Rapport Stage2
Rapport Stage2
Rapport Stage2
net/publication/345952324
CITATIONS READS
0 7,136
1 author:
Ouerghi Firas
École Nationale d'Ingénieurs de Tunis
5 PUBLICATIONS 2 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ouerghi Firas on 16 November 2020.
ICT Department
Ouerghi Firas
Ben Amor Elyes
Antabli Alaa
Host Company :
Tunisie Telecom
supervised by :
Mr.Rfaa Houerbi
Mrs.Awatef Mdhaffer
Mr.Mohammed Mustapha Ayed
I would like to extend my sincere thanks to all the team members of tunisie telecom for
their support in this internship.
I am greatly indebted to Mr. Rafaa HOUERBI for his constant supervision and guidance
as well as for providing me with the necessary information in regards to the project and
also for his continuous support in completing the internship.
I would also like to extend my deepest gratitude to Mr. Mohamed Mustapha AYED,
Mrs. Soumaya MEHERZI and Mrs.Awatef MDHAFEER for their kind cooperation which
helped me in the completion of my second year internship. My appreciation goes also
Mrs.Arwa CHAIBI and Ms.Fatma GHANDOUR who have willingly helped me out with
their abilities.
1
abstract
Based on the SDN (Software Defined Network) concept, which consists of separating the
control plan and the data plane in the network nodes, SD-WAN provides an essential
solution to the problem of managing WAN wide area network connectivity.
This involves putting in place an application allowing the supervision and management of
the network according to a hybrid architecture (MPLS, high-bandwith Internet, 4G,...).
Thanks to the programmability of the nodes, this application makes it possible to deter-
mine in real time an optimal routing of the application traffic according to the constraints
required by it (QOS, security, etc...) and the network conditions (bandwith, congestion,
etc...).
This allows a better distribution of the load and a reduction of the operating costs. The
SD-WAN solution can be combined with Network Function Virtualization (NFV) techno-
logy to provide new network services.
This solution allows virtual services to be inserted in the cloud and on-site through more
flexible automation of business processes.
A number of suppliers already offer SD-WAN solutions, such as Cisco, Huawei, Juniper,
IBM, Vmware.
The objective of this internship is to test the solutions offered by several suppliers in
a virtual environment. Key Words : SDN-WAN, SDN, NFV, Openflow, ODL, CISCO
VIPTELA, CONTRAIL.
2
Table des matières
List of Figures 5
List of tables 7
List of acronyms 8
General Introduction 9
1 Entreprise presentation 11
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3
TABLE DES MATIÈRES 4
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.4.0.2 SD-WAN . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
General conclusion 55
Bibliographie 56
Annexes 57
A 58
Liste des figures
6
LISTE DES FIGURES 7
4.14 firewall policy to allow hosts of site A to ping hosts of site B[27] 49
8
List of acronyms
TT : Tunisie Telecom.
WAN : Wide Area Network.
SDN : Software Defined Networking.
SD-WAN : Software Defined Networking-Wide Area Network.
NFV : Network Function Virtualization.
NFVI : Network Functions Virtualization Infrastructure.
VNF : Virtual Network Function.
NFV MANO : NFV Management and Orchestration.
M2M : Machine-to-Machine communications.
SLA monitoring : service-level agreement monitoring.
VPN : Virtual Private Network.
OVSDB : Open vSwitch Database.
ONF : Open Networking Foundation.
TLS : Transport Layer Security.
ZTP : Zero Touch Provisioning.
SSL : Socket Security Layer.
9
General Introduction
Enterprise networks are the last frontiers to be undergoing the rapid transformation initia-
ted by computer virtualization and the adoption of cloud delivery models. Virtualization
and cloud technologies brought new levels of IT flexibility, efficiency and cost benefits while
leaving the underlying networks unchanged. As mobile devices and new applications en-
tered enterprise workloads, networks struggled to meet the demands placed upon them.
