Internet DRAFT - draft-halstead-guichard-mavs-requirements
draft-halstead-guichard-mavs-requirements
TBD M.Halstead, Ed
Internet Draft Nexagent Ltd
Expires: November 2006
Jim Guichard, Ed
Cisco Systems, Inc.
Christian Jacquenet, Ed
France Telecom
May 8, 2006
IETF Internet Draft
Document: draft-halstead-guichard-mavs-requirements-02
Requirements for Multi Autonomous System VPN Services
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Expires November 8, 2006 [Page 1]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
Abstract
This document complements [RFC-4031] and defines requirements that
are specific to the delivery of BGP/MPLS-based [RFC-4364] VPN
services across multiple administrative domains. These requirements
are independent of underlying technologies or the number of
Autonomous Systems such VPNs may span. It lists the requirements of
the different parties that are involved in the administration of
these Autonomous Systems and may therefore be involved in the
delivery of the VPN service offerings.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC-2119].
Table of Contents
1. Introduction................................................4
2. Gap Analysis Summary by IETF Working Group...................7
2.1. Internet Area..........................................7
2.1.1. L3VPN Working Group Work Items.....................7
2.2. Operations and Management Area..........................7
2.2.1. Netconf Working Group Work Items...................7
2.3. Routing Area...........................................7
2.3.1. PCE Working Group Work Items.......................7
2.4. Transport Area.........................................8
2.4.1. IPPM Working Group Work Items......................8
2.5. Security Area..........................................8
2.5.1. BTNS Working Group Work Items......................8
2.5.2. PKI4IPSEC Working Group Work Items.................8
2.5.3. SIDR Working Group Work Items......................8
2.6. Requirements not addressed by any Working Groups.........8
3. Definitions.................................................9
3.1. Multi Domain Environment (MDE)..........................9
3.2. VPN Service Provider (VSP)..............................9
3.3. VPN Peering Location (VPL)..............................9
3.4. Agent..................................................9
4. Problem Statement..........................................10
5. Multi Domain Environment Reference Model....................11
5.1. Distributed Policy Enforcement Example.................12
5.2. Centralized Policy Enforcement Example.................12
6. Topological Requirements....................................12
Expires November 8, 2006 [Page 2]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
6.1. Remote Service Interconnect Requirement................12
6.2. Optimal Interconnect Selection Requirement.............13
6.3. Redundant Interconnect Requirement.....................14
6.4. VPN Topology Requirement...............................15
6.5. End-to-end Unicast and Multicast Routing Requirements...16
6.5.1. Generic Routing Considerations....................16
6.5.2. IGP Routing Considerations........................16
6.5.3. BGP Routing Considerations........................17
6.5.3.1. BGP AS_PATH Attribute Considerations..........17
6.5.3.2. Route Distinguisher Allocation Considerations.17
6.5.3.1. Route Target Allocation Considerations........18
6.5.3.2. Traffic Load Balancing Considerations.........18
6.5.4. Multicast Routing Considerations..................19
6.6. Topological Requirements Gap Analysis..................19
7. QoS Requirements...........................................20
7.1. Differentiated Services Policy Considerations..........21
7.1.1. QoS Policy Transparency...........................22
7.2. Consistent Metric Considerations.......................22
7.3. Traffic Engineering/Routing Policy Considerations.......23
7.4. Metrology Considerations...............................23
7.5. QoS Requirements Gap Analysis..........................24
8. Security Requirements.......................................25
8.1. Security Information Requirements......................25
8.2. Encryption Requirements................................26
8.3. Label Spoofing Protection..............................27
8.4. Authentication Requirements............................27
8.4.1. Authentication of Network Elements................27
8.4.2. VPN Route Authentication and Filtering............27
8.5. Security Requirements Gap Analysis.....................29
9. Management Requirements.....................................29
9.1. Performance Metric Statistic Requirements..............29
9.2. Capital Scaling Requirements...........................29
9.3. Operational Scaling Requirements.......................30
9.3.1. Service Independence Requirements.................30
9.3.2. Minimize Network Integration Requirements..........30
9.3.3. Third Party Interconnect Requirements.............31
9.4. IPVPN Services Demarcation Requirements................31
9.4.1. Fully Managed Service Demarcation.................31
9.4.2. Mixed Management Service Demarcation..............32
9.5. Remote CE Management Requirement.......................32
9.6. End-to-End Combined Services Requirement...............33
9.6.1. Combined VPN and Internet Access Requirement.......33
9.6.2. Combined IP and non-IP Application Transport
Requirement.............................................34
9.7. Management Requirements Gap Analysis...................34
10. Conclusions...............................................35
11. Acknowledgements..........................................37
Expires November 8, 2006 [Page 3]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
12. References................................................37
12.1. Normative References..................................37
12.2. Informative References................................38
Editor's Addresses............................................39
13. Intellectual Property Statement............................39
Disclaimer of Validity........................................40
Copyright Statement...........................................40
1. Introduction
This document summarizes requirements that apply to all parties
involved in the delivery of BGP/MPLS-based [RFC-4364] VPN services
that span multiple Autonomous Systems (ASes). Such parties include,
but are not limited to, Network Service Providers (NSP), Systems
Integrators (SI), Network Integrators (NI), Cable Operators (CO),
Mobile Operators (MO) and Virtual Network Operators (VNO). This
document further specifies which current IETF working groups could
host the work items that address some or potentially all of the
identified requirements.
BGP/MPLS-based [RFC-4364] VPN services may be delivered between ASes
of the same company (commonly referred to as ''Inter-AS'' services),
or different companies (commonly referred to as ''Inter-provider''
services). This document aims to provide requirements for either
type of service delivery.
BGP/MPLS-based [RFC-4364] VPN services are deployed and operated due
to the combined activation of a set of elementary capabilities. This
document is organized to take the requirements for activating these
capabilities across multiple ASes into account using the following
taxonomy:
- Topological considerations: These correspond to the information
needed for the deployment of BGP/MPLS-based [RFC-4364] VPN
topologies. This information includes, but is not limited to,
identification of the endpoints that will be interconnected via
the VPN, forwarding and routing policies to be enforced by the
VPN network elements, and the topology of VPN membership.
- QoS considerations: These correspond to the information, with QoS
parameters, that may characterize the level of quality provided
with the VPN service offering. QoS parameters include, but are
not limited to, VPN traffic classification and marking
capabilities, traffic conditioning and scheduling capabilities,
as well as VPN traffic engineering capabilities.
Expires November 8, 2006 [Page 4]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
- Security considerations: Any BGP/MPLS-based [RFC-4364] VPN that
is deployed and operated across multiple ASes may require the
need for identification, authentication and potentially, VPN
traffic encryption capabilities. This includes the possible
identification and authentication of the resources that
participate in the establishment and operation of a VPN, as well
as the ability to check the integrity of VPN route announcements
exchanged between ASes.
- Management considerations: It is assumed that the operation of
QoS-based BGP/MPLS-based [RFC-4364] VPN services is part of the
management tasks performed by service providers within their own
ASes. Additional operational tasks are however needed in order to
enable the management of VPN services across multiple ASes.
- Measurement and monitoring considerations: the ability to measure
and monitor service delivery is of paramount importance,
especially when such services span multiple ASes.
This document is therefore organized as follows:
- Section 2 is a gap analysis summary listed by IETF working group.
The purpose of this section is to summarize all requirements
identified in this document by each working group, with a
reference to the section that describes the requirement in full.
- Section 3 defines terminology specific to the delivery of
BGP/MPLS-based [RFC-4364] VPN services that span multiple ASes.
This terminology aims at facilitating the overall understanding
of the issues and requirements expressed in this document.
- Section 4 describes some of the drivers for the deployment of
Multi-AS BGP/MPLS-based [RFC-4364] VPN services.
- Section 5 introduces a reference model that depicts the context
for the deployment and the operation of BGP/MPLS-based [RFC-4364]
VPN service offerings that span multiple ASes. In addition, use
cases illustrate examples of different business and operational
process interaction between the various parties.
- Section 6 describes topological requirements that include traffic
forwarding and routing considerations, VPN traffic load balancing
capabilities, as well as VPN Peering Location-specific
interconnect design considerations.
