You are on page 1of 31

313

1006_05F9_c3 © 1999, Cisco Systems, Inc. 1

Deploying VPNs and


Tunneling Technology
Session 313

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 2

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 1
Agenda

• Scope of the Session


• VPN Overview
• Enterprise Dial/Access VPNs
• Enterprise Intranet/Extranet VPNs
• Service Provider VPNs
• Next Generation VPN Solutions
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 3

Scope of this Session

• A VPN survey with design guidelines, service options, and


configuration examples
• For in-depth IPSec coverage, attend “Advanced Security
Technology Concepts”
• For in-depth coverage of network management issues,
attend “Evolution of Network Management Technologies”
• For in-depth coverage of QoS issues, attend “Deploying
Traffic Management (QoS) Technology”
• For a survey of enterprise QoS, security, monitoring and
provisioning products, attend “New Developments for the
Enterprise Virtual Private Network”

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 4

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 2
Virtual Private Network (VPN)
Defined

“ A Virtual Private
Network Carries Private
Traffic Over
a Public Network

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 5

What Is a “Public” Network?

• In this context, any network shared


among different administrative domains
• A shared network such as the Internet
• A privately owned network which
services many customers, such as a
long distance telephone network

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 6

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 3
The Three Categories of VPN

Cisco
IOS®

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 7

Legacy VPNs

ASYNC
Remote
PSTN
Office Mobile User
Remote
Office ISDN
64 K
PRI
64 K Telecommuter

T1 Enterprise
Frame
Relay
AAA

Service Provider
DMZ

Internet
T1
Web Servers
DNS Server
SMTP Mail Relay
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 8

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 4
Agenda

• Scope of the Session


• VPN Overview
• Enterprise Dial/Access VPNs
• Enterprise Intranet/Extranet VPNs
• Service Provider VPNs
• Next Generation VPN Solutions
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 9

Enterprise Dial Outsourcing

Remote 64 K
Office
AAA
Enterprise
Frame T1
Relay
64 K
Remote Service Provider
Office DMZ

May Be Service
Mobile Provider IP Network
User Instead of the Internet

ASYNC Internet T3 Web Servers


DNS Server
PSTN SMTP Mail Relay
USA ISP ISP
A B ISDN
ASYNC
ISP Telecommuter
Mobile PSTN C
User Australia

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 10

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 5
PPTP/MPPE
(Voluntary Tunneling)
ISP NAS
• PPP Termination PPTP
• Registered Address Server
192.x.x.x
10.x.x.x

Private
Internet Address

• Registered Address
• Tunnel Termination
• MPPE Decryption
PSTN
PPTP/
MPPE • Layer 2 VPN, Multiprotocol
192.x.x.x • MPPE Encryption
• Tunnel Is Transparent to ISP

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 11

PPTP/MPPE Considerations

• PPTP/MPPE is built into Windows


dial-up networking
• Stateful MPPE encryption changes the
key every 255 packets, flow control is
useful in this case
• Stateless MPPE encryption generates
a new key for every packet
• Stateless MPPE is only supported in
recent versions of Dial Up Networking
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 12

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 6
L2TP/IPSec (Client Mode L2TP
with Transport Mode ESP )
ISP NAS
• PPP Termination
• Registered Address
192.x.x.x L2TP LNS
10.x.x.x

Private
Internet Address

• Registered Address
• Tunnel Termination
• IPSec Decryption
PSTN
L2TP/
IPSec • Layer 2 VPN, Multiprotocol
192.x.x.x • IPSec Encryption
• Tunnel Is Transparent to ISP

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 13

L2TP/IPSec Considerations

• Need client software, bundled


into Windows 2000
• Multivendor, multiprotocol,
standards track
• Most robust security solution
• Scales with certificate authority support

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 14

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 7
IPSec Alone
(Tunnel Mode with ESP)
ISP NAS
• PPP Termination
• Registered Address
192.x.x.x IPSec
10.x.x.x

Private
Internet Address

• Registered Address
• Tunnel Termination
• IPSec Decryption
PSTN
• IPSec Tunneling and
IPSec Encryption
192.x.x.x • Tunnel Is Transparent
to ISP

