Internet DRAFT - draft-lewis-lisp-vpns
draft-lewis-lisp-vpns
Network Working Group D. Lewis
Internet-Draft G. Schudel
Intended status: Experimental Cisco Systems, Inc.
Expires: August 18, 2014 February 14, 2014
LISP Virtual Private Networks (VPNs)
draft-lewis-lisp-vpns-00.txt
Abstract
This document describes the use of the Locator/ID Separation Protocol
(LISP) to create Virtual Private Networks (VPNs). LISP is used to
provide segmentation in both the LISP data plane and control plane.
These IP based VPNs can be created over the top of the Internet or
other VPN protocols, and can be implemented by Enterprise or Service
Provider type networks. The goal of these VPNs is to leverage the
characteristics of LISP - routing scalability, simply expressed
Ingress site TE Policy, IP Address Family traversal, and mobility, in
ways that provide value to network operators.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 18, 2014.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
Lewis & Schudel Expires August 18, 2014 [Page 1]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Definition of Terms . . . . . . . . . . . . . . . . . . . . . 3
3. Virtualizing LISP . . . . . . . . . . . . . . . . . . . . . . 4
3.1. The LISP IID in the Data Plane . . . . . . . . . . . . . 4
3.2. The LISP IID in the Control Plane . . . . . . . . . . . . 4
3.3. Locator Network Segmentation . . . . . . . . . . . . . . 4
4. LISP VPN Network Elements . . . . . . . . . . . . . . . . . . 5
5. Types of LISP VPNs . . . . . . . . . . . . . . . . . . . . . 5
6. Enterprise VPNs . . . . . . . . . . . . . . . . . . . . . . . 6
6.1. Internet based Enterprise LISP VPN Example . . . . . . . 6
6.2. MPLS-VPN based Enterprise LISP VPN Example . . . . . . . 6
7. Service Provider LISP VPNs . . . . . . . . . . . . . . . . . 6
7.1. MPLS VPNs and LISP CE based VPNs, from the SP perspective 6
7.2. Service Provider Internet based LISP VPN Example . . . . 7
7.3. Service Provider MPLS-VPN based LISP VPN Example . . . . 7
8. Security Considerations . . . . . . . . . . . . . . . . . . . 7
8.1. LISP VPNs and IPSec . . . . . . . . . . . . . . . . . . . 8
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 8
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 9
11.1. Normative References . . . . . . . . . . . . . . . . . . 9
11.2. Informative References . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10
1. Introduction
Network virtualization create multiple, logically separated
topologies across one common physical infrastructure. Virtual
Routing and Forwarding (VRF) containers are used to create multiple
instances of Layer 3 routing tables virtualization (segmentation) at
the device level. Data Plane Forwarding VRF table separation is
maintained across network paths using either single-hop path
segmentation (hop-by-hop) such as 802.1q VLANs or VPI/VCI PW.
Traditional multi-hop mechanisms include MPLS and GRE tunnels.
Control plane segmentation is key to allowing sites to use
overlapping network prefixes in these logically separate topologies.
MPLS+BGP (ref RFC 2547) is an example of this control plane
segmentation.
LISP creates two namespaces - End-Site-Identifier (EID) namespace and
the Routing Locators (RLOC) namespace. The LISP Mapping System maps
Lewis & Schudel Expires August 18, 2014 [Page 2]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
the EID to a RLOC. LISP can be used for virtual networking in both
name spaces, and the LISP Mapping System can be used to Map
Virtualized EID Networks to RLOC Networks. That is, either or both
namespace can be virtualized. When the EID namespace is segmented, a
LISP Instance-ID (IID) is encoded in both the data plane and in the
control plane to provide segmentation and to disambiguate overlapping
EID Prefixes. The allows multiple VRFs to 'share' a common Routing
Locator network while maintaining prefix segmentation.
This flexible approach to LISP virtualization, combined with LISP's
innate capabilities of simple TE policy expression, address family
traversal, and mobility, have several implications for the use and
creation of Overlay Networks. An Enterprise using a LISP VPN it can
virtualize, under the same control plane, a coherent overlay network
in its campus, its branches, its Data Centers and its external
'cloud' based services.
A LISP VPN can be built with a partial mesh of Tunnel Routers that do
not have direct reachability to each other's RLOCs. One example of
non globally reachable RLOC namespace is the IPv4 Internet and the
IPv6 Internet. Without some intervening mechanism, individual sites
connected to one, but not both of these two networks could not
directly communicate with each other. The same situation can occur
for Locator networks of the same address family, as in the case where
there are two separate MPLS VPNs acting as Locator Namespaces. When
data path security is needed, LISP virtualization can be combined
with IPSec to provide data path confidentiality, integrity, origin
authentication and anti-replay protection.