Expires November 8, 2006 [Page 5]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
- Section 7 describes VPN-specific Multi-AS QoS policy enforcement
requirements which include forwarding, routing and measurement
considerations.
- Section 8 describes VPN-specific Multi-AS security policy
enforcement requirements which include identification,
authentication and encryption considerations.
- Section 9 describes VPN-specific Multi-AS management policy
enforcement requirements which include configuration, fault
detection, performance and accounting management tasks.
Sections 6 through 9 include a "gap analysis" sub-section, the
purpose of which is to better elaborate on the pending specification
work which could solicit the IETF community to discuss whether such
gaps could be addressed by the identified working groups.
Expires November 8, 2006 [Page 6]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
2. Gap Analysis Summary by IETF Working Group
The following section details the area and IETF working group
associated with each requirement. For ease of navigation, each
requirement can be referenced by section and page number.
2.1. Internet Area
2.1.1. L3VPN Working Group Work Items
- Remote Service Interconnect Requirement, Section 6.1. , page 12
- Optimal Interconnect Selection Requirement, Section 6.2. , page
13
- Redundant Interconnect Requirement, Section 6.3. , page 14
- VPN Topology Requirement, Section 6.4. , page 15
- BGP Routing Considerations, Section 6.5.3. , Page 17
- Multicast Routing Considerations, Section 6.5.4. , Page 19
2.2. Operations and Management Area
- VPN Topology Requirement (RFC4382), Section 6.4. , page 15
2.2.1. Netconf Working Group Work Items
- Topological Requirements, Section 6. , page 12
- Differentiated Services Policy Considerations, Section 7.1. ,
page 21
2.3. Routing Area
2.3.1. PCE Working Group Work Items
- Differentiated Services Policy Considerations, Section 7.1. ,
page 21
- Consistent Metric Considerations, Section 7.2. , Page 22
- Traffic Engineering/Routing Policy Considerations, Section 7.3. ,
Page 23
Expires November 8, 2006 [Page 7]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
2.4. Transport Area
2.4.1. IPPM Working Group Work Items
- Consistent Metric Considerations, Section 7.2. , Page 22
- Traffic Engineering/Routing Policy Considerations, Section 7.3. ,
Page 23
- Performance Metric Statistic Requirements, Section 9.1. , Page 29
2.5. Security Area
2.5.1. BTNS Working Group Work Items
- Security Information Requirements, Section 8.1. Page 25
2.5.2. PKI4IPSEC Working Group Work Items
- Encryption Requirements, Section 8.2. , Page 26
2.5.3. SIDR Working Group Work Items
- Label Spoofing Protection, Section 8.3. , Page 27
- Authentication Requirements, Section 8.4. , Page 27
2.6. Requirements not addressed by any Working Groups
- Specification of a format and exchange mechanisms of SLS
templates, Section 9.4.1. , Page 31
Expires November 8, 2006 [Page 8]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
3. Definitions
Some of the terminology used in this document is taken from [RFC-
4026] and [RFC-4031]. ''VPN'' in the context of this document refers
specifically to BGP/MPLS-based [RFC-4364] VPN services. In order to
clarify the requirements listed in this document, it is necessary to
further define and introduce new terminology, specific to multi
provider VPN services as follows:
3.1. Multi Domain Environment (MDE)
Two or more Autonomous Systems that may or may not be owned by
separate administrative authorities, and which are used to
interconnect service endpoints (sites) of one or more VPNs.
3.2. VPN Service Provider (VSP)
A VSP is an operator who participates in the delivery of a single
domain, or multi-domain (MDE-wide) VPN service. In delivering the
VPN service, the VSP may own a subset, or all of the participating
network elements. Examples of VSPs include Network Service Providers
(NSP), Systems Integrators (SI), Network Integrator (NI), Cable
Operator (CO), Mobile Operator (MO) and Virtual Network Operators
(VNO).
3.3. VPN Peering Location (VPL)
A VPL is a physical location where VPN services delivered by one or
more VSPs are interconnected. Examples of VPLs include a network
operator hotel, SP central offices, a collocation facility or any
building common to one or more VSPs. A VPL could be operated by a
single VSP, consortium of VSPs or a neutral 3rd-party.
3.4. Agent
For the purposes of this document, an Agent is a VSP who is
responsible for the management of multi-party business processes,
negotiations and fulfillment that allow the multi-provider VPN to
function. The Agent manages this responsibility by either
operationally complying with or coordinating policies across all
parties involved in delivering their customer's end-to-end service.
Policy compliance or multi-party policy coordination is achieved
either in a distributed or centralized manner.
Expires November 8, 2006 [Page 9]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
For distributed policy enforcement, cooperating VSPs agree upon the
enforcement of consistent policies for VPN service provisioning
purposes. In this case, end-to-end policy enforcement is distributed
across multiple VSPs, each of which is a stakeholder in the supply
and enforcement of a fixed set of policies within the shared MDE. A
VPN customer defines their VPN service requirements with an Agent
who then maps these requirements to the set of pre-agreed policies.
For centralized policy enforcement, the Agent coordinates per
customer, a set of policies related to the management of the
customer's VPN service. In contrast to a shared MDE where policy
enforcement is distributed across multiple VSPs, this Agent will
coordinate policies and integrate VPN services per customer, thereby
creating a MDE that is dedicated to the Agent's customers only. The
Agent may independently agree and manage SLSs with each partner VSP
and offer an aggregated end-to-end SLS to their customer's.
4. Problem Statement
No single network can deliver VPN services that provide optimal
price and performance for all customers and all customer locations.
For regulatory, commercial, resiliency and other reasons, customer
requirements for VPN services may not be compatible with a single
VSP owned network infrastructure.
Alternatively, some customers may have requirements for VPNs that
are difficult and/or expensive for a single VSP to deliver. In this
case the VSP has incentives to cooperate with other VSPs that may
offer similar VPN services, along with broadly compatible SLSs.
For customers (whether they solicit an Agent or not), end-to-end VPN
service delivery is paramount. Controllable, predictable and
reliable VPN service must be delivered regardless of the
characteristics of the MDE. The challenge however for the Agent in
controlling 'global' service policy in an MDE is the lack of
homogenous policies amongst VSPs and the difficulty VSPs have in
adapting their VPN service domains to the customer's Agent-defined
VPN service policy.
Expires November 8, 2006 [Page 10]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
5. Multi Domain Environment Reference Model
Figure 1 shows a generic reference model for a Multi Domain
Environment. It shows the relationships that exist between the
various parties involved in the establishment of VPN services that
span multiple VSP-administered networks.
|<------------Multi Domain Environment----------->|
| |
| Customer |
| | |
| +----------------- Agent ------------------+ |
| | | | | | |
| | VSP1 VPL1 VSP2 | |
| | ^ ^ ^ | |
| 1..n 1..n 1..n 1..n 1..n |
| V V V V V |
|Site1 <---> AS1<---> (VPL1) <---> AS2 <---> Site2|
Figure 1 MDE Reference Model
The MDE consists of sites, interconnected via ASes. ASes are then
interconnected via VPLs, within the context of delivering VPN
service offerings. There is potentially a one-to-many relationship
between VSPs and ASes, similarly there is potentially a one-to-many
relationship between VPL operators and VPLs. Note that VSPs may be
remotely interconnected, that is, VSPs do not necessarily need to be
directly connected to each other through a given VPL, as elaborated
in section 6.1.
With reference to Figure 1, the following sections detail examples
of the coordination of the various parties in the enforcement of a
set of policies. These policies relate to the provisioning of an
MDE-wide VPN service and include (but are not limited to)
addressing, routing, QoS and security.
Expires November 8, 2006 [Page 11]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
5.1. Distributed Policy Enforcement Example
The customer's Agent is a single VSP (VSP1 in this example). VSP1
manages the relationship with the customer, which includes the
specification, instantiation, possible negotiation and invocation of
the customer's SLS (Service Level Specification). Cooperating VSPs,
VSP1 and VSP2 have pre-agreed an enforced set of policies, including
the management of VPL1. The customer's requirements are mapped by
VSP1 to the pre-agreed policies of VSP1 and VSP2.