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 15

IPSec Alone Considerations

• Client software need not support L2TP


• Open standards client
• Layer 3 VPN, so IP only
• IKE extensions provide AAA
• Scales with certificate authority support

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 16

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 8
Enterprise Dial/Access
VPN Summary

Pro • Service Provider Independent


• Reduced Cost for Enterprises
• No Long Distance Phone Charges

Con • No Resource Availability Guarantees


• No Quality of Service Guarantees
• Performance Dictated by Weakest Link
in the Internet
• Must Manage Client Software

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 17

Agenda

• Scope of the Session


• VPN Overview
• Enterprise Dial/Access VPNs
• Enterprise Intranet/Extranet VPNs
• Service Provider VPNs
• Next Generation VPN Solutions
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 18

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 9
Enterprise Intranet VPNs

Enterprise
Remote Office Remote Office Hub AAA

May Be Service
Provider IP Network
Instead of the Internet 64 K 64 K DMZ

Mobile
User

T3 Web Servers
ASYNC Internet DNS Server
PSTN SMTP Mail Relay
USA ISP ISP
A B ISDN
ASYNC
ISP Telecommuter
Mobile PSTN C
User Australia

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 19

Enterprise Intranet VPN


Technologies

• Routing variants
• IP in IP
• L2TP router to router
• GRE tunneling
• IPSec in tunnel mode

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 20

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 10
Routing Variants

• VPNs through obscurity


(per customer ACLs)
• Policy routing

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 21

IP in IP

• Used mainly by mobile users, mobile


LAN, dial, wireless, packet radio
• RFC 1853s, 2003
• IETF mobile IP working group
• Similar to GRE

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 22

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 11
L2TP LAN to LAN

• L2TP dynamic tunneling for


LAN-based clients
• Useful for remote LANs that
may need to connect to one
of many sites
• Similar to GRE

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 23

Generic Route
Encapsulation (GRE)

151.145.1.1 151.145.1.2
255.255.255.252 255.255.255.252

IP Cloud
151.145.0.0

Router LEFT Router RIGHT


172.16.1.1 172.16.2.1
255.255.255.0 255.255.255.0

172.16.3.1 GRE Tunnel 172.16.3.2


255.255.255.252 255.255.255.252

IP GRE Network Packet


Transport Carrier Passenger
Protocol Protocol Protocol
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 24

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 12
GRE Configuration
Router LEFT Configuration
• Network 151.145.x.x is in
publicly routable address Interface Ethernet 0
space (routable over the ip address 172.16.1.1 255.255.255.0
Internet or other shared
network) Interface Serial 0
ip address 151.145.1.1 255.255.255.0
• Routes for 151.145.x.x are
not propagated in private Interface Tunnel 0
network 172.16.x.x ip address 172.16.3.1 255.255.255.252
• Serial interfaces are point- tunnel source Serial 0
to-point connections across tunnel destination 151.145.1.2
the public network
router eigrp
• May be designed as a network 172.16.0.0
hub and spoke, the no auto-summary
configuration is the
same except the hub has ip route 151.145.0.0 255.255.0.0 Serial 0
tunnels to each spoke
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 25

IPSec

IP Cloud

Router LEFT Router RIGHT

20.1.1.2 20.1.1.1
255.255.255.0
IPSec Tunnel 255.255.255.0

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 26

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 13
IPSec Modes

IP HDR Data
Tunnel Mode

New IP HDR IPsec HDR IP HDR Data


May Be Encrypted

IP HDR Data
Transport Mode

IP HDR IPsec HDR Data

May Be Encrypted

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 27

IPSec
Router LEFT Configuration
crypto isakmp policy 1
hash md5
authentication pre-share
• A simple IPSec lifetime 3600
config that uses pre- crypto isakmp key cisco address 20.1.1.1
shared keys instead !
of a CA crypto ipsec transform-set Foo ah-md5-hmac esp-des
crypto ipsec transform-set Foo2 ah-sha-hmac esp-des
• Multiple policies may crypto ipsec transform-set Foo3 ah-md5-hmac esp-3des
be defined !
crypto map CryptPing 10 ipsec-isakmp
• Tie the crypto map set peer 20.1.1.1
to the outbound set security-association lifetime seconds 300
interface set transform-set Foo Foo2 Foo3
match address 101
• In this example, only !
interface Serial0
PING (or other ICMP
ip address 20.1.1.2 255.255.255.0
traffic) will crypto map CryptPing
be encrypted !
access-list 101 permit icmp host 20.1.1.2 host 20.1.1.1
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 28