Network bottlenecks arise from the traditional architecture that is based on hardware-
centric, proprietary and outdated technologies. Software Defined Networking (SDN) pro-
mises the solution to many of these problems with a software based solution. The sophis-
ticated software platform enables a transition from the proprietary hardware devices to
software defined networks that are programmable, agile and decoupled to keep pace with
the innovations in enterprise IT.
Software-Defined WAN (SD-WAN) is the extension of SDN that is transforming the en-
terprise branch office. With SD-WAN, no longer are the advantages of SDN limited to
the data center. SD-WAN abstracts network hardware into a control plane and multiple
data planes that can be used with cloud based management and automation to simplify
the delivery of services to the branch office. This work is all done with the manage-ability,
performance and reliability assurances that enterprises expect.
SD-WAN is in the spotlight and is gaining popularity in the IT world. With any new
disruptive technology and many adjacent solution providers go into a frenzy to gain a
piece of the market. This activity is part of the IT hype cycle. However, vendors who
provide solutions with real, measurable benefits often emerge as industry leaders and go
on to define the technology space.
10
Chapitre 1
Entreprise presentation
Introduction
My internship took place within the company Tunisie Telecom. In this part, we will
introduce the host company and discuss this internship objectives.
11
1.2 Organization chart of Tunisie Telecom 12
As part of its policy that aims to follow technological progress and to improve its services,
TT is deploying and testing several SD-WAN architecture from different vendors (juniper
,cisco,....). The main reason of my internship is to test and deploy the proposed solutions
on the TT network infrastructure in order to distinguish the most suitable one.
Conclusion
In this chapter, we began with a presentation of the host company in which i described
our objectives and missions during this internship. In the next chapter, we will dive into
more sophisticated topics like Network function virtualization and sdn.
Chapitre 2
Introduction
2.1 Definition
13
2.2 NFV Architectural Framework 14
Network Functions Virtualisation is applicable to any data plane packet processing and
control plane function in mobile and fixed networks, for example :
— Switching elements : routers.
— Tunnelling gateway elements : IPSec/SSL VPN gateways.
— Traffic analysis : DPI, QoE measurement.
— Software-Defined Branch and SD-WAN.
— Service Assurance, SLA monitoring, Test and Diagnostics.
— Security functions : Firewalls, virus scanners.
To highlight the use of NFV, we can find below some examples of network function virtua-
lization use cases that demonstrate how NFV is being used to address a range of challenges
as well as provide enhanced solutions to these and other networking hurdles(obstacles) in
order to enhance services and reduce outgoings.[4]
IDS, and firewalling from the proprietary hardware that was, until recently, the
dominant solutions, so as to enable them to run on software instead.
— Mobile Edge Computing : Using network function virtualization allows edge devices
to perform computational services and provide network functions by generating and
utilizing either a single or multiple virtual machines (VM).
Network Functions Virtualisation in mobile networks can also be used to create
core network instances optimized for specific services, e.g. for Machine-to-Machine
communications (M2M).
— Video Analytics : Enterprises have been turning to NFV and SDN architectures in
order to reduce network resource utilization and improve latency.This could, when
combined with using video analytics at the network edge, reduce bandwidth use by
up to 80% according to some researches made by some experts in the IT industry.
— Security : Many security vendors are already offering virtual firewalls to protect
VMs, however, in reality, firewalls are just one of nearly every security device or
component that will eventually be virtualized using network functions virtualiza-
tion as well as software-defined networking.
Conclusion
Network Functions Virtualisation is already occurring. In a few years, we can expect the
communications industry to look and feel similar to the IT industry. There will be a wider
range of business models more suited to a software industry. Operations complexity will
be abstracted away by more automation and self-provisioning will be more common.
The next chapter will be dedicated to discuss the SDN technology including its background
and the grounds on which this technology rests.