5.2. Centralized Policy Enforcement Example
The customer's Agent is a Systems Integrator (SI). The SI does not
own the network infrastructure (the VPN networking elements), but
manages the VPLs, as well as the processes involved in connecting
the VPLs with each relevant VSP owned AS. VSP1 and VSP2
independently provide customer-specific VPN services and associated
SLS instantiated templates to the SI who is then responsible for
integrating each VSP's VPN service components and
negotiating/invoking an end-to-end SLS with/for their customer.
6. Topological Requirements
6.1. Remote Service Interconnect Requirement
In an MDE, Agent(s) will select VSPs according to the needs of their
customer. VSP owned ASes may or may not be collocated at the same
VPL. For those ASes that are collocated at the same VPL,
interconnection of VPN services can take place locally. However, in
the example of an end-to-end chain of three VSP owned ASes and two
VPLs, local VPN interconnection will happen twice; once at the first
VPL (first to second AS) and once at the second (second to third
AS). Nevertheless, in some situations, the Agent may choose not to
use the VPN service of the second (middle) VSP. Instead, the Agent
may wish to interconnect the VPN services of the first and third
VSPs remotely. There is, therefore, an Agent-driven requirement to
be able to remotely interconnect services of non-collocated VSP
owned ASes in an MDE.
Expires November 8, 2006 [Page 12]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
6.2. Optimal Interconnect Selection Requirement
VSP multi-homing is the scenario in which a VSP needs to
interconnect their AS at two or more VPLs. By ensuring that traffic
passes between ASes at pre-determined VPLs, the desired end-to-end
VPN service delivery can be established and retained for any
customer sites. VSP networks can therefore be utilized more
efficiently.
As an example, consider a customer site in the middle of the USA. It
is connected to a VSP's AS that is interconnected at VPLs in both
New York and Los Angeles. In order to minimize latency, traffic must
be sent to Tokyo via the LA VPL and not via New York. From a network
utilization perspective, routing Tokyo-bound traffic via New York
incurs an inefficient, resource-consuming round trip traversal of
the USA. Similarly, the same site might also send traffic to London.
The optimal route for this traffic will be via New York rather than
LA.
Although this scenario may be taken care of by standard IP routing,
the specifics of a VSPs BGP routing policy, or traffic engineering
implementation, may force some traffic to be forwarded away from the
best path. Nevertheless, the notion of optimality should not
necessarily be expressed in terms of hop count metrics. The
selection of the optimal interconnecting points should rely upon a
variety of criteria that include (but are not necessarily limited
to):
- The minimum number of hops that need to be crossed to reach a
given (set of) VPN destination(s). Note that AS hops can be
misleading. VSPs may implement multiple BGP ASes on one or many
IGPs,
- The minimum value of the one-way transit delay to reach a given
(set of) VPN destination(s). Note that the minimum hops and one-
way transit delay may be in conflict,
- The minimum value of the inter-packet delay variation to reach a
given (set of) VPN destination(s),
- The minimum value of the packet loss rate to reach a given (set
of) VPN destination(s),
- The preservation of the confidentiality of the traffic that may
be exchanged between a given set of VPN locations,
Expires November 8, 2006 [Page 13]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
- The maximum VPN prefix length that should be announced at VPL
locations,
- The use of VPL locations that should not share network resources
involved in the forwarding of Internet traffic,
- The required traffic symmetry to allow a given source-destination
pair to be forwarded on the same path in both directions so as to
avoid packet mis-ordering,
- The available bandwidth capacity at the VPL (in the case where
overbooking policies are in effect at the VPL),
- Political considerations e.g. a given country may not allow
routing or traffic through their geography,
- Geopolitical instability e.g. a VSP should have a stability
rating as a selection criteria,
- Availability and reliability of a given VSP,
- Any combination of the above criteria.
Therefore, for multi-homed ASes, there is an Agent-driven
requirement for interconnects at multiple VPLs to be optimally
selectable for each source-destination site pair within an MDE.
6.3. Redundant Interconnect Requirement
Part of the end-to-end VPN service offering provided by one or more
Agents involves the provision of appropriate levels of redundancy
for their MDE use case. In some VPLs, where business justifications
exist, Agents or VSPs may choose to enhance interconnect reliability
by implementing a redundant interconnect complex.
The resulting interconnects might exist in the same building or in
different buildings within a city or in different buildings in
different cities. This is in addition to the Optimal Interconnect
Selection requirement in that a customer service will be designed to
traverse each redundant interconnect, rather than a specific,
optimal interconnect.
There is therefore an Agent or VSP driven requirement to support
customer services across redundant interconnects.
Expires November 8, 2006 [Page 14]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
6.4. VPN Topology Requirement
Although VSP owned ASes offer the possibility for any customer site
to communicate with any other customer site, in certain situations
this is not desirable. There are many possible reasons why a
customer might want to restrict communication amongst sites so that
their end- to-end service becomes segmented. For instance, it may be
that security is a concern or it may be that customer sites or
divisions must only use connectivity they have paid for.
Furthermore, the traffic flows associated with specific applications
may require a partial topology specifically sized to accommodate the
aggregate traffic flows.
The segmentation might need to exist on a geographical basis,
region- by-region and country-by country. Alternatively,
segmentation might need to exist on a corporate basis, division-by-
division or site-by-site. Segmentation might even exist within
customer sites. However, today, there are no standards for or
agreement of how VPN topologies are constructed amongst VSPs.
Consequently, VSPs use different methods for establishing the
logical topology of a VPN and use different schemas to define VPN
membership.
For instance, one VSP might use standard community values to
establish layer-2 topologies whilst another might use extended
community values. Yet another VSP may use a combination of both
techniques. Alternatively, VSPs may segment VPNs using layer-3
routing techniques. In fact, some VSPs might combine layer-2 and
layer-3 segmentation techniques.
Additionally, each VSP will implement a schema for VPN membership
that is proprietary, with membership values that are likely to
overlap and conflict with other VSP assigned values. VPN membership
allocation schemas tend to be difficult to modify due to the 'hard
coding' of the schema in each network operator's OSS and BSS
systems.
Conflicting VPN membership schemas and different methods for
establishing logical topologies make it very difficult for the Agent
to establish an end-to-end VPN service. Moreover, an inventory of
the topology consisting of the network elements/interfaces and set
of paths that traffic may take through the network could in addition
be difficult for the VSP to make available to the Agent.
Expires November 8, 2006 [Page 15]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
These elements will most likely constitute a partial topological
view of the network but may be sufficient and required for the
purpose of QoS policy definition.
There is therefore, a requirement to be able to establish an end-to-
end VPN topology, with assigned VPN-ID, including the publishing of
network elements and interface inventories per VSP throughout an
MDE.
6.5. End-to-end Unicast and Multicast Routing Requirements
6.5.1. Generic Routing Considerations
Routing and forwarding configuration information deals with the
decision criteria that should be taken by a network element in order
to forward VPN specific traffic according to a given VPN routing
policy. From this perspective, VSP owned network elements should be
provided as a minimum with the following information:
- Relevant metric information so that network elements can
dynamically assign these metric values. Such metric values could
be assigned on either long or (very) short-term basis. Examples
of assigned 'long-term' metrics include packet loss and delay
thresholds, usually expressed as percentiles of available
resources. Short-term metrics may include available or reserved
bandwidth, typically provided via real-time or near real-time
SNMP MIB queries. Furthermore, these metrics may be advertised as
transitive or non-transitive.
- The configuration information related to any static route that
may identify a VPN endpoint (or VPL) as the next hop to reach a
given VPN destination prefix.
6.5.2. IGP Routing Considerations
Today there are no standards for, or agreement of, how VPN routing
policy based upon the policing of the admission and distribution of
VPN routing information (classification and filtering of routing
information) is implemented amongst VSPs.
Consequently, VSPs enforce VPN routing policies within a defined
customer topology in different ways. For example, in an MDE, where
the EF-inferred IGP policy [RFC-2676] of AS1 relies upon the
computation of routes with a maximum one-way transit delay of 120 ms
in order to reach a set of destination prefixes, and AS2 defines the
equivalent EF (Expedited Forwarding)-inferred IGP policy with a
different QoS parameter (e.g. maxLossRate=0%), then there is a risk
Expires November 8, 2006 [Page 16]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
of jeopardizing the overall quality of service of the multi-AS VPN.
