Introduction
ONF is making Openflow specification as one of the standards enabling non-proprietary communication between central control plane entity & distribute data plane entities. SDN Controllers are the ones which implement control plane for various data path entities. OVS, being part of the Linux distributions, is becoming a defacto virtual switch entity in data centers and service provider market segments. OVS virtual switch, sitting in the Linux host acts as a switch (data path entity) between virtual machines on the Linux host and rest of the network.
As with virtualization of compute and storage, networks are also being virtualized. VLAN used to be the one of the techniques to realize virtual networks. With the limitations of number of VLANs and inability of extending virtual networks using VLANs over L3 networks, overlay based virtual network technology is replacing VLAN technology. VxLAN overlay protocol is becoming a choice of virtual network technology. Today virtual switches (such as OVS) are supporting VxLAN and becoming defactor overlay protocol in data center and service provider networks.
Another important technology that is becoming popular is Openstack. Openstack is virtual resource orchestration technology to manage virtualization of compute, storage and network resources. Neutron component of openstack takes care of configuration & management of virtual networks, network services such as router, DHCP, Firewall, IPSec VPN and Load balancers. Neutron provides API to configure these network resources. Horizon, which is GUI of openstack provides user interface for these services.
Network Nodes (A term used by Openstack community) are the ones which normally sit at the edge of the data centers. They provide firewall capability between Internet & data center networks, IPSec capability to terminate IPSec tunnels with the peer networks, SSL offload capability and load balancing capability to distribute the incoming connections to various servers. Network nodes also acts as routers between external networks & internal virtual networks. In today networks, network nodes are self-contained devices. They have both control plane and data plane in each node. Increasingly, it is being felt that SDN concepts can be used to separate out control plane & normal path software from data plane & fast path software.
Network nodes are also being used as routers across virtual networks within data centers for east-west traffic. Some even use them as firewall and load balancers for east-west traffic. Increasingly, it is being realized that network nodes should not be burdened with the east-west traffic and rather use virtual switches within each compute node to do this job. That is, virtual switches are being thought to be used as distributed router, firewall and load balancer for east-west traffic.
Advanced network services, which do deep inspection of packets and data, such as Intrusion Prevention, Web application firewalls, SSL offload are being deployed in L2 transparent mode to avoid reconfiguration of networks and also to enable vmotion easily. When deployed as virtual appliances, it also provides agility and scale-out functions. It requires traffic steering capability to steer the traffic across required virtual appliances. Though most of the network services are required for north-south traffic, some of them (such as IPS) are equally needed for east-west traffic.
Requirements
As one see from above introduction, operators would like to see following supported by centralized control plane entity (SDN Controllers)
- Realization of virtual networks
- Control plane for network nodes
- Normal path software for network nodes.
- Traffic Steering capability to steer the traffic across advanced network services
- Distributed routing, firewall & Load balancing capability for east-west traffic.
- Integration with Openstack Neutron
At no time, centralized entity should become a bottleneck, hence following additional requirements come in play.
- Scale-out of control plane entity (Clustered Controllers) - Controller Manager.
- Performance of each control plane entity.
- Capacity of each control plane entity.
- Security of control plane entity
Let us dig through each one of the above.
Realization of Virtual Networks:
SDN Controller is expected to provide following:
Functionality
- Ability to program the virtual switches in compute nodes.
- No special agent in compute nodes.
- Ability to use OVS using Openflow 1.3+
- Ability to realize VxLAN based virtual networks using flow based tunneling mechanism provided by OVS.
- Ability to realize broadcast & unicast traffic using OF groups.
- Ability to integrate with Openstack to come to know about VM MAC addresses and the compute nodes on which they are present.
- Ability to use above repository to program the flow entries in virtual switches without resorting broadcasting the traffic to all peer compute nodes.
- Ability to auto-learn VTEP entries.
- Ability to avoid multiple data path entities in a compute nodes - One single data path for each compute node.
- Ability to honor security groups configured in Openstack Nova. That is, ability to program flows based on security groups configuration without using 'IP tables" in the compute node.
- Ability to use 'Connection tracking" feature to enable stateful firewall functionality.
- Ability to support IPSec in virtual networks across compute nodes.
Capacity:
Capacity is entirely based on deployment scenario. Based on best of my knowledge, I believe these parameters are realistic from deployment perspective and also based on capability of hardware.
- Ability to support 256 compute nodes by one controller entity. if there are more 256 compute nodes, then more controllers in the cluster should be able to take care of rest.
- Ability to support multiple controllers - Ability to distribute controllers across the virtual switches.
- Support for 16K Virtual networks.
- Support for 128K Virtual ports
- Support for 256K VTEP entries.
- Support for 16K IPSec transport mode tunnels
Performance
- 100K Connections/sec per SDN Controller node (Due to firewall being taken care in the controllers). With new feature, that is being thought in ONF, called connection template, this requirement of 100K connections/sec can go down dramatically. I think 50K connections/sec or connection templates/sec would be good enough.
- 512 IPSec tunnels/sec.
Control Plane & Normal Path software for network nodes
Functionality such as router control plane, Firewall normal path, Load balancer normal path & control plane for IPSec (IKE) are the requirements to implement control plane for network nodes.
Functionality
- Ability to integrate with Neutron configuration of routers, firewalls, load balancers & IPSec.
- Support for IPv4 & IPv6 unicast routing protocols - OSPF, BGP, RIP and IS-IS.
- Support for IPv4 & IPv6 Multicast routing protocols - PIM-SM
- Support for IP-tables kind of firewall normal path software.