Chapitre 3
Introduction
The huge growth in mobile devices and the data they use along with server virtualisation
and the use of cloud services as well as many other changes have caused many in the
20
3.2 Software defined networking background 21
telecommunications industry to reexamine the network architectures that have been used
for many years[7].
Many of these networks are tiered and have a very hierarchical structure with many Ether-
net switches arranged in a tree structure.
This form of static telecommunications network design topology made much sense when
client serving computing was the main method of working. However this form of net-
work architecture is ill suited to the dynamic computing and storage needs that have
evolved around new computer usage scenarios with data centres, carrier environment and
campuses.
Today, the traffic patterns in data networks have significantly changed. Often today’s
applications access a variety of different sources and servers and this creates a flurry of
activity of data requests from a variety of different sources.
In addition to this, users are changing the way they work and this also has a major impact
on the data network traffic. Often users will want to access data from a variety of physical
locations, not just accessing the data from the office. As data requests often travel via a
VPN, and from different areas of the globe, this is a far cry from the requests that some
years ago tended to be from one machine to another in defined locations.
Cloud services are yet another driver for the use of software defined networking. Enter-
prises often need to access IT resources on demand. They do not want to have their own
fixed set of assets they need to increases to meet the demand peaks. Instead it makes
sense to have a common cloud resource provided by a third party that can act to average
out the peaks and troughs of a number of different enterprises and still being able to pro-
vide additional resource as required. As might be imagined, this results in more data flow
across the networks in a variety of different directions. To meet these needs and others, a
far more flexible and agile data network architecture is needed.
3.3 Traditional Network Approach Vs SDN Approach 22
In the classic network architecture, the Data plane and the Control plane are merged and
any modification to the system depends on the network’s physical devices, protocols, and
the software they support.
3.4 Software Defined Networking Architecture 23
The changes can be done to the overall system are limited as the network equipment
restrain logical network traffic flows. Machines function without support and present limi-
ted awareness towards the extended network. On the other hand, and as shown in Figure
3.1, SDN decouples the two above-mentioned planes. It integrates the network logic at
the controller level. A controller detached of the two Planes strategically centralizes the
network’s logic in a way that enables users to choose which programmable characteristics
can be moved from the physical devices onto the controller.
The SDN’s dynamic, flexible and scalable infrastructure simplifies operations and grants
the ability to try new business routes that are otherwise unable to explore.
The SDN architecture is based on the idea of the separation between control and data
planes and it is composed of major layers as mentioned in Figure 3.2[8].
— Application layer :
It is an open area to develop as much innovative application as possible by levera-
ging all the network information about network topology, network state, network
statistics, etc. There can be several types of applications which can be developed
3.4 Software Defined Networking Architecture 24
OpenFlow (OF) is considered the most commonly used southbound API in SDN, which
is being continuously developed and standardized by open networking foundation (ONF).
OF provides an abstraction layer that enables the SDN controller to securely communicate
with OF-enabled forwarding elements[9].
To ensure the exchange of information between switches and controller, the Openflow
protocol established an encrypted TLS communication between network nodes and the
controller.
3.5 OpenFlow Protocol 26
This channel enables encrypted messages to be transmitted and the authentication of the
switchs towards the controller. As shown in Figure 3.3.
Once this TCP session is set on port 6653/6633. The controller and switch begin negotia-
ting the protocol version, then update and exchange flow tables.
— Reactive mode :
This mode consists of filling the flow table of the OF devices as and when sending
a packet from a source to its destination.
For example When ”PC 1” sends a packet to the Switch, the latter queries its
controller on the destination path, the response or what is called the action will be
communicated to the switch through the established secure channel. This will be
done at each jump where the destination is not yet configured in the flow table of
the device. In this mode it is imperative that the controller and switches are near
one of the others to decrease latency.
3.5 OpenFlow Protocol 27
— Proactive mode :
This mode consists of preconfiguring all switches before the source emits its mes-
sage. This can give us some flexibility on the distance between the controller and
the switches.