In general, LISP VPNs can be instantiated either by Enterprises or by
Service Providers. When implemented by Enterprise networks, the
functions of LISP Tunnel Routers (xTRs) and the LISP Mapping System
are enabled on Customer Edge (CE) devices use IP transport (either
the internet or a private IP network (e.g. an MPLS-BGP VPN), to
create a common underlay for the LISP Overlay to use. When LISP VPNs
are implemented by a Service Provider, the xTR function may be
enabled on either the Provider Edge (PE)or the CE devices, and the
LISP Mapping system may be enabled on either one of those devices or
dedicated to a devices somewhere in the Service Provider network with
IP connectivity to those data plane devices.
2. Definition of Terms
For definitions of other terms, notably Map-Request, Map-Reply,
Ingress Tunnel Router (ITR), and Egress Tunnel Router (ETR), please
consult the LISP specification [RFC6830].
Lewis & Schudel Expires August 18, 2014 [Page 3]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
3. Virtualizing LISP
A LISP VPN is a collection of LISP Sites building an Overlay Network.
These sites share a common control plane, the LISP Mapping System.
The members of this VPN also share common RLOC connectivity, whether
it be the Internet or a private IP network.
VPNs must be allowed to have overlapping address space. We need to
disambiguate this space in both the control and data plane. The LISP
Instance ID (IID) is used to provide a VPN wide unique identifier.
The LISP Instance ID is a 24 bit unstructured namespace that
identifies a LISP VPN. The tuple of EID Prefix and IID is referred
to as an Extended EID (XEID) (ref DDT draft). The LISP IID is used
in the data plane of the LISP header (ref RFC 6830), as well as in
the LISP control plane (ref LCAF).
3.1. The LISP IID in the Data Plane
A LISP xTR will map, by configuration, the LISP Instance ID to a
given VRF in its EID namespace. The purpose of the LISP IID in the
LISP header is to allow an xTR to identify which VPN the packet
belongs to when encapsulating or decapsulating LISP packets. the EID.
For example, on receipt of a packet a LISP ETR will deliver the
decapsulated data to the proper VRF. The use of multiple IIDs on a
single site xTR, each mapped to a different EID VRF allows for
multiplexing of VPNs over a Locator network.
3.2. The LISP IID in the Control Plane
In the LISP Mapping Server, LISP sites are identified by a set of EID
Prefixes, an authentication key, and an LISP IID.
3.3. Locator Network Segmentation
This document has so far discussed virtualizing the LISP EID
namespace, and communication between xTRs and the LISP Mapping
System. Implicit in this communication requirement is a network
between these devices. LISP VPNs do not require this network
connectivity to be in the "default" VRF, just that a a given LISP
Site and its Mapping System be interconnected via a common VRF.
LISP xTRs may have connectivity to each other via multiple distinct
VRFs, as in the case where the LISP VPN is being used to create an
Overlay with multiple MPLS-VPN Service Providers being used as the
transport.
Lewis & Schudel Expires August 18, 2014 [Page 4]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
4. LISP VPN Network Elements
In general LISP VPNs are built from the network elements described in
RFC 6830 and RFC 6832. This document describes a new way to use the
Re-Encapsulating Tunnel Router in RFC 6830.
This LISP VPNs are comprised of the following major network elements:
CE routers acting as XTRs. Each customer site is deployed as one or
more LISP xTR devices, and include single-home or multi-home designs,
using any access media that provides Internet (IPv4 or IPv6) underlay
connectivity. The site xTR configuration includes only the LISP EID
space that the site is authoritative for and that it registers into
the LISP Mapping System, and the RLOC addressing and ingress TE
policy desired by the site. To reach other xTRs in the VPN, the xTR
is only required to have simple, default routing to its next hop in
the address family of the RLOC space.
A virtualized LISP Mapping System. The Mapping system is configured
with per customer and per site information, including the IID of the
VPN(s), the EID Prefixes allowed to be registered, and the
authentication key(s) of the LISP sites, and optionally the specific
Locators that are allowed to be registered.
Optionally, LISP Proxy Tunnel Routers. VPN services also need to be
able to offer non-LISP to LISP interworking for Internet connectivity
or for migration to the LISP VPN from other technologies.