Conflicting routing policies amongst VSPs therefore make it
difficult to establish an end-to-end unicast routing policy
throughout an MDE.
There is, therefore, a requirement to be able to enforce a
consistent IGP routing policy throughout an MDE.
6.5.3. BGP Routing Considerations
VSP owned network elements should be provided with relevant BGP-4
[RFC-4271] reachability information, including the attributes taken
into account by the network element's route selection process in
order to decide whether or not traffic should be forwarded along a
given VPN route.
6.5.3.1. BGP AS_PATH Attribute Considerations
Where BGP-4 is used as the PE-CE routing protocol, the use of a
single private [RFC-1930] AS Number (ASN) across all customer sites
hosted by multiple VSPs could raise issues for each VSP as they
commonly use the 'as-override' command on PE-CE neighbors.
Where VPN-IPv4 routes are advertised across multiple ASes, VSP owned
public Autonomous System Numbers (ASNs) could be pre-pended to
private route updates. The 'as-override' feature will not then
operate over PE-CE IPv4 links where public and private ASN numbers
are advertised within the same VPN address prefix.
Network elements located at a VPL should therefore be capable of
removing or changing public or private ASNs from the BGP AS_PATH
attribute on a per neighbor basis. This per neighbor AS path match
and removal policy should be capable of being performed on ingress
or egress across the entire AS path.
6.5.3.2. Route Distinguisher Allocation Considerations
VPN-IPv4 routes [RFC-4364] are made unique across a domain by
combining an IPv4 address with an 8 byte 'Route Distinguisher' (RD)
value. The advertisement of RD values end-to-end between VSPs,
combined with the customer's use of private [RFC-1918] addressing
could result in Route Reflectors (RR) making incorrect best path
decisions for identical routes received from external as well as
internal PE network elements. This will occur where RD and customer
address space overlap across VSP ASes. Although the probability of
this scenario is small, the consequences could be severe and
difficult to isolate, therefore VSP owned RRs and PE's SHOULD NOT
Expires November 8, 2006 [Page 17]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
receive VPN-IPv4 routes that have RD values assigned by another VSP.
In order to ensure that RD values that transit VPLs are unique, RD
values MUST be pre-pended by a public registered AS number [RFC-
4364], section (4.1).
6.5.3.1. Route Target Allocation Considerations
VSPs usually have difficulty in provisioning extended (Route Target)
or standard BGP community values on their PE network elements that
are assigned by external parties such as the end customers Agent or
another VSP. This difficulty is due to the VSP having automated or
manual OSS systems and operational procedures that typically apply
to per VSP ASes only. These systems and processes are difficult to
change due to schema conflicts brought about by attempting to
incorporate externally assigned RT allocation schemas. In addition,
not all VSPs allocate RT values that are pre-pended with a publicly
registered ASN or IP address. RT values to be applied on VSP PEs
therefore should be assigned by the operator of the PE. In order to
ensure that BGP extended community values are unique between ASes,
RT values that are advertised across the VPL MUST be globally unique
(e.g. by pre-pending RT values with a public registered ASN). This
follows the specification detailed in the 'Identifiers' section of
[RFC-4031] and assists in the prevention of cross-connection for VPN
services.
6.5.3.2. Traffic Load Balancing Considerations
VSPs use various traffic load-balancing techniques between customer
sites to optimize traffic flows within their own ASes. As described
in [RFC-4364], this necessitates the use of different RD values
provisioned across VRFs to which the customer is multi-homed, but
the enforcement of a RD numbering policy at the scale of a MDE
should be consistent with the recommendations expressed in section
4.2 of [RFC-4364]. Similar mechanisms SHOULD be available when VSP
owned ASes are multi-homed across multiple VPLs and where the VSP
wishes to optimize customer traffic via load balancing. Such
mechanisms may require that the signaling protocol support the
advertisement of all available paths so that optimal path selection
is available as well as backup paths in case of optimal path
failure.
Expires November 8, 2006 [Page 18]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
6.5.4. Multicast Routing Considerations
IP multicast transmission schemas may be used by some applications
such as videoconferencing or TV broadcasting in order to optimize
VPN network resources.
As a result, VSP owned network elements should support multicast
routing capabilities for the dynamic establishment and maintenance
of distribution trees within the VPN and should therefore be
provisioned with the relevant yet consistent configuration
information.
There are currently however no standards for, or agreement of, an
enforcement of consistent multicast routing policies amongst VSPs.
There is therefore a requirement to be able to enforce an end-to-end
multicast routing policy for the sake of the establishment and
maintenance of consistent distribution trees throughout an MDE.
6.6. Topological Requirements Gap Analysis
Sub-sections 6.1. through 6.3. (inclusive) mostly deal with VPN
design guidelines, which could yield the publication of an
applicability statement document, as part of the VPN deployment
scenarios that are addressed by the l3vpn working group.
Section 6.4. includes requirements for the l3vpn working group. In
addition, this section motivates the need for an exhaustive
inventory of the set of VSP-specific elementary components
(interfaces, network elements, etc.) that will be used for deploying
an end-to-end VPN topology. This is the kind of information that may
be (partly) stored and maintained in the Management Information Base
described by [RFC-4382], but the global, service-wide dimensioning
of the end-to-end topology requirement may justify the specification
of a VPN service model, e.g. based upon [IYER].
Expires November 8, 2006 [Page 19]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
Sections 6.5.1. and 6.5.2. depict the need for populating the
network elements with routing policy-specific configuration
information. This requirement raises two issues:
- The means to describe, store, and maintain the routing-specific
(configuration) information that will be used by the network
elements to enforce the corresponding routing policies.
- The means to (reliably) convey such information to the network
elements.
While the latter could benefit from the work that has been conducted
by the netconf working group so far, the former (description,
storage and maintenance of configuration information) could be
viewed as part of the aforementioned VPN service model.
Section 6.5.3 lists layer-3 VPN specific attribute behavior
requirements which could be addressed by the l3vpn working group.
Section 6.5.4. elaborates on inter-AS multicast VPN requirements
that could be addressed by the l3vpn working group.
7. QoS Requirements
Quality of service is a very generic term, which is sometimes
misused, especially when applied to IP/MPLS environments. In this
document, the design and the enforcement of a QoS policy within VPN-
specific MDE environments relies upon the following dimensions:
- A forwarding dimension, which consists of ensuring that a VSP
owned network element behaves differently, depending on the kind
of traffic it has to process and subsequently forward. This
yields a need for VPN traffic identification, classification and
possibly activation of traffic conditioning, policing, scheduling
and optionally, discarding mechanisms. The forwarding dimension
of a QoS policy is a notion that is local to a network element,
independent from the expected behaviors of the other network
elements within the MDE. The DiffServ (Differentiated Services)
architecture, as described in [RFC-2475], is generally seen as
the cornerstone of the forwarding dimension, introducing the
notion of classes of service as well as Behavior Aggregates (BA).
- A metric definition dimension, which consists of defining
consistent metrics such as delay, jitter and loss, so as to
support QoS meaningfully across multiple VSPs.
Expires November 8, 2006 [Page 20]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
- A routing dimension, which consists of enforcing a VPN-specific
traffic engineering policy at the scale of a MDE. Traffic
engineering is a set of capabilities that allow the (hopefully
dynamic) computation and selection of paths that will be used to
convey different kinds of VPN traffic. It may be necessary to
route QoS-sensitive traffic to different VSPs or along different
paths other than those selected by best effort traffic. Path
selection is dependant on the (QoS) characteristics of such
paths, which comply with the QoS requirements that have been
expressed and negotiated by the Agent with their VPN customers.
- A monitoring dimension, which consists of qualifying how
efficient a QoS policy is enforced within a MDE, based upon the
use and measurement of well-defined indicators. Due to the
multiple parties involved in the delivery of QoS, it is necessary
to have well defined methods for measurement of QoS, ways to
monitor the performance of different network elements, and ways
to report performance consistently among VSPs. Such indicators
include (but may not be limited to) one-way transit delay, one-
way inter-packet delay variation (sometimes called jitter), one-
way packet loss rate or any combination of such indicators.
