Internet DRAFT - draft-shen-lisp-multiprovider-vpn
draft-shen-lisp-multiprovider-vpn
Internet Engineering Task Force N. Shen
Internet-Draft Cisco Systems
Intended status: Experimental D. Farinacci
Expires: January 21, 2015 lispers.net
July 20, 2014
LISP Multi-Provider VPN Use-Cases
draft-shen-lisp-multiprovider-vpn-00
Abstract
This document describes how LISP sites communicate with each other in
a VPN when there are multiple mapping database systems administered
by multiple providers. The detail of VPN segmentation across mapping
databases will be provided.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 21, 2015.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Shen & Farinacci Expires January 21, 2015 [Page 1]
Internet-Draft LISP Multi-Provider VPN Use-Cases July 2014
Table of Contents
1. Requirements Language . . . . . . . . . . . . . . . . . . . . 2
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
3. Definition of Terms . . . . . . . . . . . . . . . . . . . . . 3
4. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 3
5. LISP Mapping Database System . . . . . . . . . . . . . . . . 5
6. LISP Packet Flow . . . . . . . . . . . . . . . . . . . . . . 7
6.1. Packet from Site1 to Site2 . . . . . . . . . . . . . . . 7
6.2. Packet from Site1 to Site3 . . . . . . . . . . . . . . . 7
6.3. Packet from Site1 to Site4 . . . . . . . . . . . . . . . 7
7. Security Considerations . . . . . . . . . . . . . . . . . . . 7
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 8
9.1. Normative References . . . . . . . . . . . . . . . . . . 8
9.2. Informative References . . . . . . . . . . . . . . . . . 8
Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . 8
Appendix B. Document Change Log . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9
1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
2. Introduction
This document describes how the Locator/Identifier Separation
Protocol (LISP) [RFC6830] is used for Multi-Provider LISP VPN where
the providers maintain their own local LISP mapping databases, and
their own security and crypto mechanisms within the provider's LISP
network. Each provider will have a number of Gateway Tunnel Routers
(GTR) to send and receive LISP encapsulated packets to and from the
other provider. Those Gateway Tunnel Routers behave the same as the
Re-Encapsulating Tunnel Routers (RTRs) on traffic engineered LISP
paths. Special security mechanisms between a pair of GTRs from two
providers can be enforced, such as firewall and IPSec encryption can
be applied over this Multi-Provider LISP overlay tunnel. This
specification will define how an Explicit Locator Path (ELP)
[LISP-LCAF] can be used for an ITR to encapsulate an Multi-Provider
VPN packet to its own Gateway Tunnel Router (GTR), then to the
peering provider's Gateway Tunnel Router (GTR), and finally to the
peering provider's ETR. This specification will examine how each
provider's GTR can interface with its own local LISP mapping database
system and allow the instance-ID allocated to sites of one provider
can be different from the instance-ID allocated to sites in the other
providers. This allows policy and control to be contained within
Shen & Farinacci Expires January 21, 2015 [Page 2]
Internet-Draft LISP Multi-Provider VPN Use-Cases July 2014
each provider while allowing segmented connectivity across providers
with secure LISP overlay.
3. Definition of Terms
Mapping Service Provider (MSP): A LISP control-plane network
provider which maintains its own LISP mapping database
system.
LISP Provider Network: Is a delivery network that administers its
own mapping database acting as an MSP as well as managing a
set of GTRs so multi-provider VPNs can be provided.
Re-Encapsulating Tunnel Router (RTR): An RTR is a router that acts
as an ETR (or PETR) by decapsulating packets where the
destination address in the "outer" IP header is one of its
own RLOCs. Then acts as an ITR (or PITR) by making a
decision where to encapsulate the packet based on the next
locator in the ELP towards the final destination ETR.
Gateway Tunnel Router (GTR): An GTR is a router serves as a gateway
re-encapsulating tunnel router (RTR) on the edge of the
provider's LISP network. It services as an ETR for one LISP
network for sending out the packet to the other provider,
and as an ITR for the another LISP network when receiving a
packet from the other provider.
Re-Encapsulating Tunnels: Re-Encapsulating tunneling occurs when an
RTR acts as an ETR and then an ITR on a given packet. As an
ETR it removes a LISP header, then acts as an ITR to prepend
another LISP header. Doing this allows a packet to be re-
routed by the re-encapsulating router without adding the
overhead of additional tunnel headers. Any references to
tunnels in this specification refers to dynamic
encapsulating tunnels and they are never statically
configured. When using multiple mapping database systems,
care must be taken to not create re-encapsulation loops
through misconfiguration.
4. Overview
A packet that is sourced by an EID which is destined for an EID
travels across a core network based on the locators that ITR uses as
the outer source and destination addresses towards a given ETR. If
the Mapping Service Provider (MSP) the ITR uses to obtain the
destination ETR's locator address can be a local mapping database or
one deployed on globally on the Internet.