Optionally, LISP Re-encapsulating Tunnel Routers. If LISP VPN
services require LISP to LISP interworking across disconnected
locator spaces, for example to connect LISP sites attached solely to
the IPv4 Internet with those that are solely attached to the IPv6
Internet, then the SP also deploys a number of Re-encapsulating
Tunnel Routers to act as a gateway in the data plane that joins these
disjointed locator networks.
- IPSec infrastructure. (More text needed here)
5. Types of LISP VPNs
In general, LISP VPNs can be instantiated either by Enterprises or by
Service Providers. When deployed by Enterprises, the functions of
LISP Tunnel Routers (xTRs) and the LISP Mapping System are enabled on
Customer Edge (CE) devices use IP transport (either the internet or a
private IP network (e.g. an MPLS-VPN), to create a common underlay
for the LISP Overlay to use. When LISP is used a Service Provider,
the xTR function may be enabled on either the Provider Edge or the
Customer Edge devices, and the LISP Mapping system may be enabled on
Lewis & Schudel Expires August 18, 2014 [Page 5]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
either one of these dedicated devices, or deployed elsewhere in the
Service Provider network that shares IP connectivity with those data
plane devices.
6. Enterprise VPNs
When implementing VPNs via LISP, enterprises create an Overlay which
may be independent of their network Service Provider. These VPNs
allow for edge virtualization to take place over a common core, as
well as allow for simplified multihoming, address family traversal,
ip multicast over unicast services, and support for other LISP use
cases like Mobility.
6.1. Internet based Enterprise LISP VPN Example
Example of an Enterprise LISP VPN using internet underlay. (Example
to be added)
6.2. MPLS-VPN based Enterprise LISP VPN Example
Example of an Enterprise LISP VPN using MPLS underlay (Example to be
added)
7. Service Provider LISP VPNs
This section provides two examples of LISP VPNs being used by network
Service Providers. These two are not exhaustive examples, and could
themselves be combined by Serve Providers wanting to deploy a unified
Overlay VPN with multiple types (Internet, Mobile, or Private) of
Underlay networks. The first example is a CE based VPN using the
Internet as an underlay. The second example is a CE based VPN using
an MPLS-BGP VPN as an underlay.
7.1. MPLS VPNs and LISP CE based VPNs, from the SP perspective
When LISP and MPLS VPNs are used in conjunction, there are some
potential benefits to the services and scalability of the SPs MPLS
VPN.
The Service provider would see a reduction in the number of routes on
their PEs. When LISP runs as an overlay, all customer prefixes which
are typically injected into eBGP and imported into the customer VRF
are no longer required. The LISP Mapping system is instead used to
provide the level of indirection resolution for end to end
connectivity. The only prefixes that are required in the PE VRFs are
the point-to-point PE-CE link prefixes connecting all customer sites
to the MPLS core.
Lewis & Schudel Expires August 18, 2014 [Page 6]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
A reduction in the numbers of VRFs on their PEs. When LISP is run on
the customer CE routers, sub-customer virtualization can be handled
at the EID level and only a single MPLS VPN is required to segment
traffic across the MPLS core. Thus, a global reduction in the number
of PE VRFs can be achieved and allowing the SP to more efficiently
operate the network.
Consistant network layer services across MPLS NNI networks. LISP
VPNs can be used to provide, as an example, address family traversal
over the top of an NNI VPN that does not support IPv6. The SP would
deploy a LISP Proxy Tunnel Router at their ASBR to the partner, and
then customer IPv6 traffic would be encapsulated into IPv4 at the
primary provider's edge into LISP and delivered to the IPv4 Locators
of the partner provider's CE.
7.2. Service Provider Internet based LISP VPN Example
This example describes an SP offering an Internet based VPN service
offering using LISP VPNs. (Example to be added)
7.3. Service Provider MPLS-VPN based LISP VPN Example
This example describes an MPLS VPN provider using LISP to create an
Overlay to their MPLS VPN service offering. (Example to be added)
8. Security Considerations
LISP [RFC 6830] incorporates many security mechanisms as part of the
mapping database service when using control-plane procedures for
obtaining EID-to-RLOC mappings. In general, data plane mechanisms
are not of primary concern for general Internet use-case. However,
when LISP VPNs are deployed, several additional security mechanisms
and considerations must be addressed.
Data plane traffic uses the LISP instance-id (IID) header field for
segmentation. in-flight modifications of this IID value could result
in violations to the tenant segmentation provided by the IID.
Protection against this attack can be achieved by using the integrity
protection mechanisms afforded by IPSec, with or without encryption
depending on users' confidentiality requirements (see below).
Re-encapsulating Tunnel Routers which bridge LISP-to-LISP domains
that use disconnected locator spaces do have access to the LISP
Mapping system and control plane components. Thus, RTRs should not
need specialized security mechanism beyond those already in place for
LISP VPNs.
Lewis & Schudel Expires August 18, 2014 [Page 7]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
8.1. LISP VPNs and IPSec
When LISP VPNs are created over the Public Internet, there may be a
requirement for a VPN to provide data path confidentiality,
integrity, origin authentication and anti-replay protection. When
implementing IPSec in a LISP VPN, an operator has two broad choices.
The operator can either apply the IPSec functions to the Routing
Locator or the EID.
When applying IPSec to the routing locator header, the IPSec
encryption policy is applied to the routing locator header of LISP,
the order of operation is (1) LISP e encapsulation, and then (2)
IPSec encryption. In this case, the encryption policy must be
designed to match LISP outer header source/destination attributes.
It should be noted that this form of encapsulation provides
confidentiality to the IID and the EID address space, that may be a
security requirement for certain users.
When applying IPSec to the EID header, the IPSec encryption policy is
applied to the EID header of LISP, the order of operation is (1)
IPSec encryption, and then (2) LISP encapsulation. In this case, the
encryption policy must be designed to match EID header source/
destination attributes.
Various key exchange mechanisms can be used to provision the tunnel
endpoints with appropriate key material. The use of group key
management mechanisms such as GDOI [ RFC6407] introduces a
substantial simplification in terms of operation and use of
encryption resources at the xTRs, given the role of a key server that
"pushes" group key updates to the members of a VPN that share the
same encryption key material. When GDOI encryption methods are used,
positioning the Key Server infrastructure within its own EID network
can provide substantial benefit. Architecturally, this allows the
Key Server to be reachable via LISP from "all" CE devices (xTRs).
This is advantageous from a security perspective, because the KS can
be isolated from general routing, and is not reachable (and thus
attackable) from any of the XTRs that constitute the VPN.
9. Acknowledgments
Thanks goes to Dino Farinacci, Dave Meyer, Vince Fuller, Isidor
Kouvolus, Jesper Skrivner, Fabio Maino, Vina Ermagan, and other
members of the community who have been working on implementing and
deploying LISP VPNs.
Lewis & Schudel Expires August 18, 2014 [Page 8]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
10. IANA Considerations
This document creates no new requirements on IANA namespaces
[RFC5226].
11. References
11.1. Normative References
[I-D.ietf-lisp-ddt]
Fuller, V., Lewis, D., Ermagan, V., and A. Jain, "LISP
Delegated Database Tree", draft-ietf-lisp-ddt-01 (work in
progress), March 2013.
[I-D.ietf-lisp-lcaf]
Farinacci, D., Meyer, D., and J. Snijders, "LISP Canonical
Address Format (LCAF)", draft-ietf-lisp-lcaf-04 (work in
progress), January 2014.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008.
[RFC6830] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The
Locator/ID Separation Protocol (LISP)", RFC 6830, January
2013.
[RFC6832] Lewis, D., Meyer, D., Farinacci, D., and V. Fuller,
"Interworking between Locator/ID Separation Protocol
(LISP) and Non-LISP Sites", RFC 6832, January 2013.
[RFC6833] Fuller, V. and D. Farinacci, "Locator/ID Separation
Protocol (LISP) Map-Server Interface", RFC 6833, January
2013.
11.2. Informative References
[RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
Networks (VPNs)", RFC 4364, February 2006.
[RFC6071] Frankel, S. and S. Krishnan, "IP Security (IPsec) and
Internet Key Exchange (IKE) Document Roadmap", RFC 6071,
February 2011.
[RFC6407] Weis, B., Rowles, S., and T. Hardjono, "The Group Domain
of Interpretation", RFC 6407, October 2011.
Lewis & Schudel Expires August 18, 2014 [Page 9]
Internet-Draft LISP Virtual Private Networks (VPNs) February 2014
Authors' Addresses
Darrel Lewis
Cisco Systems, Inc.
Email: darlewis@cisco.com
Gregg Schudel
Cisco Systems, Inc.
Email: gschudel@cisco.com
Lewis & Schudel Expires August 18, 2014 [Page 10]