Chapter 6 IPv6 VPN over MPLS

6VPE Overview

6VPE Overview

Figure 6-1illustrates the 6VPE network architecture and control plane protocols when two IPv6 sites communicate through an MPLS IPv4 backbone.

Figure 6-1 6VPE Network Architecture

Customer#1

Default

routing table

site1

 

 

 

2001:100:1:1000::/56

routing table “red”

 

 

200.14.14.1

 

 

 

 

 

 

 

 

BGP table

CE1

 

 

 

 

1

 

 

2001:100:1:1000::/64

200.11.11.1

 

200.10.10.1

 

 

 

 

2

3

4

 

 

MP-iBGP

2001:100:2:1000::/64

 

PE1

 

PE2

CE2

routing table “blue”

 

 

 

 

Provider

2001:100:2:1000::/56

 

 

 

Default

network

 

 

 

 

 

routing table

 

Customer#2

 

 

 

site1

 

 

 

Customer#1

site2

2001:100:1:2000::/56

CE

5

2001:100:1:2000::/64

2001:100:1:2000::/64

2001:100:2:2000::/56

CE

 

Customer#2

210612

site2

Dual stack is a technique that lets IPv4 and IPv6 coexist on the same interfaces. Dual stack implementations depend on the network area:

Network Core—In the network core, IPv6 is carried in a VPN manner over a non IPv6-aware MPLS core. This allows IPv4 or IPv6 communities to communicate with each other over an IPv4 MPLS backbone without modifying the core infrastructure. By avoiding dual stacking on the core routers, resources can be dedicated to their primary function to avoid any complexity on the operational side. The transition and integration with respect to the current state of networks is also transparent.

Network Access—To support native IPv6, the access that connects to IPv4 and IPv6 domains must be IPv6-aware. Service PE elements can exchange routing information with end users; therefore, dual stacking is a mandatory requirement on the access layer.

When IPv6 is enabled on the subinterface that is participating in a VPN, it becomes an IPv6 VPN. The CE-PE link runs IPv6 or IPv4 natively. The addition of IPv6 on a PE router turns the PE into 6VPE, thereby enabling service providers to support an IPv6 over the MPLS network.

PE routers use VRF tables to maintain the segregated reachability and forwarding information of each IPv6 VPN. MP-BGP with its IPv6 extensions distributes the routes from 6VPE to other 6VPEs through a direct interior BGP (iBGP) session or through VPNv6 route reflectors. The next hop of the advertising PE router still retains the IPv4 address (normally it is a loopback interface), but with the addition of IPv6, a value of ::FFFF: is prepended to the IPv4 next hop.

The technique can be seen as automatic tunneling of the IPv6 packets through the IPv4 backbone. The MP-BGP relationships remain the same as they are for VPNv4 traffic, with an additional capability of VPNv6. Where both IPv4 and IPv6 are supported, the same set of MP-BGP peering relationships is used.

Cisco Active Network Abstraction 3.6.6 MPLS User Guide

6-2

OL-19192-01

 

 

Page 60
Image 60
Cisco Systems 3.6.6 manual 6VPE Overview, PE1 PE2 CE2

3.6.6 specifications

Cisco Systems has continually evolved its networking solutions to address the demands of modern enterprises, with the introduction of the Cisco Systems 3.6.6 version being no exception. This version integrates cutting-edge technologies designed to enhance network performance, security, and management efficiency, catering to the increasingly complex needs of businesses across various sectors.

One of the standout features of Cisco Systems 3.6.6 is its enhanced support for automation and orchestration. This version incorporates advanced automation tools, allowing IT teams to deploy and configure network resources more rapidly and efficiently. With features such as Cisco DNA Center’s intent-based networking, organizations can streamline operations and reduce manual intervention, leading to quicker service delivery and reduced operational costs.

Security remains a top priority, and Cisco Systems 3.6.6 includes improved security protocols that help protect sensitive data and critical infrastructure. The integration of Cisco SecureX provides a unified view of security across the network, enabling organizations to respond to threats in real-time, manage vulnerabilities proactively, and maintain compliance with regulatory standards. The incorporation of machine learning and AI-driven analytics ensures that potential threats are identified and mitigated before they can escalate.

Interoperability is another key characteristic of version 3.6.6, allowing existing Cisco hardware and software to work seamlessly together. This flexibility ensures that enterprises can leverage their current investments while adopting newer technologies without the need for a complete overhaul of their existing network architecture.

Additionally, Cisco Systems 3.6.6 has enhanced support for IoT devices, integrating robust frameworks that enable organizations to manage and secure an increasing number of connected devices. With the proliferation of IoT in various industries, this feature is vital for maintaining efficiency and security, as it allows for better monitoring and control over the connected ecosystem.

In conclusion, Cisco Systems 3.6.6 embodies a comprehensive approach to modern networking challenges. Its emphasis on automation, advanced security features, interoperability, and IoT support positions it as a pivotal solution for businesses looking to enhance their operational capabilities and embrace digital transformation. As organizations worldwide adapt to an ever-evolving technological landscape, Cisco Systems 3.6.6 stands out as a reliable partner in navigating these complexities.