Shen & Farinacci Expires January 21, 2015 [Page 3]
Internet-Draft LISP Multi-Provider VPN Use-Cases July 2014
In a LISP Provider Network, the security mechanism is usually applied
with the LISP tunneled packets within a single administrative
organization. When two LISP Provider Networks need to communicate
with each other, it is undesirable to have xTRs belong to two
organizations to simply exchange the crypto keys. This specification
proposes the solution to have the xTRs setup normal LISP overlay to
the local GTR, and to have both GTRs of peering LISP Provider
Networks to share common crypto keys if needed, and use the LISP re-
encapsulation tunnels to have the Multi-Provider VPN packets traffic
engineered among two providers without compromising the security
aspect of the VPNs and simplify the Multi-Provider secure VPN
management.
(Mapping DB 1) (Mapping DB 2)
Source site (-----------} {-----------) Destination Site
( LISP } { LISP )
+-------+ ( Provider1 } { Provider2 ) +---------+
| \ ( Network } { Network ) / |
| seid / ITR ---(---> . --> } { --> . ----)---> ETR deid / |
| siid / || ( | } { ^ ) ^^ \ diid |
| / || ( | } { | ) || \ |
+------+ || ( v } { | ) || +-------+
|| ( GTR1 ======> GTR2 ) ||
|| ( ^^ } { || ) ||
|| (--------||-} {-||--------) ||
|| || || ||
================= ==================
Secure LISP Tunnel Secure LISP Tunnel
Typical Multi-Provider Secure VPN Data Path from ITR to ETR
This diagram shows the packet flow from Provider1's network into the
Provider2's network, and the other direction is logically the same.
Although this diagram only showing one pair of GTRs between two
providers, but in general, there can be a number of GTRs to be
deployed on each side to either load share or for Multi-Provider VPN
traffic engineering purposes. The policy agreed upon both providers
decides which EIDs/IIDs to be exported to the other provider's
mapping database.
The ETR in Provider2 network registers the destination EID/IID into
its own mapping system (Mapping DB 2); base on the Multi-Provider VPN
policies, Provider2 network will provide the VPN mapping information
along with the gateway Tunnel Router (GTR2) hop address to Provider1.
Shen & Farinacci Expires January 21, 2015 [Page 4]
Internet-Draft LISP Multi-Provider VPN Use-Cases July 2014
Provider1 will provision the Gateway Tunnel Router (GTR1) to register
the Multi-Provider VPN LISP mapping into its own mapping database
along with the ELP to list the GTR1 and GTR2 as hops.
An AS Number [LISP-LCAF] can be part of the EID mapping entry to
clearly define the mapping is an Multi-Provider LISP entry and belong
to which MSP network. Other usages of this AS Number includes to
detect the LISP mapping system looping and to facilitate multi-
provider LISP VPN trouble-shooting.
5. LISP Mapping Database System
For sites attached to LISP Provider Networks to communicate with one
another in a VPN, we assume the EID space is unique, while the IID
space is maintained individually by each LISP Provider Network and
there is no coordination among providers on the LISP IIDs. The
Multi-Provider VPN mapping entries are registered into its own
mapping database by the GTRs.
Take an example to illustrate the mapping database systems in the
Multi-Provider LISP VPN. In this instance, we have 4 LISP sites that
want to be part of the same VPN. There are 3 LISP Provider Networks
each which manage their own LISP mapping database systems. Each
provider allocates IIDs to their local LISP sites and there is no IID
space coordination among the MSPs.
Shen & Farinacci Expires January 21, 2015 [Page 5]
Internet-Draft LISP Multi-Provider VPN Use-Cases July 2014
AS 65512 AS 65513
10.1.0.0/16 (-----------} {-----------)
+-----+ ( LISP } { LISP ) 11.1.0.0/16
|Site1 \ ( ProviderA } { ProviderB ) +------+
| xTR ( Network } { Network ) / Site3 |
|IID 1 / +-----(--- . --+ } { +-- . ----)---- xTR |
+-----+ ( | } { | ) \ IID 2 |
( | } { | ) +------+
+-----+ ( | } { | )
|Site2 \ ( GTR-A GTR-B )
| xTR ---{--- . --+ }. . . .{ }
|IID 1 / (-----------} . . {-----------)
+-----+ . .
10.2.0.0/16 .
{-- GTR-C --) 12.1.0.0/16
{ | ) +------+
{ | ) / Site4 |
{ . ----)---- xTR |
{ ) \ IID 1 |
{ LISP ) +------+
{ ProviderC )
{ Network }
{-----------)
AS 65514
Four Multi-Provider LISP VPN sites from three LISP Providers
In above diagram, there are three LISP Provider Networks and four
LISP sites to be provisioned within the same Multi-Provider VPN. MSP
A has two LISP sites with the same IID, and with prefix 10.1.0.0/16
in Site1 and 10.2.0.0/16 in Site2, IID 1; The MSP B has one site with
IID 2 with prefix 11.1.0.0/16 in Site3 and the MSP C has one site
with IID 1 with prefix 12.1.0.0/16 in Site4. The GTR-A, GTR-B and
GTR-C are the re-encapsulation tunnel routers to facilitate Multi-
Provider VPN communication among the three MSPs.
