WO2008042553A2 - System and method for forwarding traffic data in an mpls vpn - Google Patents

System and method for forwarding traffic data in an mpls vpn Download PDF

Info

Publication number
WO2008042553A2
WO2008042553A2 PCT/US2007/077830 US2007077830W WO2008042553A2 WO 2008042553 A2 WO2008042553 A2 WO 2008042553A2 US 2007077830 W US2007077830 W US 2007077830W WO 2008042553 A2 WO2008042553 A2 WO 2008042553A2
Authority
WO
WIPO (PCT)
Prior art keywords
gateway
router
routers
vpn
specified
Prior art date
Application number
PCT/US2007/077830
Other languages
French (fr)
Other versions
WO2008042553A3 (en
Inventor
Sumantra Roy
Joseph Wolfe
Paul Umeki
David J. Mahar
Original Assignee
At & T Corp.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by At & T Corp. filed Critical At & T Corp.
Publication of WO2008042553A2 publication Critical patent/WO2008042553A2/en
Publication of WO2008042553A3 publication Critical patent/WO2008042553A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5691Access to open networks; Ingress point selection, e.g. ISP selection
    • H04L12/5692Selection among different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

Definitions

  • the present invention generally relates to the field of data communication. More specifically, the present invention relates to techniques for forwarding traffic data in a multiprotocol label switching (MPLS) virtual private networks (VPNs) within a telecommunications network.
  • MPLS multiprotocol label switching
  • VPNs virtual private networks
  • VPNs virtual private networks
  • WAN wide area network
  • the MPLS VPN architecture mainly comprises a backbone network composed of P (provider router) devices and PE (provider edge router) devices preferably provided by a VPN Service Protocol (ISP) as well as the subscribers' VPN that comprises a plurality of sites and CE (customer edge router) devices.
  • ISP VPN Service Protocol
  • P devices are mainly responsible for forwarding MPLS frames.
  • PE devices are the main body to realize MPLS VPN service, and they maintain independent lists of sites in subscribers' VPNs, and detect PCT Patent Application Attorney Docket No. : 18891-13
  • CE devices are common routers, and they connect sites in subscribers' VPNs to PEs, without supporting any MPLS or VPN signaling or protocol.
  • MPLS VPNS do not intrinsically provide a mechanism for customer edge (CE) routers to route traffic to preferred exit points, also referred to as gateways, connected to the service provider (SP) backbone.
  • CE customer edge
  • SP service provider
  • Such mechanisms are required when a choice of exit points exist. These exit points can for example be gateways to the public Internet or other services.
  • Customers preferably require the ability to select the gateway by the customer, i.e. the CE router.
  • These mechanisms also need to be aware of the availability of the service past the gateway to the extent possible via network/routing information. Non-availability of the service should result in the gateway being dropped as a possible exit point.
  • An additional requirement faced by service providers is the need to keep the complexity of such mechanisms low.
  • the present invention provides a system and method for forwarding traffic data in MPLS VPNs.
  • the method comprises receiving traffic data from at least one CE router, checking at least one VPN routing table to select at least one gateway within a MPLS backbone for at least one VPN destination.
  • the table comprises at least one gateway specified by the CE router and a logic provided with the specified gateway.
  • the method also comprises configuring a recursive static route in at least one PE router in the MPLS backbone.
  • the recursive static route comprise at least one path to the gateway specified by the CE router.
  • the method further comprises directing traffic data by at least one PE router to a VPN destination via the path to the gateway.
  • Figure 1 illustrates a MPLS VPN architecture in accordance with one embodiment of the present invention.
  • FIG. 2 illustrates a MPLS VPN architecture in accordance with another embodiment of the present invention.
  • Figure 3 illustrates a MPLS VPN architecture in accordance with a further embodiment of the present invention.
  • the MPLS VPN defines a mechanism that allows service providers to use their IP backbone (in this case MPLS backbone) to provide VPN services to their customers.
  • IP backbone in this case MPLS backbone
  • a standard PE-CE routing protocol can be used to distribute VPN routing PCT Patent Application Attorney Docket No. : 18891-13
  • Border Gateway Protocol is the core routing protocol of the Internet. It works by maintaining a table of IP networks or 'prefixes' which designate network reachability between autonomous systems (AS). It is described as a path vector protocol. BGP does not use traditional IGP metrics, but makes routing decisions based on path, network policies and/or rulesets.
  • Border Gateway Protocol BGP
  • the routes received have a next hop that is not necessarily directly connected. The IGP is used to "resolve" these next hops.
  • BGP When BGP is running inside an autonomous system (AS), it is referred to as Internal BGP (IBGP Interior Border Gateway Protocol). iBGP routes have an administrative distance of 200. When BGP runs between ASs, it is called External BGP (EBGP Exterior Border Gateway Protocol), and it has an administrative distance of 20.
  • AS autonomous system
  • IBGP Internal Border Gateway Protocol
  • EBGP Exterior Border Gateway Protocol External Border Gateway Protocol
  • VPN comprises a plurality of sites.
  • a customer site is connected to the service provider network by one or more ports, where the service provider associates each port with a VPN routing table, also known as a VPN routing and forwarding (VRF) table.
  • VRF Virtual Routing and Forwarding
  • VRF is a technology used in computer networks. It allows multiple instances of a routing table to co-exist within the same router at the same time. Because the routing instances are independent, the same or overlapping IP addresses can be used without conflicting with each other.
  • a VRF may be implemented in a network device by having distinct routing tables, also known as forwarding information bases (FIBs), one per VRF.
  • FIBs forwarding information bases
  • a network device may have the ability to configure different virtual routers, where each one has its own FIB, not accessible to any other virtual router instance on the same device.
  • VRF technology is commonly found in the ISP marketplace, notably in MPLS VPN configurations.
  • a VRF is a collection of policies that control the PCT Patent Application Attorney Docket No. : 18891-13
  • policies may comprise a IP route list, a label- forwarding list, a series of interfaces using the label-forwarding list and management information, router filtering policy, member interface list, etc.
  • CE routers forward all traffic to MPLS backbone PE routers.
  • the PE routers then forward traffic using the VPN routing tables. These tables help the PE routers determine the best paths within the backbone for any VPN destination.
  • CE routers cannot by default influence the choice of paths in the backbone.
  • the VPN customer often requires the ability to select the path for reasons such as load-balancing, latency, routing symmetry, administrative- distance etc.
  • load-balancing allows a router to use multiple paths to a destination when forwarding data packets. Latency means network delay and routing symmetry means that forward path and return path are identical.
  • the administrative distance is a measure of relative importance assigned to a protocol, used to determine which route to pick when multiple protocols resolve the same route. Rather than require complex routing interaction between the CE and PE routers, customers prefer to leave routing decisions to the backbone and cannot specify the choice of gateway on a per-PE per VRF basis.
