|
|
This chapter provides the fundamental concepts and considerations, as well as our recommendations, for administering customer edge routers (CEs) in a service provider environment. Before VPNSC: MPLS Solution software can be appropriately deployed to deliver services to customers, the question of whether the CEs are to be managed by the service provider or not must be answered.
If the CEs are unmanaged, the provider can use IPv4 connectivity for all management traffic. VPNSC: MPLS Solution software is not employed for provisioning or managing unmanaged CEs.
Figure 7-1 shows a basic topology with unmanaged CEs. Note that the network management subnet has a direct link to the service provider MPLS core network.

Regarding unmanaged CEs, service providers should note the following considerations:
For information on how you define a CE as a managed CE, refer to the "Adding the Customer Edge Routers to a Site" section.
Regarding managed CEs, service providers should note the following considerations:
The following sections discuss the concepts and issues required for administering a managed CE environment.
The VPNSC: MPLS Solution network management subnet is required when the provider's service offering entails the management of CEs. Once a CE is in a VPN, it is no longer accessible by means of conventional IPv4 routing unless one of the techniques described in this chapter is employed.
Figure 7-2 shows the network management subnet and the devices that may be required to connect to it:

The core issues with regard to gaining access to VPNs are as follows:
The network management subnet is appropriateand necessaryonly if there is an intent to have managed CEs connected via an in-band connection. In-band indicates a single link or permanent virtual circuit (PVC) that carries both the customer's VPN traffic, as well as the provider's network management traffic.
You configure the MCE by identifying the CE as part of the management LAN in the VPNSC software. For details on how to define a CE as an MCE within VPNSC: MPLS Solution software, see the "Implementing the Management VPN Technique" section.
The MPE needs access to the following devices:
Device | Connectivity | Function |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
At the current time, VPNSC: MPLS Solution recommends three main network management subnet implementation techniques:
The network management subnet technique the provider chooses to implement depends on many factors, which are discussed later in this chapter.
The Management VPN technique is the default method provisioned by VPNSC: MPLS Solution. A key concept for this implementation technique is that all the CEs in the network are a member of the management VPN. To connect to the PEs and NetFlow Collector, the MPE-MCE link uses a parallel IPv4 link. Figure 7-3 shows a typical topology for the Management VPN technique.

When employing the Management VPN technique, the MPE-MCE link uses a management VPN to connect to managed CEs. To connect to the PEs and NetFlow Connector, the MPE-MCE link employs a parallel IPv4 link.
Each CE in a customer VPN is also added to the management VPN by selecting the Join the management VPN option in the service request wizard (see the "About Provisioning PE-CE Links in the Management VPN" section). The function of the management route map is to allow only the routes to the specific CE into the management VPN. The Cisco IOS supports only one export route map and one import route map per VRF (and therefore, per VPN).
As shown in Figure 7-3, a second parallel non-MPLS VPN link is required between the MPE and MCE to reach the PEs and the NetFlow Collector host.
For information on how to provision a Management VPN in VPNSC: MPLS Solution software, see the "Implementing the Management VPN Technique" section.
![]() |
Note Implementation of the Management VPN technique requires Cisco IOS 12.07 or higher. |
The advantages involved in implementing the Management VPN technique are as follows:
A key concept for this network management subnet technique is that the MPE-MCE pair are part of all the customer's VPNs. When you a add new VPN to the Extranet Multiple VPN, you must create a service request each time a VPN is defined to add that VPN to the MPE-MCE pair, and thus to the network management subnet. To connect to the PEs and NetFlow Connector, the MPE-MCE link uses a parallel IPv4 link. Figure 7-4 shows a typical topology for the Extranet Multiple VPN.

In the Extranet Multiple VPN (sometimes referred to as the rainbow VPN), several security and access list considerations exist, but these considerations are centralized at the MPE and MCE devices.
The MPE includes the BGP routes to all customer routes. This should constrained such that only the CE subnet routes are imported to the interior gateway protocol.
The advantages in implementing the Extranet Multiple VPN technique are as follows:
The Out-of-Band technique does not employ a management VPN to manage the CEs. Out-of-band connectivity is provided by IPv4 links. Out-of-band signifies a separate link between PEs that carries the provider's management traffic. As shown in Figure 7-5, the MCE provides separation between the provider's routes and the customer's routes.

The Out-of-Band technique has the advantage of being relatively simple to set up, and no management VPN is required. However, its disadvantages are that it is expensive since it requires an IPv4 connection to each CE. Also, due to the delicate staging requirements for this technique, the Out-of-Band implementation does have a high degree of complexity.
The CE access lists between IP pool addresses and the network management subnet hosts should also specify the required ports for access (using Telnet). It is important to limit the port numbers. Cisco IP Manager uses TFTP; VPNSC: MPLS Solution uses SNMP when it can (see the "Using TFTP to Transport Router Configuration Files" section). Those three ports are the only permissible ones. Access to the Orbix process running on either the Cisco IP Manager or VPNSC: MPLS Solution hosts should particularly be denied.
Cisco recommends the following access rules of type:
Apply these access rules outbound on the CE on its interface up to the PE so that only VPNSC: MPLS Solution and Cisco IP Manager can send packets, and then only to management addresses. Additional rules of type are as follows:
These rules should apply on the CE as an input list on its link from the PE. Thus, only responses are allowed ingeneral CEs cannot start a session to the management machinesand then only from legal IP addresses.
Given these rules of type, only the CE can send packets into the network management subnet, and even those must be in response to a network management subnet query. Spoofing could be an issue, but for that Cisco recommends anti-spoofing access lists as part of the basic configuration of CEs at customer sitesdeny all packets coming from within a site marked with a management address.) The CEs do not need the CE-PE link when returning management packets.
Build the local entries in the VRF like this:
IP route VRF ManagementVPNSC_host/32 CE_address IP route VRF ManagementCIPM_host/32 CE_address
The term "VRF Management" is for illustration purposes only; VPNSC: MPLS Solution builds all this and picks a name for the VRF.
To prevent injections of inappropriate routes, it is helpful to add this command:
IP route VRF Management 0.0.0.0/0 Null0
That is all you want to put in the local VRF table. From there, it dynamically learns all the routes to the other CEs.
However, you cannot prevent it also knowing a directly connected route for the link between this PE and the Management CE. You must protect against customer attempts to gain access to the Management CE. The access lists described above control only transit traffic across that CE.
Therefore, Cisco recommends that the PE have an access list applied outbound on the link to the CE in the following form:
permit packets to {VPNSC Host, CIPM Host}
deny everything else
This is simple and it prevents customers from gaining access to the Management CE.
Cisco recommends the following:
1. In the PE configuration file, enter the following commands:
ip route vrf managementVPNSC_hostip/32 <mce ip route vrf managementCIPM_hostip/32 <mce
ip route vrf management 0.0.0.0/0 Null0
2. Whenever possible, use statics on the Management CE toouse a static or set of statics covering legal management addresses, as discussed above.
permit {VPNSC host, CIPM host} to <pooldeny all
permit <pool to {VPNSC host, CIPM host} with tcp-establisheddeny all
4. To protect the Management CE, create an output access list on the PE's link B interface:
permit to {VPNSC host, CIPM host}deny all
5. If desired, also place an access list to protect the IPv4 link, depending on the service provider's own access needs to the network management subnet.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Wed Sep 20 15:02:00 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.