In ProviderA's mapping database (registered by GTR-A):
(IID1, 11.1.0.0/16) -> ELP: [GTR-A, (IID2, GTR-B)]
[IID1, 12.1.0.0/16) -> ELP: [GTR-A, (IID1, GTR-C)]
In ProviderB's mapping database (registered by GTR-B):
(IID2, 10.1.0.0/16) -> ELP: [GTR-B, (IID1, GTR-A)]
[IID2, 10.2.0.0/16) -> ELP: [GTR-B, (IID1, GTR-A)]
[IID2, 12.1.0.0/16) -> ELP: [GTR-B, (IID1, GTR-C)]
Shen & Farinacci Expires January 21, 2015 [Page 6]
Internet-Draft LISP Multi-Provider VPN Use-Cases July 2014
In ProviderC's mapping database (registered by GTR-C):
(IID2, 10.1.0.0/16) -> ELP: [GTR-C, (IID1, GTR-A)]
[IID2, 10.2.0.0/16) -> ELP: [GTR-C, (IID1, GTR-A)]
[IID2, 11.1.0.0/16) -> ELP: [GTR-C, (IID2, GTR-B)]
6. LISP Packet Flow
Using the same example as in the previous section, this section shows
how the VPN packet flow operations either within the same LISP
Provider Network sites as well as sites across LISP Provider
Networks.
6.1. Packet from Site1 to Site2
This packet flow from 10.1 network to 10.2 network is within the same
LISP Provider Network uses the traditional LISP-VPN mechanism
[LISP-VPN]. Each ETR registers the site (IID1, eid-prefix) with
ProviderA's mapping database. The xTR at Site1 sends the Map-
Requests for(IID1, eid) to mapping database, and encapsulates the
packet direct to the xTR at Site2.
6.2. Packet from Site1 to Site3
This is the Multi-Provider VPN case. The xTR at Site1 of 10.1 sends
a Map-Request for (IID1, 11.1.1.1) to its local LISP mapping
database. The returned result will be (IID1, 11.1.0.0/16) with ELP
of [GTR-A, (IID2, GTR-B)]. The xTR at Site1 encapsulates to GTR-A
with the IID1 in the LISP header. The GTR-A does a lookup on (IID1,
11.1.1.1) in its local mapping database (same as the xTRs) and it
will use the second node in the ELP list. The GTR-A encapsulates the
packet to GTR-B with IID2 in the LISP header. GTR-B decapsulates and
looks up the (IID2, 11.1.1.1) in MSP B's local mapping database, and
the RLOC of TR at Site3 is returned. The GTR-B encapsulates the
packet to that RLOC. The xTR on Site3 decapsulates the packet and
sends the packet to the host of 11.1.1.1.
6.3. Packet from Site1 to Site4
The operation is almost identical as the above sub-section except for
that the IIDs between the two sites are the same. Thus there is no
IID change during the packet hops across LISP Provider Networks.
7. Security Considerations
This specification allows provider's VPN to communicate with each
other in a secure fashion. The LISP tunnel from ITR to GTR1 and from
GTR2 to ETR may use their own encryption mechanisms with each
Shen & Farinacci Expires January 21, 2015 [Page 7]
Internet-Draft LISP Multi-Provider VPN Use-Cases July 2014
provider. There can be cases one provider uses encryption for the
LISP overlay while the other provider does not. Also whether or not
to use the encryption over the tunnel between the GTR1 and GTR2
depends on the data sensitivity and the underlining network. The
GTRs MAY choose to drop the packet if the local security policy does
not match Multi-Provider VPN packet attributes.
8. IANA Considerations
At this time there are no requests for IANA.
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC6830] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The
Locator/ID Separation Protocol (LISP)", RFC 6830, January
2013.
9.2. Informative References
[LISP-LCAF]
Farinacci, D., Meyer, D., and J. Snijders, "LISP Canonical
Address Format", draft-ietf-lisp-lcaf-06 (work in
progress), 2014.
[LISP-VPN]
Lewis, D. and G. Schudel, "LISP Virtual Private Networks
(VPNs)", draft-ietf-lisp-vpns-00 (work in progress), 2014.
[RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
June 1999.
Appendix A. Acknowledgments
TBD.
Appendix B. Document Change Log
Initial draft posted on July 2014.
Shen & Farinacci Expires January 21, 2015 [Page 8]
Internet-Draft LISP Multi-Provider VPN Use-Cases July 2014
Authors' Addresses
Naiming Shen
Cisco Systems
San Jose, California
USA
Email: naiming@cisco.com
Dino Farinacci
lispers.net
San Jose, California
USA
Phone: 408-718-2001
Email: farinacci@gmail.com
Shen & Farinacci Expires January 21, 2015 [Page 9]