The OpenFlow protocol defines three message types, each of those types is composed of
multiple sub-types as explained below[10] :
— Controller-to-switch :
Controller-to-switch messages are initiated by the controller and used to directly
3.5 OpenFlow Protocol 28
manage or inspect the state of the switch. This type of messages may or may not
require a response from the switch and are categorized in the following subtypes.
1. Features :
Upon establishment of the TLS session, the controller sends a feature request
message to the switch. The switch must reply with a features reply message
that specifies the features and capabilities that are supported by the switch.
2. Configuration :
The controller is able to set and query configuration parameters in the switch.
The switch only responds to a query from the controller.
3. Modify-State : These messages are sent by the controller to manage the state
of the switches. They are used to add/delete or modify flow table entries or to
set switch port priorities.
4. Read-State :
These messages collect statistics from the switch flow tables, ports, and the
individual flow entries.
5. Send-Packet :
These are used by the controller to send packets out of a specified port on the
switch.
6. Barrier :
Barrier request/reply messages are used by the controller to ensure message
dependencies have been met or to receive notifications for completed operations.
— Symmetric messages :
Symmetric messages are initiated by either the switch or the controller and sent
without solicitation. There are three symmetric message subtypes in OpenFlow
protocol as follows :
1. Hello :
Hello messages are exchanged between the switch and controller upon connec-
tion setup.
2. Echo :
Echo request/reply messages can be sent from either the switch or the controller,
and must return an echo reply. These messages can be used to indicate the
3.5 OpenFlow Protocol 29
3. Vendor :
These messages provide a standard way for OpenFlow switches to offer additio-
nal functionality within the OpenFlow message type space for future revisions
of OpenFlow.
— Asynchronous messages :
Asynchronous messages are initiated by the switch and used to update the control-
ler of network events and changes to the switch state. Switches send asynchronous
messages to the controller to denote a packet arrival, switch state change, or an
error. There are four main asynchronous messages as follows :
1. Packet-in :
For all packets that do not have a matching flow entry or if a packet matches
an entry with a send to controller action, a packet-in message is sent to the
controller. If the switch has sufficient memory to buffer packets that are sent
to the controller, the packet-in message contains some fraction of the packet
header (by default, 128 bytes) and a buffer ID to be used by the controller
when it is ready for the switch to forward the packet. Switches that do not
support internal buffering (or have run out of internal buffer space) must send
the full packet to the controller as part of the message.
2. Flow-Removal :
When a flow entry is added to the switch by a flow modify message (the Modify
State section), an idle timeout value indicates when the entry should be removed
due to the lack of activity as well as a hard timeout value. The hard timeout
value indicates when the entry should be removed, regardless of activity. The
flow modify message also specifies whether the switch should send a flow removal
message to the controller when the flow expires. Flow modify messages, which
delete flow entries may also cause flow removal messages.
3. Port-status :
The switch is expected to send port-status messages to the controller as the
port configuration state changes. These events include changes in port status
(for example, disabled by the user) or a change in the port status as specified
3.5 OpenFlow Protocol 30
4. Error :
The switch is able to notify the controller of problems using error messages.
The operation of an Openflow equipment is based on the use of a several flow tables (in
pipeline). A flow table is a data structure that performs packet forwarding and lookups.
Each entry of an Openflow table contains five main parts[11] :
An Openflow filter, can be built using several header fields, we cite below the most im-
portant ones :
— Ethernet : source, destination, type, VLAN ID.
— Ipv4 : source, destination, upper protocol, Tos.
— TCP/UDP : source port, destination port.
Regarding actions, an Openflow switch exposes actions similar to those found in traditional
IP equipment, as shown in the list below :
Figure 3.7 – Flowchart detailing packet flow through an OpenFlow switch [12]
When receiving a packet, an OpenFlow Switch performs the functions shown in Fi-
gure(3.7).