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 14
Enterprise Extranet

Enterprise X

May Be Service
Provider IP Network DMZ
Instead of the Internet

IPSec T1 IPSec

Internet
ISP B
ISP A
T1 T1
ISP C DMZ
DMZ
Partner Z
Supplier Y

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 29

Enterprise Intranet and Extranet


VPN Summary

Pro • Service Provider Independent


• Reduced Cost for Enterprises
• Quick and Easy Provisioning

Con • No QoS Guarantee


• Performance Dictated by Weakest Link
in the Internet

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 30

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 15
Agenda

• Scope of the Session


• VPN Overview
• Enterprise Dial/Access VPNs
• Enterprise Intranet/Extranet VPNs
• Service Provider VPNs
• Next Generation VPN Solutions
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 31

Service Provider Enterprise


Outsourcing and Wholesale Dial
DNIS= Mary/ISP A ISP
Proxied User with A
555-9999
Local PPP Termination
AAA
PSTN

Service
PRI(s) POP Provider
Network RPMS

DNIS= Core
555-1111

Joe
L2x Forwarded
Proxy
Radius

L2F or L2TP
Enterprise AAA
Z
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 32

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 16
Virtual Private Dial Networks
(VPDN) Components
LACs (NASs)
PSTN

PRI(s) Service
Provider LNS
DNIS= POP Network (Home
555-1111 Gateway)

RPMS and AAA AAA


Enterprise
or ISP

IP V.90 PPP L2TP IP

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 33

L2TP Basic Cisco IOS Commands

LAC:
vpdn-group 1
request dialin [l2f|l2tp] ip x.x.x.x [domain|dnis] <y>
local name <foo>
l2tp tunnel password <password>

LNS:
vpdn-group 1
accept dialin [l2f|l2tp|any] virtual-template 1 remote <y>
local name <foo>
l2tp tunnel password <password>

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 34

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 17
L2TP LAC Configuration
through AAA
• Enables centralized configuration
of NAS/LACs
• Simplifies and standardizes
NAS/LAC configuration
• Radius, Tacacs+
• Resource Pool Management (RPM)
adds the ability to configure this
locally in the Cisco IOS
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 35

Radius Tunnel Attribute


Sample Configuration

foo.com Password = "cisco User-Service = Outbound-User


Tunnel-type = L2TP,
Tunnel-Medium-Type = IP,
Tunnel-Server-Endpoint = "10.1.1.1, 10.1.1.2, 10.1.1.3",
Tunnel-Id = "nas-pool",
Tunnel-Password = "welcome"

Cisco-specific AV-Pairs Are Also Supported in


Earlier Versions of the Cisco IOS, for Example:
5551212 Password= "cisco" User-Service = Outbound-user,
cisco-avp="vpdn:ip-addresses=10.1.1.1,10.1.1.2/20.1.1.1",
cisco-avp="vpdn:tunnel-id=nas-pool",
cisco-avp="vpdn:tunnel-type=l2tp",
cisco-avp="vpdn:l2tp-tunnel-password=welcome”
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 36

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 18
Resource Pool Management
(RPM) Network Layout
Customer A

Optional Local AAA Radius/


Modem TACACS+
LNS
Service Provider
TA Network
NASs VPDN Tunnel
PSTN
ISDN VPDN Tunnel Radius/
Router DNIS TACACS+

Resource
Groups
RPMS LNS

Customer B
• Resources are located in the NAS
• Information captured at call setup
DNIS, Call Type, CLID
• Public network interfaces supported
PRI, CT1, CT3, CE1, SS7
• Resource pool management may be located:
In the NAS (if single NAS) or in a Resource Pool Manager Server
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 37

RPM Customer Profile


Components

A Outgoing
Incoming C Session
Call Management C Management

• DNIS Group(s)
E • Local
and Call Type P Authentication
T
• Session Limit • VPDN Group(s)
and Overflow
• Resource Group
and Resource
C
Service A
L
• Call Treatment
L
Threshold Settings (RPMS)

