Internet DRAFT - draft-nachum-smartap
draft-nachum-smartap
Network Working Group Youval Nachum
Internet Draft Net Optics, an Ixia Company
Intended status: Proposed Standard Linda Dunbar
Expires: July 2014 Huawei
January 23, 2014 Tal Mizrahi
Marvell
Network Smart Tapping (SmarTap)
draft-nachum-smartap-00.txt
Abstract
Tapping technologies provide traffic visibility to network
analysis tools such as monitors, traffic recorders and security
systems. Current tapping architectures and protocols are vendor
specific and adapted to legacy networks.
Emerging networking such as large scale datacenters for cloud
applications and Mobile backhaul networks demand accurate and fast
network traffic visibility. These networks are built on Layer 2
technologies and infrastructure to support virtual machines
mobility, growing number of devices including mobile users.
SmarTap architecture is designed to support emerging network
requirements allowing network analysis tools to gain full
visibility of network traffic. SmarTap technology monitors each
link and each component of the network. It captures packets,
classifies them and sends them to tools with relevant packet
attributes. SmarTap can provide attributes such as flow-ID,
tapping-location, tapping-time and statistics.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-Drafts
as reference material or to cite them other than as "work in
progress."
Nachum, et al. Expires July 23, 2014 [Page 1]
Internet-Draft SmarTap January 2014
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on July 23, 2014.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Nachum, et al. Expires July 23, 2014 [Page 2]
Internet-Draft SmarTap January 2014
Table of Contents
1. Introduction ................................................. 4
1.1. SmarTap Motivation ...................................... 4
1.2. Terms and Abbreviations Used in this Document ........... 4
1.3. Existing Network Tapping Architecture ................... 5
1.4. Network Analysis Tools Functionality .................... 7
1.5. Emerging Networks ....................................... 7
1.5.1. Emerging Networks characteristics .................. 8
1.6. Networks Visibility Requirements ........................ 8
2. SmarTap Description .......................................... 8
2.1. SmarTap Functionality ................................... 8
2.2. SmarTap Configuration ................................... 9
2.2.1. Tapping Location .................................. 10
2.2.2. Tapping Time stamping ............................. 10
2.2.3. Flow Digest ....................................... 11
2.2.4. Packet Format ..................................... 11
3. SmarTap Deployment Options .................................. 12
3.1. SmarTap with Network Analysis Tools .................... 13
3.2. SmarTap with Layer-3 Networks .......................... 14
4. Security Considerations ..................................... 14
5. IANA Considerations ......................................... 14
6. References .................................................. 14
6.1. Informative References ................................. 14
7. Acknowledgments ............................................. 14
Nachum, et al. Expires July 23, 2014 [Page 3]
Internet-Draft SmarTap January 2014
1. Introduction
Emerging networks such as large scale datacenters and Mobile
backhauls demand the use of network analysis tools to enable
stable and secure operation of the network. Network analysis tools
such as Application Aware Network Performance Monitoring [AA-NPM],
Intrusion Detection Systems (IDS) and Network Recorders (Such as
financial transactions and phone calls) require visibility to the
raw traffic, its tapping location and its exact tapping time.
Network visibility building blocks are network TAPs, SPAN ports
and Network Packet Brokers NPB). TAP refers to a device located at
the network which passes a copy of every packet to the monitoring
tools. SPAN port, Switched Port Analyzer, mirrors what comes into
the target port or out of the target port to the sniffer port for
monitoring purposes. NPB device aggregates the monitored traffic
from multiple ports to a single port or load balances the
monitored traffic to multiple tools.
SmarTap, introduced in this memo, defines a protocol and an
architecture that standardize the way network TAPs, SPAN ports and
NPBs interact with network analysis tools. SmarTap provides high
resolution network visibility by capturing raw packets with their
exact tapping-time, tapping-location and relevant statistics and
sends it to the tools in a standard form.
1.1. SmarTap Motivation
Network analysis tools require full and accurate visibility to the
traffic that traverses the network. SmarTap standardizes the way
tapping devices communicate with network analysis tools, specifies
the information required by the tools and defines its data
structure.
1.2. Terms and Abbreviations Used in this Document
AA-NPM: Application Aware Network Performance Monitoring
IDS: Intrusion Detection System
NPB: Network Packet Broker
VM: Virtual Machine
Nachum, et al. Expires July 23, 2014 [Page 4]
Internet-Draft SmarTap January 2014
1.3. Existing Network Tapping Architecture
Common network tapping architectures consists of network TAPs and
Network Packets Brokers (NPBs). All links that are subject to
tapping are connected to network TAPs in the following
manner. Figure 1 depicts a link between Router-1 and Router-2 that
is subject to tapping. The network TAP is connected between
router-1 and Router-2 as described by Figure 1.