  • the present invention provides a system and a method for gateway selection in MPLS VPNs by using a combination of recursive floating static routes in MPLS PE routers and conditional route advertisements from gateway CE routers.
  • This method is extended to include the case where the gateway CE is unable to support conditional route advertisements.
  • the MPLS PE routers are able to route correctly in both normal and failure scenarios using MPLS PE rerouting.
  • This method allows for choice of gateway on a per-PE per- VRF basis.
  • Use of the 'floating' feature in the PE vrf static routes allows for selection from amongst multiple gateways. This approach's reliance on a static route mechanism ensures minimal additional complexity and configuration overhead from a SP viewpoint.
  • the MPLS VPN architecture 100 includes a MPLS backbone 101 comprising PE routers PEl 102, PE2 110, PE3 118, PE4 124 and PE5 126.
  • the MPLS VPN 100 also comprises CE routers CEl 104, CE2 112 and CE3 120; and gateway routers GWl 106, GW2 114 and GW3 120.
  • the PEl router 102 directs traffic from the CEl router 104 to the gateway GWl 106 via the backbone 101.
  • VRFl 108 a recursive static route VRFl 108 in a PEl router 102 of the VRF table that CEl 104 is a part of.
  • a recursive static route is where the next-hop destination for a static route is not directly connected to the router. The router must do a recursive lookup in its VRF table to resolve the next-hop for the route. This provides flexibility in choosing the next-hop based on dynamic changes to the VRF table.
  • the recursive static route VRFl 108 is introduced in the PEl router 102 as shown in Figure 1
  • This recursive static route 108 points to a loopback address on the gateway router of choice, which in this case is GWl 106.
  • PE2 router 110 directs traffic from CE2 router 112 to gateway GW2 114 such that a recursive static route VRF2 116 is introduced in the PE2 router 110 as shown in Figure 1.
  • This recursive static route 116 points to a loopback address on the gateway router GW2 114. Note that if the recursive static routes were not PCT Patent Application Attorney Docket No. : 18891-13
  • GWl is the loopback address of the gateway router GWl 106
  • GW2 is the loopback address of the gateway router GW2 114
  • network w.x.y.z is a common destination network that is being advertised by both gateways GWl 106 and GW2 114.
  • the standard PE-CE routing protocols also cause network w.x.y.z to be advertised and learned by the PEs using the Multi Protocol Internal Border Gateway Protocol (MPiBGP). However, the presence of the static route suppresses the MPiBGP route, this is the result of static routes having a lower administrative distance as compared to MPiBGP.
  • the static routes VRFl 108 and VRF2 116 are valid only as long as the PE routers PEl 102 and PE2 110 are able to resolve the path to loopback addresses GWl 106 and GW2 114. These are learnt via standard PE-CE routing protocols. If for example the GWl 106 router becomes non-functional, address GWl is no longer advertised to the PEs.
  • PEl 102 withdraws the static route VRFl 108 to network w.x.y.z from its routing table, i.e. the VRF table. With the static route 108 withdrawn, PEl 102 uses the MPiBGP path to network w.x.y.z. This can result in forwarding to any other available gateway depending PCT Patent Application Attorney Docket No. : 18891-13
  • a 'floating' option can be added to the recursive static route 108 in PEl 102 as follows:
  • the PE2 router 110 can implement a similar order in the example described above or can alternatively implement a different order of preference for its gateway selection.
  • the use of the recursive feature ensures that if the static route is disabled for some reason the gateway router loopback address is unreachable.
  • the additional use of the floating feature in the static route allows for multiple gateways to be defined in the order of preference. This method results in very minor incremental complexity.
  • the only feature dependence is the recursive resolution of the routing next-hop on the ingress PE.
  • the recursive static routes are resolved based on BGP routing table lookups. All other P and PE routers that comprise the SP backbone remain unaffected. Note that there may preferably be multiple layers of recursions which indicates that the static route could depend on a dynamic route which could depend on yet another dynamic route and that could go on until the a path is resolved.
  • FIG. 1 a MPLS VPN architecture 100 of Figure 1 with a scenario that the gateway routers GWl 106, GW2 114 and GW3 122 are unable to support conditional advertisement.
  • This solution is depicted in Figure 2.
  • GW3 122 continues to advertise its loopback address PCT Patent Application Attorney Docket No. : 18891-13
  • PE5 126 learns the route to GW2 114 through loopback, but does not have a route for the network w.x.y.z from GW2 114. It does however have a route to the network w.x.y.z from GWl 106 and GW3 122.
  • GWl 106 is preferred by MPiBGP for reaching the destination network w.x.y.z.
  • traffic from the CE2 112 is forwarded to PE2 110 as usual, which then forwards traffic to PE5 126 based on the static recursive route VRF2 116 in the PE2 110. This route has not been withdrawn since PE2 110 can resolve the GW3 122 loopback address.
  • the vrf routing table will determine that the packets must be forwarded to PE3 118.
  • the traffic re-enters the MPLS backbone and emerges at PE3 118.
  • the vrf routing table in PE3 118 then forwards the traffic to GWl 106.
  • This embodiment while not differing from the case where conditional advertisements are supported on the Gateways CEs in terms of the configuration (as shown in Figure 1), does require the PE routers to have the ability to redirect traffic within the backbone 101.
  • MPLS frames are de-encapsulated into IP packets, a route lookup is performed, the packets are re- encapsulated in MPLS frames and sent back into the SP network. This results in some additional feature complexity on the PE that performs this function, which is the PE5 126 in this example.
  • FIG. 3 there is provided a MPLS VPN architecture 100 of Figure 1 which considers a case scenario where a particular non-Gateway CE, for example CEl 104 or CE2 112 in the figure requires load- balancing to two gateways.
  • a particular non-Gateway CE for example CEl 104 or CE2 112 in the figure requires load- balancing to two gateways.
  • One approach to solving this is by defining two static routes in the ingress PE. For example, to support CEl 104 load-balancing its traffic for the network PCT Patent Application Attorney Docket No. : 18891-13
  • the VRFl 108 routing table on the PEl 102 would have the following entries:
  • An additional variation requires the definition of a 2 n vrf to support load- balancing on the local PE. This removes the need to run a PVC to a non-local PE. Routes can be exported to this second vrf to ensure that its table contains the w.x.y.z route via GW3. This approach is more complex from a SP configuration and support perspective, but can be implemented if issues such as backbone capacity or latency become overriding issues.
  • the PE router has many VRFs, each one helping define a VPN. And VPN is created in this PCT Patent Application Attorney Docket No. : 18891-13
  • the CE can now load-balance between two gateways over the MPLS backbone.

Abstract

The present invention provides a system and method for forwarding traffic data in a MPLS VPN network within a telecommunications network. The method comprise a technique for gateway selection in the MPLS VPN by using a combination of recursive floating static routes in the PE routers and conditional route advertisements from the gateway CE routers. This method allows for choice of gateway on a per-PE per- VRF basis.