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 38

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 19
Resource Pool Management
Cisco IOS Command Sample

resource-pool enable resource-pool profile customer FOO1


vpdn enable limit base-size 16
! limit overflow-size 8
resource-pool group resource ISDN1 resource ISDN1 digital
range limit 46 dnis group DG1
! vpdn group VG1
vpdn-group VG1 !
request dialin l2tp ip 10.1.1.1 dnis DG1 dialer dnis group DG1
local name NAS1 number 5551212
dnis DG1 number 5553434
loadsharing ip 10.1.1.1 limit 12
loadsharing ip 10.1.1.2 limit 12
backup ip 10.1.1.3

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 39

RPMS Control

RMP RPMS
PRI
CT1
CE1

Modem PSTN/ISDN
DNIS RADIUS
Call Type
ISDN {CLID} AAA
Pool (Optional)

• Customer profiles stored in the RPMS


• RPMS may control a single NAS, or multiple
NASes in a single or multiple PoP definitions
• Utilizes Resource Manager Protocol (RMP)
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 40

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 20
Stackable L2TP LNSs
and Multilink PPP
LNS #1
NASs 1st Link
SGBP

Domain IP 2nd Link


x.com 10.1.1.1 LNS #2
x.com 10.1.1.2

AAA

• SGBP determines bundle owner


• Multihop code forwards link
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 41

Stacking Home Gateways/


LNS’s Configuration

hostname LNS1
!
username LNSstack password 7 00071A150754
!
multilink virtual-template 1
!
sgbp group LNSstack
sgbp member LNS2 10.1.1.2
sgbp member LNS3 10.1.1.3
sgbp member LNS4 10.1.1.4
!
vpdn multihop

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 42

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 21
QoS Considerations

• The IP ToS byte may be copied from


the IP header down to the L2TP
header for class-based queuing
• Individual tunnels/VCs can have
standard QoS techniques applied
such as CAR and traffic shaping

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 43

L2TP Multihop for Multi-Protocol

LNS
Multi Protocol Router
(IPX, ATalk, Etc.)
Enterprise

L2TP

NAS/ L2TP
LAC DMZ

Internet T1
IP Only Router

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 44

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 22
L2TP Multihop for
Clearing House Model

Enterprise

Clearing
House
Internet
DMZ

L2TP L2TP
LAC MultiHop LNS
Router

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 45

L2F/L2TP Multihop Configuration

vpdn enable
vpdn multihop
!
vpdn-group 1
accept dialin l2tp virtual-template 1 remote cs1
local name cs2
!
vpdn-group 2
request dialin l2tp ip 10.1.1.1 domain x.com
local name cs2

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 46

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 23
Domain Name Stripping
Configuration

Enterprise
X.COM
AAA

L2TP Jane
LNS

Jane@X.COM
LAC
Cisco IOS config:

ip host x.com 10.1.1.1


...
radius-server host 10.1.1.1
radius-server directed-request restricted
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 47

Service Provider VPN Summary

Pro • Service Guarantees Such as Modem


Reservation and QoS
• Service Provider IP Network Reliability
and Privacy
• No Client Software to Manage
Con • Must Contract with Service Provider(s)
• Coverage Area May Not Be as Great

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 48

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 24
Agenda

• Scope of the Session


• VPN Overview
• Enterprise Dial/Access VPNs
• Enterprise Intranet/Extranet VPNs
• Service Provider VPNs
• Next Generation VPN Solutions
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 49

Cisco MPLS VPN Architecture

VPN Membership
Corp A Based on Interface
• Scalable VPNs Site 3 and Unique ID
Corp A
• Standards-based Site 1
Corp A
Site 2 MPLS
• IP QoS Network
Corp B
and traffic MPLS VPN Citybank Site 2
engineering MPLS VPN Bankcorp
Corp B
• WAN B/W Site 3
Corp B
optimization Site 1
Traffic Separation by
• No VC Interface
provisioning
required
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 50

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 25
Building VPNs with MPLS
Private View Public View Private View
Controlled Route
Distribution Cust A
(15)10.1.1 (15)10.2.1
10.2.1.x
Cust A VPN 15
10.1.1.x MPLS (15)10.3.1
VPN 15 Network
(354)10.2.1
Cust A
(354)10.1.1 10.3.1.x
VPN 15
Forwarding Examples
In Out
Cust B Cust B
10.1.1.x (15)10.2.1 (15)10.1.1 10.2.1.x
VPN 354 (15)10.3.1 VPN 354
(354)10.2.1 (354)10.1.1
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 51

