diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4364.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4364.txt')
-rw-r--r-- | doc/rfc/rfc4364.txt | 2635 |
1 files changed, 2635 insertions, 0 deletions
diff --git a/doc/rfc/rfc4364.txt b/doc/rfc/rfc4364.txt new file mode 100644 index 0000000..a7ecd5b --- /dev/null +++ b/doc/rfc/rfc4364.txt @@ -0,0 +1,2635 @@ + + + + + + +Network Working Group E. Rosen +Request for Comments: 4364 Cisco Systems, Inc. +Obsoletes: 2547 Y. Rekhter +Category: Standards Track Juniper Networks, Inc. + February 2006 + + + BGP/MPLS IP Virtual Private Networks (VPNs) + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document describes a method by which a Service Provider may use + an IP backbone to provide IP Virtual Private Networks (VPNs) for its + customers. This method uses a "peer model", in which the customers' + edge routers (CE routers) send their routes to the Service Provider's + edge routers (PE routers); there is no "overlay" visible to the + customer's routing algorithm, and CE routers at different sites do + not peer with each other. Data packets are tunneled through the + backbone, so that the core routers do not need to know the VPN + routes. + + This document obsoletes RFC 2547. + + + + + + + + + + + + + + + + + +Rosen & Rekhter Standards Track [Page 1] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Virtual Private Networks ...................................4 + 1.2. Customer Edge and Provider Edge ............................5 + 1.3. VPNs with Overlapping Address Spaces .......................6 + 1.4. VPNs with Different Routes to the Same System ..............7 + 1.5. SP Backbone Routers ........................................7 + 1.6. Security ...................................................8 + 2. Sites and CEs ...................................................8 + 3. VRFs: Multiple Forwarding Tables in PEs .........................9 + 3.1. VRFs and Attachment Circuits ...............................9 + 3.2. Associating IP Packets with VRFs ..........................10 + 3.3. Populating the VRFs .......................................11 + 4. VPN Route Distribution via BGP .................................12 + 4.1. The VPN-IPv4 Address Family ...............................13 + 4.2. Encoding of Route Distinguishers ..........................14 + 4.3. Controlling Route Distribution ............................15 + 4.3.1. The Route Target Attribute .........................15 + 4.3.2. Route Distribution Among PEs by BGP ................17 + 4.3.3. Use of Route Reflectors ............................20 + 4.3.4. How VPN-IPv4 NLRI Is Carried in BGP ................22 + 4.3.5. Building VPNs Using Route Targets ..................23 + 4.3.6. Route Distribution Among VRFs in a Single PE .......23 + 5. Forwarding .....................................................23 + 6. Maintaining Proper Isolation of VPNs ...........................26 + 7. How PEs Learn Routes from CEs ..................................27 + 8. How CEs Learn Routes from PEs ..................................30 + 9. Carriers' Carriers .............................................30 + 10. Multi-AS Backbones ............................................32 + 11. Accessing the Internet from a VPN .............................34 + 12. Management VPNs ...............................................36 + 13. Security Considerations .......................................37 + 13.1. Data Plane ...............................................37 + 13.2. Control Plane ............................................39 + 13.3. Security of P and PE Devices .............................39 + 14. Quality of Service ............................................39 + 15. Scalability ...................................................40 + 16. IANA Considerations ...........................................40 + 17. Acknowledgements ..............................................41 + 18. Contributors ..................................................41 + 19. Normative References ..........................................44 + 20. Informative References ........................................45 + + + + + + + + +Rosen & Rekhter Standards Track [Page 2] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + +1. Introduction + + This document describes a method by which a Service Provider may use + an IP backbone to provide IP Virtual Private Networks (VPNs) for its + customers. This method uses a "peer model", in which the customers' + edge routers (CE routers) send their routes to the Service Provider's + edge routers (PE routers). Border Gateway Protocol (BGP) + [BGP, BGP-MP] is then used by the Service Provider to exchange the + routes of a particular VPN among the PE routers that are attached to + that VPN. This is done in a way that ensures that routes from + different VPNs remain distinct and separate, even if two VPNs have an + overlapping address space. The PE routers distribute, to the CE + routers in a particular VPN, the routes from other the CE routers in + that VPN. The CE routers do not peer with each other, hence there is + no "overlay" visible to the VPN's routing algorithm. The term "IP" + in "IP VPN" is used to indicate that the PE receives IP datagrams + from the CE, examines their IP headers, and routes them accordingly. + + Each route within a VPN is assigned a Multiprotocol Label Switching + (MPLS) [MPLS-ARCH, MPLS-BGP, MPLS-ENCAPS] label; when BGP distributes + a VPN route, it also distributes an MPLS label for that route. + Before a customer data packet travels across the Service Provider's + backbone, it is encapsulated with the MPLS label that corresponds, in + the customer's VPN, to the route that is the best match to the + packet's destination address. This MPLS packet is further + encapsulated (e.g., with another MPLS label or with an IP or Generic + Routing Encapsulation (GRE) tunnel header [MPLS-in-IP-GRE]) so that + it gets tunneled across the backbone to the proper PE router. Thus, + the backbone core routers do not need to know the VPN routes. + + The primary goal of this method is to support the case in which a + client obtains IP backbone services from a Service Provider or + Service Providers with which it maintains contractual relationships. + The client may be an enterprise, a group of enterprises that need an + extranet, an Internet Service Provider, an application service + provider, another VPN Service Provider that uses this same method to + offer VPNs to clients of its own, etc. The method makes it very + simple for the client to use the backbone services. It is also very + scalable and flexible for the Service Provider, and allows the + Service Provider to add value. + + + + + + + + + + + +Rosen & Rekhter Standards Track [Page 3] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + +1.1. Virtual Private Networks + + Consider a set of "sites" that are attached to a common network that + we call "the backbone". Now apply some policy to create a number of + subsets of that set, and impose the following rule: two sites may + have IP interconnectivity over that backbone only if at least one of + these subsets contains them both. + + These subsets are Virtual Private Networks (VPNs). Two sites have IP + connectivity over the common backbone only if there is some VPN that + contains them both. Two sites that have no VPN in common have no + connectivity over that backbone. + + If all the sites in a VPN are owned by the same enterprise, the VPN + may be thought of as a corporate "intranet". If the various sites in + a VPN are owned by different enterprises, the VPN may be thought of + as an "extranet". A site can be in more than one VPN; e.g., in an + intranet and in several extranets. In general, when we use the term + "VPN" we will not be distinguishing between intranets and extranets. + + We refer to the owners of the sites as the "customers". We refer to + the owners/operators of the backbone as the "Service Providers" + (SPs). The customers obtain "VPN service" from the SPs. + + A customer may be a single enterprise, a set of enterprises, an + Internet Service Provider, an Application Service Provider, another + SP that offers the same kind of VPN service to its own customers, + etc. + + The policies that determine whether a particular collection of sites + is a VPN are the policies of the customers. Some customers will want + the implementation of these policies to be entirely the + responsibility of the SP. Other customers may want to share with the + SP the responsibility for implementing these policies. This document + specifies mechanisms that can be used to implement these policies. + The mechanisms we describe are general enough to allow these policies + to be implemented either by the SP alone or by a VPN customer + together with the SP. Most of the discussion is focused on the + former case, however. + + The mechanisms discussed in this document allow the implementation of + a wide range of policies. For example, within a given VPN, one can + allow every site to have a direct route to every other site ("full + mesh"). Alternatively, one can force traffic between certain pairs + of sites to be routed via a third site. This can be useful, e.g., if + it is desired that traffic between a pair of sites be passed through + a firewall, and the firewall is located at the third site. + + + + +Rosen & Rekhter Standards Track [Page 4] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + In this document, we restrict our discussion to the case in which the + customer is explicitly purchasing VPN service from an SP, or from a + set of SPs that have agreed to cooperate to provide the VPN service. + That is, the customer is not merely purchasing internet access from + an SP, and the VPN traffic does not pass through a random collection + of interconnected SP networks. + + We also restrict our discussion to the case in which the backbone + provides an IP service to the customer, rather than, e.g., a layer 2 + service such as Frame Relay, Asynchronous Transfer Mode (ATM), + ethernet, High Level Data Link Control (HDLC), or Point-to-Point + Protocol (PPP). The customer may attach to the backbone via one of + these (or other) layer 2 services, but the layer 2 service is + terminated at the "edge" of the backbone, where the customer's IP + datagrams are removed from any layer 2 encapsulation. + + In the rest of this introduction, we specify some properties that + VPNs should have. The remainder of this document specifies a set of + mechanisms that can be deployed to provide a VPN model that has all + these properties. This section also introduces some of the technical + terminology used in the remainder of the document. + +1.2. Customer Edge and Provider Edge + + Routers can be attached to each other, or to end systems, in a + variety of different ways: PPP connections, ATM Virtual Circuits + (VCs), Frame Relay VCs, ethernet interfaces, Virtual Local Area + Networks (VLANs) on ethernet interfaces, GRE tunnels, Layer 2 + Tunneling Protocol (L2TP) tunnels, IPsec tunnels, etc. We will use + the term "attachment circuit" to refer generally to some such means + of attaching to a router. An attachment circuit may be the sort of + connection that is usually thought of as a "data link", or it may be + a tunnel of some sort; what matters is that it be possible for two + devices to be network layer peers over the attachment circuit. + + Each VPN site must contain one or more Customer Edge (CE) devices. + Each CE device is attached, via some sort of attachment circuit, to + one or more Provider Edge (PE) routers. + + Routers in the SP's network that do not attach to CE devices are + known as "P routers". + + CE devices can be hosts or routers. In a typical case, a site + contains one or more routers, some of which are attached to PE + routers. The site routers that attach to the PE routers would then + be the CE devices, or "CE routers". However, there is nothing to + prevent a non-routing host from attaching directly to a PE router, in + which case the host would be a CE device. + + + +Rosen & Rekhter Standards Track [Page 5] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Sometimes, what is physically attached to a PE router is a layer 2 + switch. In this case, we do NOT say that the layer 2 switch is a CE + device. Rather, the CE devices are the hosts and routers that + communicate with the PE router through the layer 2 switch; the layer + 2 infrastructure is transparent. If the layer 2 infrastructure + provides a multipoint service, then multiple CE devices can be + attached to the PE router over the same attachment circuit. + + CE devices are logically part of a customer's VPN. PE and P routers + are logically part of the SP's network. + + The attachment circuit over which a packet travels when going from CE + to PE is known as that packet's "ingress attachment circuit", and the + PE as the packet's "ingress PE". The attachment circuit over which a + packet travels when going from PE to CE is known as that packet's + "egress attachment circuit", and the PE as the packet's "egress PE". + + We will say that a PE router is attached to a particular VPN if it is + attached to a CE device that is in a site of that VPN. Similarly, we + will say