7.1. Differentiated Services Policy Considerations
Currently, there are no standards for or agreement of service
definitions as defined in the Diffserv architecture amongst VSPs.
[RFC-3644] defines QoS policy within a single Diffserv domain as
being dependent upon three types of information:
- The topology of the network elements under management;
- The particular type of QoS methodology used (e.g. Diffserv), and;
- The business rules and requirements for specifying service(s)
delivered by the network.
These information types vary across VSP ASes. Consequently, VSPs
deploy different numbers of classes of service (COS) and specify
service definitions in proprietary ways. Fixed mappings of classes
of service between any two VSPs may result in compromised service
across the two. This is in part because fixed mappings cannot always
utilize the full service envelope available from the interconnected
VSPs (a VSP with three classes of service can only utilize 3/5ths of
the service envelope of a VSP with five classes of service).
Furthermore, fixed mappings may be adequate for some Agent's
customers, but not for others. This is because QoS policy is often
Expires November 8, 2006 [Page 21]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
applied in different ways for each application used in each customer
environment
When three or more VSP ASes are used to provide connectivity between
customer sites, two or more VPLs are required and, therefore, a
multiple, compounding service compromise exists.
In an MDE of many VSP ASes and VPLs, it is clear that numerous and
compounding compromises in service will take place and end-to-end
QoS policy enforcement may be hard to achieve.
There is a requirement, therefore, for a relationship to exist
between VSP classes of service that may vary from one customer to
another, and that can also utilize the full service envelope of all
VSPs within an MDE.
7.1.1. QoS Policy Transparency
There is general agreement that customer packets should not be
remarked (that is, have their DSCP values modified) as they transit
the MDE. At the same time, it is often necessary for the VSP to
impose a QoS treatment on customer packets that differs from that
which might be indicated by the customer's DSCP (such as is the case
for non-conforming traffic downgraded to best effort). However, even
if the packets are treated as best effort by the VSP, the customer
wishes to retain the original DSCP marking for their own use when
the packets arrive at their remote site. This requirement is defined
as "QoS transparency", where the transparency in question refers to
the tunneling of the customer QoS policy, unmodified, from ingress
to egress across an MDE. [RFC-4031] describes this requirement as a
'Carrier's Carrier' model where one VSP is the customer of another
VSP. Such a VSP should be able to resell VPN services to their
customers independent of the DSCP mapping solution employed by the
'Carrier's Carrier' VSP.
There is a requirement, therefore, for enterprise QoS policy
transparency throughout an MDE.
7.2. Consistent Metric Considerations
Currently, there are no standards for, or agreement of metric
definitions between VSPs. As an example, the Low Latency service
class is generally characterized by three network performance
metrics; latency, packet loss, and jitter. These metrics are
generally reported as two-way or one-way derived from two-way
measurements, but are generally defined differently between VSPs.
Expires November 8, 2006 [Page 22]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
There is therefore a requirement to produce service classes with
metrics that can be meaningfully concatenated, so as to provide
reasonable commonality of metrics across VSPs.
7.3. Traffic Engineering/Routing Policy Considerations
In a true MDE environment there may be many alternate paths between
customer sites. The preferred path among VSPs is typically
determined by BGP policies. However, when multiple classes of
service exist, it may be desirable to route some traffic
preferentially via VSPs who support the enhanced QoS class(es) while
best effort traffic takes the conventional route. That is to say,
there may be cases in which the current route selection capabilities
of BGP, which yield only a single best path for a given prefix, may
not be sufficient. The deployment of traffic engineering
capabilities in VPL owned network elements is of importance when
considering the joint forwarding of "triple-play" services where
data, video and voice traffic is forwarded within a given VPN.
Within a MDE, VSPs or Agents should provide configuration
information parameters that will allow network elements to choose
appropriate VPN paths to a given destination based on ''Service
Contexts''. These paths are chosen according to application-specific
constraints, available service characteristics and/or requirements.
These constraints and/or requirements may be expressed in terms of
time duration (e.g. the use of a VPN route on a weekly basis),
traffic characterization (e.g. all IP multicast traffic should be
forwarded along a set of specific VPN routes), security concerns
(e.g. use trusted network elements along the path towards specific
destinations), and/or QoS considerations (e.g. marked VPN traffic
with a specific DiffServ Code Point (DSCP) value should always use a
configured set of traffic-engineered VPN routes, or available exit
point that exhibits the desired ''Service Context'').
7.4. Metrology Considerations
Currently, there are no standards for, or agreement of, measurement
methods amongst VSPs. VSPs define measurements differently and
measure different service end points. In a MDE environment,
measurement methodology differences, particularly differences in the
statistical nature of the measurements, make it impossible to
combine VSP measurement reports so that the overall quality of the
VPN service can be qualified.
As VSP reports can be so different, it is tedious and time consuming
to analyze whether an individual VSP or VPL operator has met its
Expires November 8, 2006 [Page 23]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
performance targets. When end-to-end services fail, it may be very
difficult to analyze VSP measurement data in order to detect and
isolate faults amongst VSPs or VPL operators.
In an MDE, where the customer's Agent(s) are responsible for end-to-
end service, this may be untenable. In addition, whilst windows for
scheduled and unscheduled maintenance will remain difficult for the
Agent(s) to control or coordinate, any measurement methodology must
take these windows into account in any performance assessments of
the QoS policy that are made.
There is, therefore, a requirement for statistically homogenous
measurement throughout an MDE as well as the ability to place
measurement instrumentation/sources at VPL locations in order to aid
fault detection and isolation.
7.5. QoS Requirements Gap Analysis
Section 7.1. discusses the need for exchanging QoS information
between VSPs. This assumes that such information is described,
stored, and maintained by each participating VSP, but also that a
protocol is required to exchange such information between VSP
providers. The specification of a QoS policy could be viewed as part
of the VPN service model specification effort (as mentioned in
section 6.6. ). The corresponding configuration information to be
used by the network elements to enforce such QoS policies could
benefit from the work conducted by the netconf working group. To
exchange such information between VSPs, there are several candidate
protocols which include (but are not necessarily limited to) RSVP,
BGP and the protocol to be specified by the pce working group (since
such information might be used by Path Computation Elements to
compute traffic-engineered paths).
The need for the use of consistent metrics (as described in section
7.2. ) could rely upon the work conducted by the ippm and pce
working groups (since the latter is chartered to define objective
metrics that will aim at evaluating the quality of a traffic-
engineered path, for example).
Section 7.3. describes the need for populating network elements with
routing and traffic engineering configuration information. Such
information can be viewed as part of the description of the overall
QoS policy that will have to be consistently enforced by the
participating VSP providers for the delivery and the operation of a
given VPN service. Both the netconf and pce working groups could be
solicited to investigate the corresponding (protocol-specific)
Expires November 8, 2006 [Page 24]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
issues, but this is also the kind of requirement that advocates the
specification and the instantiation of a VPN service model.
From a metrology standpoint as described in section 7.4. , the work
conducted by the ippm working group (OWAMP (One-Way Active
Measurement Protocol, [OWAMP]), and TWAMP (Two-Way Active
Measurement Protocol, [TWAMP]) protocols) could serve as a basis for
investigating the consistency issues raised by this section.
8. Security Requirements
Security is a requirement of any business, but the requirement
becomes more important where that business collaborates with others
to provide a service [RFC-4111]. Potential threats might emanate
from a number of sources, for instance, other VSPs, VPL operators
and customers.
Clearly, the vulnerability of a customer service to threats from
these sources is of paramount importance. Of equal importance is the
vulnerability of a VSP AS to threats from these sources. An attack
on a VSP AS could detrimentally affect numerous customers, including
those attached to other VSP owned ASes.
8.1. Security Information Requirements
Enforcement of a security policy at the scale of a MDE may rely upon
the following capabilities:
- The identification and the authentication of the users who may be
entitled to access the VPN service,
- The identification and authentication of network elements that
will not only participate in the deployment and the operation of
the VPN, but also in VPN route information propagation,
- The preservation of the confidentiality of information within a
VPN.
