Re: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6 WGLC

Owen DeLong <owen@delong.com> Mon, 12 August 2013 17:25 UTC

Return-Path: <owen@delong.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A3BEC21F9BCA for <v6ops@ietfa.amsl.com>; Mon, 12 Aug 2013 10:25:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.525
X-Spam-Level:
X-Spam-Status: No, score=-2.525 tagged_above=-999 required=5 tests=[AWL=0.075, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ekk+bl22AKyr for <v6ops@ietfa.amsl.com>; Mon, 12 Aug 2013 10:25:49 -0700 (PDT)
Received: from owen.delong.com (owen.delong.com [IPv6:2620:0:930::200:2]) by ietfa.amsl.com (Postfix) with ESMTP id 1D5E121F8616 for <v6ops@ietf.org>; Mon, 12 Aug 2013 10:22:15 -0700 (PDT)
Received: from [IPv6:2620::930:0:ca2a:14ff:fe3e:d024] ([IPv6:2620:0:930:0:ca2a:14ff:fe3e:d024]) (authenticated bits=0) by owen.delong.com (8.14.2/8.14.1) with ESMTP id r7CHGfmN012709 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Mon, 12 Aug 2013 10:16:41 -0700
X-DKIM: Sendmail DKIM Filter v2.8.3 owen.delong.com r7CHGfmN012709
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=delong.com; s=mail; t=1376327801; bh=f+KT3F2yil1wT7j3EH+MSk9cQYw=; h=Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc: Message-Id:References:To; b=Vlb5/JBCyF9c1OfEOw4+0uGg++IJJ5Cpq9W+eyokL+ceFuhMBVsVNvO7y+fFWkFYx p7mQo2iTYh/e2xmvVIrmktAsBWxxl8Tf3in8mE2o/qujUKn/xvDI3Vnxhz1nAjTVBS 8s21LyV/+RRj1GYhG/xxnm8wrKe7B5FcXQP5xinc=
Content-Type: multipart/alternative; boundary="Apple-Mail=_B2122261-0D1B-4650-A7C8-5B87F2BAB021"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Owen DeLong <owen@delong.com>
In-Reply-To: <CA6D42D0F8A41948AEB3864480C554F104AEAABE@xmb-rcd-x10.cisco.com>
Date: Mon, 12 Aug 2013 10:16:43 -0700
Message-Id: <875AA51D-5AFF-4378-80F9-E3FF5FA0491A@delong.com>
References: <201308041800.r74I03pC023049@irp-view13.cisco.com> <3374_1375690984_51FF60E8_3374_427_1_983A1D8DA0DA5F4EB747BF34CBEE5CD15C5041E1E5@PUEXCB1C.nanterre.francetelecom.fr> <8C48B86A895913448548E6D15DA7553B96E2C5@xmb-rcd-x09.cisco.com> <CAKD1Yr13GK_cuvkt2LpJ1qJo2NR8eUnY-xfwMF_zWfe0P1mm9g@mail.gmail.com> <8C48B86A895913448548E6D15DA7553B96EAE7@xmb-rcd-x09.cisco.com> <CAKD1Yr2_d=4uD1W4WcQ82rupjVJ4UmmQAQmtSY+aQgTXmscNUw@mail.gmail.com> <97EB7536A2B2C549846804BBF3FD47E113128FA2@xmb-aln-x02.cisco.com> <CA6D42D0F8A41948AEB3864480C554F104AE7A3F@xmb-rcd-x10.cisco.com> <C00B4018-6FEE-441C-B807-B1126101CE6D@delong.com> <CA6D42D0F8A41948AEB3864480C554F104AEAABE@xmb-rcd-x10.cisco.com>
To: "Arie Vayner (avayner)" <avayner@cisco.com>
X-Mailer: Apple Mail (2.1508)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0rc1 (owen.delong.com [IPv6:2620:0:930::200:2]); Mon, 12 Aug 2013 10:16:41 -0700 (PDT)
Cc: "v6ops@ietf.org" <v6ops@ietf.org>
Subject: Re: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6 WGLC
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Aug 2013 17:25:51 -0000

Not necessarily. You are thinking of moving them physically closer. I'm suggesting moving them topologically closer.

Imagine that the WN links are not private, but instead are public. Each site doesn't necessarily have a firewall, but it does need a VPN device (good practice anyway, since you can't trust your WAN links to be truly private[1]). These VPN gateways would have some level of mesh (ideally matching the phsyical topology relatively closely) to link the internal networks at all the sites over the WAN links. At that point, the firewalls may be physically at any or all of the internet gateway locations, but may serve different subsets of users or may be partitioned into virtual firewalls that are connected to different subsets of the internal network that travel through different VPNs, etc.

There are many ways to virtualize and abstract topology in order to enable this without necessarily increasing or moving physical hardware.

Owen

On Aug 11, 2013, at 22:27 , "Arie Vayner (avayner)" <avayner@cisco.com> wrote:

> Owen,
>  
> While the arguments about moving the firewalls closer to the users are valid they are often are not practical (or at least the customers I worked with would not implement this option).
> Imagine an enterprise network with 300 spoke sites, but only 2 or 3 Internet gateway locations (with some private WAN in between).
> Moving the firewalls to the spoke sites would increase the number of firewalls from ~3 to ~300 (I am ignoring redundancy and scale for a second)… This is a major CAPEX and OPEX impact…
>  
> Arie
>  
> From: Owen DeLong [mailto:owen@delong.com] 
> Sent: Friday, August 9, 2013 12:17 PM
> To: Arie Vayner (avayner)
> Cc: Eric Vyncke (evyncke); Lorenzo Colitti; Fred Baker (fred); v6ops@ietf.org
> Subject: Re: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6 WGLC
>  
>  
> On Aug 8, 2013, at 22:21 , Arie Vayner (avayner) <avayner@cisco.com> wrote:
> 
> 
> Another loosely related point that I think could make sense in such a document would be the ways to accomplish multi-homing and how it is different than today’s IPv4 implementations.
>  
> Many enterprises rely on NAT on the Internet edge as their multi-homing/traffic engineering mechanism with IPv4.
>  
> If we recommend against ULA+NPTv6 (or just NPTv6 for traffic engineering), then we need to highlight the symmetry requirement due to stateful security layers.
> Traffic leaving from an Internet gateway site to the Internet has to come back through the same site, or the stateful firewalls would break the flow (well, has to hit the same stateful security layer)
>  
> Or stateful firewalls have to get better about sharing state. There are two things that can help with this...
>  
> 1.         Put your firewalls as close to the end systems they protect as possible. Make your security zones relatively small and place the firewalls closer together at those narrower borders.
>             This will often require more firewall units, but it helps in a number of ways:
>             A.        Firewall policy tends to be much simpler (and as a result less error prone and more reliable)
>             B.        The hardware demands on the firewall tend to be lower so you can buy cheaper units.
>             C.        The simpler rulesets can be more easily tailored to meet business requirements as they evolve.
>  
>  
>  
> 2.         Improve firewalls. Give the firewalls that all protect the same boundary a way to mesh-peer with each other and exchange information about the state tables such that triangle routing is no longer problematic.
> 
> 
> Syncing upstream and downstream routing policies is not always an easy task (but could be relevant in some cases).
> Linking the Internet gateway layer across sites (before hitting the stateful security layer) could be another solution.
>  
> If we make the changes above to the firewalls, this could be  a lot less relevant in most cases.
> 
> 
> Do you think a short discussion to raise awareness for this potential issue could be relevant in such a document?
>  
> It's certainly worth documenting. I'm not sure whether it belongs in this document or not.
>  
> Owen
>