that a PE router is attached to a particular site if it is + attached to a CE device that is in that site. + + When the CE device is a router, it is a routing peer of the PE(s) to + which it is attached, but it is NOT a routing peer of CE routers at + other sites. Routers at different sites do not directly exchange + routing information with each other; in fact, they do not even need + to know of each other at all. As a consequence, the customer has no + backbone or "virtual backbone" to manage, and does not have to deal + with any inter-site routing issues. In other words, in the scheme + described in this document, a VPN is NOT an "overlay" on top of the + SP's network. + + With respect to the management of the edge devices, clear + administrative boundaries are maintained between the SP and its + customers. Customers are not required to access the PE or P routers + for management purposes, nor is the SP required to access the CE + devices for management purposes. + +1.3. VPNs with Overlapping Address Spaces + + If two VPNs have no sites in common, then they may have overlapping + address spaces. That is, a given address might be used in VPN V1 as + the address of system S1, but in VPN V2 as the address of a + completely different system S2. This is a common situation when the + VPNs each use an RFC 1918 private address space. Of course, within + each VPN, each address must be unambiguous. + + + + + +Rosen & Rekhter Standards Track [Page 6] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Even two VPNs that do have sites in common may have overlapping + address spaces, as long as there is no need for any communication + between systems with such addresses and systems in the common sites. + +1.4. VPNs with Different Routes to the Same System + + Although a site may be in multiple VPNs, it is not necessarily the + case that the route to a given system at that site should be the same + in all the VPNs. Suppose, for example, we have an intranet + consisting of sites A, B, and C, and an extranet consisting of A, B, + C, and the "foreign" site D. Suppose that at site A there is a + server, and we want clients from B, C, or D to be able to use that + server. Suppose also that at site B there is a firewall. We want + all the traffic from site D to the server to pass through the + firewall, so that traffic from the extranet can be access controlled. + However, we don't want traffic from C to pass through the firewall on + the way to the server, since this is intranet traffic. + + It is possible to set up two routes to the server. One route, used + by sites B and C, takes the traffic directly to site A. The second + route, used by site D, takes the traffic instead to the firewall at + site B. If the firewall allows the traffic to pass, it then appears + to be traffic coming from site B, and follows the route to site A. + +1.5. SP Backbone Routers + + The SP's backbone consists of the PE routers, as well as other + routers ("P routers") that do not attach to CE devices. + + If every router in an SP's backbone had to maintain routing + information for all the VPNs supported by the SP, there would be + severe scalability problems; the number of sites that could be + supported would be limited by the amount of routing information that + could be held in a single router. It is important therefore that the + routing information about a particular VPN only needs to be present + in the PE routers that attach to that VPN. In particular, the P + routers do not need to have ANY per-VPN routing information + whatsoever. (This condition may need to be relaxed somewhat when + multicast routing is considered. This is not considered further in + this paper, but is examined in [VPN-MCAST].) + + So just as the VPN owners do not have a backbone or "virtual + backbone" to administer, the SPs themselves do not have a separate + backbone or "virtual backbone" to administer for each VPN. Site-to- + site routing in the backbone is optimal (within the constraints of + the policies used to form the VPNs) and is not constrained in any way + by an artificial "virtual topology" of tunnels. + + + + +Rosen & Rekhter Standards Track [Page 7] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Section 10 discusses some of the special issues that arise when the + backbone spans several Service Providers. + +1.6. Security + + VPNs of the sort being discussed here, even without making use of + cryptographic security measures, are intended to provide a level of + security equivalent to that obtainable when a layer 2 backbone (e.g., + Frame Relay) is used. That is, in the absence of misconfiguration or + deliberate interconnection of different VPNs, it is not possible for + systems in one VPN to gain access to systems in another VPN. Of + course, the methods described herein do not by themselves encrypt the + data for privacy, nor do they provide a way to determine whether data + has been tampered with en route. If this is desired, cryptographic + measures must be applied in addition. (See, e.g., [MPLS/BGP-IPsec].) + Security is discussed in more detail in Section 13. + +2. Sites and CEs + + From the perspective of a particular backbone network, a set of IP + systems may be regarded as a "site" if those systems have mutual IP + interconnectivity that doesn't require use of the backbone. In + general, a site will consist of a set of systems that are in + geographic proximity. However, this is not universally true. If two + geographic locations are connected via a leased line, over which Open + Shortest Path First (OSPF) protocol [OSPFv2] is running, and if that + line is the preferred way of communicating between the two locations, + then the two locations can be regarded as a single site, even if each + location has its own CE router. (This notion of "site" is + topological, rather than geographical. If the leased line goes down, + or otherwise ceases to be the preferred route, but the two geographic + locations can continue to communicate by using the VPN backbone, then + one site has become two.) + + A CE device is always regarded as being in a single site (though as + we shall see in Section 3.2, a site may consist of multiple "virtual + sites"). A site, however, may belong to multiple VPNs. + + A PE router may attach to CE devices from any number of different + sites, whether those CE devices are in the same or in different VPNs. + A CE device may, for robustness, attach to multiple PE routers, of + the same or of different service providers. If the CE device is a + router, the PE router and the CE router will appear as router + adjacencies to each other. + + While we speak mostly of "sites" as being the basic unit of + interconnection, nothing here prevents a finer degree of granularity + in the control of interconnectivity. For example, certain systems at + + + +Rosen & Rekhter Standards Track [Page 8] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + a site may be members of an intranet as well as members of one or + more extranets, while other systems at the same site may be + restricted to being members of the intranet only. However, this + might require that the site have two attachment circuits to the + backbone, one for the intranet and one for the extranet; it might + further require that firewall functionality be applied on the + extranet attachment circuit. + +3. VRFs: Multiple Forwarding Tables in PEs + + Each PE router maintains a number of separate forwarding tables. One + of the forwarding tables is the "default forwarding table". The + others are "VPN Routing and Forwarding tables", or "VRFs". + +3.1. VRFs and Attachment Circuits + + Every PE/CE attachment circuit is associated, by configuration, with + one or more VRFs. An attachment circuit that is associated with a + VRF is known as a "VRF attachment circuit". + + In the simplest case and most typical case, a PE/CE attachment + circuit is associated with exactly one VRF. When an IP packet is + received over a particular attachment circuit, its destination IP + address is looked up in the associated VRF. The result of that + lookup determines how to route the packet. The VRF used by a + packet's ingress PE for routing a particular packet is known as the + packet's "ingress VRF". (There is also the notion of a packet's + "egress VRF", located at the packet's egress PE; this is discussed in + Section 5.) + + If an IP packet arrives over an attachment circuit that is not + associated with any VRF, the packet's destination address is looked + up in the default forwarding table, and the packet is routed + accordingly. Packets forwarded according to the default forwarding + table include packets from neighboring P or PE routers, as well as + packets from customer-facing attachment circuits that have not been + associated with VRFs. + + Intuitively, one can think of the default forwarding table as + containing "public routes", and of the VRFs as containing "private + routes". One can similarly think of VRF attachment circuits as being + "private", and of non-VRF attachment circuits as being "public". + + If a particular VRF attachment circuit connects site S to a PE + router, then connectivity from S (via that attachment circuit) can be + restricted by controlling the set of routes that gets entered in the + corresponding VRF. The set of routes in that VRF should be limited + to the set of routes leading to sites that have at least one VPN in + + + +Rosen & Rekhter Standards Track [Page 9] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + common with S. Then a packet sent from S over a VRF attachment + circuit can only be routed by the PE to another site S' if S' is in + one of the same VPNs as S. That is, communication (via PE routers) + is prevented between any pair of VPN sites that have no VPN in + common. Communication between VPN sites and non-VPN sites is + prevented by keeping the routes to the VPN sites out of the default + forwarding table. + + If there are multiple attachment circuits leading from S to one or + more PE routers, then there might be multiple VRFs that could be used + to route traffic from S. To properly restrict S's connectivity, the + same set of routes would have to exist in all the VRFs. + Alternatively, one could impose different connectivity restrictions + over different attachment circuit from S. In that case, some of the + VRFs associated with attachment circuits from S would contain + different sets of routes than some of the others. + + We allow the case in which a single attachment circuit is associated + with a set of VRFs, rather than with a single VRF. This can be + useful if it is desired to divide a single VPN into several + "sub-VPNs", each with different connectivity restrictions, where some + characteristic of the customer packets is used to select from among + the sub-VPNs. For simplicity though, we will usually speak of an + attachment circuit as being associated with a single VRF. + +3.2. Associating IP Packets with VRFs + + When a PE router receives a packet from a CE device, it must + determine the attachment circuit over which the packet arrived, as + this determines in turn the VRF (or set of VRFs) that can be used for + forwarding that packet. In general, to determine the attachment + circuit over which a packet arrived, a PE router takes note of the + physical interface over which the packet arrived, and possibly also + takes note of some aspect of the packet's layer 2 header. For + example, if a packet's ingress attachment circuit is a Frame Relay + VC, the identity of the attachment circuit can be determined from the + physical Frame Relay interface over which the packet arrived, + together with the Data Link Connection Identifier (DLCI) field in the + packet's Frame Relay header. + + Although the PE's conclusion that a particular packet arrived on a + particular attachment circuit may be partially determined by the + packet's layer 2 header, it must be impossible for a customer, by + writing the header fields, to fool the SP into thinking that a packet + that was received over one attachment circuit really arrived over a + different one. In the example above, although the attachment circuit + is determined partially by inspection of the DLCI field in the Frame + Relay header, this field cannot be set freely by the customer. + + + +Rosen & Rekhter Standards Track [Page 10] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Rather, it must be set to a value specified by the SP, or else the + packet cannot arrive at the PE router. + + In some cases, a particular site may be divided by the customer into + several "virtual sites". The SP may designate a particular set of + VRFs to be used for routing packets from that site and may allow the + customer to set some characteristic of the packet, which is then used + for choosing a particular VRF from the set. + + For example, each virtual site might be realized as a VLAN. The SP + and the customer could agree that on packets arriving from a + particular CE, certain VLAN values would be used to identify certain + VRFs. Of course, packets from that CE would be discarded by the PE + if they carry VLAN tag values that are not in the agreed-upon set. + Another way to accomplish this is to use IP source addresses. In + this case, the