PPP+MPLS VPN
VPN A
CE AAA
VPN100 PE
DNIS VPN 100 VPN 200 1.1.1.1
555-1212 FIB FIB
PPP Client BGP-MP AAA
POP IP
VPN A L2TP Server
NAS 1
PE
NAS 2 L2TP
IP
isp-b.net BGP-MP
PPP Client BGP-MP MPLS
VPN B Core
Route
Summary
Mgmt IP
Station

PE

VPN B
VPN200
CE AAA
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 2.2.2.2 52

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 26
PPP/MPLS VPN Configuration—
Define VPDN and VRFs

vpdn enable
vpdn-group 1
accept dialin l2tp virtual-template 1 remote nas-cisco
local name pe1
vpdn-group 2
accept dialin l2tp virtual-template 2 remote nas-stanford
local name pe1
!
ip vrf CISCO
rd 100:1
route-target both 100:1
!
ip vrf STANFORD
rd 100:2
route-target both 100:2
313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 53

PPP/MPLS VPN Configuration—


Define Virtual Templates

interface virtual-template 1
ip vrf forwarding CISCO
ip address 10.100.0.1 255.255.255.0
no ip directed-broadcast
ppp authentication chap
peer default ip address pool CISCO
!
interface virtual-template 2
ip vrf forwarding STANFORD
ip address 10.200.0.1 255.255.255.0
no ip directed-broadcast
ppp authentication chap
peer default ip address pool STANFORD

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 54

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 27
PPP/MPLS VPN—Define Pools
and Configure Routing

ip local pool CISCO 10.100.0.2 10.100.0.254


ip local pool STANFORD 10.200.0.2 10.200.0.254
!
router bgp 1
address-family ipv4 vrf CISCO
network 10.100.0.0 mask 255.255.255.0
aggregate 10.100.0.0 255.255.255.0 summary
redistribute connected
exit-address-family
address-family ipv4 vrf STANFORD
network 10.200.0.0 mask 255.255.255.0
aggregate 10.200.0.0 255.255.255.0 summary
redistribute connected
exit-address-family

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 55

PPP/MPLS VPN—
Configure Interfaces

Interface FastEthernet 1.1


! this is a VLAN interface, but it doesn’t have to be
ip vrf forwarding CISCO
ip address 10.100.10.1 255.255.255.0

Interface FastEthernet 1.2


ip vrf forwarding STANFORD
ip address 10.200.10.1 255.255.255.0

! Optional static routes

ip vrf CISCO route 0.0.0.0 0.0.0.0 FastEthernet 1.1


ip vrf STANFORD route 0.0.0.0 0.0.0.0 FastEthernet 1.2

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 56

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 28
PPP/MPLS VPN—Other
Configuration Considerations

• Use Proxy Radius in first release


• Much work is being done in this area

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 57

Next Generation MPLS VPN


Solutions Summary

Pro • Offers Optimal Use of the Backbone


• Offers New Managed Service
Opportunities, Bundled VPN Services
(Dedicated and Access)
• Offers Traffic Engineering
• No Client Software to Manage
Con • Requires an Upgrade of the
Backbone Network

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 58

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 29
Resources

• VPN Services (Enterprise):


http://www.cisco.com/warp/public/779/largeent/
learn/technologies/VPNs.html
• VPN Services (Service Provider):
http://www.cisco.com/warp/public/779/servpro/
solutions/vpn/about.htm
• VPN Solutions for Service Providers:
http://www.cisco.com/warp/public/cc/cisco/mkt/
servprod/dial/index.shtml
• MPLS VPNs:
http://www.cisco.com/warp/public/784/packet/
313
apr99/6.html
1006_05F9_c3 © 1999, Cisco Systems, Inc. 59

Q&A

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 60

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 30
Please Complete Your
Evaluation Form
Session 313

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 61

313
1006_05F9_c3 © 1999, Cisco Systems, Inc. 62

Copyright © 1998, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr 31

You might also like