*--------------* *-----* *--------------*
| Router-1 |-----| TAP |-----| router-2 |
*--------------* *-----* *--------------*
|
|
|
*--------*
| AA-NPM |
*--------*
Figure 1 Tapping Device
The network TAP is transparent to Router-1 and Router-2 in all
layers. It relays all packets from Router-1 to Router-2 and vice
versa without any packet modification.
The network TAP also supports network high availability. In case
of TAP failure, the network TAP can be bypassed and router-1 is
directly connected with router-2. In case of link failure at
Router-1 or Router-2 the network TAP mimics the failure to the
other router to enable network fast reroute.
The network TAP is also connected to the network analysis tools,
for example Application Aware Network Performance Monitoring tool
(AA-NPM) as described by Figure 1. The network TAP can either
redirect the packets to the network analysis tools or just
duplicate it, i.e. forward the original packet to the next router
and transmit the copied packet to the tool.
Nachum, et al. Expires July 23, 2014 [Page 5]
Internet-Draft SmarTap January 2014
*--------------* *-----* *--------------*
| Router-1 |-----| TAP |-----| router-2 |
*--------------* *-----* *--------------*
|
|
|
*--------*
| NPB |
*--------*
| |
| |
| |
*---------* *---------*
| AA-NPM-1| | AA-NPM-2|
*---------* *---------*
Figure 2 Tapping Device with NPB (regeneration).
Networks that monitor the traffic by multiple tools or monitor
multiple links use Network Packet Brokers to aggregate or
REF _Ref367009627 \r \h \* MERGEFORMAT Figure 2 depicts an NPB
duplicates all received packets from the network TAP to AA-NPM-1
and AA-NPM-2. Figure 3 depicts an NPB that aggregates traffic,
i.e., sends all received packets from TAP-1 and TAP-2 to the AA-
NPM.
*-----* *-----*
|TAP-1| |TAP-2|
*-----* *-----*
| |
| |
| |
*---------*
| NPB |
*---------*
|
|
|
*--------*
| AA-NPM |
*--------*
Figure 3 Tapping Device with NPB (aggregation).
Nachum, et al. Expires July 23, 2014 [Page 6]
Internet-Draft SmarTap January 2014
1.4. Network Analysis Tools Functionality
Network analysis tools analyze tapped packets according to the
packet fields and accompanied data such as:
- Tapping location
- Tapping time
- Packet transmitter and receiver location
- Packet next hop and previous hop
- Flow-ID
- Packet statistics
Network analysis tools in legacy networks deduce the tapping
location of the packet from the received port. In networks where
the TAP is directly connected to the tool, or using an NPB with a
packet redirection, the received port at the tool indicates the
tapping location. Networks using an aggregation NPB mark the
tapped packet at the NPB with a vendor specific indication to
indicate the received port.
Network analysis Tools at Layer 3 networks deduce the next and
previous hop of the tapped packets from the packet source and
destination MAC addresses. The packet source MAC address refers to
the previous hop router and the packet destination MAC address
refers to the next hop router.
At Layer 3 networks the source and destination IP addresses of the
tapped packet refer to the source and destination location of the
packet transmitter and receiver.
Network analysis tools in legacy networks refer to the tapping
time of the tapped packet as the time that the packet is analyzed
by the tool or received by the NPB.
1.5. Emerging Networks
SmarTap is designed to support emerging networks such as cloud
computing, mobile Backhaul, large scale datacenters and finance
computing. It also has huge advantages at the legacy Layer 3
networks.
Nachum, et al. Expires July 23, 2014 [Page 7]
Internet-Draft SmarTap January 2014
1.5.1. Emerging Networks characteristics
Emerging networks such as mobile backhauls and large scale
datacenters support mobile entities like virtual machines and
cellular devices. Mobile entities move through the network while
their connections remain stable at all networking layers.
Emerging network traffic is mostly Layer 2 based to allow
efficient mobility while timing and performance become more
critical and accurate.
1.6. Networks Visibility Requirements
Some of the characteristic of emerging networks conflict with the
behavior of network TAPs, as presented above. Network analysis
tools require full and accurate visibility to the tapped packet
location, time and data.
In Layer 2 based network, IP addresses are not location oriented
and MAC addresses remain unchanged throughout the packet route.