VSPs should therefore be provided with configuration information
related to the aforementioned security parameters. This does not
mean that VSP owned network elements have to maintain a dynamically
updated user database, rather, they should be provided with the
following configuration information:
- Identification information for IP networks that may exchange data
through the VPN and/or the configuration information required for
the activation of an identification/authentication mechanism such
Expires November 8, 2006 [Page 25]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
as RADIUS (Remote Authentication Dial-In User Service), [RFC-
2865],
- Identification information for VSP owned network elements that
support endpoint(s) of the MP-BGP peer and possibly configuration
information related to the activation of a mechanism for
identifying and authenticating such peers,
- Configuration information required for encryption purposes. This
requirement is further expanded on in section 8.2.
There is a requirement, therefore, to securely forward VPN related
security parameters between VSPs and Agents.
8.2. Encryption Requirements
VPN customers may require all or part of their encrypted traffic to
be preserved, independent of the number of VSP owned ASes within the
MDE supporting their VPN service.
There is therefore a need for the MDE to support any relevant
encryption technique that preserves the confidentiality of the VPN
traffic. This implies that:
- The VSP owned network elements that compose the MDE should
support protocols of the IPsec suite [RFC-4301],
- The MDE should be capable of supporting an adequate means for
identifying and authenticating any participating device involved
in the forwarding of VPN traffic,
- The MDE should be capable of supporting an adequate means for
identifying and authenticating any participating VSP owned
network element involved in the enforcement of the VPN-specific
routing policy. Such means should enable any VSP owned network
element to check the integrity of received VPN route
announcements,
- The MDE should be capable of supporting and enforcing any dynamic
key management scheme suitable for the dynamic establishment of
Secure Associations (SA) between relevant VSP owned network
elements without jeopardizing the scalability of the VPN service,
- VSPs that are involved in the dynamic establishment of SA
associations across their ASes should be provided with relevant
configuration information (keys, passwords) in a timely manner,
that is, the provisioning of such configuration information
Expires November 8, 2006 [Page 26]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
should not jeopardize the time to deliver the VPN service
offering to the customer with the required level of security (nor
its scalability).
8.3. Label Spoofing Protection
Whenever labels are exchanged between two VSP peers it is possible
that the spoofing of such labels may occur either toward the
internal infrastructure of the said VSPs, or within the VPNs that
are supported by such VSPs. There is therefore a requirement to
provide mechanisms that prevent the spoofing of labels in the
forwarding path.
8.4. Authentication Requirements
8.4.1. Authentication of Network Elements
Within a MDE, every VSP owned network element that participates in
the deployment and the operation of a VPN service offering should be
trusted. This trust model may need to be specifically defined on a
per-VSP peering basis. There is therefore a requirement to provide
acceptable authentication processes in order for a network element
to participate in the deployment and operation of a VPN service.
This implies that every VSP owned network element must be identified
and authenticated typically via processes owned by relevant Agents
or VSPs.
8.4.2. VPN Route Authentication and Filtering
Within a MDE, every VSP owned network element is permitted to
announce VPN routes to some or all of its pre-authenticated peers,
assuming the requirements expressed in section 8. 1. have been
addressed.
VSPs have existing mechanisms and operational processes that prevent
the cross connection of VPNs within their own ASes. These mechanisms
include manual or automated systems for VPN membership allocations
that include per customer RT values. Where the VSP extends VPN
services via an MDE, incorrect or malicious configuration of VPN
membership information could result in cross connection or incorrect
announcement of VPN membership attributes across an MDE. These route
announcements could in addition expose the VPN topology of the VSP.
The integrity of the contents of such VPN route announcements must
be authenticated by any receiving peer and/or by some kind of VPN
route server capability that could be embedded in the relevant Agent
or VSP owned facility before the receiving peer accepts the
Expires November 8, 2006 [Page 27]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
announced route. Draft [VPN-VERIFICATION] could assist with this
route authentication requirement.
It should be possible to enforce further VPN route-specific
filtering policies at appropriate locations within an MDE.
Additional route filtering criteria could be based upon (but not
necessarily limited to):
- Intra-VPL communication restriction where, for example, RT value
announcements are filtered such that they only include interested
parties across VPL locations. This filtering policy is
particularly relevant where the VSP owned network elements peer
with more than one network element at a VPL. This function is
described further in [RT-CONSTRAIN]
- Intra-VPN communication restrictions, where, for example, not all
sites are permitted to communicate
- The contracted metrics with the VPN customer and between VSPs for
routing table size, routing protocol type, and end-to-end routing
policy.
- The required end-to-end convergence time to avoid the case where
restoration policies, timer values, or fast convergence protocols
(such as BFD), differ between VSPs.
- Inter-AS routing restrictions, where, for example, some VPN
traffic shouldn't be transported across one or more ASes within
an MDE
- Time based restrictions, where, for example, some destinations
cannot be reached during working hours,
- QoS based restrictions, where, for example, traffic should not be
bound for VPN route sources that experience more than a 100 ms
one-way transit delay. Traffic route sources that experience
delay over a certain threshold should not then be announced at
selected VPLs.
Expires November 8, 2006 [Page 28]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
8.5. Security Requirements Gap Analysis
While sections 8. and 8.2. could undoubtedly rely upon the work that
has been conducted by the btns and pki4ipsec (in particular) working
groups, sections 8.3. and 8.4. raise issues that could be partly
covered by the recently-created sidr working group (VPN route
authentication, in particular).
9. Management Requirements
9.1. Performance Metric Statistic Requirements
Agents have stringent usage requirements for an MDE. From this
perspective, VSPs should permit an Agent to have access to
statistical information based upon, (but not necessarily limited
to):
- The volume of traffic that has been conveyed by the entire VPN, a
specific VPN route, forwarded by a specific network element or
over a given period of time that may include a distinction
between incoming and outgoing traffic,
- The volume of VPN traffic that has been dropped by network
elements within a given period of time,
- IPPM (IP Performance Metrics) [RFC-2330] related information that
is relevant to tunnel usage: such information includes one-way
transit delay, inter-packet delay variation etc.,
- Routing state convergence.
9.2. Capital Scaling Requirements
In an MDE, there might be one or more VPLs. At each VPL there may be
one or more interconnected VSP ASes, or a single VSP that uses the
VPL for connectivity between their own ASes.
Traditionally, the interconnection of two VSP ASes has resulted in
the deployment of network element resources that are either
dedicated to those two VSPs, or leased from the VPL operator.
Where there is a need for a VSP to interconnect with multiple other
VSPs, scaling cost efficiency could result if interconnected network
elements could be shared across all VSPs. This multilateral approach
Expires November 8, 2006 [Page 29]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
to VPL design will have increasing benefit as the number of
interconnected VSPs at a VPL increases.
Interconnected network elements at VPLs must therefore be shared
multilaterally.
9.3. Operational Scaling Requirements
Cost of operations is of great concern to a VSP, whether or not VPN
services span their own ASes or those of their VSP partners.
Compared to the capital cost of MDE interconnection at a VPL,
operational cost easily dominates. In an MDE, some, and perhaps all
VSPs, might play a part in delivering services to an individual
customer's VPN.
Within a customer VPN, sites, physical and logical connectivity,
VSPs, VPLs and VPN-specific policies might be variously moved,
added, changed or deleted (MACD) at any time. In fact, different
components of the VPN will, at times, undergo MACD concurrently.
Service MACD lifecycle is part of any customer VPN and will happen
as needed throughout the VPN's service life. As an MDE evolves, with
increasing numbers of VSPs, VPLs and customers, the amount of
service MACD will increase and place a continual and increasing
burden on VSP operators throughout an MDE unless a scalable approach
is taken. Operational scaling criteria could be based upon (but are
not necessarily limited to) the following sections.
9.3.1. Service Independence Requirements
In an MDE, it is inevitable that dependencies will exist between the
services of individual VSPs. For example, a lack of forethought by
the VPL operator by implementing a 'tightly-coupled' VPL
interconnect environment would result in single VSP changes to
topology, bandwidth, routing, QoS, etc., requiring all other VSPs to
modify their definitions of existing services.