PE uses the IP source address in a packet received + from the CE, along with the interface over which the packet is + received, to assign the packet to a particular VRF. Again, the + customer would only be able to select from among the particular set + of VRFs that that customer is allowed to use. + + If it is desired to have a particular host be in multiple virtual + sites, then that host must determine, for each packet, which virtual + site the packet is associated with. It can do this, e.g., by sending + packets from different virtual sites on different VLANs, or out + different network interfaces. + +3.3. Populating the VRFs + + With what set of routes are the VRFs populated? + + As an example, let PE1, PE2, and PE3 be three PE routers, and let + CE1, CE2, and CE3 be three CE routers. Suppose that PE1 learns, from + CE1, the routes that are reachable at CE1's site. If PE2 and PE3 are + attached, respectively, to CE2 and CE3, and there is some VPN V + containing CE1, CE2, and CE3, then PE1 uses BGP to distribute to PE2 + and PE3 the routes that it has learned from CE1. PE2 and PE3 use + these routes to populate the VRFs that they associate, respectively, + with the sites of CE2 and CE3. Routes from sites that are not in VPN + V do not appear in these VRFs, which means that packets from CE2 or + CE3 cannot be sent to sites that are not in VPN V. + + When we speak of a PE "learning" routes from a CE, we are not + presupposing any particular learning technique. The PE may learn + routes by means of a dynamic routing algorithm, but it may also + "learn" routes by having those routes configured (i.e., static + routing). (In this case, to say that the PE "learned" the routes + from the CE is perhaps to exercise a bit of poetic license.) + + + +Rosen & Rekhter Standards Track [Page 11] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + PEs also need to learn, from other PEs, the routes that belong to a + given VPN. The procedures to be used for populating the VRFs with + the proper sets of routes are specified in Section 4. + + If there are multiple attachment circuits leading from a particular + PE router to a particular site, they might all be mapped to the same + forwarding table. But if policy dictates, they could be mapped to + different forwarding tables. For instance, the policy might be that + a particular attachment circuit from a site is used only for intranet + traffic, while another attachment circuit from that site is used only + for extranet traffic. (Perhaps, e.g., the CE attached to the + extranet attachment circuit is a firewall, while the CE attached to + the intranet attachment circuit is not.) In this case, the two + attachment circuits would be associated with different VRFs. + + Note that if two attachment circuits are associated with the same + VRF, then packets that the PE receives over one of them will be able + to reach exactly the same set of destinations as packets that the PE + receives over the other. So two attachment circuits cannot be + associated with the same VRF unless each CE is in the exact same set + of VPNs as is the other. + + If an attachment circuit leads to a site which is in multiple VPNs, + the attachment circuit may still associated with a single VRF, in + which case the VRF will contain routes from the full set of VPNs of + which the site is a member. + +4. VPN Route Distribution via BGP + + PE routers use BGP to distribute VPN routes to each other (more + accurately, to cause VPN routes to be distributed to each other). + + We allow each VPN to have its own address space, which means that a + given address may denote different systems in different VPNs. If two + routes to the same IP address prefix are actually routes to different + systems, it is important to ensure that BGP not treat them as + comparable. Otherwise, BGP might choose to install only one of them, + making the other system unreachable. Further, we must ensure that + POLICY is used to determine which packets get sent on which routes; + given that several such routes are installed by BGP, only one such + must appear in any particular VRF. + + We meet these goals by the use of a new address family, as specified + below. + + + + + + + +Rosen & Rekhter Standards Track [Page 12] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + +4.1. The VPN-IPv4 Address Family + + The BGP Multiprotocol Extensions [BGP-MP] allow BGP to carry routes + from multiple "address families". We introduce the notion of the + "VPN-IPv4 address family". A VPN-IPv4 address is a 12-byte quantity, + beginning with an 8-byte Route Distinguisher (RD) and ending with a + 4-byte IPv4 address. If several VPNs use the same IPv4 address + prefix, the PEs translate these into unique VPN-IPv4 address + prefixes. This ensures that if the same address is used in several + different VPNs, it is possible for BGP to carry several completely + different routes to that address, one for each VPN. + + Since VPN-IPv4 addresses and IPv4 addresses are different address + families, BGP never treats them as comparable addresses. + + An RD is simply a number, and it does not contain any inherent + information; it does not identify the origin of the route or the set + of VPNs to which the route is to be distributed. The purpose of the + RD is solely to allow one to create distinct routes to a common IPv4 + address prefix. Other means are used to determine where to + redistribute the route (see Section 4.3). + + The RD can also be used to create multiple different routes to the + very same system. We have already discussed a situation in which the + route to a particular server should be different for intranet traffic + than for extranet traffic. This can be achieved by creating two + different VPN-IPv4 routes that have the same IPv4 part, but different + RDs. This allows BGP to install multiple different routes to the + same system, and allows policy to be used (see Section 4.3.5) to + decide which packets use which route. + + The RDs are structured so that every Service Provider can administer + its own "numbering space" (i.e., can make its own assignments of + RDs), without conflicting with the RD assignments made by any other + Service Provider. An RD consists of three fields: a 2-byte type + field, an administrator field, and an assigned number field. The + value of the type field determines the lengths of the other two + fields, as well as the semantics of the administrator field. The + administrator field identifies an assigned number authority, and the + assigned number field contains a number that has been assigned, by + the identified authority, for a particular purpose. For example, one + could have an RD whose administrator field contains an Autonomous + System number (ASN), and whose (4-byte) number field contains a + number assigned by the SP to whom that ASN belongs (having been + assigned to that SP by the appropriate authority). + + RDs are given this structure in order to ensure that an SP that + provides VPN backbone service can always create a unique RD when it + + + +Rosen & Rekhter Standards Track [Page 13] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + needs to do so. However, the structure is not meaningful to BGP; + when BGP compares two such address prefixes, it ignores the structure + entirely. + + A PE needs to be configured such that routes that lead to a + particular CE become associated with a particular RD. The + configuration may cause all routes leading to the same CE to be + associated with the same RD, or it may cause different routes to be + associated with different RDs, even if they lead to the same CE. + +4.2. Encoding of Route Distinguishers + + As stated, a VPN-IPv4 address consists of an 8-byte Route + Distinguisher followed by a 4-byte IPv4 address. The RDs are encoded + as follows: + + - Type Field: 2 bytes + - Value Field: 6 bytes + + The interpretation of the Value field depends on the value of the + type field. At the present time, three values of the type field are + defined: 0, 1, and 2. + + - Type 0: The Value field consists of two subfields: + + * Administrator subfield: 2 bytes + * Assigned Number subfield: 4 bytes + + The Administrator subfield must contain an Autonomous System + number. If this ASN is from the public ASN space, it must have + been assigned by the appropriate authority (use of ASN values + from the private ASN space is strongly discouraged). The + Assigned Number subfield contains a number from a numbering space + that is administered by the enterprise to which the ASN has been + assigned by an appropriate authority. + + - Type 1: The Value field consists of two subfields: + + * Administrator subfield: 4 bytes + * Assigned Number subfield: 2 bytes + + The Administrator subfield must contain an IP address. If this + IP address is from the public IP address space, it must have been + assigned by an appropriate authority (use of addresses from the + private IP address space is strongly discouraged). The Assigned + Number subfield contains a number from a numbering space which is + administered by the enterprise to which the IP address has been + assigned. + + + +Rosen & Rekhter Standards Track [Page 14] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + - Type 2: The Value field consists of two subfields: + + * Administrator subfield: 4 bytes + * Assigned Number subfield: 2 bytes + + The Administrator subfield must contain a 4-byte Autonomous + System number [BGP-AS4]. If this ASN is from the public ASN + space, it must have been assigned by the appropriate authority + (use of ASN values from the private ASN space is strongly + discouraged). The Assigned Number subfield contains a number + from a numbering space which is administered by the enterprise to + which the ASN has been assigned by an appropriate authority. + +4.3. Controlling Route Distribution + + In this section, we discuss the way in which the distribution of the + VPN-IPv4 routes is controlled. + + If a PE router is attached to a particular VPN (by being attached to + a particular CE in that VPN), it learns some of that VPN's IP routes + from the attached CE router. Routes learned from a CE routing peer + over a particular attachment circuit may be installed in the VRF + associated with that attachment circuit. Exactly which routes are + installed in this manner is determined by the way in which the PE + learns routes from the CE. In particular, when the PE and CE are + routing protocol peers, this is determined by the decision process of + the routing protocol; this is discussed in Section 7. + + These routes are then converted to VPN-IP4 routes, and "exported" to + BGP. If there is more than one route to a particular VPN-IP4 address + prefix, BGP chooses the "best" one, using the BGP decision process. + That route is then distributed by BGP to the set of other PEs that + need to know about it. At these other PEs, BGP will again choose the + best route for a particular VPN-IP4 address prefix. Then the chosen + VPN-IP4 routes are converted back into IP routes, and "imported" into + one or more VRFs. Whether they are actually installed in the VRFs + depends on the decision process of the routing method used between + the PE and those CEs that are associated with the VRF in question. + Finally, any route installed in a VRF may be distributed to the + associated CE routers. + +4.3.1. The Route Target Attribute + + Every VRF is associated with one or more Route Target (RT) + attributes. + + When a VPN-IPv4 route is created (from an IPv4 route that the PE has + learned from a CE) by a PE router, it is associated with one or more + + + +Rosen & Rekhter Standards Track [Page 15] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Route Target attributes. These are carried in BGP as attributes of + the route. + + Any route associated with Route Target T must be distributed to every + PE router that has a VRF associated with Route Target T. When such a + route is received by a PE router, it is eligible to be installed in + those of the PE's VRFs that are associated with Route Target T. + (Whether it actually gets installed depends upon the outcome of the + BGP decision process, and upon the outcome of the decision process of + the IGP (i.e., the intra-domain routing protocol) running on the + PE/CE interface.) + + A Route Target attribute can be thought of as identifying a set of + sites. (Though it would be more precise to think of it as + identifying a set of VRFs.) Associating a particular Route Target + attribute with a route allows that route to be placed in the VRFs + that are used for routing traffic that is received from the + corresponding sites. + + There is a set of Route Targets that a PE router attaches to a route + received from site S; these may be called the "Export Targets". And + there is a set of Route Targets that a PE router uses to determine + whether a route received from another PE router could be placed in + the VRF associated with site S; these may be called the "Import + Targets". The two sets are distinct, and need not be the same. Note + that a particular VPN-IPv4 route is only eligible for installation in + a particular VRF if there is some Route Target that is both one of + the route's Route Targets and one of the VRF's Import