- Support for IKE with public key based authentication.
- Support for LVS kind of L4 load balancing software.
- Ability to support multiple routes, firewall, load balancer instances.
- Ability to support multiple Openflow switches that implement datapath/fastpath functionality of network nodes.
- Ability to receive exception packets from Openflow switches, process them through control plane/normal-path software & programming the resulting flows in openflow switches.
- Ability to support various extensions to Openflow specifications such as
- Bind Objects
- To bind client-to-server & Server-to-client flows.
- To realize IPSec SAs
- To bind multiple flow together for easy revalidation in case of firewalls.
- Multiple actions/instructions to support:
- IPSec outbound/inbound SA processing.
- Attack checks - Sequence number checks.
- TCP sequence number NAT with delta history table.
- Generation of ICMP error messages.
- Big Metadata
- LPM table support
- IP Fragmentation
- IP Reassembly on per table basis.
- Ability to go back to the tables whose ID is less than the current table ID.
- Ability to receive all pipe line fields via packet-in and sending them back via packet-out.
- Ability for controller to set the starting table ID along with the packet-out.
- Ability to define actions when the flow is created or bind object is created.
- Ability to define actions when the flow is being deleted or bind object is being deleted.
- Connection template support to auto-create the flows within the virtual switches.
Capacity
- Ability to support multiple network node switches - Minimum 32.
- Ability to support multiple routers - 256 per controller node, that is, 256 name spaces per controller node.
- Ability to support 10K Firewall rules on per router.
- Ability to support 256 IPSec policy rules on per router.
- Ability to support 1K pools in LVS on per router basis.
- Ability to support 4M firewall/Load balancer sessions.
- Ability to support 100K IPSec SAs. (If you need to support mobile users coming in via from IPSec)
Performance
- 100K Connections or Connection templates/sec on per controller node basis.
- 10K IPSec SAs/sec on per controller node basis.
Traffic Steering
Functionality
- Ability to support network service chains
- Ability to define multiple network services in a chain.
- Ability to define bypass rules - to bypass some services for various traffic types.
- Ability to associate multiple network service chains to a virtual network.
- Ability to define service chain selection rules - Select a service chain based on the the type of traffic.
- Ability to support multiple virtual networks.
- Ability to establish rules in virtual switches that are part of the chain.
- Ability to support scale-out of network services.
Capacity:
- Support for 4K virtual networks.
- Support for 8 network services in each chain.
- Support for 4K chains.
- Support for 32M flows.
Performance
- 256K Connections Or connection templates/sec.
Distributed Routing/Firewall/Load balancing for East-West traffic
As indicated before, virtual switches in the compute nodes should be used as data plane entity for these functions. As a controller, in addition to programming the flows to realize virtual networks and traffic steering capabilities, it should also program flows to control the traffic based on firewall rules and direct the east-west traffic based on the routing information and load balancing decisions.
Functionality
- Ability to integrate with Openstack to get to know the routers, firewall & LB configurations.
- Ability to act as control plane/normal-path entity for firewall & LB (Similar to network node except that it programs the virtual switches of compute nodes).
- Ability to add routes in multiple virtual switches (Unlike in network node where the routes are added to only corresponding data plane switch).
- Ability to support many extensions (as specified in network node section).
- Ability to collect internal server load (For load balancing decisions).
Capacity
- Support for 512 virtual switches.
- 8M+ firewall/SLB entries.
Performance
- 100K Connections/sec by one SDN controller node.
SDN Controller Manager
When there are multiple controller nodes in a cluster or multiple clusters of controllers, I believe there is a need for a manager to manage these controller nodes.
Functionality
- Ability to on-board new clusters
- Ability to on-board new controller nodes and assigning them to clusters.
- Ability to recognize virtual switches - Automatically wherever possible. Where not possible, via on-boarding.
- Ability to associate virtual switches to controller nodes and ability to inform controller nodes on the virtual switches that would be connected to it.
- Ability to schedule virtual switches to controller nodes based on controller node capabilities to take in more virtual switches.
- Ability to act as a bridge between Openstack Neutron & SDN controller nodes in synchronizing the resources & configuration of Neutron with all SDN controller nodes. Configuration includes:
- Ports & Networks.
- Routers
- Firewall, SLB & IPSec VPN configuration.
- Ensuring that configuration in appropriate controller node is set to avoid any race conditions.
- Ability to set backup relations.
Securing the SDN Controller
Since SDN Controller is brain behind realization of virtual networks and network services, it is required that it is highly available and not prone to attacks. Some of the security features it should implement in my view are:
- Support SSL/TLS based OF connections.
- Accept connections only from authorized virtual switches.
- Always work with backup controller.
- Synchronize state information with backup controller.
- DDOS Prevention
- Enable Syn-Cookie mechanism.
- Enable host based Firewall
- Allow traffic that is of interest to SDN Controller. Drop all other traffic.
- Enable rate limiting of the traffic.
- Enable rate limiting on the exception packets from virtual switches.
- Control number of flow setups/sec.
- Constant vulnerability asssesment.
- Running fragroute tools and isic tools to ensure that no known vulnerabilities are present.
- Always authenticate the configuration users.
- Provide higher priority to the configuration traffic.
Note: If one SDN controller node is implementing all the functions listed above, it is required to combine all performance and capacity requirements.
Check SDN controller from Freescale consisting of comprehensive feature set, takes advantage of multiple cores to provide very high performance system. Check the details here:
http://www.freescale.com/webapp/sps/site/prod_summary.jsp?code=VORTIQA_OND