Re: [IPsec] One comment to this draft//Fwd: I-D Action: draft-ietf-ipsecme-ad-vpn-problem-06.txt

Vishwas Manral <vishwas.ietf@gmail.com> Mon, 03 June 2013 15:45 UTC

Return-Path: <vishwas.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42A2311E80DE for <ipsec@ietfa.amsl.com>; Mon, 3 Jun 2013 08:45:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wxq6LoV1uSRJ for <ipsec@ietfa.amsl.com>; Mon, 3 Jun 2013 08:45:11 -0700 (PDT)
Received: from mail-ie0-x22f.google.com (mail-ie0-x22f.google.com [IPv6:2607:f8b0:4001:c03::22f]) by ietfa.amsl.com (Postfix) with ESMTP id D7D0911E80D5 for <ipsec@ietf.org>; Mon, 3 Jun 2013 08:45:10 -0700 (PDT)
Received: by mail-ie0-f175.google.com with SMTP id tp5so10547247ieb.6 for <ipsec@ietf.org>; Mon, 03 Jun 2013 08:45:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=6wHuJnpX2MYVnH2PasTMRx/rd0qnys/+Tnheq3X2OP0=; b=QxdUDXrt5rmP1qtDVz9ymY0fRDuPRuN3QXkchC4S4kzrRTsFd/UnX2pKkuIp4x94Q/ PF/SfEN8uL98LDv8Wi74s0SuYG2STq4VvM/Kh93XRWcLEcZpQ0k8emADyoEMp4wilosD /RQjauinzcGIN0yurEIGip9wpdBP9dszZVugu2HBthxwm//HFVsvkE/QiF9x6Jv3VsnE ZFXeW5L0YuUMPGj3GoCx17Prz5ZINyR1FVpkwFg2x3NfKhOEwZpvCeWhRrTyu6wNjdDH Xx1D2w9pbQKCD1iJQS1ze17Z8joHJeWUSi3cF5ziABAOuneVFDgT36kLNLOEQSfh2bcC REOw==
MIME-Version: 1.0
X-Received: by 10.42.250.202 with SMTP id mp10mr10721216icb.21.1370274310435; Mon, 03 Jun 2013 08:45:10 -0700 (PDT)
Received: by 10.50.56.107 with HTTP; Mon, 3 Jun 2013 08:45:10 -0700 (PDT)
In-Reply-To: <CDAD2848.18B87F%praveenys@juniper.net>
References: <CAPPa=k=JK7GLquP+-kRG=v5jE=MD8YJJunM2DFfWxgwCmsRhZg@mail.gmail.com> <CDAD2848.18B87F%praveenys@juniper.net>
Date: Mon, 03 Jun 2013 08:45:10 -0700
Message-ID: <CAOyVPHSfsSp=Hp4Kj=LhcY4eSkTQWu6j4h4r9OkTbha8ko5OZA@mail.gmail.com>
From: Vishwas Manral <vishwas.ietf@gmail.com>
To: Praveen Sathyanarayan <praveenys@juniper.net>
Content-Type: multipart/alternative; boundary="20cf3010e6c984ced404de41d97d"
Cc: IPsecme WG <ipsec@ietf.org>, "maoyu@h3c.com" <maoyu@h3c.com>, Yoav Nir <ynir@checkpoint.com>, Paul Hoffman <paul.hoffman@vpnc.org>, Toby Mao <yumao9@gmail.com>
Subject: Re: [IPsec] One comment to this draft//Fwd: I-D Action: draft-ietf-ipsecme-ad-vpn-problem-06.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jun 2013 15:45:12 -0000

Hi Praveen,

I think the idea is to be able to have QoS in a way that the traffic from
one spoke cannot overwhelm the Hub and lead to issues there. We need to
maintain QoS policies per spoke (or spoke type) on the Hub, as well as to
be able to push some QoS policies to the spokes from the Hub.

Do I make sense?

Thanks,
Vishwas


On Mon, May 6, 2013 at 9:30 AM, Praveen Sathyanarayan <praveenys@juniper.net
> wrote:

>  Hi Toby,
>
>  When you say QoS policy, could you elaborate what it really means? I
> mean what kind of information does it need to have or exchanged?
>
>  -- Praveen
>
>   From: Toby Mao <yumao9@gmail.com>
> Date: Sunday, May 5, 2013 8:49 AM
> To: Yoav Nir <ynir@checkpoint.com>
> Cc: IPsecme WG <ipsec@ietf.org>, "maoyu@h3c.com" <maoyu@h3c.com>, Paul
> Hoffman <paul.hoffman@vpnc.org>
> Subject: Re: [IPsec] One comment to this draft//Fwd: I-D Action:
> draft-ietf-ipsecme-ad-vpn-problem-06.txt
>
>   Hi Yoav.
>
>          The QoS implementations in ADVPN are :
>
> 1.        In the star topology,  the QoS policy is implemented
> individually for each spoke in the hub, all the traffic through the Hub can
> be regulated by QoS policy in the hub.
>
> 2.       In the full mesh topology,  when the two spokes establish the
> direct connection, each spoke should also have the QoS policy for each
> other. The QoS policy can be obtained from the Hub, or other control device
> ,  which has the individual QoS policy for each spoke.
>
> I think your understanding is the same as the QoS implementation in the
> full mesh topology.
>
> Toby
>
>
> On Fri, May 3, 2013 at 4:11 AM, Yoav Nir <ynir@checkpoint.com> wrote:
>
>> Hi Toby.
>>
>>  Let's see if I understand the issue. I'll describe this with an
>> example. Please let me know if I got it.
>>
>>  Suppose we have satellite gateways A, B, C, D, and E. A through D each
>> have a bandwidth of 10 Mb/s, while E has 20 Mb/s.
>>
>>  The center gateway, Z, has plenty of bandwidth and the appropriate QoS
>> policy. So if A, B, and C are simultaneously sending traffic to E through
>> Z, Z will do the QoS magic (maybe by dropping packets or playing with TCP
>> ACKs) to make sure the QoS goals are met.
>>
>>  Now add ADVPN to the mix. A and E discover each other, and are able to
>> bypass Z. Initially A had no IPsec policy about E. There's no reason to
>> think it had a QoS policy about E, and the same is true in the other
>> direction. Unless the QoS policy from Z somehow gets transmitted to the
>> satellites, they may reach congestion and have the QoS targets miss.
>>
>>  So whereas before ADVPN the center gateway could be counted on to
>> handle the QoS (because everything goes through it), as soon as you add
>> ADVPN, that policy has to be enforced on the spokes, or not at all.
>>
>>  I'm not sure whether we can or should solve this issue as part of
>> AD-VPN, but I want to make sure that we understand the issue.
>>
>>  Yoav
>>
>>   On May 2, 2013, at 6:02 PM, Toby Mao <yumao9@gmail.com> wrote:
>>
>>
>>  On Sat, Apr 27, 2013 at 10:57 PM, Paul Hoffman <paul.hoffman@vpnc.org>wrote:
>>
>>> These requirements might be useful to add in the next draft, but they
>>> need to be refined.
>>>
>>> On Apr 26, 2013, at 8:10 PM, Toby Mao <yumao9@gmail.com> wrote:
>>>
>>> > The ADVPN solution SHOULD be able to implement Quality of Service
>>> (QoS) to regulate the traffic in the ADVPN topology.
>>>
>>>  Why is this statement needed? Do you see situations where an ADVPN
>>> solution would be *prevented* from implementing some sort of QoS because it
>>> was an ADVPN?
>>>
>>
>>   [Toby]: There is no situation that ADVPN solution could be prevented
>> from implementing Qos. Actually, Qos is crucial on ADVPN, such as sharing
>> network bandwidth, meeting the application latency requirement. Especially
>> in the Hub, for each spoke, the Qos policy should be implemented
>> individually , because different spoke has different link speed and data
>> processing capability. Thus, in the ADVPN solution, the small spoke can not
>> be overrun by hub by sending too much traffic, also the spoke which has
>> large bandwidth cannot hog the hub's resources and starve other spokes. In
>> addition, a unique Qos policy for each spoke in the hub could be cumbersome
>> for administrator, some improvement could be implemented, such as the
>> spokes with the same bandwidth can belong to the same group, the Qos policy
>> can be implemented on a basis of group.
>>
>>>
>>> > ADVPN peer SHOULD NOT send excessive traffic to the other members of
>>> ADVPN.
>>>
>>>  How would you define "excessive"? Where would that measurement be done?
>>
>>
>> [Toby]  The traffic to the ADVPN peer exceeding the actual peer bandwidth
>> can be defined as "excessive". To solve this problem, the other ADVPN peer
>> should apply Qos policy for this ADVPN peer.
>>
>>  > The traffic for each ADVPN peer CAN be measured individually for
>>> shaping and policing.
>>>
>>>  Why is this statement needed? Do you see situations where an ADVPN
>>> solution would be *prevented* from measuring individually?
>>
>>
>> [Toby]  The reason is explained in the first answer.
>>
>>>
>>> --Paul Hoffman
>>
>>
>>
>>
>>  Email secured by Check Point
>>
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
>>
>>
>>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>