The switch starts by performing a table lookup in the first flow table, and based on pipe-
line processing, may perform table lookups in other flow tables (see Figure 3.8).
Packet match fields are extracted from the packet.Packet match fields used for table loo-
kups depend on the packet type, and typically include various packet header fields, such
as Ethernet source addressor IPv4 destination address. In addition to packet headers,
3.6 SDN use cases 32
matches can also be performed against the ingress port and metadata fields.
Metadata may be used to pass information between tables in a switch. The packet match
fields represent the packet in its current state, if actions applied in a previous table using
the Apply-Actions changed the packet headers, those changes are reflected in the packet
match fields.A packet matches a flow table entry if the values in the packet match fields
used for the lookup match those defined in the flow table entry.
If a flow table entry field has a value of ANY (field omitted), it matches all possible values
in the header. The packet is matched against the table and only the highest priority flow
entry that matches the packet must be selected.
The counters associated with the selected flow entry must be updated and the instruction
set included in the selected flow entry must be applied. If there are multiple matching
flow entries with the same highest priority, the selected flow entry is explicitly undefined
and the packet can either be dropped or sent to the controller[14].
Over the years, organizations have introduced SDN into their networks. SDN has been
introduced because of its benefits, and the upcoming sections highlight the most prominent
real-life applications of SDN in networks and how they have been adopted[12].
Conclusion
In this chapter i highlighted a theoretical and detailed study on the SDN system and its
global architecture and basic components. The next chapter will be totally dedicated to
the extension of this technology to the WAN also known as SD-WAN.
Chapitre 4
Introduction
In recent years, software defined wide-area networking (SD-WAN) solutions have evolved
to address many challenges.
In this chapter we will introduce the SD-WAN technology and its benefits for enterprises,
its characteristics, and why this technology is more reputed than traditional WAN. Finally
we will discuss the juniper solution tested in Tunisie Telecom.
4.1 Definition
The software defined wide area network (SD-WAN) is a specific application of software
defined networking (SDN) technology applied to WAN connections such as broadband in-
ternet, 4G, LTE, or MPLS, to more effectively route network traffic between headquarters
or data centers, remote and branch offices, and the cloud[13].
There are two basic SD-WAN architectures, edge appliances and cloud-based SD-WAN.
Both edge appliances and cloud-based SD-WAN involve a controller function for pushing
34
4.2 SD-WAN Architecture 35
out policies and distributing routing information and a management console for dash-
board, reporting and policy configuration. Where they differ is in the location of the
virtual overlay and how they provide advanced services. The following Figures 4.1/4.2
shows us the simple and detailed global architecture of SD-WAN.
With edge appliances, the SD-WAN virtual overlay stretches from location to location.
Appliances are installed at each site and, once connected to the Internet, retrieve configu-
ration profiles from the SD-WAN controller. The SD-WAN devices configure themselves
and joining or construct a virtual overlay with other devices. Each device runs the policy-
based routing algorithms needed to steer traffic to the most appropriate link based on
application requirements and underlying link quality.
With Cloud-based SD-WAN, the virtual overlay is formed between the points of presence
(PoPs) of the Cloud SD-WAN service. The PoPs connect to each other across a priva-
tely managed backbone. There are appliances at each location, but in contrast to edge
architecture, Cloud-based SD-WAN appliance run “just enough” functionality to send traf-
fic to the nearest PoP. Software in the PoP applies the necessary security and network
optimizations before forwarding the traffic along the optimum path to its destination.
SD-WAN implementations have incorporated WAN technologies and functions that have
been developed over the years such as VPN, WAN Optimization, IPsec tunneling, hybrid
WAN, deep packet inspection, policy management, service assurance and analytic while
incorporating newer SDN, NFV, and Service Orchestration technologies.
While SD-WAN service offerings will vary among service providers, these Sections below
discuss fundamental capabilities of SD-WAN managed services[14].