Targets. + + The function performed by the Route Target attribute is similar to + that performed by the BGP Communities attribute. However, the format + of the latter is inadequate for present purposes, since it allows + only a 2-byte numbering space. It is desirable to structure the + format, similar to what we have described for RDs (see Section 4.2), + so that a type field defines the length of an administrator field, + and the remainder of the attribute is a number from the specified + administrator's numbering space. This can be done using BGP Extended + Communities. The Route Targets discussed herein are encoded as BGP + Extended Community Route Targets [BGP-EXTCOMM]. They are structured + similarly to the RDs. + + When a BGP speaker has received more than one route to the same VPN- + IPv4 prefix, the BGP rules for route preference are used to choose + which VPN-IPv4 route is installed by BGP. + + Note that a route can only have one RD, but it can have multiple + Route Targets. In BGP, scalability is improved if one has a single + route with multiple attributes, as opposed to multiple routes. One + + + +Rosen & Rekhter Standards Track [Page 16] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + could eliminate the Route Target attribute by creating more routes + (i.e., using more RDs), but the scaling properties would be less + favorable. + + How does a PE determine which Route Target attributes to associate + with a given route? There are a number of different possible ways. + The PE might be configured to associate all routes that lead to a + specified site with a specified Route Target. Or the PE might be + configured to associate certain routes leading to a specified site + with one Route Target, and certain with another. + + If the PE and the CE are themselves BGP peers (see Section 7), then + the SP may allow the customer, within limits, to specify how its + routes are to be distributed. The SP and the customer would need to + agree in advance on the set of RTs that are allowed to be attached to + the customer's VPN routes. The CE could then attach one or more of + those RTs to each IP route that it distributes to the PE. This gives + the customer the freedom to specify in real time, within agreed-upon + limits, its route distribution policies. If the CE is allowed to + attach RTs to its routes, the PE MUST filter out all routes that + contain RTs that the customer is not allowed to use. If the CE is + not allowed to attach RTs to its routes, but does so anyway, the PE + MUST remove the RT before converting the customer's route to a VPN- + IPv4 route. + +4.3.2. Route Distribution Among PEs by BGP + + If two sites of a VPN attach to PEs that are in the same Autonomous + System, the PEs can distribute VPN-IPv4 routes to each other by means + of an IBGP connection between them. (The term "IBGP" refers to the + set of protocols and procedures used when there is a BGP connection + between two BGP speakers in the same Autonomous System. This is + distinguished from "EBGP", the set of procedures used between two BGP + speakers in different Autonomous Systems.) Alternatively, each can + have an IBGP connection to a route reflector [BGP-RR]. + + When a PE router distributes a VPN-IPv4 route via BGP, it uses its + own address as the "BGP next hop". This address is encoded as a + VPN-IPv4 address with an RD of 0. ([BGP-MP] requires that the next + hop address be in the same address family as the Network Layer + Reachability Information (NLRI).) It also assigns and distributes an + MPLS label. (Essentially, PE routers distribute not VPN-IPv4 routes, + but Labeled VPN-IPv4 routes. Cf. [MPLS-BGP].) When the PE processes + a received packet that has this label at the top of the stack, the PE + will pop the stack, and process the packet appropriately. + + + + + + +Rosen & Rekhter Standards Track [Page 17] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + The PE may distribute the exact set of routes that appears in the + VRF, or it may perform summarization and distribute aggregates of + those routes, or it may do some of one and some of the other. + + Suppose that a PE has assigned label L to route R, and has + distributed this label mapping via BGP. If R is an aggregate of a + set of routes in the VRF, the PE will know that packets from the + backbone that arrive with this label must have their destination + addresses looked up in a VRF. When the PE looks up the label in its + Label Information Base, it learns which VRF must be used. On the + other hand, if R is not an aggregate, then when the PE looks up the + label, it learns the egress attachment circuit, as well as the + encapsulation header for the packet. In this case, no lookup in the + VRF is done. + + We would expect that the most common case would be the case where the + route is NOT an aggregate. The case where it is an aggregate can be + very useful though if the VRF contains a large number of host routes + (e.g., as in dial-in), or if the VRF has an associated Local Area + Network (LAN) interface (where there is a different outgoing layer 2 + header for each system on the LAN, but a route is not distributed for + each such system). + + Whether or not each route has a distinct label is an implementation + matter. There are a number of possible algorithms one could use to + determine whether two routes get assigned the same label: + + - One may choose to have a single label for an entire VRF, so that + a single label is shared by all the routes from that VRF. Then + when the egress PE receives a packet with that label, it must + look up the packet's IP destination address in that VRF (the + packet's "egress VRF"), in order to determine the packet's egress + attachment circuit and the corresponding data link encapsulation. + + - One may choose to have a single label for each attachment + circuit, so that a single label is shared by all the routes with + the same "outgoing attachment circuit". This enables one to + avoid doing a lookup in the egress VRF, though some sort of + lookup may need to be done in order to determine the data link + encapsulation, e.g., an Address Resolution Protocol (ARP) lookup. + + - One may choose to have a distinct label for each route. Then if + a route is potentially reachable over more than one attachment + circuit, the PE/CE routing can switch the preferred path for a + route from one attachment circuit to another, without there being + any need to distribute new a label for that route. + + + + + +Rosen & Rekhter Standards Track [Page 18] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + There may be other possible algorithms as well. The choice of + algorithm is entirely at the discretion of the egress PE, and is + otherwise transparent. + + In using BGP-distributed MPLS labels in this manner, we presuppose + that an MPLS packet carrying such a label can be tunneled from the + router that installs the corresponding BGP-distributed route to the + router that is the BGP next hop of that route. This requires either + that a label switched path exist between those two routers or else + that some other tunneling technology (e.g., [MPLS-in-IP-GRE]) can be + used between them. + + This tunnel may follow a "best effort" route, or it may follow a + traffic-engineered route. Between a given pair of routers, there may + be one such tunnel, or there may be several, perhaps with different + Quality of Service (QoS) characteristics. All that matters for the + VPN architecture is that some such tunnel exists. To ensure + interoperability among systems that implement this VPN architecture + using MPLS label switched paths as the tunneling technology, all such + systems MUST support Label Distribution Protocol (LDP) [MPLS-LDP]. + In particular, Downstream Unsolicited mode MUST be supported on + interfaces that are neither Label Controlled ATM (LC-ATM) [MPLS-ATM] + nor Label Controlled Frame Relay (LC-FR) [MPLS-FR] interfaces, and + Downstream on Demand mode MUST be supported on LC-ATM interfaces and + LC-FR interfaces. + + If the tunnel follows a best-effort route, then the PE finds the + route to the remote endpoint by looking up its IP address in the + default forwarding table. + + A PE router, UNLESS it is a route reflector (see Section 4.3.3) or an + Autonomous System Border Router (ASBR) for an inter-provider VPN (see + Section 10), should not install a VPN-IPv4 route unless it has at + least one VRF with an Import Target identical to one of the route's + Route Target attributes. Inbound filtering should be used to cause + such routes to be discarded. If a new Import Target is later added + to one of the PE's VRFs (a "VPN Join" operation), it must then + acquire the routes it may previously have discarded. This can be + done using the refresh mechanism described in [BGP-RFSH]. The + outbound route filtering mechanism of [BGP-ORF] can also be used to + advantage to make the filtering more dynamic. + + Similarly, if a particular Import Target is no longer present in any + of a PE's VRFs (as a result of one or more "VPN Prune" operations), + the PE may discard all routes that, as a result, no longer have any + of the PE's VRF's Import Targets as one of their Route Target + attributes. + + + + +Rosen & Rekhter Standards Track [Page 19] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + A router that is not attached to any VPN and that is not a Route + Reflector (i.e., a P router) never installs any VPN-IPv4 routes at + all. + + Note that VPN Join and Prune operations are non-disruptive and do not + require any BGP connections to be brought down, as long as the + refresh mechanism of [BGP-RFSH] is used. + + As a result of these distribution rules, no one PE ever needs to + maintain all routes for all VPNs; this is an important scalability + consideration. + +4.3.3. Use of Route Reflectors + + Rather than having a complete IBGP mesh among the PEs, it is + advantageous to make use of BGP Route Reflectors [BGP-RR] to improve + scalability. All the usual techniques for using route reflectors to + improve scalability (e.g., route reflector hierarchies) are + available. + + Route reflectors are the only systems that need to have routing + information for VPNs to which they are not directly attached. + However, there is no need to have any one route reflector know all + the VPN-IPv4 routes for all the VPNs supported by the backbone. + + We outline below two different ways to partition the set of VPN-IPv4 + routes among a set of route reflectors. + + 1. Each route reflector is preconfigured with a list of Route + Targets. For redundancy, more than one route reflector may be + preconfigured with the same list. A route reflector uses the + preconfigured list of Route Targets to construct its inbound + route filtering. The route reflector may use the techniques of + [BGP-ORF] to install on each of its peers (regardless of + whether the peer is another route reflector or a PE) the set of + Outbound Route Filters (ORFs) that contains the list of its + preconfigured Route Targets. Note that route reflectors should + accept ORFs from other route reflectors, which means that route + reflectors should advertise the ORF capability to other route + reflectors. + + A service provider may modify the list of preconfigured Route + Targets on a route reflector. When this is done, the route + reflector modifies the ORFs it installs on all of its IBGP + peers. To reduce the frequency of configuration changes on + route reflectors, each route reflector may be preconfigured + with a block of Route Targets. This way, when a new Route + Target is needed for a new VPN, there is already one or more + + + +Rosen & Rekhter Standards Track [Page 20] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + route reflectors that are (pre)configured with this Route + Target. + + Unless a given PE is a client of all route reflectors, when a + new VPN is added to the PE ("VPN Join"), it will need to become + a client of the route reflector(s) that maintain routes for + that VPN. Likewise, deleting an existing VPN from the PE ("VPN + Prune") may result in a situation where the PE no longer needs + to be a client of some route reflector(s). In either case, the + Join or Prune operation is non-disruptive (as long as + [BGP-RFSH] is used, and never requires a BGP connection to be + brought down, only to be brought right back up. + + (By "adding a new VPN to a PE", we really mean adding a new + import Route Target to one of its VRFs, or adding a new VRF + with an import Route Target not had by any of the PE's other + VRFs.) + + 2. Another method is to have each PE be a client of some subset of + the route reflectors. A route reflector is not preconfigured + with the list of Route Targets, and does not perform inbound + route filtering of routes received from its clients (PEs); + rather, it accepts all the routes received from all of its + clients (PEs). The route reflector keeps track of the set of + the Route Targets carried by all the routes it receives. When + the route reflector receives from its client a route with a + Route Target that is not in this set, this Route Target is + immediately added to the set. On the other hand, when the + route reflector no longer has any routes with a particular + Route Target that