Service dependencies amongst VSPs in a MDE must therefore be
minimized.
9.3.2. Minimize Network Integration Requirements
Currently there is no common agreement for how VSPs implement the
interconnection of their VPN networks. This means that each inter-AS
interconnect agreement at a VPL by VSP pairs will be a unique
project, each of which potentially having different design goals and
compromises.
Expires November 8, 2006 [Page 30]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
Each unique inter-AS interconnect agreement will usually take
considerable time and consume highly skilled resources in both
organizations. As the number of VPLs increases, so the load on the
organizations will increase. In an MDE, the required number of
unique inter-AS interconnect agreements could rapidly become
untenable. Unique network inter-AS interconnect agreements amongst
VSP pairs must therefore be minimized.
9.3.3. Third Party Interconnect Requirements
Agents or VSPs require the ability to provide end-to-end services
within an MDE. These Agents or VSPs may however have no desire or be
unable to administer the coordination of business and operational
processes involved in establishing an MDE. In order for an MDE to be
established, the Agent or VSP may therefore require a third party
operator to provide these business and operational process services.
It may be that the third party is another VSP, a systems integrator,
a network integrator or another type of service provider. To achieve
end-to-end service, it is critical that the third party operator is
able to control and coordinate global service business and
operational process policy throughout the MDE.
There is, therefore, a requirement for the business and operational
processes involved in establishing an MDE to be administered by a
third party operator.
9.4. IPVPN Services Demarcation Requirements
9.4.1. Fully Managed Service Demarcation
[RFC-4364] based VPN services may encompass a 'fully managed'
Customer Edge (CE) to CE service with associated SLSs. In an MDE,
this 'fully managed' service is interconnected to other VSP-owned
services via VPLs. For SLS demarcation purposes, the VSP may express
a preference to collocate a dedicated network element at each VPL.
The VPL collocated network elements will, from an operational
perspective function identically to a CE. In contrast to a standard
CE however, each VPL collocated network element will usually support
more than a single VPN across one or more customers and/or VSPs.
From a scalability perspective, this is particularly advantageous
for the VSP when interconnecting multiple VPN services at each VPL
on behalf of one or more Agents. The SLS offered by the VSP to each
Agent partner will in addition to CE-to-CE connectivity, include
connectivity from each CE to one or more VPL collocated network
elements.
Expires November 8, 2006 [Page 31]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
For contractual and/or technical reasons, the VSP may decide for
example to collocate a network element per Agent, per group of
Agents or per VPN. In all cases, consistent, unambiguous service
boundaries for the fully managed service offering are essential.
There is a requirement, therefore for consistent SLS demarcation
points across 'fully managed' VPN service offerings within an MDE.
9.4.2. Mixed Management Service Demarcation
In addition to 'fully managed' services, VSPs also offer VPN
services that allow for a third party such as the VSPs customers to
manage their own CE network elements. IPVPN connectivity of the
customers' CEs via the VSP-owned ASes is done via VSP-owned access
facilities. This type of VPN network outsourcing is known as an
'unbundled' or 'wires-only' service. SLSs are negotiated between the
VSP and their customers that allow the customer managed CE's to
intercommunicate.
In an MDE, when an 'unbundled' service is procured from a VSP by an
Agent, the Agent may want to use the 'unbundled' service to extend
the geographic reach of their VPN footprint by connecting this
service to one or more VPLs. Again, for SLS demarcation purposes,
the VSP may express a preference to collocate a network element at
each VPL.
SLS demarcation points for the selling VSP may then include VPL
collocated network elements that are shared across one or more
Agents and/or VPNs, access facilities linking the Agent-owned CEs,
and common [RFC-4364] based VPN services that span the VSP-owned
AS(es). The Agent must then offer SLSs to their customer that
encompass the VSPs 'unbundled' service and associated SLS(s), as
well as their managed CE offering.
There is a requirement, therefore, for consistent 'unbundled'
service SLS demarcation points across an MDE.
9.5. Remote CE Management Requirement
For contractual and/or technical reasons, Agents or customers have a
requirement to manage Customer Edge (CE) network elements that are
interconnected as part of a [RFC-4364] based VPN service. In an MDE,
the ASes supporting these VPNs may or may not be operated by the
Agent. The Agent will in addition to managing VPN services on behalf
of their customers, usually operate a management network to which
their end customers have restricted or no access. The management
network is used to provide as a minimum IP-based connectivity
Expires November 8, 2006 [Page 32]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
between CEs and the Agent's operations staff, typically located in
one or more operations centers.
In order for an Agent to directly manage CEs connected to ASes that
they do not operate, the Agent will procure 'unbundled' VPN services
from one or more VSP partners. In addition to SLSs that are
negotiated between the Agent and the selling VSP for CE-to-CE
communication, the Agent requires SLSs that encompass the connection
of each CE to the Agent's management network.
There is a requirement, therefore, for an Agent to remotely manage
CE network elements that are directly interconnected through one or
more ASes that are operated by the Agent's VSP partners. The VSP
partner should therefore be capable of supporting one or more common
management network connectivity methods selected by the Agent.
9.6. End-to-End Combined Services Requirement
9.6.1. Combined VPN and Internet Access Requirement
It is common for VSPs to offer combined Internet access and VPN
services via a shared networking infrastructure, e.g. based upon
[RFC-4364]. In an MDE, when an Agent offers this service, it is
sometimes advantageous for the Agent if their VSP partners could
support the local 'breakout' of traffic destined for the Internet
within the VSPs own ASes. An alternative to this is for all
customers Internet and VPN traffic to be transported by the Agent's
VSP partners across VPLs to Internet 'breakout' location(s) in other
ASes. These traffic paths are inevitably suboptimal, raising
performance concerns with the Agent's customers. In addition, the
service is potentially expensive to deliver for the Agent, as there
is little or no differentiation between traffic paths carrying
mission-critical VPN traffic and Internet destined best effort
traffic as all traffic will be forwarded by the VSP partner across
one or more VPLs.
There is a requirement, therefore, in an MDE for VSPs to provide
consistent Internet 'breakout' services that are compatible with an
Agents combined Internet access and VPN services. These
compatibility requirements include (but are not limited to):
- Security, Authentication, Intrusion Detection, Virus protection
services etc.
- Consistent QoS policies across VSPs for best effort or better
than best effort Internet-destined traffic.
Expires November 8, 2006 [Page 33]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
9.6.2. Combined IP and non-IP Application Transport Requirement
Some VSPs offer managed services that include the transporting of
non-IP application traffic across a shared networking infrastructure
based on [RFC-4364]. These 'legacy' applications use networking
protocols (for example X.25, SNA and IPX) that typically do not
support an IP network layer header and therefore cannot natively be
transported across VSP operated ASes. The non-IP packets must
therefore be 'tunneled' across VSP ASes by adding IP and MPLS
headers to the packets. Either end of a 'legacy' application
transport tunnel must support configurations that are based on non-
IP application specific configuration parameters for mapping non-IP
network layer application sources to destination tunnel network
element IP addresses. In an MDE, the non-IP transport tunnel could
span one or more VSP-owned ASes. Network elements that originate and
terminate packets that are forwarded across these non-IP tunnels
could therefore be operated by different VSPs.
There is a requirement, therefore, in an MDE for consistent non-IP
application transport tunnels to be supported by participating VSPs
in an MDE. Tunnel transport consistency per non-IP protocol must
take into account amongst others, agreements on MTU sizing, SLS
conformance, vendor proprietary and standardized encapsulation
techniques etc.
9.7. Management Requirements Gap Analysis
The work that needs to be done to address the requirement described
in section 9.1. can rely upon the work conducted by the ippm working
group. Sections 9.2. and 9.3. (as well as sections 9.5. and 9.6. )
rather refer to operational procedures and guidelines which may not
justify an involvement of the IETF.
But section 9.4. (and section 9.4.2. in particular) encourages the
development of the work formerly initialized by the late diffserv
working group, which introduced the notion of SLS. There is
currently no known IETF effort which would aim at specifying a
format for a SLS template, as discussed in [SLS] for example.
