190 likes | 382 Views
The Use of Locator/ID Separation Protocol (LISP) in Providing Network Services by Internet Service Providers. 21.11.2013 Petteri Sirén. Content. Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary. Preface. Preface.
E N D
The Use of Locator/ID Separation Protocol (LISP) in Providing Network Services by Internet Service Providers 21.11.2013 PetteriSirén
Content • Preface • Locator/ID Separation Protocol (LISP) • How LISP works • Methods how LISP was studied • Test cases • Result • Summary Petteri Sirén
Preface Petteri Sirén
Preface • Why this study is done • Reasons for the development of LISP • Separation of location and identity • EIDs and RLOCs Petteri Sirén
Locator/ID Separation Protocol (LISP) Petteri Sirén
Locator/ID Separation Protocol • Hosts operate the same way as before • Core routers operate the same way as before • Tunnel routers (CE/PE) perform tunneling • Mapping system stores the EID-RLOC pairs • Tunnel routers have map cache for EID-RLOC pairs • Proxy tunnel routers are used between LISP sites and non-LISP sites Petteri Sirén
How LISP works Petteri Sirén
How LISP works Mapping System -> Sent IP packet Src 10.1.0.11 Dst 10.0.0.2 From MS to ITR 10.0.0.2/24 is behind 2.2.2.2 Src: 10.1.0.11/24 Dst: 10.0.0.2/24 Src: 1.1.1.1 Dst: 2.2.2.2 From ITR to MS Where is 10.0.0.2? DNS query -> Where is Host B? <- Response Host B is in 10.0.0.2/24 Core B? ETR 2.2.2.2 Src: 10.1.0.11 Dst: 10.0.0.2 ITR 1.1.1.1 Host B 10.0.0.2 Host A 10.1.0.11 Petteri Sirén
Tunnel router EID table • eid-table vrfCustomer_A instance-id 101 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 100 database-mapping 10.1.0.0/16 x.t.r.2 priority 2 weight 100 • eid-table vrfCustomer_B instance-id 102 database-mapping 10.1.0.0/16 x.t.r.1 priority 1weight 50 database-mapping 10.1.0.0/16 x.t.r.2 priority 1 weight 50 • eid-table default instance-id 0 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 100 xTR2 LISP site xTR1 Petteri Sirén
Methods used to study LISP Petteri Sirén
Methods used to study LISP • Tunnel routers were Cisco 800 series routers • Mapping system and Proxy Tunnel router was Cisco ASR1000 • Control messages were studied • Map Request, Map Reply, Map Register • LISP Security Petteri Sirén
Test Cases Petteri Sirén
Services tested • Internet access • IPv6 service • Multihoming • VPNs • Back-up connection (Multi-attached) Petteri Sirén
LISP in VPN Petteri Sirén
Results Petteri Sirén
Results • Easy way to offer IPv6 services • VPN works fine • No renumbering needed when changing the location of the virtual machines • SP core does not need to know the customers • Adding new site is simple, only one tunnel router must be configured Petteri Sirén
Summary Petteri Sirén
Summary • LISP devices: Tunnel routers, Proxy Tunnel routers & Mapping system • Hosts utilize EIDs, routers use RLOCs • Use cases: multihoming, no renumbering and a simple VPN solution • Doesn’t solve the IPv4 address problem Petteri Sirén
Thank You More information RFC 6830-6836 www.lisp4.net Petteri Sirén