1 / 19

21.11.2013 Petteri Sirén

The Use of Locator/ID Separation Protocol (LISP) in Providing Network Services by Internet Service Providers. 21.11.2013 Petteri Sirén. Content. Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary. Preface. Preface.

allayna
Download Presentation

21.11.2013 Petteri Sirén

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Use of Locator/ID Separation Protocol (LISP) in Providing Network Services by Internet Service Providers 21.11.2013 PetteriSirén

  2. Content • Preface • Locator/ID Separation Protocol (LISP) • How LISP works • Methods how LISP was studied • Test cases • Result • Summary Petteri Sirén

  3. Preface Petteri Sirén

  4. Preface • Why this study is done • Reasons for the development of LISP • Separation of location and identity • EIDs and RLOCs Petteri Sirén

  5. Locator/ID Separation Protocol (LISP) Petteri Sirén

  6. Locator/ID Separation Protocol • Hosts operate the same way as before • Core routers operate the same way as before • Tunnel routers (CE/PE) perform tunneling • Mapping system stores the EID-RLOC pairs • Tunnel routers have map cache for EID-RLOC pairs • Proxy tunnel routers are used between LISP sites and non-LISP sites Petteri Sirén

  7. How LISP works Petteri Sirén

  8. How LISP works Mapping System -> Sent IP packet Src 10.1.0.11 Dst 10.0.0.2 From MS to ITR 10.0.0.2/24 is behind 2.2.2.2 Src: 10.1.0.11/24 Dst: 10.0.0.2/24 Src: 1.1.1.1 Dst: 2.2.2.2 From ITR to MS Where is 10.0.0.2? DNS query -> Where is Host B? <- Response Host B is in 10.0.0.2/24 Core B? ETR 2.2.2.2 Src: 10.1.0.11 Dst: 10.0.0.2 ITR 1.1.1.1 Host B 10.0.0.2 Host A 10.1.0.11 Petteri Sirén

  9. Tunnel router EID table • eid-table vrfCustomer_A instance-id 101 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 100 database-mapping 10.1.0.0/16 x.t.r.2 priority 2 weight 100 • eid-table vrfCustomer_B instance-id 102 database-mapping 10.1.0.0/16 x.t.r.1 priority 1weight 50 database-mapping 10.1.0.0/16 x.t.r.2 priority 1 weight 50 • eid-table default instance-id 0 database-mapping 10.1.0.0/16 x.t.r.1 priority 1 weight 100 xTR2 LISP site xTR1 Petteri Sirén

  10. Methods used to study LISP Petteri Sirén

  11. Methods used to study LISP • Tunnel routers were Cisco 800 series routers • Mapping system and Proxy Tunnel router was Cisco ASR1000 • Control messages were studied • Map Request, Map Reply, Map Register • LISP Security Petteri Sirén

  12. Test Cases Petteri Sirén

  13. Services tested • Internet access • IPv6 service • Multihoming • VPNs • Back-up connection (Multi-attached) Petteri Sirén

  14. LISP in VPN Petteri Sirén

  15. Results Petteri Sirén

  16. Results • Easy way to offer IPv6 services • VPN works fine • No renumbering needed when changing the location of the virtual machines • SP core does not need to know the customers • Adding new site is simple, only one tunnel router must be configured Petteri Sirén

  17. Summary Petteri Sirén

  18. Summary • LISP devices: Tunnel routers, Proxy Tunnel routers & Mapping system • Hosts utilize EIDs, routers use RLOCs • Use cases: multihoming, no renumbering and a simple VPN solution • Doesn’t solve the IPv4 address problem Petteri Sirén

  19. Thank You More information RFC 6830-6836 www.lisp4.net Petteri Sirén

More Related