A traditional WAN connects multiple local area networks (LANs) to each other through
routers and virtual private networks (VPN), and is used for connecting organizations
that have more than one location. Traditional WANs mostly rely on multiprotocol label
switching (MPLS), which provides resilient and efficient network traffic flow. This allows
you to prioritize the voice, video, and data traffic on your network. Figure 4.1 describes
the Traditional WAN architecture.
4.4 Traditional WAN VS SD-WAN 38
4.4.0.2 SD-WAN
below a table summarizing the main differences between legacy WAN SD-WAN[15].
4.4 Traditional WAN VS SD-WAN 39
Provisioning High time for setting new setup Low time for setting new se-
and configuration tup and configuration.
For the enterprises with significant numbers of branch offices, stitching multiple WAN-
related technologies together is an onerous commitment. SD-WAN delivers a strong set
of business results to fulfill many of the unmet needs of enterprises.
The most known benefits of SD-WAN are listed below[16] :
— Automation and the intelligence-in-the-cloud gateway head end eliminate the bot-
tleneck of network traffic.
— real-time monitoring, historical reporting and troubleshooting tools are part of the
cloud management portal.
Juniper Contrail SD-WAN delivers a simple, secure multitenant, multisite, and multi-
cloud SD-WAN and branch solution. Contrail combines hybrid WAN connections MPLS,
broadband, legacy interfaces, and wireless 4G/LTE to connect branch sites. And support
virtual CPE like multicloud endpoints in clouds like AWS and Azure. It also dynamically
determines the optimal path for specific application traffic based on policies, while assu-
ring consistent and reliable WAN services that align with business objectives using user
and application-level visibility, analytics, and active/passive quality of experience .
Contrail SD-WAN doesn’t stop at the WAN edge. It unifies security and management
inside the branch as well for LAN and Wi-Fi. It fully orchestrates Juniper Networks EX
Series Ethernet Switches to enable LAN services for users, IoT devices, and wireless access
points.
This section is dedicated to demonstrate the juniper solution proposed by TT. For that
we are going to detail every scenario that we have tested.
All along this lab we are going to perform our tests on this topology, consisting of :
— First site : One physical juniper SRX device connected to internet throw 2 links
one MPLS and an other internet ADSL. This site will act as a gateway for two pc’s
— Second site : One virtual srx hosted on my pc and connected to internet throw a
4G/LTE link and will act as a gateway to an internal virtual machine hosted on
my computer.
4.6 Case of study : Juniper solution 43
Zero Touch Provisioning (ZTP) allows you to provision new Juniper Networks devices in
your network automatically, with minimal manual intervention. You can use either ma-
nagement ports or network ports on your switch to connect to the network. When you
physically connect a device to the network and boot it with a default factory configu-
ration, the device upgrades (or downgrades) the Junos OS release and auto installs the
configuration file created by the administrator using the cso ready to use templates.
1. Creating the site template, this template will contain all the device configuration
from general device settings like time zone, geo-location, site name, to WAN and
LAN settings like DHCP services, address pool and link cost and type.
4.6 Case of study : Juniper solution 44
2. Now that the configuration has been pushed to the device from the cso, The rou-
ter is automatically detected and displayed on the web platform, the pc directly
connected to the vsrx can get an ip address and ping the outside world.
WAN failover can prevent network disruptions and downtime by transferring traffic from
a degraded or failed connection to a redundant link(ADSL/4G-LTE). Failover can be
automated to ensure continuous availability and provide a seamless experience for users
and customers with no need to restart, reconnect, or log in to applications again. To test
this scenario we will break the MPLS link connected to the physical SRX once this link
is cut the device automatically switch our internet traffic on the backup internet link.
Many dynamic applications use HTTP static ports to tunnel non-HTTP traffic through
the network. Such applications can permit traffic that might not be adequately controlled
by standard network firewall policies, leading to a security threat. Standard policies func-
tion based on IP addresses and ports, and therefore are not effective with these dynamic
applications. To avoid these security issues, an additional security control for policies was
introduced that functions based on the application ID.