is in the set, the route reflector should + delay (by a few hours) the deletion of this Route Target from + the set. + + The route reflector uses this set to form the inbound route + filters that it applies to routes received from other route + reflectors. The route reflector may also use ORFs to install + the appropriate outbound route filtering on other route + reflectors. Just like with the first approach, a route + reflector should accept ORFs from other route reflectors. To + accomplish this, a route reflector advertises ORF capability to + other route reflectors. + + When the route reflector changes the set, it should immediately + change its inbound route filtering. In addition, if the route + reflector uses ORFs, then the ORFs have to be immediately + changed to reflect the changes in the set. If the route + reflector doesn't use ORFs, and a new Route Target is added to + + + + +Rosen & Rekhter Standards Track [Page 21] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + the set, the route reflector, after changing its inbound route + filtering, must issue BGP Refresh to other route reflectors. + + The delay of "a few hours" mentioned above allows a route + reflector to hold onto routes with a given RT, even after it + loses the last of its clients that are interested in such + routes. This protects against the need to reacquire all such + routes if the clients' "disappearance" is only temporary. + + With this procedure, VPN Join and Prune operations are also + non-disruptive. + + Note that this technique will not work properly if some client + PE has a VRF with an import Route Target that is not one of its + export Route Targets. + + In these procedures, a PE router which attaches to a particular VPN + "auto-discovers" the other PEs that attach to the same VPN. When a + new PE router is added, or when an existing PE router attaches to a + new VPN, no reconfiguration of other PE routers is needed. + + Just as there is no one PE router that needs to know all the VPN-IPv4 + routes supported over the backbone, these distribution rules ensure + that there is no one Route Reflector (RR) that needs to know all the + VPN-IPv4 routes supported over the backbone. As a result, the total + number of such routes that can be supported over the backbone is not + bounded by the capacity of any single device, and therefore can + increase virtually without bound. + +4.3.4. How VPN-IPv4 NLRI Is Carried in BGP + + The BGP Multiprotocol Extensions [BGP-MP] are used to encode the + NLRI. If the Address Family Identifier (AFI) field is set to 1, and + the Subsequent Address Family Identifier (SAFI) field is set to 128, + the NLRI is an MPLS-labeled VPN-IPv4 address. AFI 1 is used since + the network layer protocol associated with the NLRI is still IP. + Note that this VPN architecture does not require the capability to + distribute unlabeled VPN-IPv4 addresses. + + In order for two BGP speakers to exchange labeled VPN-IPv4 NLRI, they + must use BGP Capabilities Advertisement to ensure that they both are + capable of properly processing such NLRI. This is done as specified + in [BGP-MP], by using capability code 1 (multiprotocol BGP), with an + AFI of 1 and an SAFI of 128. + + The labeled VPN-IPv4 NLRI itself is encoded as specified in + [MPLS-BGP], where the prefix consists of an 8-byte RD followed by an + IPv4 prefix. + + + +Rosen & Rekhter Standards Track [Page 22] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + +4.3.5. Building VPNs Using Route Targets + + By setting up the Import Targets and Export Targets properly, one can + construct different kinds of VPNs. + + Suppose it is desired to create a fully meshed closed user group, + i.e., a set of sites where each can send traffic directly to the + other, but traffic cannot be sent to or received from other sites. + Then each site is associated with a VRF, a single Route Target + attribute is chosen, that Route Target is assigned to each VRF as + both the Import Target and the Export Target, and that Route Target + is not assigned to any other VRFs as either the Import Target or the + Export Target. + + Alternatively, suppose one desired, for whatever reason, to create a + "hub and spoke" kind of VPN. This could be done by the use of two + Route Target values, one meaning "Hub" and one meaning "Spoke". At + the VRFs attached to the hub sites, "Hub" is the Export Target and + + "Spoke" is the Import Target. At the VRFs attached to the spoke + site, "Hub" is the Import Target and "Spoke" is the Export Target. + + Thus, the methods for controlling the distribution of routing + information among various sets of sites are very flexible, which in + turn provides great flexibility in constructing VPNs. + +4.3.6. Route Distribution Among VRFs in a Single PE + + It is possible to distribute routes from one VRF to another, even if + both VRFs are in the same PE, even though in this case one cannot say + that the route has been distributed by BGP. Nevertheless, the + decision to distribute a particular route from one VRF to another + within a single PE is the same decision that would be made if the + VRFs were on different PEs. That is, it depends on the Route Target + attribute that is assigned to the route (or would be assigned if the + route were distributed by BGP), and the import target of the second + VRF. + +5. Forwarding + + If the intermediate routers in the backbone do not have any + information about the routes to the VPNs, how are packets forwarded + from one VPN site to another? + + When a PE receives an IP packet from a CE device, it chooses a + particular VRF in which to look up the packet's destination address. + This choice is based on the packet's ingress attachment circuit. + + + + +Rosen & Rekhter Standards Track [Page 23] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Assume that a match is found. As a result we learn the packet's + "next hop". + + If the packet's next hop is reached directly over a VRF attachment + circuit from this PE (i.e., the packet's egress attachment circuit is + on the same PE as its ingress attachment circuit), then the packet is + sent on the egress attachment circuit, and no MPLS labels are pushed + onto the packet's label stack. + + If the ingress and egress attachment circuits are on the same PE, but + are associated with different VRFs, and if the route that best + matches the destination address in the ingress attachment circuit's + VRF is an aggregate of several routes in the egress attachment + circuit's VRF, it may be necessary to look up the packet's + destination address in the egress VRF as well. + + If the packet's next hop is NOT reached through a VRF attachment + circuit, then the packet must travel at least one hop through the + backbone. The packet thus has a "BGP Next Hop", and the BGP Next Hop + will have assigned an MPLS label for the route that best matches the + packet's destination address. Call this label the "VPN route label". + The IP packet is turned into an MPLS packet with the VPN route label + as the sole label on the label stack. + + The packet must then be tunneled to the BGP Next Hop. + + If the backbone supports MPLS, this is done as follows: + + - The PE routers (and any Autonomous System border routers) that + redistribute VPN-IPv4 addresses need to insert /32 address + prefixes for themselves into the IGP routing tables of the + backbone. This enables MPLS, at each node in the backbone + network, to assign a label corresponding to the route to each PE + router. To ensure interoperability among different + implementations, it is required to support LDP for setting up the + label switched paths across the backbone. However, other methods + of setting up these label switched paths are also possible. + (Some of these other methods may not require the presence of the + /32 address prefixes in the IGP.) + + - If there are any traffic engineering tunnels to the BGP next hop, + and if one or more of those is available for use by the packet in + question, one of these tunnels is chosen. This tunnel will be + associated with an MPLS label, the "tunnel label". The tunnel + label gets pushed on the MPLS label stack, and the packet is + forwarded to the tunnel's next hop. + + + + + +Rosen & Rekhter Standards Track [Page 24] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + - Otherwise, + + * The packet will have an "IGP Next Hop", which is the next hop + along the IGP route to the BGP Next Hop. + + * If the BGP Next Hop and the IGP Next Hop are the same, and if + penultimate hop popping is used, the packet is then sent to + the IGP Next Hop, carrying only the VPN route label. + + * Otherwise, the IGP Next Hop will have assigned a label for + the route that best matches the address of the BGP Next Hop. + Call this the "tunnel label". The tunnel label gets pushed + on as the packet's top label. The packet is then forwarded + to the IGP Next Hop. + + - MPLS will then carry the packet across the backbone to the BGP + Next Hop, where the VPN label will be examined. + + If the backbone does not support MPLS, the MPLS packet carrying only + the VPN route label may be tunneled to the BGP Next Hop using the + techniques of [MPLS-in-IP-GRE]. When the packet emerges from the + tunnel, it will be at the BGP Next Hop, where the VPN route label + will be examined. + + At the BGP Next Hop, the treatment of the packet depends on the VPN + route label (see Section 4.3.2). In many cases, the PE will be able + to determine, from this label, the attachment circuit over which the + packet should be transmitted (to a CE device), as well as the proper + data link layer header for that interface. In other cases, the PE + may only be able to determine that the packet's destination address + needs to be looked up in a particular VRF before being forwarded to a + CE device. There are also intermediate cases in which the VPN route + label may determine the packet's egress attachment circuit, but a + lookup (e.g., ARP) still needs to be done in order to determine the + packet's data link header on that attachment circuit. + + Information in the MPLS header itself, and/or information associated + with the label, may also be used to provide QoS on the interface to + the CE. + + In any event, if the packet was an unlabeled IP packet when it + arrived at its ingress PE, it will again be an unlabeled packet when + it leaves its egress PE. + + The fact that packets with VPN route labels are tunneled through the + backbone is what makes it possible to keep all the VPN routes out of + the P routers. This is crucial to ensuring the scalability of the + + + + +Rosen & Rekhter Standards Track [Page 25] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + scheme. The backbone does not even need to have routes to the CEs, + only to the PEs. + + With respect to the tunnels, it is worth noting that this + specification: + + - DOES NOT require that the tunnels be point-to-point; multipoint- + to-point can be used; + + - DOES NOT require that there be any explicit setup of the tunnels, + either via signaling or via manual configuration; + + - DOES NOT require that there be any tunnel-specific signaling; + + - DOES NOT require that there be any tunnel-specific state in the P + or PE routers, beyond what is necessary to maintain the routing + information and (if used) the MPLS label information. + + Of course, this specification is compatible with the use of point- + to-point tunnels that must be explicitly configured and/or signaled, + and in some situations there may be reasons for using such tunnels. + + The considerations that are relevant to choosing a particular + tunneling technology are outside the scope of this specification. + +6. Maintaining Proper Isolation of VPNs + + To maintain proper isolation of one VPN from another, it is important + that no router in the backbone accept a tunneled packet from outside + the backbone, unless it is sure that both endpoints of that tunnel + are outside the backbone. + + If MPLS is being used as the tunneling technology, this means that a + router in the backbone MUST NOT accept a labeled packet from any + adjacent non-backbone device unless the following two conditions + hold: + + 1. the label at the top of the label stack was actually + distributed by that backbone router to that non-backbone + device, and + + 2. the backbone router can determine that use of that label will + cause the packet to leave the backbone before any labels lower + in the stack will be inspected, and before the IP header will + be inspected. + + The first condition ensure that any labeled packets received from + non-backbone routers have a legitimate and properly assigned label at + + + +Rosen & Rekhter Standards Track [Page 26] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + the top of the label stack. The second condition ensures that the + backbone routers will never look below that top label. Of course, + the simplest way to meet these two conditions is just to have the + backbone devices refuse to accept labeled packets from non-backbone + devices. + + If MPLS is not being used as the tunneling technology, then filtering + must be done to ensure that an MPLS-in-IP or MPLS-in-GRE packet can + be accepted into the backbone only if the packet's IP