Expires November 8, 2006 [Page 34]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
10. Conclusions
This section extracts from the gap analysis sections, the suitable
actions that are to be conducted for the delivery of BGP/MPLS-based
[RFC-4364] VPN services across multiple administrative domains.
Exhaustive inventories of the set of VSP-specific elementary
components (interfaces, network elements) will be used for deploying
an end-to-end multi-provider VPN topology. This information may be
(partly) stored and maintained in the Management Information Base
described by [RFC-4382]. Nevertheless, the global, service-wide
dimension of the end-to-end topology justifies the specification of
a VPN service model, e.g. based upon [IYER].
- Reliably populating network elements with routing (policy-
specific) configuration information is the base building block
for providing VPN services across multiple VSPs. This information
will be used by the network elements to enforce the corresponding
routing policies. Several candidate working groups could be
solicited to investigate the corresponding (protocol-specific)
issues. This requirement advocates the specification and the
instantiation of a VPN service model including the description,
storage and maintenance of routing configuration information.
Such work could be the primary focus of a newly dedicated effort.
- QoS policy must be consistently enforced by the participating VSP
providers for the delivery and the operation of a given VPN
service. QoS policy information exchanges between VSP providers
require a specific protocol. Several candidate protocols to
exchange such information between VSPs have to be investigated.
This investigation should lead to specific extensions to these
protocols or initiation of a dedicated QoS information exchange
protocol. The corresponding configuration information to be used
by the network elements to enforce QoS policies could benefit
from the work conducted by the netconf WG. This information may
be complemented by QoS routing information.
To support QoS meaningfully across multiple VSPs a consistent set of
metrics shall be defined to provide for consistent service classes.
Moreover performance measurement and monitoring techniques shall be
investigated. Work conducted by the ippm WG (OWAMP (One-Way Active
Measurement Protocol, [OWAMP]), and TWAMP (Two-Way Active
Measurement Protocol, [TWAMP]) protocols) should serve a basis of
this investigation. Performance statistics collections can rely upon
the work conducted by the ippm working group. Dedicated effort is
Expires November 8, 2006 [Page 35]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
expected to extended relevant work such as to provide for the
suitable techniques as required for multi-SP environments.
Providing consistent 'unbundled' service demarcation points across
an MDE and consistent demarcation points across 'fully managed' VPN
service offerings within an MDE encourages the introduction and
development of SLS. There is currently no known IETF effort, which
would aim at specifying a format and exchange mechanisms of SLS
templates. This task could become a specific item of a dedicated
effort in operating multi-SP VPNs.
Encryption work that has been conducted by the btns and pki4ipsec
(in particular) working groups fulfill the needs of multi-provider
VPNs. Label spoofing and authentication requirements are partly
covered by the recently-created sidr working group (VPN route
authentication, in particular).
VPN design guidelines and deployment scenarios, could result in the
publication of an applicability statement document by the l3vpn WG.
The following efforts have been identified:
- Specification of a VPN service model including the description,
storage and maintenance of routing policy and QoS policy
configuration information.
- Protocol(s) and/or extension to existing protocols to exchange the
corresponding information between VSP providers.
- Definition of a consistent set of metrics shall be defined to
provide for consistent service classes.
- Performance measurement, statistic collection and monitoring
techniques shall be investigated as extension to the work initiated
by the ippm working group.
- Specification of a format and exchange mechanisms of SLS
templates.
- Extend applicability of the encryption work conducted by the btns
and pki4ipsec working groups and the newly initiated work of the
sidr working group for VPN information authentication.
- Provide VPN design guidelines and deployment scenarios as
extension of the applicability statement document of the l3vpn WG.
Expires November 8, 2006 [Page 36]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
11. Acknowledgements
This document is the combined effort of the co-editors and the
following contributing authors and reviewers: Dimitri Papadimitriou,
James Humphris, Colin Simpson, Matthew Ford, William Copeland, James
Uttaro, Florent Bersani and David Page.
12. References
12.1. Normative References
[RFC-1930] Hawkinson, J., Bates, T., "Guidelines for creation,
selection, and registration of an Autonomous System
(AS)", RFC 1930, March 1996.
[RFC-2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC-2330] Paxson, V., et al., "Framework for IP Performance
Metrics", RFC 2330, May 1998.
[RFC-2475] Blake, S., et al., ''An Architecture for Differentiated
Services'', RFC 2475, December 1998.
[RFC-2676] Apostolopoulos, G., et al., "QoS Routing Mechanisms and
OSPF Exetensions", RFC 2676, August 1999.
[RFC-2865] Rigney, C., et al., "Remote Authentication Dial-In User
Service (RADIUS)", RFC 2865, June 2000.
[RFC-3644] Snir, Y., et al., "Policy Quality of Service (QoS)
Information Model", RFC 3644, November 2003.
[RFC-4026] Andersson, L., Madsen, T., "Provider-Provisioned Virtual
Private Network (VPN) Terminology", RFC 4026, March
2005.
[RFC-4031] Carugi, M., et al., "Service Requirements for Layer 3
Provider Provisioned Virtual Private Networks (PPVPNs)",
RFC 4031, April 2005.
[RFC-4111] Fang, L., et al., "Security Framework for Provider-
Provisioned Virtual Private Networks (PPVPNs)", RFC
4111, July 2005.
[RFC-4271] Rekhter, Y., Li, T., et al., "A Border Gateway Protocol
4 (BGP-4)", RFC 4271, January 2006.
Expires November 8, 2006 [Page 37]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
[RFC-4301] Kent, S., Seo, K., "Security Architecture for the
Internet Protocol", RFC 4301, December 2005.
[RFC-1918] Rekhter, Y., "Address Allocation for Private Internets",
RFC 1918, February 1996.
[RFC-4364] Rosen, E., Rekhter, Y., "BGP/MPLS IP Virtual Private
Networks (VPNs)", RFC 4364, February 2006.
[RFC-4382] Rosen, E., Rekhter, Y., "MPLS/BGP Layer 3 Virtual
Private Networks (VPN) Management Information Base", RFC
4382, February 2006.
12.2. Informative References
[IYER] Iyer, M., Jacquenet, C., Lago, P., Scandariato, R., "IP
VPN Policy Information Model", draft-iyer-ipvpn-
infomodel-01.txt, Work in Progress, july 2001.
[OWAMP] Shalunov, S., et al., "A One-way Active Measurement
Protocol (OWAMP)", draft-ietf-ippm-owdp-16.txt, Work in
Progress, February 2006.
[TWAMP] Babiarz, J., et al., "A Two-way Active Measurement
Protocol (TWAMP)", draft-ietf-ippm-twamp-00.txt, Work in
Progress, February 2006.
[SLS] Goderis, D., et al., "Attributes of a Service Level
Specification (SLS) Template", draft-tequila-sls-03.txt,
Work in Progress, October 2003.
[VPN-VERIFICATION] Behringer, M., et al., "Layer-3 VPN Import/Export
Verification", draft-ietf-l3vpn-vpn-verification-00.txt,
Work in Progress, March 2005.
[RT-CONSTRAIN] Marques, P., et al., "Constrained VPN Route
Distribution", draft-ietf-l3vpn-rt-constrain-02.txt,
Work in Progress, June 2005.
Expires November 8, 2006 [Page 38]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
Editor's Addresses
Jim Guichard
Cisco Systems, Inc
300 Beaver Brook Rd
Boxborough
MA
Email: jguichar@cisco.com
Martin Halstead
Nexagent Ltd
Thames Tower
37-45 Station Road
Reading
Berkshire
UK
RG1 1LX
Email: mhalstead@nexagent.com
Christian Jacquenet
France Telecom
4, rue du Clos Courtel
BP 91226
35512 Cesson-Sevigne Cedex
France
Email: christian.jacquenet@francetelecom.com
13. Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such
rights might or might not be available; nor does it represent that
it has made any independent effort to identify any such rights.
Information on the procedures with respect to rights in RFC
documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
Expires November 8, 2006 [Page 39]
Internet-Draft draft-halstead-guichard-mavs-requirements-02 May 2006
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
Expires November 8, 2006 [Page 40]