Ted Lemon wrote, around 5/12/07 5:12 PM:
On Dec 5, 2007, at 4:52 PM, Peter Arberg wrote:
I think any NAS vendor will be supportive of implementing the
DSLF choosen authentication methoed for IP Sessions, if
it is DHCP Auth or PANA or something else :)

The reason I asked the question is that if it's pretty much all the same to the vendors, and it would solve the problem, then it would be expedient to go with the PANA solution. The reason it would be expedient is that support for the DHCP option in the Internet Area meeting was weak, and I suspect that of all the people who raised their hands supporting it (e.g., me), a significant percentage would have raised their hands in support of PANA as well. So you could get a strong consensus really easily.

When I asked about this yesterday, Richard said that the reason for choosing DHCP over PANA is that fewer elements in the network have to change, but my superficial understanding of PANA suggests to me that this is not actually the case. It seems to me that PANA can traverse essentially the same path that DHCP relay packets traverse, given that you're going to have to make a change on the BRAS anyway.

As I say, I'm not an expert in PANA, so I may have missed something, but this is my naive understanding of the situation. And again, as I say, I'm not a strong proponent of PANA - I'm just suggesting that we do what is expedient, and will work, rather than fighting a pitched battle for an alternative that in the final analysis probably isn't a better choice, and fundamentally does pretty much the same thing.
The DHCP Authentication solution assumes that port marking (in DHCP Option 82) and then the layer 2 network is secure by current features in the DSLAM that are provisioned by DHCP snooping. Thus the DHCP Authentication, while only being implemented on the Layer 3 edge and the CPE, does secure the large layer 2 network in front of the layer 3 edge. Basically you cannot send a packet into the layer 2 network until the DHCP ack is received (DHCP packets are obviously the only exception to this).

Often my frustration in this dialog has been that people do not seem to understand how big an issue this layer 2 secured edge is. A couple of points to that: - Firstly these metro and dsl aggregation networks can be large, 200K subscribers sites connected common.
- Services like large content sources are deployed in the layer 2 networks.
- Multiservice and layer 2 content distribution are the main real technical drivers to move from PPPoE.

PANA would require something to get identity from the layer 2 switch directly connected to the subscriber site and then something else to enforce policy in the layer 2 provider edge. This is a very different implementation task but also means that the service edge which touches millions of homes would need to implement and upgrade to whatever spaghetti sauce control plain PANA propose to control the layer 2 switches at this edge. These are not big BRAS's with lots of memory and CPU, these are small edge devices, built to be as cheap as possible, providers are very, very reluctant to replace them with things that could run a big control plain.

Personally I think the most likely result of specifying something that needs an equipment upgrade to the layer 2 edge for SP's to deploy a service without a cost advantage will probably be that we will see deployment of proprietary authentication that do not inflict this cost and operation hardship on the SP's.

- Ric



_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to