destination + address will cause it to be sent outside the backbone. + +7. How PEs Learn Routes from CEs + + The PE routers that attach to a particular VPN need to know, for each + attachment circuit leading to that VPN, which of the VPN's addresses + should be reached over that attachment circuit. + + The PE translates these addresses into VPN-IPv4 addresses, using a + configured RD. The PE then treats these VPN-IPv4 routes as input to + BGP. Routes from a VPN site are NOT leaked into the backbone's IGP. + + Exactly which PE/CE route distribution techniques are possible + depends on whether or not a particular CE is in a "transit VPN". A + "transit VPN" is one that contains a router that receives routes from + a "third party" (i.e., from a router that is not in the VPN, but is + not a PE router) and that redistributes those routes to a PE router. + A VPN that is not a transit VPN is a "stub VPN". The vast majority + of VPNs, including just about all corporate enterprise networks, + would be expected to be "stubs" in this sense. + + The possible PE/CE distribution techniques are: + + 1. Static routing (i.e., configuration) may be used. (This is + likely to be useful only in stub VPNs.) + + 2. PE and CE routers may be Routing Information Protocol (RIP) + [RIP] peers, and the CE may use RIP to tell the PE router the + set of address prefixes that are reachable at the CE router's + site. When RIP is configured in the CE, care must be taken to + ensure that address prefixes from other sites (i.e., address + prefixes learned by the CE router from the PE router) are never + advertised to the PE. More precisely: if a PE router, say, + PE1, receives a VPN-IPv4 route R1, and as a result distributes + an IPv4 route R2 to a CE, then R2 must not be distributed back + from that CE's site to a PE router, say, PE2, (where PE1 and + PE2 may be the same router or different routers), unless PE2 + maps R2 to a VPN-IPv4 route that is different than (i.e., + contains a different RD than) R1. + + + +Rosen & Rekhter Standards Track [Page 27] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + 3. The PE and CE routers may be OSPF peers. A PE router that is + an OSPF peer of a CE router appears, to the CE router, to be an + area 0 router. If a PE router is an OSPF peer of CE routers + that are in distinct VPNs, the PE must of course be running + multiple instances of OSPF. + + IPv4 routes that the PE learns from the CE via OSPF are + redistributed into BGP as VPN-IPv4 routes. Extended Community + attributes are used to carry, along with the route, all the + information needed to enable the route to be distributed to + other CE routers in the VPN in the proper type of OSPF Link + State Advertisement (LSA). OSPF route tagging is used to + ensure that routes received from the MPLS/BGP backbone are not + sent back into the backbone. + + Specification of the complete set of procedures for the use of + OSPF between PE and CE can be found in [VPN-OSPF] and + [OSPF-2547-DNBIT]. + + 4. The PE and CE routers may be BGP peers, and the CE router may + use BGP (in particular, EBGP to tell the PE router the set of + address prefixes that are at the CE router's site. (This + technique can be used in stub VPNs or transit VPNs.) + + This technique has a number of advantages over the others: + + a) Unlike the IGP alternatives, this does not require the PE + to run multiple routing algorithm instances in order to + talk to multiple CEs. + + b) BGP is explicitly designed for just this function: + passing routing information between systems run by + different administrations. + + c) If the site contains "BGP backdoors", i.e., routers with + BGP connections to routers other than PE routers, this + procedure will work correctly in all circumstances. The + other procedures may or may not work, depending on the + precise circumstances. + + d) Use of BGP makes it easy for the CE to pass attributes of + the routes to the PE. A complete specification of the + set of attributes and their use is outside the scope of + this document. However, some examples of the way this + may be used are the following: + + + + + + +Rosen & Rekhter Standards Track [Page 28] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + - The CE may suggest a particular Route Target for each + route, from among the Route Targets that the PE is + authorized to attach to the route. The PE would then + attach only the suggested Route Target, rather than + the full set. This gives the CE administrator some + dynamic control of the distribution of routes from + the CE. + + - Additional types of Extended Community attributes may + be defined, where the intention is to have those + attributes passed transparently (i.e., without being + changed by the PE routers) from CE to CE. This would + allow CE administrators to implement additional route + filtering, beyond that which is done by the PEs. + This additional filtering would not require + coordination with the SP. + + On the other hand, using BGP may be something new for the CE + administrators. + + If a site is not in a transit VPN, note that it need not have a + unique Autonomous System Number (ASN). Every CE whose site is + not in a transit VPN can use the same ASN. This can be chosen + from the private ASN space, and it will be stripped out by the + PE. Routing loops are prevented by use of the Site of Origin + attribute (see below). + + What if a set of sites constitutes a transit VPN? This will + generally be the case only if the VPN is itself an Internet + Service Provider's (ISP's) network, where the ISP is itself + buying backbone services from another SP. The latter SP may be + called a "carrier's carrier". In this case, the best way to + provide the VPN is to have the CE routers support MPLS, and to + use the technique described in Section 9. + + When we do not need to distinguish among the different ways in which + a PE can be informed of the address prefixes that exist at a given + site, we will simply say that the PE has "learned" the routes from + that site. This includes the case where the PE has been manually + configured with the routes. + + Before a PE can redistribute a VPN-IPv4 route learned from a site, it + must assign a Route Target attribute (see Section 4.3.1) to the + route, and it may assign a Site of Origin attribute to the route. + + The Site of Origin attribute, if used, is encoded as a Route Origin + Extended Community [BGP-EXTCOMM]. The purpose of this attribute is + to uniquely identify the set of routes learned from a particular + + + +Rosen & Rekhter Standards Track [Page 29] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + site. This attribute is needed in some cases to ensure that a route + learned from a particular site via a particular PE/CE connection is + not distributed back to the site through a different PE/CE + connection. It is particularly useful if BGP is being used as the + PE/CE protocol, but different sites have not been assigned distinct + ASNs. + +8. How CEs Learn Routes from PEs + + In this section, we assume that the CE device is a router. + + If the PE places a particular route in the VRF it uses to route + packets received from a particular CE, then in general, the PE may + distribute that route to the CE. Of course, the PE may distribute + that route to the CE only if this is permitted by the rules of the + PE/CE protocol. (For example, if a particular PE/CE protocol has + "split horizon", certain routes in the VRF cannot be redistributed + back to the CE.) We add one more restriction on the distribution of + routes from PE to CE: if a route's Site of Origin attribute + identifies a particular site, that route must never be redistributed + to any CE at that site. + + In most cases, however, it will be sufficient for the PE to simply + distribute the default route to the CE. (In some cases, it may even + be sufficient for the CE to be configured with a default route + pointing to the PE.) This will generally work at any site that does + not itself need to distribute the default route to other sites. + (E.g., if one site in a corporate VPN has the corporation's access to + the Internet, that site might need to have default distributed to the + other site, but one could not distribute default to that site + itself.) + + Whatever procedure is used to distribute routes from CE to PE will + also be used to distribute routes from PE to CE. + +9. Carriers' Carriers + + Sometimes a VPN may actually be the network of an ISP, with its own + peering and routing policies. Sometimes a VPN may be the network of + an SP that is offering VPN services in turn to its own customers. + VPNs like these can also obtain backbone service from another SP, the + "carrier's carrier", using essentially the same methods described in + this document. However, it is necessary in these cases that the CE + routers support MPLS. In particular: + + - The CE routers should distribute to the PE routers ONLY those + routes that are internal to the VPN. This allows the VPN to be + handled as a stub VPN. + + + +Rosen & Rekhter Standards Track [Page 30] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + - The CE routers should support MPLS, in that they should be able + to receive labels from the PE routers, and send labeled packets + to the PE routers. They do not need to distribute labels of + their own, though. + + - The PE routers should distribute, to the CE routers, labels for + the routes they distribute to the CE routers. + + The PE must not distribute the same label to two different CEs + unless one of the following conditions holds: + + * The two CEs are associated with exactly the same set of VRFs; + + * The PE maintains a different Incoming Label Map ([MPLS-ARCH]) + for each CE. + + Further, when the PE receives a labeled packet from a CE, it must + verify that the top label is one that was distributed to that CE. + + - Routers at the different sites should establish BGP connections + among themselves for the purpose of exchanging external routes + (i.e., routes that lead outside of the VPN). + + - All the external routes must be known to the CE routers. + + Then when a CE router looks up a packet's destination address, the + routing lookup will resolve to an internal address, usually the + address of the packet's BGP next hop. The CE labels the packet + appropriately and sends the packet to the PE. The PE, rather than + looking up the packet's IP destination address in a VRF, uses the + packet's top MPLS label to select the BGP next hop. As a result, if + the BGP next hop is more than one hop away, the top label will be + replaced by two labels, a tunnel label and a VPN route label. If the + BGP next hop is one hop away, the top label may be replaced by just + the VPN route label. If the ingress PE is also the egress PE, the + top label will just be popped. When the packet is sent from its + egress PE to a CE, the packet will have one fewer MPLS labels than it + had when it was first received by its ingress PE. + + In the above procedure, the CE routers are the only routers in the + VPN that need to support MPLS. If, on the other hand, all the + routers at a particular VPN site support MPLS, then it is no longer + required that the CE routers know all the external routes. All that + is required is that the external routes be known to whatever routers + are responsible for putting the label stack on a hitherto unlabeled + packet and that there be label switched path that leads from those + routers to their BGP peers at other sites. In this case, for each + + + + +Rosen & Rekhter Standards Track [Page 31] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + internal route that a CE router distributes to a PE router, it must + also distribute a label. + +10. Multi-AS Backbones + + What if two sites of a VPN are connected to different Autonomous + Systems (e.g., because the sites are connected to different SPs)? + The PE routers attached to that VPN will then not be able to maintain + IBGP connections with each other, or with a common route reflector. + Rather, there needs to be some way to use EBGP to distribute VPN-IPv4 + addresses. + + There are a number of different ways of handling this case, which we + present in order of increasing scalability. + + a) VRF-to-VRF connections at the AS (Autonomous System) border + routers. + + In this procedure, a PE router in one AS attaches directly to a + PE router in another. The two PE routers will be attached by + multiple sub-interfaces, at least one for each of the VPNs + whose routes need to be passed from AS to AS. Each PE will + treat the other as if it were a CE router. That is, the PEs + associate each such sub-interface with a VRF, and use EBGP to + distribute unlabeled IPv4 addresses to each other. + + This is a procedure that "just works", and that does not + require MPLS at the border between ASes. However, it does not + scale as well as the other procedures discussed below. + + b) EBGP redistribution of labeled VPN-IPv4 routes from AS to + neighboring AS. + + In this procedure, the PE routers use IBGP to redistribute + labeled VPN-IPv4 routes either to an Autonomous System Border + Router (ASBR), or to a route reflector of which an ASBR is a + client. The ASBR then uses EBGP to redistribute those labeled + VPN-IPv4 routes to an ASBR in another AS, which in turn + distributes them to the PE routers in that AS, or perhaps to + another ASBR which in turn distributes them, and so on. + + When using this procedure, VPN-IPv4 routes should only be + accepted on EBGP connections at private peering points, as part + of a trusted arrangement between SPs. VPN-IPv4 routes should + neither be distributed to nor accepted from the public + Internet, or from any BGP peers that are not trusted. An ASBR + should never accept a labeled packet from an EBGP peer unless + it has actually distributed the top label to that peer. + + + +Rosen & Rekhter Standards Track [Page 32] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + If there are many VPNs having sites attached to different + Autonomous Systems, there does not need to be a single ASBR + between those two ASes that holds all the routes for all the + VPNs; there can be multiple ASBRs, each of which holds only the + routes for a particular subset of the VPNs. + + This procedure requires that there be a label switched path + leading from a packet's ingress PE to its egress PE. Hence the + appropriate trust relationships must exist between and among + the set of ASes along the path. Also, there must be agreement + among the set of SPs as to which border routers need to receive + routes with which Route Targets. + + c) Multi-hop EBGP redistribution of labeled VPN-IPv4 routes + between source and destination ASes, with EBGP redistribution + of labeled IPv4 routes from AS to neighboring AS. + + In this procedure, VPN-IPv4 routes are neither maintained nor + distributed by the ASBRs. An ASBR must maintain labeled IPv4 + /32 routes to the PE routers within its AS. It uses EBGP to + distribute these routes to other ASes. ASBRs in any transit + ASes will also have to use EBGP to pass along the labeled /32 + routes. This results in the creation of a label switched path + from the ingress PE router to the egress PE router. Now PE + routers in different ASes can establish multi-hop EBGP + connections to each other, and can exchange VPN-IPv4 routes + over those connections. + + If the /32 routes for the PE routers are made known to the P + routers of each AS, everything works normally. If the /32 + routes for the PE routers are NOT made known to the P routers + (other than the ASBRs), then this procedure requires a packet's + ingress PE to put a three-label stack on it. The bottom label + is assigned by the egress PE, corresponding to the packet's + destination address in a particular VRF. The middle label is + assigned by the ASBR, corresponding to the /32 route to the + egress PE. The top label is assigned by the ingress PE's IGP + Next Hop, corresponding to the /32 route to the ASBR. + + To improve scalability, one can have the multi-hop EBGP + connections exist only between a route reflector in one AS and + a route reflector in another. (However, when the route + reflectors distribute routes over this connection, they do not + modify the BGP next hop attribute of the routes.) The actual + PE routers would then only have IBGP connections to the route + reflectors in their own AS. + + + + + +Rosen & Rekhter Standards Track [Page 33] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + This procedure is very similar to the "carrier's carrier" + procedures described in Section 9. Like the previous + procedure, it requires that there be a label switched path + leading from a packet's ingress PE to its egress PE. + +11. Accessing the Internet from a VPN + + Many VPN sites will need to be able to access the public Internet, as + well as to access other VPN sites. The following describes some of + the alternative ways of doing this. + + 1. In some VPNs, one or more of the sites will obtain Internet + access by means of an "Internet gateway" (perhaps a firewall) + attached to a non-VRF interface to an ISP. The ISP may or may + not be the same organization as the SP that is providing the + VPN service. Traffic to/from the Internet gateway would then + be routed according to the PE router's default forwarding + table. + + In this case, the sites that have Internet access may be + distributing a default route to their PEs, which in turn + redistribute it to other PEs and hence into other sites of the + VPN. This provides Internet access for all of the VPN's sites. + + In order to properly handle traffic from the Internet, the ISP + must distribute, to the Internet, routes leading to addresses + that are within the VPN. This is completely independent of any + of the route distribution procedures described in this + document. The internal structure of the VPN will in general + not be visible from the Internet; such routes would simply lead + to the non-VRF interface that attaches to the VPN's Internet + gateway. + + In this model, there is no exchange of routes between a PE + router's default forwarding table and any of its VRFs. VPN + route distribution procedures and Internet route distribution + procedures are completely independent. + + Note that although some sites of the VPN use a VRF interface to + communicate with the Internet, ultimately all packets to/from + the Internet traverse a non-VRF interface before + leaving/entering the VPN, so we refer to this as "non-VRF + Internet access". + + Note that the PE router to which the non-VRF interface attaches + does not necessarily need to maintain all the Internet routes + in its default forwarding table. The default forwarding table + could have as few as one route, "default", which leads to + + + +Rosen & Rekhter Standards Track [Page 34] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + another router (probably an adjacent one) that has the Internet + routes. A variation of this scheme is to tunnel packets + received over the non-VRF interface from the PE router to + another router, where this other router maintains the full set + of Internet routes. + + 2. Some VPNs may obtain Internet access via a VRF interface ("VRF + Internet access"). If a packet is received by a PE over a VRF + interface, and if the packet's destination address does not + match any route in the VRF, then it may be matched against the + PE's default forwarding table. If a match is made there, the + packet can be forwarded natively through the backbone to the + Internet, instead of being forwarded by MPLS. + + In order for traffic to flow natively in the opposite direction + (from Internet to VRF interface), some of the routes from the + VRF must be exported to the Internet forwarding table. + Needless to say, any such routes must correspond to globally + unique addresses. + + In this scheme, the default forwarding table might have the + full set of Internet routes, or it might have as little as a + single default route leading to another router that does have + the full set of Internet routes in its default forwarding + table. + + 3. Suppose the PE has the capability to store "non-VPN routes" in + a VRF. If a packet's destination address matches a "non-VPN + route", then the packet is transmitted natively, rather than + being transmitted via MPLS. If the VRF contains a non-VPN + default route, all packets for the public Internet will match + it, and be forwarded natively to the default route's next hop. + At that next hop, the packets' destination addresses will be + looked up in the default forwarding table, and may match more + specific routes. + + This technique would only be available if none of the CE + routers is distributing a default route. + + 4. It is also possible to obtain Internet access via a VRF + interface by having the VRF contain the Internet routes. + Compared with model 2, this eliminates the second lookup, but + it has the disadvantage of requiring the Internet routes to be + replicated in each such VRF. + + If this technique is used, the SP may want to make its + interface to the Internet be a VRF interface, and to use the + + + + +Rosen & Rekhter Standards Track [Page 35] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + techniques of Section 4 to distribute Internet routes, as VPN- + IPv4 routes, to other VRFs. + + It should be clearly understood that by default, there is no exchange + of routes between a VRF and the default forwarding table. This is + done ONLY upon agreement between a customer and an SP, and only if it + suits the customer's policies. + +12. Management VPNs + + This specification does not require that the sub-interface connecting + a PE router and a CE router be a "numbered" interface. If it is a + numbered interface, this specification allows the addresses assigned + to the interface to come from either the address space of the VPN or + the address space of the SP. + + If a CE router is being managed by the Service Provider, then the + Service Provider will likely have a network management system that + needs to be able to communicate with the CE router. In this case, + the addresses assigned to the sub-interface connecting the CE and PE + routers should come from the SP's address space, and should be unique + within that space. The network management system should itself + connect to a PE router (more precisely, be at a site that connects to + a PE router) via a VRF interface. The address of the network + management system will be exported to all VRFs that are associated + with interfaces to CE routers that are managed by the SP. The + addresses of the CE routers will be exported to the VRF associated + with the network management system, but not to any other VRFs. + + This allows communication between the CE and network management + system, but does not allow any undesired communication to or among + the CE routers. + + One way to ensure that the proper route import/exports are done is to + use two Route Targets; call them T1 and T2. If a particular VRF + interface attaches to a CE router that is managed by the SP, then + that VRF is configured to: + + - import routes that have T1 attached to them, and + + - attach T2 to addresses assigned to each end of its VRF + interfaces. + + If a particular VRF interface attaches to the SP's network management + system, then that VRF is configured to attach T1 to the address of + that system, and to import routes that have T2 attached to them. + + + + + +Rosen & Rekhter Standards Track [Page 36] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + +13. Security Considerations + +13.1. Data Plane + + By security in the "data plane", we mean protection against the + following possibilities: + + - Packets from within a VPN travel to a site outside the VPN, other + than in a manner consistent with the policies of the VPN. + + - Packets from outside a VPN enter one of the VPN's sites, other + than in a manner consistent with the policies of the VPN. + + Under the following conditions: + + 1. a backbone router does not accept labeled packets over a + particular data link, unless it is known that that data link + attaches only to trusted systems, or unless it is known that + such packets will leave the backbone before the IP header or + any labels lower in the stack will be inspected, and + + 2. labeled VPN-IPv4 routes are not accepted from untrusted or + unreliable routing peers, + + 3. no successful attacks have been mounted on the control plane, + + the data plane security provided by this architecture is virtually + identical to that provided to VPNs by Frame Relay or ATM backbones. + If the devices under the control of the SP are properly configured, + data will not enter or leave a VPN unless authorized to do so. + + Condition 1 above can be stated more precisely. One should discard a + labeled packet received from a particular neighbor unless one of the + following two conditions holds: + + - the packet's top label has a label value that the receiving + system has distributed to that neighbor, or + + - the packet's top label has a label value that the receiving + system has distributed to a system beyond that neighbor (i.e., + when it is known that the path from the system to which the label + was distributed to the receiving system may be via that + neighbor). + + + + + + + + +Rosen & Rekhter Standards Track [Page 37] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Condition 2 above is of most interest in the case of inter-provider + VPNs (see Section 10). For inter-provider VPNs constructed according + to scheme b) of Section 10, condition 2 is easily checked. (The + issue of security when scheme (c) of Section 10 is used is for + further study.) + + It is worth noting that the use of MPLS makes it much simpler to + provide data plane security than might be possible if one attempted + to use some form of IP tunneling in place of the MPLS outer label. + It is a simple matter to have one's border routers refuse to accept a + labeled packet unless the first of the above conditions applies to + it. It is rather more difficult to configure a router to refuse to + accept an IP packet if that packet is an IP tunneled packet whose + destination address is that of a PE router; certainly, this is not + impossible to do, but it has both management and performance + implications. + + MPLS-in-IP and MPLS-in-GRE tunneling are specified in + [MPLS-in-IP-GRE]. If it is desired to use such tunnels to carry VPN + packets, then