Description

PCT Patent Application Attorney Docket No.: 18891-13
SYSTEM AND METHOD FOR FORWARDING TRAFFIC DATA IN AN
MPLS VPN
FIELD OF THE INVENTION
[0001] The present invention generally relates to the field of data communication. More specifically, the present invention relates to techniques for forwarding traffic data in a multiprotocol label switching (MPLS) virtual private networks (VPNs) within a telecommunications network.
BACKGROUND OF THE INVENTION
[0002] Recently, organizations have begun to build "virtual private networks" (VPNs) on top of public networks, such as the Internet to protect data transmitted over public networks. Virtual private network systems often rely on virtual private network gateways which reside on wide area network (WAN) side of a routing apparatus to connect an enterprise side to the Internet. Thus, VPN gateways are in the path of all relevant data traffic between an enterprise site and the public network.
[0003] There are different implementations of traditional provider provisioned (PP) VPN architecture applications. One such implementation is muliprotocol label switching (MPLS) VPN. The MPLS VPN architecture mainly comprises a backbone network composed of P (provider router) devices and PE (provider edge router) devices preferably provided by a VPN Service Protocol (ISP) as well as the subscribers' VPN that comprises a plurality of sites and CE (customer edge router) devices. In said devices, P devices are mainly responsible for forwarding MPLS frames. PE devices are the main body to realize MPLS VPN service, and they maintain independent lists of sites in subscribers' VPNs, and detect PCT Patent Application Attorney Docket No. : 18891-13
VPN topologies and learn internal VPN routes. CE devices are common routers, and they connect sites in subscribers' VPNs to PEs, without supporting any MPLS or VPN signaling or protocol.
[0004] MPLS VPNS do not intrinsically provide a mechanism for customer edge (CE) routers to route traffic to preferred exit points, also referred to as gateways, connected to the service provider (SP) backbone. Such mechanisms are required when a choice of exit points exist. These exit points can for example be gateways to the public Internet or other services. Customers preferably require the ability to select the gateway by the customer, i.e. the CE router. These mechanisms also need to be aware of the availability of the service past the gateway to the extent possible via network/routing information. Non-availability of the service should result in the gateway being dropped as a possible exit point. An additional requirement faced by service providers is the need to keep the complexity of such mechanisms low. Thus, there is a need to provide a mechanism that allows for ease of implementation and troubleshooting across large service provider (SP) networks. [0005] Many organizations have been planning to deploy a more complex approach for many years utilizing a Border Gateway Protocol (BGP) based approach. However, high development costs for the more complex approach has resulted in this feature not being developed as yet. Complex workarounds such as the use of multiple VRFs in the backbone have been used to handle existing customer requirements. However, these solutions do not scale and cannot keep up with customer requirements. PCT Patent Application Attorney Docket No. : 18891-13
SUMMARY OF THE INVENTION
[0006] The present invention provides a system and method for forwarding traffic data in MPLS VPNs. The method comprises receiving traffic data from at least one CE router, checking at least one VPN routing table to select at least one gateway within a MPLS backbone for at least one VPN destination. The table comprises at least one gateway specified by the CE router and a logic provided with the specified gateway. The method also comprises configuring a recursive static route in at least one PE router in the MPLS backbone. The recursive static route comprise at least one path to the gateway specified by the CE router. The method further comprises directing traffic data by at least one PE router to a VPN destination via the path to the gateway.
BRIEF DESCRIPTION OF THE DRAWINGS
[0007] Figure 1 illustrates a MPLS VPN architecture in accordance with one embodiment of the present invention.
[0008] Figure 2 illustrates a MPLS VPN architecture in accordance with another embodiment of the present invention.
[0009] Figure 3 illustrates a MPLS VPN architecture in accordance with a further embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[0010] As known in the art, the MPLS VPN defines a mechanism that allows service providers to use their IP backbone (in this case MPLS backbone) to provide VPN services to their customers. A standard PE-CE routing protocol can be used to distribute VPN routing PCT Patent Application Attorney Docket No. : 18891-13
information across the provider's backbone and MPLS is used to forward VPN traffic from one VPN site to another. Alternatively, a Border Gateway Protocol (BGP) can be used to distribute VPN routing information. The Border Gateway Protocol (BGP) is the core routing protocol of the Internet. It works by maintaining a table of IP networks or 'prefixes' which designate network reachability between autonomous systems (AS). It is described as a path vector protocol. BGP does not use traditional IGP metrics, but makes routing decisions based on path, network policies and/or rulesets. When using an exterior gateway protocol such as Border Gateway Protocol (BGP) in a network, the routes received have a next hop that is not necessarily directly connected. The IGP is used to "resolve" these next hops. When BGP is running inside an autonomous system (AS), it is referred to as Internal BGP (IBGP Interior Border Gateway Protocol). iBGP routes have an administrative distance of 200. When BGP runs between ASs, it is called External BGP (EBGP Exterior Border Gateway Protocol), and it has an administrative distance of 20.
[0011] Typically, VPN comprises a plurality of sites. A customer site is connected to the service provider network by one or more ports, where the service provider associates each port with a VPN routing table, also known as a VPN routing and forwarding (VRF) table. Virtual Routing and Forwarding (VRF) is a technology used in computer networks. It allows multiple instances of a routing table to co-exist within the same router at the same time. Because the routing instances are independent, the same or overlapping IP addresses can be used without conflicting with each other. A VRF may be implemented in a network device by having distinct routing tables, also known as forwarding information bases (FIBs), one per VRF. Alternatively, a network device may have the ability to configure different virtual routers, where each one has its own FIB, not accessible to any other virtual router instance on the same device. VRF technology is commonly found in the ISP marketplace, notably in MPLS VPN configurations. In simple terms, a VRF is a collection of policies that control the PCT Patent Application Attorney Docket No. : 18891-13
connectivity among a set of sites. Such policies may comprise a IP route list, a label- forwarding list, a series of interfaces using the label-forwarding list and management information, router filtering policy, member interface list, etc.
[0012] In a MPLS VPN, CE routers forward all traffic to MPLS backbone PE routers. The PE routers then forward traffic using the VPN routing tables. These tables help the PE routers determine the best paths within the backbone for any VPN destination. CE routers cannot by default influence the choice of paths in the backbone. In a case where multiple paths exist to a common destination/service, the VPN customer often requires the ability to select the path for reasons such as load-balancing, latency, routing symmetry, administrative- distance etc. Briefly, load-balancing allows a router to use multiple paths to a destination when forwarding data packets. Latency means network delay and routing symmetry means that forward path and return path are identical. The administrative distance is a measure of relative importance assigned to a protocol, used to determine which route to pick when multiple protocols resolve the same route. Rather than require complex routing interaction between the CE and PE routers, customers prefer to leave routing decisions to the backbone and cannot specify the choice of gateway on a per-PE per VRF basis.
[0013] The present invention provides a system and a method for gateway selection in MPLS VPNs by using a combination of recursive floating static routes in MPLS PE routers and conditional route advertisements from gateway CE routers. This method is extended to include the case where the gateway CE is unable to support conditional route advertisements. In this case the MPLS PE routers are able to route correctly in both normal and failure scenarios using MPLS PE rerouting. This method allows for choice of gateway on a per-PE per- VRF basis. Use of the 'floating' feature in the PE vrf static routes allows for selection from amongst multiple gateways. This approach's reliance on a static route mechanism ensures minimal additional complexity and configuration overhead from a SP viewpoint. This PCT Patent Application Attorney Docket No. : 18891-13
approach is unique and innovative thus combining several standard routing components in a new way to provide an approach to gateway selection for MPLS VPN's that also incorporates information on gateway availability. It imposes low incremental functionality and configuration requirements on the service provider backbone which is another positive, resulting in it being easily deployable. The features of the present invention are described in a greater detail below.