The security policies provide firewall security functionality by enforcing rules for the traf-
fic, which pass through the device, is permitted or denied based on the action defined in
the rules. The application firewall port in the policies provides additional security control
for dynamic applications.
An application firewall provides the following features :
— Permits, rejects, or denies traffic based on the application in use.
— Identifies not only HTTP but also any application running on top of it, letting
you properly enforce policies. For example, an application firewall rule could block
HTTP traffic from Facebook but allow Web access to HTTP traffic from other
websites.
The application firewall policy is defined by a collection of rule sets. A rule set defines the
rules that match the application ID detected, based on the application signature. After
you create an application firewall policy by adding rules, you can select that policy to be
the active policy on your device. Using the CSO, here a step by step demonstration for
the firewall application to block the juniper official website.
IPsec VPN provides means for securely communicating among remote computers across
a public WAN such as the Internet. A VPN connection can link two LANs (site-to-site
VPN) or a remote dial-up user and a LAN. To secure VPN communication that passes
through the WAN, we can create an IPsec tunnel to allow data to be securely transferred
between two sites.
To perform this option we are going to create an IPsec tunnel between my site (FirasVsrx)
and the physical srx site so that any machine of my LAN ; that have an ip address in the
70.70.70.1/24 pool can ping any other machine in the LAN of the physical srx site that
have an ip address in the 10.10.10.1/24 pool.
4.6 Case of study : Juniper solution 49
Figure 4.14 – firewall policy to allow hosts of site A to ping hosts of site B[27]
As shown bellow the ipsec tunnel is created successfully, site A hostes can now ping site
B hosts securely.
Secure Sockets Layer (SSL) is an application-level protocol that provides encryption and
decryption technology for the Internet by residing between the server and the client.
SSL, also called Transport Layer Security (TLS), ensures the secure transmission of data
between a client and a server through a combination of privacy, authentication, confiden-
tiality, and data integrity. SSL relies on certificates and private-public key exchange pairs
for this level of security.
We are going to describe below how to create an SSL proxy.
1. Import Certificate.
The certificate can be generated with openSSL package under linux.
Ensures application flows get the best available network path based on their priorities
and live network traffic conditions. This improves application performance and availabi-
lity by routing traffic over different links when network issues arise. The way dynamic
path selection functions do vary widely. The technology should continually check multiple
link characteristics to make the right decision and work on a per-app-session basis. Dyna-
mic path selection is particularly beneficial for real-time applications, such as Skype for
Business and video.
To perform this task we are going to create an SLA profile to forward Microsoft traffic on
links that meets a specific criteria.
For that the link that will be responsible of forwarding this traffic should have latency
under 100ms and a packet loss not bigger than 5%.
3. As shown below after the degradation of first link performance because wan0 didn’t
meet our policy agreement all the Microsoft traffic has been switched to the second
link that respects better our needs.
Conclusion
In a nutshell, this internship has been an excellent and rewarding experience. I can
conclude that there have been a lot I’ve learnt from my work at TT. Needless to say, the
technical aspects of the work I’ve done are not flawless and could be improved provided
enough time. As someone with no prior experience with SDN and SD-WAN whatsoever I
believe my time spent in research and discovering it was well worth it. Two main things
that I’ve learned : the importance of time-management skills and self-motivation.
56
Bibliographie
[5] ,”NFV White Paper” ,Published on October 22-24, 2012 at the “SDN and OpenFlow
World Congress”, Darmstadt-Germany, viewed on 13/08/2019.
[8] Patricia Morreale & James Anderson, Software Defined Networking : Design and
Deployment
[9] Chuck Black & Paul Goransson, Software Defined Networks : A Comprehensive Ap-
proach
57
Annexe A
58