Therefore, the location of the sender and the receiver of the
tapped packet cannot be deduced from the IP addresses of the
tapped packet, while last hop and next hop cannot be deduced from
the tapped packet MAC addresses.
Analysis tools require the exact tapping time of the tapped
packets. If the tapping time is measured by the NPB, the time at
which a tapped packet is received by the tool or by the NPB
includes network propagation delay and is thus not accurate
enough.
Emerging networks provide tremendous rate of traffic to analyze in
comparison to the processing resources of typical tools. The
common way to overcome this gap is by using an NPB to load balance
traffic between multiple tools. Emerging networks require
additional actions to overcome the increasing gap.
2. SmarTap Description
2.1. SmarTap Functionality
SmarTap provides additional functionality beyond existing TAP
technologies. It taps packets with their relevant metadata and
sends it to the tools. Packet metadata includes: Timestamp,
Location, related statistics and packet digest. The SmarTap device
Nachum, et al. Expires July 23, 2014 [Page 8]
Internet-Draft SmarTap January 2014
is typically connected to a remote tool, and can send the tapped
packets with their metadata encapsulated within a tunnel.
SmarTap supports multiple options to mitigate traffic load over
the tools. It can truncate tapped packets to a preconfigured size
(e.g., 64 or 128 bytes). Tapped packets can be sent to the tools
statistically with a preconfigured ratio or rate. Traffic can be
monitor by the TAP and sent to the tools conditionally. For
example, SmarTap can filter the packets that are sent to the tools
according to predefined filters or rate limits.
2.2. SmarTap Configuration
SmarTap is a tapping element that is connected to the target
tapped link in the same manner as a TAP. Figure 4 depicts a target
link between Switch-1 and Switch-2 that needs to be monitored.
The SmarTap is connected to Switch-1 and Switch-2 and is
functioning as a regular TAP i.e. the SmarTap is transparent to
Switch-1 and Switch-2 and has all TAP capabilities. Moreover, the
SmarTap taps packets from Switch-1 to Switch-2 (and vice versa)
and sends them to a preconfigured target port with the packets'
metadata. The target port can be any port at the SmarTap. Figure 4
"Switch-3". In configuration A the tools or the NPB can be
connected to any network element, switch or router, and receive
all the tapped packets with their metadata by tunnels. Figure 5
depicts a SmarTap that is directly connected to the tool and sends
the tapped packets with their metadata directly to the tool
without the need to encapsulate them over tunnels.
*--------------* *---------* *--------------*
| Switch-1 |-----| SmarTap |-----| Switch-2 |
*--------------* *---------* *--------------*
|
|
|
*--------------*
| Switch-3 |
*--------------*
Figure 4 SmarTap Device Configuration A.
Nachum, et al. Expires July 23, 2014 [Page 9]
Internet-Draft SmarTap January 2014
*--------------* *---------* *--------------*
| Switch-1 |-----| SmarTap |-----| Switch-2 |
*--------------* *---------* *--------------*
|
|
|
*--------------*
| AA-NPM |
*--------------*
Figure 5 SmarTap Device Configuration B.
2.2.1. Tapping Location
One of the tapped packet attributes is its tapping location, which
indicates the link the packet was tapped from. In a simple
scenario where the SmarTap is connected directly to the tool, the
tapping location can be deduced from the received port. Otherwise,
the tapping location, if needed, should be inserted to the tapped
packet Metadata. There are a few options to describe tapping
location:
. Global Grid references
. Tap-ID
. Link-ID
. Received tunnel
2.2.2. Tapping Time stamping
There are several options for sending tapped packets with time
stamping:
. A tapped packet may be sent to the tools with the tapping
time at the packet's metadata.
. A packet may be sent with no packet modification (as it was
received on the link).
Nachum, et al. Expires July 23, 2014 [Page 10]
Internet-Draft SmarTap January 2014
. Timestamp may be global or local to the network. Time
synchronization and accuracy are determined by the tools.
2.2.3. Flow Digest
Tapped packets are sent to the tool with a preconfigured statistic
information embedded within the packet metadata, for example
packet rate. The configuration of which packets to tap and what is
the required statistic information is configured by the monitoring
tool. Packet statistics is standard compatible for example sFlow,
Netflow or RMON and is collected and provided by the tapping
device.
2.2.4. Packet Format
Packet format includes the tapped packet and its metadata. A
tapped packet may be transmitted to the tool without any packet
modification in the same way as it was transmitted on the tapped
link. A packet can be also truncated to a predefined size, 64B,
128B.
Optionally, a metadata field is added to the packet. Metadata is
in TLV format: Type, Length, and Value.
