
and where their purchased hosts are placed
3. Ask their VPN operators to add attachment circuits on the PEs
which are adjacent to the data centers in which their hosts
reside.
One big issue associated with this process is that the client VPN's
network provider may not have PEs in close proximity to the data
centers from which clients' remote hosts are purchased or leased. It
can be very difficult to connect hosts in 3rd party data centers to a
provider VPN. Under this scenario, the only option is to use tunnels,
e.g. IPSec, between 3rd party data centers and VPN provider PEs. This
approach will definitely turn away some enterprises that have paid
premium for their VPNs.
When VPN service providers do have PEs co-located, or via secure
links connected, with the 3rd party data centers from which clients'
remote hosts are purchased, proper configuration on the PEs can be
very challenging. The VPN operator has to know how their PEs are
connected to the 3rd party data center gateway routers, what
protocols are supported on the connections, which network segments
have the hosts belonging to a particular VPN client, etc.. To get all
those information accurately, a lot of coordination is needed among
VPN clients, VPN service providers, and 3rd party data center
operators. This process can be very long and error prone.
4. Hosts connectivity for VPN Oriented Data Center Service
The VPN oriented data center service [VDCS] describes a service model
where VPN clients can assume the computing resources purchased from
VPN service providers are already linked with their corresponding
VPNs.
Dunbar Expires April 24, 2012 [Page 4]
Internet-Draft Problem statement for VPN4DC 2011-10-05
To enable those services, VPN service providers have PEs co-located
with gateways of multiple data centers, which can be their own or 3rd
party data centers.
There are two cases of connectivity in VDCS service model:
1. Strictly connectivity: PE is provisioned (by its own operators)
in the same fashion as today's L3VPN. When a group of hosts
belonging to client X are added to Data Center Y, the PE
adjacent to Y is configured properly so that Client X's VPN can
exchange routes with Client X owned hosts in Y.
2. VPN attachment circuit configuration being triggered by data
center gateway routers: When a group of hosts purchased by
Client X are added to a Data Center Y, Y's gateway automatically
triggers its adjacent PEs to add attachment circuits for the VPN
which belongs to X, and then perform the Case #1 above for VPN-
X's PEs to exchange routes with X's hosts in the data center Y.
The Case #1 above will require a long and deep coordination between
data center management systems and VPN management systems. The Data
Center management systems have to pass out at least the following
attributes associated with hosts belonging to Client X:
- Which gateway routers from which Client X's hosts can be
accessed
- Which physical interfaces from which Client X's hosts can be
accessed
- Which logical interfaces, e.g. subnets, VLANs, or Data Center
internal VPN ID, from which Client X's hosts can be accessed.
Suppose those information can be provided by data center management
systems, it is not a simple process for VPN management systems to map
Client X's VPN ID with those network attributes from data center,
figure out which PEs are actually connected with which Data Center
Gateways and which ports on PEs are connected with DC gateway where
Client X's hosts can be accessed. This process gets worse when a VPN
client's hosts have to be placed in different data center locations
for reasons like, regulatory, diverse locations for disaster
recovery, etc.
It is well known that network is only a small portion of the overall
data center infrastructure. Most likely the data center networks are
managed by a smaller separate team than their computing and storage
services. Majority, if not all, Data Center's overall management
Dunbar Expires April 24, 2012 [Page 5]
Internet-Draft Problem statement for VPN4DC 2011-10-05
systems don't have proper mechanism to get and record the information
on which network segments are assigned to which clients. Therefore,
it can take extremely long process to configure the PE properly for
Case #1 above to work.
5. APIs between VPN PEs and Data Center Gateways
Different data centers can have different network designs. The
network segments on which a VPN client's hosts reside in different
data centers can be represented by very different ways. For example,
some data centers use VID to differentiate different clients, some
data centers could use different subnet addresses, while other data
centers could use its internal VPN IDs.
There are simply too many attributes from too many different places
to be coordinated in order to configure VPN PEs manageably. There is
no protocol between data center server management systems and network
management systems, and there is no protocol for VPN management
systems to retrieve the needed network attributes from data center
management systems. In addition, data center management systems are
part of computing industry which is different industry from
networking.