[0014] Referring to Figure 1, there is shown a MPLS VPN architecture 100 in accordance with one embodiment of the present invention. The MPLS VPN architecture 100 includes a MPLS backbone 101 comprising PE routers PEl 102, PE2 110, PE3 118, PE4 124 and PE5 126. The MPLS VPN 100 also comprises CE routers CEl 104, CE2 112 and CE3 120; and gateway routers GWl 106, GW2 114 and GW3 120. In Figure 1, the PEl router 102 directs traffic from the CEl router 104 to the gateway GWl 106 via the backbone 101. This is done by introducing a recursive static route VRFl 108 in a PEl router 102 of the VRF table that CEl 104 is a part of. The use of a recursive static route in one version, points to a loopback address on the gateway router of choice. This route is added on a per PE per VRF basis. A recursive static route is where the next-hop destination for a static route is not directly connected to the router. The router must do a recursive lookup in its VRF table to resolve the next-hop for the route. This provides flexibility in choosing the next-hop based on dynamic changes to the VRF table.
[0015] The recursive static route VRFl 108 is introduced in the PEl router 102 as shown in Figure 1 This recursive static route 108 points to a loopback address on the gateway router of choice, which in this case is GWl 106. Similarly PE2 router 110 directs traffic from CE2 router 112 to gateway GW2 114 such that a recursive static route VRF2 116 is introduced in the PE2 router 110 as shown in Figure 1. This recursive static route 116 points to a loopback address on the gateway router GW2 114. Note that if the recursive static routes were not PCT Patent Application Attorney Docket No. : 18891-13
present, traffic from both CEl 104 and CE2 112 would be routed to a common gateway router. An example of the recursive static route 108 in PEl 102 is given below:
•Ip route VRFl 108 {w.x.y.z} next-hop GWl Where: w.x.y.z is the destination network &
GWl is the loopback address of the gateway router GWl 106
Similarly, the recursive static route in PE2 would be: •Ip route VRF2 116 {w.x.y.z} next-hop GW2 Where: w.x.y.z is the destination network &
GW2 is the loopback address of the gateway router GW2 114
[0016] In the above example, network w.x.y.z is a common destination network that is being advertised by both gateways GWl 106 and GW2 114.
[0017] The standard PE-CE routing protocols also cause network w.x.y.z to be advertised and learned by the PEs using the Multi Protocol Internal Border Gateway Protocol (MPiBGP). However, the presence of the static route suppresses the MPiBGP route, this is the result of static routes having a lower administrative distance as compared to MPiBGP. [0018] The static routes VRFl 108 and VRF2 116 are valid only as long as the PE routers PEl 102 and PE2 110 are able to resolve the path to loopback addresses GWl 106 and GW2 114. These are learnt via standard PE-CE routing protocols. If for example the GWl 106 router becomes non-functional, address GWl is no longer advertised to the PEs. In that case PEl 102 withdraws the static route VRFl 108 to network w.x.y.z from its routing table, i.e. the VRF table. With the static route 108 withdrawn, PEl 102 uses the MPiBGP path to network w.x.y.z. This can result in forwarding to any other available gateway depending PCT Patent Application Attorney Docket No. : 18891-13
upon MPiBGP determination. And, if more than two gateways exist and a specific order of selection is required, a 'floating' option can be added to the recursive static route 108 in PEl 102 as follows:
•Ip route VRFl 108 {w.x.y.z} next-hop GWl admin-distance 5 •Ip route VRFl 108 {w.x.y.z} next-hop GW2 admin-distance 10 •Ip route VRFl 108 {w.x.y.z} next-hop GW3 admin-distance 15
[0019] Note that the lower admin-distance results in a higher preference of that route. This approach is known as a floating static route. The PE2 router 110 can implement a similar order in the example described above or can alternatively implement a different order of preference for its gateway selection.
[0020] Thus the use of the recursive feature ensures that if the static route is disabled for some reason the gateway router loopback address is unreachable. The additional use of the floating feature in the static route allows for multiple gateways to be defined in the order of preference. This method results in very minor incremental complexity. The only feature dependence is the recursive resolution of the routing next-hop on the ingress PE. In other words, the recursive static routes are resolved based on BGP routing table lookups. All other P and PE routers that comprise the SP backbone remain unaffected. Note that there may preferably be multiple layers of recursions which indicates that the static route could depend on a dynamic route which could depend on yet another dynamic route and that could go on until the a path is resolved.
[0021] In another embodiment of the present invention, there is provided a MPLS VPN architecture 100 of Figure 1 with a scenario that the gateway routers GWl 106, GW2 114 and GW3 122 are unable to support conditional advertisement. This solution is depicted in Figure 2. In this case, for example, GW3 122 continues to advertise its loopback address PCT Patent Application Attorney Docket No. : 18891-13
even though it is unable to reach the destination network w.x.y.z. In this case, PE5 126 learns the route to GW2 114 through loopback, but does not have a route for the network w.x.y.z from GW2 114. It does however have a route to the network w.x.y.z from GWl 106 and GW3 122. In this example as shown in Figure 2, it is assumed that GWl 106 is preferred by MPiBGP for reaching the destination network w.x.y.z. Thus, traffic from the CE2 112 is forwarded to PE2 110 as usual, which then forwards traffic to PE5 126 based on the static recursive route VRF2 116 in the PE2 110. This route has not been withdrawn since PE2 110 can resolve the GW3 122 loopback address.
[0022] Once the traffic is received at PE5 126, the vrf routing table will determine that the packets must be forwarded to PE3 118. The traffic re-enters the MPLS backbone and emerges at PE3 118. The vrf routing table in PE3 118 then forwards the traffic to GWl 106. This embodiment, while not differing from the case where conditional advertisements are supported on the Gateways CEs in terms of the configuration (as shown in Figure 1), does require the PE routers to have the ability to redirect traffic within the backbone 101. MPLS frames are de-encapsulated into IP packets, a route lookup is performed, the packets are re- encapsulated in MPLS frames and sent back into the SP network. This results in some additional feature complexity on the PE that performs this function, which is the PE5 126 in this example. There are also traffic engineering implications for backbone capacity management and latency issues to consider.
[0023] In a further embodiment of the present invention, as illustrated in Figure 3, there is provided a MPLS VPN architecture 100 of Figure 1 which considers a case scenario where a particular non-Gateway CE, for example CEl 104 or CE2 112 in the figure requires load- balancing to two gateways. One approach to solving this is by defining two static routes in the ingress PE. For example, to support CEl 104 load-balancing its traffic for the network PCT Patent Application Attorney Docket No. : 18891-13
w.x.y.z via both GWl 106 and GW2 114, the VRFl 108 routing table on the PEl 102 would have the following entries:
Jp route VRF 1-108 {w.x.y.z} next-hop GWl •Ip route VRFl 108 {w.x.y.z} next-hop GW2
[0024] Depending on additional (standard) underlying forwarding mechanisms this would result in per-flow or per-packet load-balancing to the two gateways. Since there are two equal cost routes to destination w.x.y.z, traffic will load-balance over the two routes/paths. [0025] One variation to this situation occurs when there are multiple customer CEs homed to a PE router, and load-balancing is required for a specific CE only. The solution is to run two PVCs, PVCl 128 and PVC2 130 from the CEl 104 requiring load-balancing, one each terminating on Pes, i.e. PEl 102 and PE2 110 that provide the required routing. PVC is a permanent virtual circuit. The idea here is to connect a CE to two PEs using a single physical link. By defining two PVCs on the physical link and terminating them on the two PEs respectively, two logical connections are created that provides the required connectivity. Figure 3 as shown also depicts this variation. PVCs 128 andl30 from CEl 104 to PEl 102 and PE2 110 ensure that traffic from CE to network w.x.y.z is load-balanced via GWl 106 and GW2 114. Traffic for the same destination originating in CE3 120 is forwarded via GWl 106 only.
[0026] An additional variation requires the definition of a 2n vrf to support load- balancing on the local PE. This removes the need to run a PVC to a non-local PE. Routes can be exported to this second vrf to ensure that its table contains the w.x.y.z route via GW3. This approach is more complex from a SP configuration and support perspective, but can be implemented if issues such as backbone capacity or latency become overriding issues. The PE router has many VRFs, each one helping define a VPN. And VPN is created in this PCT Patent Application Attorney Docket No. : 18891-13
approach with its own set of recursive static routes. By connecting the CE to the original VRF and this 2nd one, and by load-balancing between the two, the CE can now load-balance between two gateways over the MPLS backbone.
[0027] Although various embodiments that incorporate the teachings of the present invention have been shown and described in detail herein, those skilled in the art can readily devise many other varied embodiments that still incorporate these teachings without departing from the spirit and the scope of the invention.