the security considerations described in Section 8 of + that document must be fully understood. Any implementation of + BGP/MPLS IP VPNs that allows VPN packets to be tunneled as described + in that document MUST contain an implementation of IPsec that can be + used as therein described. If the tunnel is not secured by IPsec, + then the technique of IP address filtering at the border routers, + described in Section 8.2 of that document, is the only means of + ensuring that a packet that exits the tunnel at a particular egress + PE was actually placed in the tunnel by the proper tunnel head node + (i.e., that the packet does not have a spoofed source address). + Since border routers frequently filter only source addresses, packet + filtering may not be effective unless the egress PE can check the IP + source address of any tunneled packet it receives, and compare it to + a list of IP addresses that are valid tunnel head addresses. Any + implementation that allows MPLS-in-IP and/or MPLS-in-GRE tunneling to + be used without IPsec MUST allow the egress PE to validate in this + manner the IP source address of any tunneled packet that it receives. + + In the case where a number of CE routers attach to a PE router via a + LAN interface, to ensure proper security, one of the following + conditions must hold: + + 1. All the CE routers on the LAN belong to the same VPN, or + + 2. A trusted and secured LAN switch divides the LAN into multiple + VLANs, with each VLAN containing only systems of a single VPN; + in this case, the switch will attach the appropriate VLAN tag + to any packet before forwarding it to the PE router. + + + + +Rosen & Rekhter Standards Track [Page 38] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Cryptographic privacy is not provided by this architecture, nor by + Frame Relay or ATM VPNs. These architectures are all compatible with + the use of cryptography on a CE-CE basis, if that is desired. + + The use of cryptography on a PE-PE basis is for further study. + +13.2. Control Plane + + The data plane security of the previous section depends on the + security of the control plane. To ensure security, neither BGP nor + LDP connections should be made with untrusted peers. The TCP/IP MD5 + authentication option [TCP-MD5] should be used with both these + protocols. The routing protocol within the SP's network should also + be secured in a similar manner. + +13.3. Security of P and PE Devices + + If the physical security of these devices is compromised, data plane + security may also be compromised. + + The usual steps should be taken to ensure that IP traffic from the + public Internet cannot be used to modify the configuration of these + devices, or to mount Denial of Service attacks on them. + +14. Quality of Service + + Although not the focus of this paper, Quality of Service is a key + component of any VPN service. In MPLS/BGP VPNs, existing L3 QoS + capabilities can be applied to labeled packets through the use of the + "experimental" bits in the shim header [MPLS-ENCAPS], or, where ATM + is used as the backbone, through the use of ATM QoS capabilities. + The traffic engineering work discussed in [MPLS-RSVP] is also + directly applicable to MPLS/BGP VPNs. Traffic engineering could even + be used to establish label switched paths with particular QoS + characteristics between particular pairs of sites, if that is + desirable. Where an MPLS/BGP VPN spans multiple SPs, the + architecture described in [PASTE] may be useful. An SP may apply + either intserv (Integrated Services) or diffserv (Differentiated + Services) capabilities to a particular VPN, as appropriate. + + + + + + + + + + + + +Rosen & Rekhter Standards Track [Page 39] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + +15. Scalability + + We have discussed scalability issues throughout this paper. In this + section, we briefly summarize the main characteristics of our model + with respect to scalability. + + The Service Provider backbone network consists of (a) PE routers, (b) + BGP Route Reflectors, (c) P routers (that are neither PE routers nor + Route Reflectors), and, in the case of multi-provider VPNs, (d) + ASBRs. + + P routers do not maintain any VPN routes. In order to properly + forward VPN traffic, the P routers need only maintain routes to the + PE routers and the ASBRs. The use of two levels of labeling is what + makes it possible to keep the VPN routes out of the P routers. + + A PE router maintains VPN routes, but only for those VPNs to which it + is directly attached. + + Route reflectors can be partitioned among VPNs so that each partition + carries routes for only a subset of the VPNs supported by the Service + Provider. Thus, no single route reflector is required to maintain + routes for all VPNs. + + For inter-provider VPNs, if the ASBRs maintain and distribute VPN- + IPv4 routes, then the ASBRs can be partitioned among VPNs in a + similar manner, with the result that no single ASBR is required to + maintain routes for all the inter-provider VPNs. If multi-hop EBGP + is used, then the ASBRs need not maintain and distribute VPN-IPv4 + routes at all. + + As a result, no single component within the Service Provider network + has to maintain all the routes for all the VPNs. So the total + capacity of the network to support increasing numbers of VPNs is not + limited by the capacity of any individual component. + +16. IANA Considerations + + The Internet Assigned Numbers Authority (IANA) has created a new + registry for the "Route Distinguisher Type Field" (see Section 4.2). + This is a two-byte field. Types 0, 1, and 2 are defined by this + document. Additional Route Distinguisher Type Field values with a + high-order bit of 0 may be allocated by IANA on a "First Come, First + Served" basis [IANA]. Values with a high-order bit of 1 may be + allocated by IANA based on "IETF consensus" [IANA]. + + + + + + +Rosen & Rekhter Standards Track [Page 40] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + This document specifies (see Section 4.3.4) the use of the BGP + Address Family Identifier (AFI) value 1, along with the BGP + Subsequent Address Family Identifier (SAFI) value 128, to represent + the address family "VPN-IPv4 Labeled Addresses", which is defined in + this document. + + The use of AFI value 1 for IP is as currently specified in the IANA + registry "Address Family Identifier", so IANA need take no action + with respect to it. + + The SAFI value 128 was originally specified as "Private Use" in the + IANA "Subsequent Address Family Identifier" registry. IANA has + changed the SAFI value 128 from "private use" to "MPLS-labeled VPN + address". + +17. Acknowledgements + + The full list of contributors can be found in Section 18. + + Significant contributions to this work have also been made by Ravi + Chandra, Dan Tappan, and Bob Thomas. + + We also wish to thank Shantam Biswas for his review and + contributions. + +18. Contributors + + Tony Bogovic + Telcordia Technologies + 445 South Street, Room 1A264B + Morristown, NJ 07960 + + EMail: tjb@research.telcordia.com + + + Stephen John Brannon + Swisscom AG + Postfach 1570 + CH-8301 + Glattzentrum (Zuerich), Switzerland + + EMail: stephen.brannon@swisscom.com + + + + + + + + + +Rosen & Rekhter Standards Track [Page 41] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Marco Carugi + Nortel Networks S.A. + Parc d'activites de Magny-Les Jeunes Bois CHATEAUFORT + 78928 YVELINES Cedex 9 - FRANCE + + EMail: marco.carugi@nortelnetworks.com + + + Christopher J. Chase + AT&T + 200 Laurel Ave + Middletown, NJ 07748 + USA + + EMail: chase@att.com + + + Ting Wo Chung + Bell Nexxia + 181 Bay Street + Suite 350 + Toronto, Ontario + M5J2T3 + + EMail: ting_wo.chung@bellnexxia.com + + + Eric Dean + + + Jeremy De Clercq + Alcatel Network Strategy Group + Francis Wellesplein 1 + 2018 Antwerp, Belgium + + EMail: jeremy.de_clercq@alcatel.be + + + Luyuan Fang + AT&T + IP Backbone Architecture + 200 Laurel Ave. + Middletown, NJ 07748 + + EMail: luyuanfang@att.com + + + + + + +Rosen & Rekhter Standards Track [Page 42] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Paul Hitchen + BT + BT Adastral Park + Martlesham Heath, + Ipswich IP5 3RE + UK + + EMail: paul.hitchen@bt.com + + + Manoj Leelanivas + Juniper Networks, Inc. + 385 Ravendale Drive + Mountain View, CA 94043 USA + + EMail: manoj@juniper.net + + + Dave Marshall + Worldcom + 901 International Parkway + Richardson, Texas 75081 + + EMail: dave.marshall@wcom.com + + + Luca Martini + Cisco Systems, Inc. + 9155 East Nichols Avenue, Suite 400 + Englewood, CO, 80112 + + EMail: lmartini@cisco.com + + + Monique Jeanne Morrow + Cisco Systems, Inc. + Glatt-com, 2nd floor + CH-8301 + Glattzentrum, Switzerland + + EMail: mmorrow@cisco.com + + + + + + + + + + +Rosen & Rekhter Standards Track [Page 43] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + Ravichander Vaidyanathan + Telcordia Technologies + 445 South Street, Room 1C258B + Morristown, NJ 07960 + + EMail: vravi@research.telcordia.com + + + Adrian Smith + BT + BT Adastral Park + Martlesham Heath, + Ipswich IP5 3RE + UK + + EMail: adrian.ca.smith@bt.com + + + Vijay Srinivasan + 1200 Bridge Parkway + Redwood City, CA 94065 + + EMail: vsriniva@cosinecom.com + + + Alain Vedrenne + Equant + Heraklion, 1041 route des Dolines, BP347 + 06906 Sophia Antipolis, Cedex, France + + EMail: Alain.Vedrenne@equant.com + +19. Normative References + + [BGP] Rekhter, Y. and T. Li, "A Border Gateway Protocol 4 + (BGP-4)", RFC 4271, January 2006. + + [BGP-MP] Bates, T., Rekhter, Y., Chandra, R., and D. Katz, + "Multiprotocol Extensions for BGP-4", RFC 2858, + June 2000. + + [BGP-EXTCOMM] Sangli, S., Tappan, D., and Y. Rekhter, "BGP + Extended Communities Attribute", RFC 4360, February + 2006. + + [MPLS-ARCH] Rosen, E., Viswanathan, A., and R. Callon, + "Multiprotocol Label Switching Architecture", RFC + 3031, January 2001. + + + +Rosen & Rekhter Standards Track [Page 44] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + [MPLS-BGP] Rekhter, Y. and E. Rosen, "Carrying Label + Information in BGP-4", RFC 3107, May 2001. + + [MPLS-ENCAPS] Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y., + Farinacci, D., Li, T., and A. Conta, "MPLS Label + Stack Encoding", RFC 3032, January 2001. + +20. Informative References + + [BGP-AS4] Vohra, Q. and E. Chen, "BGP Support for Four-Octet + AS Number Space", Work in Progress, March 2004. + + [BGP-ORF] Chen, E. and Y. Rekhter, "Cooperative Route + Filtering Capability for BGP-4", Work in Progress, + March 2004. + + [BGP-RFSH] Chen, E., "Route Refresh Capability for BGP-4", RFC + 2918, September 2000. + + [BGP-RR] Bates, T., Chandra, R., and E. Chen, "BGP Route + Reflection - An Alternative to Full Mesh IBGP", RFC + 2796, April 2000. + + [IANA] Narten, T. and H. Alvestrand, "Guidelines for + Writing an IANA Considerations Section in RFCs", + BCP 26, RFC 2434, October 1998. + + [MPLS-ATM] Davie, B., Lawrence, J., McCloghrie, K., Rosen, E., + Swallow, G., Rekhter, Y., and P. Doolan, "MPLS + using LDP and ATM VC Switching", RFC 3035, January + 2001. + + [MPLS/BGP-IPsec] Rosen, E., De Clercq, J., Paridaens, O., T'Joens, + Y., and C. Sargor, "Architecture for the Use of + PE-PE IPsec Tunnels in BGP/MPLS IP VPNs", Work in + Progress, March 2004. + + [MPLS-FR] Conta, A., Doolan, P., and A. Malis, "Use of Label + Switching on Frame Relay Networks Specification", + RFC 3034, January 2001. + + [MPLS-in-IP-GRE] Worster, T., Rekhter, Y., and E. Rosen, + "Encapsulating MPLS in IP or Generic Routing + Encapsulation (GRE)", RFC 4023, March 2005. + + [MPLS-LDP] Andersson, L., Doolan, P., Feldman, N., Fredette, + A., and B. Thomas, "LDP Specification", RFC 3036, + January 2001. + + + +Rosen & Rekhter Standards Track [Page 45] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + + [MPLS-RSVP] Awduche, D., Berger, L., Gan, D., Li, T., + Srinivasan, V., and G. Swallow, "RSVP-TE: + Extensions to RSVP for LSP Tunnels", RFC 3209, + December 2001. + + [OSPFv2] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April + 1998. + + [PASTE] Li, T. and Y. Rekhter, "A Provider Architecture for + Differentiated Services and Traffic Engineering + (PASTE)", RFC 2430, October 1998. + + [RIP] Malkin, G., "RIP Version 2", STD 56, RFC 2453, + November 1998. + + [OSPF-2547-DNBIT] Rosen, E., Psenak, P., and P. Pillay-Esnault, + "Using an LSA Options Bit to Prevent Looping in + BGP/MPLS IP VPNs", Work in Progress, March 2004. + + [TCP-MD5] Heffernan, A., "Protection of BGP Sessions via the + TCP MD5 Signature Option", RFC 2385, August 1998. + + [VPN-MCAST] Rosen, E., Cai, Y., and J. Wijsnands, "Multicast in + MPLS/BGP VPNs", Work in Progress, May 2004. + + [VPN-OSPF] Rosen, E., Psenak, P., and P. Pillay-Esnault, "OSPF + as the PE/CE Protocol in BGP/MPLS VPNs", Work in + Progress, February 2004. + +Authors' Addresses + + Eric C. Rosen + Cisco Systems, Inc. + 1414 Massachusetts Avenue + Boxborough, MA 01719 + + EMail: erosen@cisco.com + + + Yakov Rekhter + Juniper Networks + 1194 N. Mathilda Avenue + Sunnyvale, CA 94089 + + EMail: yakov@juniper.net + + + + + + +Rosen & Rekhter Standards Track [Page 46] + +RFC 4364 BGP/MPLS IP VPNs February 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + + + +Rosen & Rekhter Standards Track [Page 47] + |