Book description
A guide to using and defining MPLS VPN services
Analyze strengths and weaknesses of TDM and Layer 2 WAN services
Understand the primary business and technical issues when evaluating IP/MPLS VPN offerings
Describe the IP addressing, routing, load balancing, convergence, and services capabilities of the IP VPN
Develop enterprise quality of service (QoS) policies and implementation guidelines
Achieve scalable support for multicast services
Learn the benefits and drawbacks of various security and encryption mechanisms
Ensure proper use of services and plan for future growth with monitoring and reporting services
Provide remote access, Internet access, and extranet connectivity to the VPN supported intranet
Provide a clear and concise set of steps to plan and execute a network migration from existing ATM/Frame Relay/leased line networks to an IP VPN
IP/MPLS VPNs are compelling for many reasons. For enterprises, they enable right-sourcing of WAN services and yield generous operational cost savings. For service providers, they offer a higher level of service to customers and lower costs for service deployment.
Migration comes with challenges, however. Enterprises must understand key migration issues, what the realistic benefits are, and how to optimize new services. Providers must know what aspects of their services give value to enterprises and how they can provide the best value to customers.
Selecting MPLS VPN Services helps you analyze migration options, anticipate migration issues, and properly deploy IP/MPLS VPNs. Detailed configurations illustrate effective deployment while case studies present available migration options and walk you through the process of selecting the best option for your network. Part I addresses the business case for moving to an IP/MPLS VPN network, with a chapter devoted to the business and technical issues you should review when evaluating IP/MPLS VPN offerings from major providers. Part II includes detailed deployment guidelines for the technologies used in the IP/MPLS VPN.
This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Table of contents
- Copyright
- About the Authors
- Acknowledgments
- Icons Used in This Book
- Command Syntax Conventions
- Introduction
-
I. Business Analysis and Requirements of IP/MPLS VPN
- 1. Assessing Enterprise Legacy WANs and IP/VPN Migration
- 2. Assessing Service Provider WAN Offerings
-
3. Analyzing Service Requirements
- Application/Bandwidth Requirements
- Backup and Resiliency
- Enterprise Segmentation Requirements
- Access Technologies
- QoS Requirements
- Subscriber Network QoS Design
- Security Requirements
- Multiprovider Considerations
- Extranets
-
Case Study: Analyzing Service Requirements for Acme, Inc.
- Layer 2 Description
- Existing Customer Characteristics That Are Required in the New Network
- DefenseCo’s Backbone Is a Single Autonomous System
- Reasons for Migrating to MPLS
- Evaluation Testing Phase
- Routing Convergence
- Jitter and Delay
- Congestion, QoS, and Load Testing
- Vendor Knowledge and Technical Performance
- Evaluation Tools
- TTCP
- Lessons Learned
- Transition and Implementation Concerns and Issues
- Post-Transition Results
- Summary
-
References
-
II. Deployment Guidelines
-
4. IP Routing with IP/MPLS VPNs
- Introduction to Routing for the Enterprise MPLS VPN
-
Site Typifying WAN Access: Impact on Topology
- Site Type: Topology
- WAN Connectivity Standards
- Site Type A Attached Sites: Dual CE and Dual PE
- Site Type B/3 Dual-Attached Site—Single CE, Dual PE
- Site Type B/3 Dual-Attached Site—Single CE, Single PE
- Site Type D Single-Attached Site—Single CE with Backup
- Convergence: Optimized Recovery
- IP Addressing
- Routing Between the Enterprise and the Service Provider
- Using EIGRP Between the CE and PE
- How EIGRP MPLS VPN PE-to-CE Works
- PE Router: Non-EIGRP-Originated Routes
- PE Router: EIGRP-Originated Internal Routes
- PE Router: EIGRP-Originated External Routes
- Multiple VRF Support
- Extended Communities Defined for EIGRP VPNv4
- Metric Propagation
- Configuring EIGRP for CE-to-PE Operation
- Using BGP Between the CE and PE
- Securing CE-PE Peer Sessions
- Improving BGP Convergence
-
Case Study: BGP and EIGRP Deployment in Acme, Inc.