The tunneling protocol used for tapped packets is IP GRE.
Figure 6 and Figure 7 describe the tapped packet format and a
tapped packet example. The packets start from left to right.
Nachum, et al. Expires July 23, 2014 [Page 11]
Internet-Draft SmarTap January 2014
*-------------------*
| Tapped packet |
*-------------------*
*-------*-------------------*
| TLV-1 | Tapped packet |
*-------*-------------------*
*-------*-------*-------------------*
| TLV-2 | TLV-1 | Tapped packet |
*-------*-------*-------------------*
*-------*-------*-------*-------------------*
| TLV-3 | TLV-2 | TLV-1 | Tapped packet |
*-------*-------*-------*-------------------*
*-------*-------*-------*-------*-------------------*
| GRE | TLV-3 | TLV-2 | TLV-1 | Tapped packet |
*-------*-------*-------*-------*-------------------*
Figure 6 Packet Format.
*-----*----------*---------*------------*---------------*
| GRE | Location | Flow-ID | Timestamp | Tapped packet |
*-----*----------*---------*------------*---------------*
Figure 7 Packet example.
3. SmarTap Deployment Options
Nachum, et al. Expires July 23, 2014 [Page 12]
Internet-Draft SmarTap January 2014
*-------------------*
| |
+-------| Interconnect |-------+
| | | |
| *-------------------* |
| |
*-----------------* *----------------*
| Edge Device | | Edge Device |
*-----------------* *----------------*
| |
*-----------------* *********
| Core | *SmarTap*
*-----------------* *********
| | |
*-------* *----------* *----------------*
| Agg | | Network | | Core |
*-------* | Analysis | *----------------*
| | Tool | | |
*----------* *----------* | *********
|Hypervisor| | *SmarTap*
*----------* | *********
| | |
********* *-------* *-------*
*SmarTap* * Host * * Host *
********* *-------* *-------*
|
*--------*
|Virtual |
|Machine |
*--------*
Figure 8 SmarTap deployment example.
SmarTap deployment is tightly connected to the network analysis
tool and its visibility requirements. SmarTap is applied on each
link that needs to be tapped whether it is a physical link or
virtual switch on a hypervisor. Each SmarTap is configured with
information such as which data to Tap, what is the required format
of the packets and its metadata and the target tools.
3.1. SmarTap with Network Analysis Tools
Network analysis tools are connected to all SmarTaps that are
relevant to their application. The SmarTaps are either connected
directly to the tools or by using tunnels. Each tool gets its
Nachum, et al. Expires July 23, 2014 [Page 13]
Internet-Draft SmarTap January 2014
required information in a central location and creates a
networking picture.
SmarTap architecture can offload the tools by distributing the
traffic classification and counting to the SmarTaps. In this
option tools only get the digested data such as standard
statistics with the relevant packets.
Offline tools have also full visibility to all the relevant data
they need: the exact location, time and relevant statistics. In
this scenario all information received from the SmarTaps is
captured, stored and mapped to its exact time and location.
3.2. SmarTap with Layer-3 Networks
SmarTaps that are used at layer-3 networks are still functioning
as TAPs with additional functionality. The tapping location of the
received packet, its transmitter and sender location can still be
deduced from the MAC and IP addresses of the tapped packet. All
SmarTap advantages are also valid for layer-3 networks. SmarTap
provides tapped packets with their Metadata, for example:
location, tapping time and related statistics. With SmarTap
architecture packet tapping location can be derived directly from
the metadata which is simple and more accurate.
4. Security Considerations
To be updated in a future version of this draft.
5. IANA Considerations
There are no IANA actions required by this document.
RFC Editor: please delete this section before publication.
6. References
6.1. Informative References
[AA-NPM] Application Aware Network Performance Monitoring
7. Acknowledgments
This document was prepared using 2-Word-v2.0.template.dot.
Nachum, et al. Expires July 23, 2014 [Page 14]
Internet-Draft SmarTap January 2014
Author's addresses
Youval Nachum
Net Optics, an Ixia Company, IL, LLC
13 Amal Street, Building A
Rosh Ha'Ayin, 48091 Israel
Email: youval@netoiptics.com
Linda Dunbar
Huawei Technologies
5430 Legacy Drive, Suite #175
Plano, TX 75024, USA
Phone: (469) 277 5840
Email: ldunbar@huawei.com
Tal Mizrahi
Marvell
6 Hamada St.
Yokneam, 20692 Israel
Email: talmi@marvell.com
Nachum, et al. Expires July 23, 2014 [Page 15]