Hub-and-Spoke VPNs Using Next-Hop Tunnel Binding Overview

This topic includes the following sections:

Fundamentals of Hub-and-Spoke VPNs in Junos OS

Junos operating system (Junos OS) is Juniper Networks’ single operating system and provides the following features:

This document provides an example for configuration of a multipoint interface, which is commonly used for hub-and-spoke environments. This example uses route-based VPNs from a central hub device to multiple spoke devices. Junos OS does not support a multipoint topology with policy-based VPNs.

This document is intended for network design and security engineers, as well as anyone who requires secure connectivity over public networks.

Next-Hop Tunnel Binding Overview

You can implement a hub-and-spoke VPN topology by using the route-based VPN concept in many ways. One way of implementing a hub-and-spoke VPN topology is to configure a separate secure tunnel (st0) logical unit for every spoke site. However, if a device has many associated peer devices, then the increased number of required interfaces can be a concern from the standpoint of scaling and management.

For example, the following limitation applies to:

Junos OS supports the multipoint secure tunnel interfaces with the next-hop tunnel binding (NHTB) feature for easier management and scalability. NHTB enables a device to bind multiple IPsec security associations (SAs) to a single secure tunnel interface.

In this example:

The maximum number of IPsec tunnels is not limited by the number of st0 interfaces that you can create, but is limited by either of the following factor (whichever is lower) :

To see the maximum route and tunnel capacities for your platform, refer to the relevant product data sheet.

Understanding Route-to-Tunnel Mapping

To manage the traffic among multiple IPsec VPN tunnels bound to the same st0 interface, the security device maps the next-hop gateway IP address specified in the route table to a particular IPsec tunnel name. This scenario is explained in this section with reference to Figure 1.

The following settings are assumed for the local security device and remote VPN peer devices:

Figure 1 shows the local device routing traffic sent from 10.10.10.10 to 10.30.10.10 through the st0.0 interface and then routed the traffic through VPN2.

Figure 1: NHTB Routes and Table Entries

Image g040514.gif

Table 1 shows the mapping of entries in the route table to the entries in the NHTB table.

Table 1: Mapping of Route Table Entries and NHTB Table Entries

Route Table

 

Next-Hop Tunnel Binding Table

IP Prefix

Next Hop

Interface

Next Hop

Interface

IPsec VPN

Flag

10.20.10.0/24

10.1.1.2

st0.0

–>

10.1.1.2

st0.0

VPN1

static

10.30.10.0/24

10.1.1.3

st0.0

–>

10.1.1.3

st0.0

VPN2

static

10.40.10.0/24

10.1.1.4

st0.0

–>

10.1.1.4

st0.0

VPN3

static

The following is an explanation of the scenario in Figure 1 and in Table 1:

  1. You can use a dynamic routing protocol (for example, OSPF) to automatically populate the route table or you can add static routes manually. The next-hop IP address is the IP address of the remote peer’s st0 interface.
  2. You can use one of the following options for an NHTB table:
    • Enter the next-hop addresses manually and bind them to the appropriate IPsec VPN tunnel.

      To link the route table and NHTB table, you must enter the same IP address as the next hop, along with the appropriate IPsec VPN name in the NHTB table.

    • Allow the Junos device to acquire the next-hop address automatically from the remote peer during Phase 2 negotiations using the NOTIFY_NS_NHTB_INFORM message. Note that this functionality is applicable only if both peers are Junos devices.

      During Phase 2 negotiations, the two Internet Key Exchange (IKE) peers can exchange st0 interface addresses automatically through the Notify message NOTIFY_NS_NHTB_INFORM (value 40001).

  3. As listed in Table 1, the IP addresses for the next hop in the route table (which is also the same next-hop IP in the NHTB table) is the st0 interface IP address of the remote peer site. This next hop links the route –and consequently the st0 interface specified in the route -to a particular IPsec VPN tunnel.

Related Topics