[161326] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: internet routing table in a vrf

daemon@ATHENA.MIT.EDU (Matt Newsom)
Fri Mar 8 11:40:30 2013

From: Matt Newsom <matt.newsom@RACKSPACE.COM>
To: beavis daniels <beavis.daniels@gmail.com>, "nanog@nanog.org"
 <nanog@nanog.org>
Date: Fri, 8 Mar 2013 16:40:01 +0000
In-Reply-To: <CA+MOkACrH1LJekpne4dDsrw7d0T13Pnge5FviX8vVOcLS1u+fg@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Internet in a vrf is doable on most platforms and definitely adds a lot of =
flexibility.=20

1) control plane  (route reflectors )
          This is really dependent on your platform and whether you are doi=
ng multiple RD's or not. If you divide your transit into regions and filter=
 based upon RT you can tier your route-reflectors to get plenty 	of scalabi=
lity.

2) forward plane (recursive lookup issues)
          Most platforms program prefix's with associated labels slower so =
your base convergence will suffer. In addition if you want to run PIC you w=
ill likely be left with a bit of custom engineering to make it  	work. VPN'=
s hide the next hop behind the loopback of the PE so next hop failure aware=
ness of an edge tie will be lost. If you can stomach the double lookup you =
can run per-vrf labels (per prefix isn't feasible on most platforms) and we=
ight up your edge ties and force a bounce back to another PE, otherwise you=
 will be stuck with bgp control plane based convergence with per-ce labels.

3) Operational
       It's definitely harder to train operation people on how to look in a=
 vrf.

4) DDOS
       It's actually much easier to design a DDOS filtering system if every=
thing is in VRF's. If you create separate vrf's for transit and subscriptio=
n your can have extreme flexibility in DDOS filtering. The import export fl=
exibility allows for injection of /32 or /128's into your transit vrf and y=
ou can simply hang your DDOS mitigation seems between the transit and subsc=
ription VRF's.

5) BCP and RFC that would break  eg "BGP-SEC does not support in todays dra=
ft to check prefixs within the VPN"
       We haven't found any significant functionality we would want to use =
other than PIC that it would break, and there was a work around with that.

6) Vendor specifics
    You are probably ok with most vendors but a few still have issues with =
table carving, and a few don't support 6VPE.

           =20



-----Original Message-----
From: beavis daniels [mailto:beavis.daniels@gmail.com]=20
Sent: Thursday, March 07, 2013 2:23 PM
To: nanog@nanog.org
Subject: internet routing table in a vrf

hi

I would to enquire about the cons/pros of running a full internet routing t=
able in a vrf and the potential challenges of operating it in a VPN cross a=
 large network that does peering and provide transit.

I not a fan to support running it in a vrf.

I am looking for a list of operational and technical challenges

specifically around
1) control plane  (route reflectors )
2) forward plane (recursive lookup issues)
3) Operational
4) DDOS
5) BCP and RFC that would break  eg "BGP-SEC does not support in todays dra=
ft to check prefixs within the VPN"
6) Vendor specifics


home help back first fref pref prev next nref lref last post