Claims

PCT Patent Application Attorney Docket No. : 18891-13CLAIMS;
1. A method for forwarding traffic data in MPLS VPNs within a telecommunications network, the method comprising the steps of: receiving traffic data from at least one CE router; checking at least one VPN routing table to select at least one gateway within a MPLS backbone for at least one VPN destination, wherein said table comprises at least one gateway specified by the CE router and a logic provided with said specified gateway; configuring a recursive static route in at least one PE router in the MPLS backbone, wherein said recursive static route comprise at least one path to the gateway specified by the CE router; and directing the traffic data to the VPN destination via said path to the gateway specified by the CE router, said traffic directed by the at least one PE router.
2. The method of claim 1 wherein said table comprises at least one gateway not specified by the CE router and the logic with said gateway, wherein said logic comprises of load-balancing, latency, routing symmetry, admin-distance.
3. The method of claim 2 wherein said recursive static route comprises multiple paths dependent on each other.
4. The method of claim 3 further comprising searching the recursive static route according to address of the VPN destination.
5. The method of claim 4 further comprising choosing said path according to an address of a next hop in the recursive static route to direct the traffic data to one of the PE routers, wherein one of the PE routers correspond to the address in the next hop.
6. The method of claim 3 wherein said recursive static route is a floating recursive static route when more than two gateways exist to direct the traffic data to the VPN destination, PCT Patent Application Attorney Docket No. : 18891-13
wherein the floating recursive static route comprises an order of processing of said multiple paths dependent on each other.
7. The method of claim 5 further comprising: withdrawing the recursive static route in one of the PE router upon non- function of the gateway specified by the CE router.
8. The method of claim 7 further comprising: directing the traffic data to the VPN destination via a gateway other than the gateway specified by the CE router.
9. The method of claim 7 further comprising: rerouting the traffic data from one of the PE routers to other of the PE routers upon non- function of the selected gateway.
10. A multiprotocol label switching virtual private network (MLPS VPN) comprising: customer edge (CE) routers and gateway routers in a subscriber's virtual private network (VPN); a MPLS backbone network having provider edge (PE) routers connected to the CE routers and the gateway routers; wherein each of the PE routers includes circuitry for:
(i) receiving traffic data from the CE router;
(ii) checking at least one VPN routing table to select at least one of the gateway routes within the MPLS backbone for at least one VPN destination, said table comprises at least one of the gateway router specified by the CE router and a logic provided with said specified gateway;
(iii) configuring a recursive static route to include at least one path to the gateway router specified by the CE router; and
(iv) directing traffic data to a VPN destination via said path to the gateway router specified by the CE router.
PCT/US2007/077830 2006-09-28 2007-09-07 System and method for forwarding traffic data in an mpls vpn WO2008042553A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/541,032 US20080080517A1 (en) 2006-09-28 2006-09-28 System and method for forwarding traffic data in an MPLS VPN
US11/541,032 2006-09-28

Publications (2)

Publication Number Publication Date
WO2008042553A2 true WO2008042553A2 (en) 2008-04-10
WO2008042553A3 WO2008042553A3 (en) 2008-06-05

Family

ID=39271488

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/077830 WO2008042553A2 (en) 2006-09-28 2007-09-07 System and method for forwarding traffic data in an mpls vpn

Country Status (2)

Country Link
US (1) US20080080517A1 (en)
WO (1) WO2008042553A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136950A (en) * 2011-03-29 2011-07-27 华为技术有限公司 Automatic configuration method of static tunnels and network management system

Families Citing this family (126)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9253274B2 (en) * 2007-01-19 2016-02-02 Cisco Technology, Inc. Service insertion architecture
US8526325B2 (en) * 2007-01-31 2013-09-03 Hewlett-Packard Development Company, L.P. Detecting and identifying connectivity in a network
US8675656B2 (en) * 2007-02-20 2014-03-18 Cisco Technology, Inc. Scaling virtual private networks using service insertion architecture
US8429400B2 (en) * 2007-06-21 2013-04-23 Cisco Technology, Inc. VPN processing via service insertion architecture
US20090092140A1 (en) * 2007-10-09 2009-04-09 Gibbons John F Method and apparatus for providing a hierarchical structure for routing
US8208403B2 (en) * 2007-12-26 2012-06-26 Verizon Patent And Licensing Inc. Defining an end-to-end path for a network service
US8121118B2 (en) 2008-10-31 2012-02-21 At&T Intellectual Property I, L.P. Methods and apparatus to dynamically control connectivity within virtual private networks
US8549616B2 (en) * 2008-10-31 2013-10-01 At&T Intellectual Property I, L.P. Methods and apparatus to dynamically control access from virtual private networks to network-based shared resources
KR101006962B1 (en) 2008-11-28 2011-01-12 한국과학기술정보연구원 System for allotting a dynamic private network path in a logical network and the method thereof
US8442043B2 (en) * 2008-12-29 2013-05-14 Cisco Technology, Inc. Service selection mechanism in service insertion architecture data plane
US8665886B2 (en) 2009-03-26 2014-03-04 Brocade Communications Systems, Inc. Redundant host connection in a routed network
US20100254385A1 (en) * 2009-04-07 2010-10-07 Cisco Technology, Inc. Service Insertion Architecture (SIA) in a Virtual Private Network (VPN) Aware Network
US8650618B2 (en) * 2009-07-22 2014-02-11 Cisco Technology, Inc. Integrating service insertion architecture and virtual private network
JP5338555B2 (en) * 2009-08-11 2013-11-13 富士通株式会社 Load distribution apparatus, load distribution method, and load distribution program
US8705513B2 (en) * 2009-12-15 2014-04-22 At&T Intellectual Property I, L.P. Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks
US8625616B2 (en) 2010-05-11 2014-01-07 Brocade Communications Systems, Inc. Converged network extension
US8867552B2 (en) * 2010-05-03 2014-10-21 Brocade Communications Systems, Inc. Virtual cluster switching
US9716672B2 (en) 2010-05-28 2017-07-25 Brocade Communications Systems, Inc. Distributed configuration management for virtual cluster switching
US9461840B2 (en) * 2010-06-02 2016-10-04 Brocade Communications Systems, Inc. Port profile management for virtual cluster switching
US9001824B2 (en) 2010-05-18 2015-04-07 Brocade Communication Systems, Inc. Fabric formation for virtual cluster switching
US9769016B2 (en) 2010-06-07 2017-09-19 Brocade Communications Systems, Inc. Advanced link tracking for virtual cluster switching
US8989186B2 (en) 2010-06-08 2015-03-24 Brocade Communication Systems, Inc. Virtual port grouping for virtual cluster switching
US9270486B2 (en) 2010-06-07 2016-02-23 Brocade Communications Systems, Inc. Name services for virtual cluster switching
US9231890B2 (en) * 2010-06-08 2016-01-05 Brocade Communications Systems, Inc. Traffic management for virtual cluster switching
US8634308B2 (en) 2010-06-02 2014-01-21 Brocade Communications Systems, Inc. Path detection in trill networks
US8885488B2 (en) 2010-06-02 2014-11-11 Brocade Communication Systems, Inc. Reachability detection in trill networks
US9608833B2 (en) 2010-06-08 2017-03-28 Brocade Communications Systems, Inc. Supporting multiple multicast trees in trill networks
US8446914B2 (en) 2010-06-08 2013-05-21 Brocade Communications Systems, Inc. Method and system for link aggregation across multiple switches
US9806906B2 (en) 2010-06-08 2017-10-31 Brocade Communications Systems, Inc. Flooding packets on a per-virtual-network basis
US9246703B2 (en) 2010-06-08 2016-01-26 Brocade Communications Systems, Inc. Remote port mirroring
US9628293B2 (en) 2010-06-08 2017-04-18 Brocade Communications Systems, Inc. Network layer multicasting in trill networks
US9807031B2 (en) 2010-07-16 2017-10-31 Brocade Communications Systems, Inc. System and method for network configuration
US8473557B2 (en) 2010-08-24 2013-06-25 At&T Intellectual Property I, L.P. Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network
US9270572B2 (en) 2011-05-02 2016-02-23 Brocade Communications Systems Inc. Layer-3 support in TRILL networks
US8743885B2 (en) 2011-05-03 2014-06-03 Cisco Technology, Inc. Mobile service routing in a network environment
US9432258B2 (en) 2011-06-06 2016-08-30 At&T Intellectual Property I, L.P. Methods and apparatus to configure virtual private mobile networks to reduce latency
US9386035B2 (en) 2011-06-21 2016-07-05 At&T Intellectual Property I, L.P. Methods and apparatus to configure virtual private mobile networks for security
US8879549B2 (en) 2011-06-28 2014-11-04 Brocade Communications Systems, Inc. Clearing forwarding entries dynamically and ensuring consistency of tables across ethernet fabric switch
US8948056B2 (en) 2011-06-28 2015-02-03 Brocade Communication Systems, Inc. Spanning-tree based loop detection for an ethernet fabric switch
US9401861B2 (en) 2011-06-28 2016-07-26 Brocade Communications Systems, Inc. Scalable MAC address distribution in an Ethernet fabric switch
US9407533B2 (en) 2011-06-28 2016-08-02 Brocade Communications Systems, Inc. Multicast in a trill network
US9007958B2 (en) 2011-06-29 2015-04-14 Brocade Communication Systems, Inc. External loop detection for an ethernet fabric switch
US8885641B2 (en) 2011-06-30 2014-11-11 Brocade Communication Systems, Inc. Efficient trill forwarding
US9736085B2 (en) 2011-08-29 2017-08-15 Brocade Communications Systems, Inc. End-to end lossless Ethernet in Ethernet fabric
US10044678B2 (en) 2011-08-31 2018-08-07 At&T Intellectual Property I, L.P. Methods and apparatus to configure virtual private mobile networks with virtual private networks
US9699117B2 (en) 2011-11-08 2017-07-04 Brocade Communications Systems, Inc. Integrated fibre channel support in an ethernet fabric switch
US9450870B2 (en) 2011-11-10 2016-09-20 Brocade Communications Systems, Inc. System and method for flow management in software-defined networks
US8995272B2 (en) 2012-01-26 2015-03-31 Brocade Communication Systems, Inc. Link aggregation in software-defined networks
CN102571606A (en) * 2012-02-24 2012-07-11 中兴通讯股份有限公司 Private network data forwarding method, device and system for layer-3 virtual private network
US9742693B2 (en) 2012-02-27 2017-08-22 Brocade Communications Systems, Inc. Dynamic service insertion in a fabric switch
US9154416B2 (en) 2012-03-22 2015-10-06 Brocade Communications Systems, Inc. Overlay tunnel in a fabric switch
US9374301B2 (en) 2012-05-18 2016-06-21 Brocade Communications Systems, Inc. Network feedback in software-defined networks
US10277464B2 (en) 2012-05-22 2019-04-30 Arris Enterprises Llc Client auto-configuration in a multi-switch link aggregation
CN104272668B (en) 2012-05-23 2018-05-22 博科通讯系统有限公司 Layer 3 covers gateway
US9602430B2 (en) 2012-08-21 2017-03-21 Brocade Communications Systems, Inc. Global VLANs for fabric switches
US9401872B2 (en) 2012-11-16 2016-07-26 Brocade Communications Systems, Inc. Virtual link aggregations across multiple fabric switches
US9548926B2 (en) 2013-01-11 2017-01-17 Brocade Communications Systems, Inc. Multicast traffic load balancing over virtual link aggregation
US9350680B2 (en) 2013-01-11 2016-05-24 Brocade Communications Systems, Inc. Protection switching over a virtual link aggregation
US9413691B2 (en) 2013-01-11 2016-08-09 Brocade Communications Systems, Inc. MAC address synchronization in a fabric switch
US9565113B2 (en) 2013-01-15 2017-02-07 Brocade Communications Systems, Inc. Adaptive link aggregation and virtual link aggregation
US9565099B2 (en) 2013-03-01 2017-02-07 Brocade Communications Systems, Inc. Spanning tree in fabric switches
US9515872B2 (en) * 2013-03-12 2016-12-06 Dell Products L.P. Systems and methods for tunnel-free fast rerouting in internet protocol networks
US9401818B2 (en) 2013-03-15 2016-07-26 Brocade Communications Systems, Inc. Scalable gateways for a fabric switch
US9130872B2 (en) 2013-03-15 2015-09-08 Cisco Technology, Inc. Workload based service chain insertion in a network environment
US9794379B2 (en) 2013-04-26 2017-10-17 Cisco Technology, Inc. High-efficiency service chaining with agentless service nodes
US9699001B2 (en) 2013-06-10 2017-07-04 Brocade Communications Systems, Inc. Scalable and segregated network virtualization
US9565028B2 (en) 2013-06-10 2017-02-07 Brocade Communications Systems, Inc. Ingress switch multicast distribution in a fabric switch
US10110684B1 (en) 2013-08-15 2018-10-23 Avi Networks Transparent network service migration across service devices
US9843520B1 (en) * 2013-08-15 2017-12-12 Avi Networks Transparent network-services elastic scale-out
US9806949B2 (en) 2013-09-06 2017-10-31 Brocade Communications Systems, Inc. Transparent interconnection of Ethernet fabric switches
US9912612B2 (en) 2013-10-28 2018-03-06 Brocade Communications Systems LLC Extended ethernet fabric switches
US9548873B2 (en) 2014-02-10 2017-01-17 Brocade Communications Systems, Inc. Virtual extensible LAN tunnel keepalives
US10581758B2 (en) 2014-03-19 2020-03-03 Avago Technologies International Sales Pte. Limited Distributed hot standby links for vLAG
US10476698B2 (en) 2014-03-20 2019-11-12 Avago Technologies International Sales Pte. Limited Redundent virtual link aggregation group
US10063473B2 (en) 2014-04-30 2018-08-28 Brocade Communications Systems LLC Method and system for facilitating switch virtualization in a network of interconnected switches
US9800471B2 (en) 2014-05-13 2017-10-24 Brocade Communications Systems, Inc. Network extension groups of global VLANs in a fabric switch
US9379931B2 (en) 2014-05-16 2016-06-28 Cisco Technology, Inc. System and method for transporting information to services in a network environment
US9479443B2 (en) 2014-05-16 2016-10-25 Cisco Technology, Inc. System and method for transporting information to services in a network environment
US10616108B2 (en) 2014-07-29 2020-04-07 Avago Technologies International Sales Pte. Limited Scalable MAC address virtualization
US9544219B2 (en) 2014-07-31 2017-01-10 Brocade Communications Systems, Inc. Global VLAN services
US9807007B2 (en) 2014-08-11 2017-10-31 Brocade Communications Systems, Inc. Progressive MAC address learning
US9524173B2 (en) 2014-10-09 2016-12-20 Brocade Communications Systems, Inc. Fast reboot for a switch
US9699029B2 (en) 2014-10-10 2017-07-04 Brocade Communications Systems, Inc. Distributed configuration management in a switch group
US10417025B2 (en) 2014-11-18 2019-09-17 Cisco Technology, Inc. System and method to chain distributed applications in a network environment
US9660909B2 (en) 2014-12-11 2017-05-23 Cisco Technology, Inc. Network service header metadata for load balancing
USRE48131E1 (en) 2014-12-11 2020-07-28 Cisco Technology, Inc. Metadata augmentation in a service function chain
US9628407B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Multiple software versions in a switch group
US9626255B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Online restoration of a switch snapshot
US9942097B2 (en) 2015-01-05 2018-04-10 Brocade Communications Systems LLC Power management in a network of interconnected switches
US10003552B2 (en) 2015-01-05 2018-06-19 Brocade Communications Systems, Llc. Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches
US10078534B2 (en) * 2015-01-23 2018-09-18 Cisco Technology, Inc. Network-aware workload placement in a data center
US9807005B2 (en) 2015-03-17 2017-10-31 Brocade Communications Systems, Inc. Multi-fabric manager
US10038592B2 (en) 2015-03-17 2018-07-31 Brocade Communications Systems LLC Identifier assignment to a new switch in a switch group
US11283697B1 (en) 2015-03-24 2022-03-22 Vmware, Inc. Scalable real time metrics management
US10579406B2 (en) 2015-04-08 2020-03-03 Avago Technologies International Sales Pte. Limited Dynamic orchestration of overlay tunnels
US9762402B2 (en) 2015-05-20 2017-09-12 Cisco Technology, Inc. System and method to facilitate the assignment of service functions for service chains in a network environment
US10439929B2 (en) 2015-07-31 2019-10-08 Avago Technologies International Sales Pte. Limited Graceful recovery of a multicast-enabled switch
US10171303B2 (en) 2015-09-16 2019-01-01 Avago Technologies International Sales Pte. Limited IP-based interconnection of switches with a logical chassis
US9912614B2 (en) 2015-12-07 2018-03-06 Brocade Communications Systems LLC Interconnection of switches based on hierarchical overlay tunneling
US11044203B2 (en) 2016-01-19 2021-06-22 Cisco Technology, Inc. System and method for hosting mobile packet core and value-added services using a software defined network and service chains
CN112787935B (en) * 2016-02-01 2022-12-06 华为技术有限公司 VPN route notification method, data flow forwarding method and related equipment
US10187306B2 (en) 2016-03-24 2019-01-22 Cisco Technology, Inc. System and method for improved service chaining
US10931793B2 (en) 2016-04-26 2021-02-23 Cisco Technology, Inc. System and method for automated rendering of service chaining
US10419550B2 (en) 2016-07-06 2019-09-17 Cisco Technology, Inc. Automatic service function validation in a virtual network environment
US10320664B2 (en) 2016-07-21 2019-06-11 Cisco Technology, Inc. Cloud overlay for operations administration and management
US10218616B2 (en) 2016-07-21 2019-02-26 Cisco Technology, Inc. Link selection for communication with a service function cluster
US10225270B2 (en) 2016-08-02 2019-03-05 Cisco Technology, Inc. Steering of cloned traffic in a service function chain
US10218593B2 (en) 2016-08-23 2019-02-26 Cisco Technology, Inc. Identifying sources of packet drops in a service function chain environment
US10361969B2 (en) 2016-08-30 2019-07-23 Cisco Technology, Inc. System and method for managing chained services in a network environment
US10237090B2 (en) 2016-10-28 2019-03-19 Avago Technologies International Sales Pte. Limited Rule-based network identifier mapping
US10225187B2 (en) 2017-03-22 2019-03-05 Cisco Technology, Inc. System and method for providing a bit indexed service chain
US10884807B2 (en) 2017-04-12 2021-01-05 Cisco Technology, Inc. Serverless computing and task scheduling
US10257033B2 (en) 2017-04-12 2019-04-09 Cisco Technology, Inc. Virtualized network functions and service chaining in serverless computing infrastructure
US10333855B2 (en) 2017-04-19 2019-06-25 Cisco Technology, Inc. Latency reduction in service function paths
US10554689B2 (en) 2017-04-28 2020-02-04 Cisco Technology, Inc. Secure communication session resumption in a service function chain
US10735275B2 (en) 2017-06-16 2020-08-04 Cisco Technology, Inc. Releasing and retaining resources for use in a NFV environment
US10798187B2 (en) 2017-06-19 2020-10-06 Cisco Technology, Inc. Secure service chaining
US10397271B2 (en) 2017-07-11 2019-08-27 Cisco Technology, Inc. Distributed denial of service mitigation for web conferencing
US10673698B2 (en) 2017-07-21 2020-06-02 Cisco Technology, Inc. Service function chain optimization using live testing
US11063856B2 (en) 2017-08-24 2021-07-13 Cisco Technology, Inc. Virtual network function monitoring in a network function virtualization deployment
US10791065B2 (en) 2017-09-19 2020-09-29 Cisco Technology, Inc. Systems and methods for providing container attributes as part of OAM techniques
US11018981B2 (en) 2017-10-13 2021-05-25 Cisco Technology, Inc. System and method for replication container performance and policy validation using real time network traffic
US10541893B2 (en) 2017-10-25 2020-01-21 Cisco Technology, Inc. System and method for obtaining micro-service telemetry data
US10666612B2 (en) 2018-06-06 2020-05-26 Cisco Technology, Inc. Service chains for inter-cloud traffic
US11398973B2 (en) * 2018-09-26 2022-07-26 Hewlett Packard Enterprise Development Lp Route selection using cumulative cost
CN114039863B (en) * 2021-10-19 2022-06-28 广州鲁邦通物联网科技股份有限公司 Remote control multi-router VPN automatic networking method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030137971A1 (en) * 2002-01-22 2003-07-24 Mark Gibson Telecommunications system and method
US6970464B2 (en) * 2003-04-01 2005-11-29 Cisco Technology, Inc. Method for recursive BGP route updates in MPLS networks
US20060092935A1 (en) * 2004-11-01 2006-05-04 Lucent Technologies Inc. Softrouter feature server

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6339595B1 (en) * 1997-12-23 2002-01-15 Cisco Technology, Inc. Peer-model support for virtual private networks with potentially overlapping addresses
US6079020A (en) * 1998-01-27 2000-06-20 Vpnet Technologies, Inc. Method and apparatus for managing a virtual private network
CN1183726C (en) * 2002-08-05 2005-01-05 华为技术有限公司 Network organizing method based on multi protocol label exchange virtual private network
US20050065411A1 (en) * 2003-09-15 2005-03-24 Baldwin Blair F. Tongue depressing device
US7535828B2 (en) * 2005-03-18 2009-05-19 Cisco Technology, Inc. Algorithm for backup PE selection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030137971A1 (en) * 2002-01-22 2003-07-24 Mark Gibson Telecommunications system and method
US6970464B2 (en) * 2003-04-01 2005-11-29 Cisco Technology, Inc. Method for recursive BGP route updates in MPLS networks
US20060092935A1 (en) * 2004-11-01 2006-05-04 Lucent Technologies Inc. Softrouter feature server

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136950A (en) * 2011-03-29 2011-07-27 华为技术有限公司 Automatic configuration method of static tunnels and network management system

Also Published As

Publication number Publication date
WO2008042553A3 (en) 2008-06-05
US20080080517A1 (en) 2008-04-03

Similar Documents

Publication Publication Date Title
US20080080517A1 (en) System and method for forwarding traffic data in an MPLS VPN
US10454821B2 (en) Creating and maintaining segment routed traffic engineering policies via border gateway protocol
US11716280B2 (en) Interoperability between symmetric and asymmetric EVPN IRB modes
US10237163B2 (en) Static route advertisement
CN107040463B (en) System for avoiding traffic flooding due to asymmetric MAC learning
US7139278B2 (en) Routing traffic in a communications network
US7733876B2 (en) Inter-autonomous-system virtual private network with autodiscovery and connection signaling
JP5579853B2 (en) Method and system for realizing virtual private network
US7283529B2 (en) Method and system for supporting a dedicated label switched path for a virtual private network over a label switched communication network
US7864669B2 (en) Method of constructing a backup path in an autonomous system
JP5237391B2 (en) VPN implementation over a link state protocol controlled Ethernet network
US8955100B2 (en) Routing device having integrated MPLS-aware firewall
US7408941B2 (en) Method for auto-routing of multi-hop pseudowires
CN112840625A (en) First hop gateway redundancy in a network computing environment
EP1753175B1 (en) A method for implementing virtual private network
US9621378B2 (en) Methods and routers for connectivity setup between provider edge routers
CN110830352A (en) Method and device for realizing VPN cross-domain and boundary node
US9100213B1 (en) Synchronizing VPLS gateway MAC addresses
US20070091796A1 (en) Method of implementing a backup path in an autonomous system
US20070091793A1 (en) Method and apparatus for managing forwarding of data in an autonomous system
US20100061227A1 (en) Method to reduce routing convergence at the edge
US20070258447A1 (en) Inter-area summarization of edge-device addresses using RFC3107
EP2087419B1 (en) Supporting bgp based ip-vpn in a routed network
US11516112B2 (en) Optimized layer 3 VPN control plane using segment routing
US20180309594A1 (en) Systems and Methods for Creating an Integrated Layer 2-Layer 3 Hybrid VPN Network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07853530

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07853530

Country of ref document: EP

Kind code of ref document: A2