If Data Center gateway routers can inform their adjacent VPN PEs on
network attributes associated with hosts of a VPN client, the steps
to get PEs configured properly will be much shorter and simpler. Even
though PEs' VPN attachment circuit may not be configured directly by
adjacent DC Gateway routers for security reasons, the network
attributes passed from DC can be used by VPN network management
system to properly configure the VPN PEs after some level of
authentication.
Therefore, it is very beneficial to have some open APIs between VPN
PEs and DC gateway to simplify the steps needed for VPN PE
configurations.
5.1. What to be communicated between VPN PEs and Data Center Gateways?
The APIs between VPN PEs and their directly connected data center
gateway should at least include the request for a group of hosts in a
data center to join (or leave) a specific client's VPN.
If a DC Gateway and PE are directly connected via an Ethernet
interface, the network segment for a group of hosts belonging to a
VPN client in data center can be easily represented by a VLAN
identifier.
Dunbar Expires April 24, 2012 [Page 6]
Internet-Draft Problem statement for VPN4DC 2011-10-05
If a data center gateway is connected with VPN PEs via OC-n
interfaces, then the data center Gateway and VPN PEs have to reach
agreement on how to differentiate traffic belonging to different VPN
clients. If GRE encapsulation is used on the interfaces, the data
center gateway and the VPN PE has to reach agreement on which outer
IP address represents which VPN client.
It is very common that Data Center network is not aware of provider
VPN configuration, and vice versa. Provider VPN Management system has
its own mapping between VPN client and its corresponding VPN
identifier. Data Center Network management system also has its own
mapping from client ID to a specific network segment, such as VLAN
ID, ISID, or IP interface, etc.
When Data Center Gateway sends a request to VPN PE for a network
segment to be attached to a specific client's VPN, the information it
has is the client identifier. Upon receiving the request, the PE has
to authenticate the request with its own management system. Upon
authenticating the request, the VPN management system has to map the
client identifier, potentially a key, to the proper VPN identifier,
and then configure the PE accordingly to get the VPN connected.
As of now, there aren't any available solutions to enable this in-
band communication between VPN and data center gateways.
6. Conclusion and Recommendation
VPNs represent a major industry for service providers in the
enterprise (revenues at billion dollar level). It is very important
for VPN Service Providers to expand its VPN services with cloud Data
Center services in a secure manner. Automation and end-to-end
network integration is very important for VDCS.
Therefore, we recommend IETF to investigate solutions to make it
possible.
7. Manageability Considerations
TBD
8. Security Considerations
TBD.
Dunbar Expires April 24, 2012 [Page 7]
Internet-Draft Problem statement for VPN4DC 2011-10-05
9. IANA Considerations
10. Acknowledgments
We want to acknowledge the following people for their valuable inputs
to this draft: K.K.Ramakrishnan.
This document was prepared using 2-Word-v2.0.template.dot.
11. References
[VPN4DC-Req] So, et al, "Requirements of Layer 3 Virtual Private
Network for Data Centers", draft-so-VPN4DC-00, Oct 2011.
[VDCS] So, et al, "Requirement and Framework for VPN-Oriented Data
Center Services", draft-so-vdcs-00, June 2011.
Authors' Addresses
Linda Dunbar
Huawei Technologies
5340 Legacy Drive, Suite 175
Plano, TX 75024, USA
Phone: (469) 277 5840
Email: ldunbar@huawei.com
Ning So
Verizon Inc.
2400 N. Glenville Ave.,
Richardson, TX75082
ning.so@verizonbusiness.com
Intellectual Property Statement
The IETF Trust takes no position regarding the validity or scope of
any Intellectual Property Rights or other rights that might be
claimed to pertain to the implementation or use of the technology
described in any IETF Document or the extent to which any license
under such rights might or might not be available; nor does it
represent that it has made any independent effort to identify any
such rights.
Dunbar Expires April 24, 2012 [Page 8]
Internet-Draft Problem statement for VPN4DC 2011-10-05
Copies of Intellectual Property disclosures made to the IETF
Secretariat and any assurances of licenses to be made available, or
the result of an attempt made to obtain a general license or
permission for the use of such proprietary rights by implementers or
users of this specification can be obtained from the IETF on-line IPR
repository at http://www.ietf.org/ipr
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
any standard or specification contained in an IETF Document. Please
address the information to the IETF at ietf-ipr@ietf.org.
Disclaimer of Validity
All IETF Documents and the information contained therein are provided
on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Dunbar Expires April 24, 2012 [Page 9]