- Small Site—Single-Homed, No Backup
- Medium Site—Single-Homed with Backup
- Medium Site—Single CE Dual-Homed to a Single PE
- Large Site—Dual-Homed (Dual CE, Dual PE)
- Load Sharing Across Multiple Connections
- Very Large Site/Data Center—Dual Service Provider MPLS VPN
- Site Typifying Site Type A Failures
- Solutions Assessment
- Summary
- References
- 5. Implementing Quality of Service
-
6. Multicast in an MPLS VPN
- Introduction to Multicast for the Enterprise MPLS VPN
- Mechanics of IP Multicast
- Multicast Deployment Models
- Multicast in an MPLS VPN Environment: Transparency
- Case Study: Implementing Multicast over MPLS for Acme
- What Happens When There Is No MVPN Support?
- Summary
-
References
-
7. Enterprise Security in an MPLS VPN Environment
- Setting the Playing Field
- Comparing MPLS VPN Security to Frame Relay Networks
- Issues for Enterprises to Resolve When Connecting at Layer 3 to Provider Networks
- Basic Security Techniques
- Distributed DoS, Botnets, and Worms
- Case Study Selections
- Summary
-
References
- Comparing MPLS VPN to Frame Relay Security
- ACL Information
- Miscellaneous Security Tools
- Cisco Reference for MPLS Technology and Operation
- Cisco Reference for Cisco Express Forwarding
- Public Online ISP Security Bootcamp
- Tutorials, Workshops, and Bootcamps
- Original Backscatter Traceback and Customer-Triggered Remote-Triggered Black-Hole Techniques
- Source for Good Papers on Internet Technologies and Security
- Security Work Definitions
- NANOG SP Security Seminars and Talks
- Birds of a Feather and General Security Discussion Sessions at NANOG
- 8. MPLS VPN Network Management
-
9. Off-Net Access to the VPN
- Remote Access
- IPsec Access
- Supporting Internet Access in IP VPNs
- Case Study Selections
- Summary
-
References
- General PPP Information
- Configuring Dial-In Ports
- L2TP
- Layer 2 Tunnel Protocol Fact Sheet
- Layer 2 Tunnel Protocol
- VPDN Configuration Guide
- VPDN Configuration and Troubleshooting
- Security Configuration Guide
- RADIUS Configuration Guide
- Broadband Aggregation to MPLS VPN
- Remote Access to MPLS VPN
- Network-Based IPsec VPN Solutions
- IPsec
- GRE + IPsec
- DMVPN
- Split Tunneling
- Prefragmentation
- 10. Migration Strategies
-
4. IP Routing with IP/MPLS VPNs
-
III. Appendix
-
A. Questions to Ask Your Provider Regarding Layer 3 IP/MPLS VPN Capability
- Coverage and Topology
- Customer Edge Router Management
- Network Access, Resiliency, and Load Balancing
- QoS Capability
- Multicast Capability
- Routing Protocol Capability
- Security
- Software Deployment Processes
- Inter-Provider IP/VPN
- IPv6
- MTU Considerations
- Hosting Capability
- IP Telephony PSTN Integration
- IP Telephony Hosted Call Agent
- Remote and Dial Access
- Internet Access
- Other Network Services
-
A. Questions to Ask Your Provider Regarding Layer 3 IP/MPLS VPN Capability
Product information
- Title: Selecting MPLS VPN Services
- Author(s):
- Release date: February 2006
- Publisher(s): Cisco Press
- ISBN: 9781587051913
You might also like
book
Broadband Cable Access Networks
Broadband Cable Access Networks focuses on broadband distribution and systems architecture and concentrates on practical concepts …
book
IP, Ethernet and MPLS Networks: Resource and Fault Management
This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and …
book
BCS Glossary of Computing, 14th Edition
This unrivalled study aid and reference tool is divided into themed sections making it much more …
article
Use GitHub Copilot: Additional Tips
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …