The present invention relates to network management configuration and specifically, relates to a method of formalizing network requirements and automating associated reasoning when configuring a network.
Automating solutions to fundamental network configuration management problems such as specifying system requirements, configuration synthesis, requirement strengthening, component addition, configuration error diagnosis, configuration error troubleshooting, and requirement verification is a long time issue.
Policy based networking (PBN) is an approach to solve the problems. However, a large amount of the reasoning must be explicitly programmed with PBNs in the form of if-condition-then action-rules. The present invention performs such reasoning automatically. In addition, policy-based networking is concerned only with configuration synthesis and not with other problems such as diagnosis, verification, and the like. Policy based networking is described in the publication by B. Moore et al entitled “Policy Core Information Model —Version 1 Specification, IETF RFC 3060, February 2001, available at http://www.ietf.org/rfc/frc3060.txt IETF's policy-based networking group does not propose any explicit representation of system requirements. Instead, the logic is procedurally encoded in the form of if-condition-then-action rules. The problem with this approach is that these rules have to be changed or extended every time new requirements or components are added or deleted. In effect, these rules have to do all of the work of a Requirement Solver (Alloy model finder), which is a primary feature of the present invention.
In the paper “Making collaborative system administration easier: constraints and declarative aspect precedence”, by A. Holt and J Hawkins, Proc. Of SAICSIT-2004, the expressive power of configuration constraints is highly limited. The authors say that they do not want to admit arbitrary Boolean combinations of constraint expressions. In accordance with the present invention, negative membership specifications and arbitrary Boolean combinations of constraints are handled. In addition, the Holt et al paper is only concerned with configuration synthesis and not the other problems mentioned above.
In the paper “SmartFrog meets LCFG: Autonomous Reconfiguration with Central Policy Control”, Paul Anderson, Patrick Goldsack, and Jim Paterson describe another declarative system called LCFG for configuration management, but again, LCFG is only concerned with configuration synthesis and not the other problems.
In a paper by S. Narain, T. Cheng, B. Coan, V. Kaul, K. Parmeswaran, W. Stephens. entitled “Building Autonomic Systems Via Configuration” in Proceedings of AMS Autonomic Computing Workshop, Seattle, Wash., 2003, formalized requirements of Prolog are described. Prolog is based on definite clauses, hence it is not possible to specify full first-order logic constraints such as “every GRE tunnel is protected by an IPSec tunnel”, and “no two distinct interfaces on a router are on the same subnet”. These constraints are possible in the present invention and are useful for network configuration.
In accordance with the teachings of the present invention, the Requirement Solver remains unchanged. It is only the requirements or the scope that change. The Requirement Solver automatically adjusts to these changes and finds new network configurations. Verification is another application of the Requirement Solver.
The present invention proposes an approach for formalizing network requirements and automating associated reasoning. The approach is based on a new logical system called Alloy (alloy.mit.edu). While Alloy is based in set theory, a subset of it also has an intuitive object-oriented interpretation: allowing one to specify object types, their attributes and type of attribute values. It also allows one to specify first-order logic constraints on the objects. Finally, Alloy allows one to specify a “scope” that defines a finite number of object instances of each type in a given system. Given a specification and a scope, Alloy attempts to find values of attributes of object instances in the scope that satisfy the specification. These values together constitute a “model” of the specification in the system in the logical sense of the word “model”. Alloy first compiles a specification into a propositional formula in conjunctive normal form, then uses a satisfiability solver such as Berkmin (http://eigold.tripod.com/BerkMin.html) or Zchaff (http://www.princeton.edu/˜chaff) to check whether the formula is satisfiable. If so, it converts satisfying values of propositional variables back into values of attributes and displays these. Often, more than one solution is found.
The Alloy system allows for the definition of first-order constraints on objects and their attributes in a system and also a “scope”, i.e., the number and type of objects in the system. Alloy then uses a satisfiability (SAT) solver to compute a “model” of the constraints in the scope. The present invention uses the Alloy system to solve the configuration management problems. This is a nonobvious and unintended application of the Alloy system which was invented to solve verification problems in software design. Moreover, the present invention includes methods of writing efficient and compact Alloy specifications. These include scope splitting, minimizing quantifiers and avoiding unintended answers.
Automating solutions to fundamental network configuration management problems such as specifying system requirements, configuration synthesis, requirement strengthening, component addition, configuration error diagnosis, configuration error troubleshooting, and requirement verification is accomplished by the use of a Requirement Solver. The Requirement Solver receives as inputs a set of requirements upon a set of objects of different types, and computes as an output, network configurations of those objects such that the requirements are true. The Requirement Solver is used in different ways to solve the abovementioned problems.
The invention introduces the notion of a Requirement Solver and shows how fundamental configuration management tasks can be naturally formalized and carried out using it. The Requirement Solver is implemented in the logical system called Alloy. Alloy is based on the concept of model finding in finite domains, rather than theorem proving. The Requirement Solver is illustrated in the context of a realistic fault-tolerant VPN with remote access. However, the network configuration management method is equally applicable to any protocol, including but not limited to, VoIP and mobile hosted networks. Approaches for writing “efficient” specification are described below.
Complex, end-to-end network services are set up via a configuration method: each component has a finite number of configuration parameters each of which is set to a definite value. End-to-end network service requirements can be based on connectivity, security, performance and fault-tolerance. However, there is a large conceptual gap between end-to-end requirements and detailed component configurations. In order to bridge this gap, a number of subsidiary requirements are created that constrain, for example, the protocols to be used, and the logical structures and associated policies to be set up at different protocol layers. By performing different types of reasoning with these requirements, different configuration tasks are accomplished. These include configuration synthesis, configuration error diagnosis, configuration error fixing, reconfiguration as requirements or components are added and deleted, and requirement verification. However, such reasoning is currently ad hoc. Network requirements are not precisely specified hence automation of reasoning is virtually impossible. This is a major reason for the high cost of network management and total cost of ownership.
The present invention provides solutions to the fundamental network configuration management problems by formalizing network requirements and automating associated reasoning when configuring a network using a Requirement Solver.
The present invention of network configuration management is applicable to any protocol, including but not limited to, VoIP and mobile hosted networks.
The invention will be better understood when the following description is read in conjunction with the accompanying drawings.
a is a schematic representation of requirement strengthening by adding an overlay.
b is a schematic representation of requirement strengthening by securing the overlay.
c is a schematic representation of requirement strengthening by adding a remote access server.
a is a schematic representation of component addition of adding a new spoke router.
b is a schematic representation of component addition of adding an additional hub router.
Alloy is used to realize the concept of a Requirement Solver as shown in
The Requirement Solver has a direct implementation in Alloy. Network component types, attributes and values are directly modeled in Alloy. A set of network components of different types is modeled as a scope. Network system configuration is modeled as values of all component attributes in a given scope. Network requirements are modeled using first-order logic. Solutions are found by the Alloy interpreter.
The Requirement Solver can be used to accomplish a variety of reasoning tasks:
The Requirement Solver is illustrated in depth, by carrying out tasks 1-4 above in the context of a realistic fault-tolerant virtual private network with remote access. Approaches for making the present approach scale to networks of realistic size and complexity are outlined below.
Fault-Tolerant Virtual Private Network with Remote Access
As shown in
The problem, however, is that if a hub router fails, connectivity between sites is lost. This is because the source spoke router will continue to send traffic through the IPSec tunnel to the failed hub router. IPSec has no notion of fault-tolerance that will enable the source spoke router to redirect traffic via another hub router. Routing protocols such as RIP (Routing Information Protocol) or OSPF (Open Shortest Path First) accomplish precisely this kind of fault-tolerance; however, they are incompatible with IPSec. They do not recognize an IPSec tunnel as directly connecting two routers since there can be multiple physical hops in between. The solution is to set up a new type of tunnel, called GRE, between each hub and spoke router. The purpose of the GRE tunnel 220a-d is to create the illusion to a routing protocol that two routers are directly connected, even when there are multiple physical hops in between. This is done by creating new GRE interfaces at each tunnel end point and making these end points belong to the same point-to-point subnet. If a hub router fails, a routing protocol will automatically direct traffic through another GRE tunnel to another hub router, and then to the destination. Each GRE tunnel is then secured via an IPSec tunnel. Thus, the required fault-tolerant virtual private network is set up. If two hub router failures are to be tolerated, the number of tunnels is just 600 or 3% of nearly 20,000 in the full mesh case.
The described solution has a useful defense-in-depth feature: there are two separate routing domains, the external domain and the overlay domain. No routes are exchanged between these domains. Thus, even if an adversary compromises the WAN router, a packet cannot be sent to a host. The WAN router does not have a route to the host.
In order to enable remote users to securely collaborate, a remote access server 222 is set up in “parallel” with a spoke router 202. A remote user connected to the WAN sets up an L2TP tunnel between its host and the server. This tunnel gives the illusion to the host of being directly connected to the internal interface of the site spoke router. Consequently, all traffic between the host and any other host or server on the VPN is also secured. It is necessary to ensure that two separate routing protocols run on the access server, one protocol for the private side and another protocol for the public.
In order to realize the above design, the following types of configuration parameters need to be set:
It is very hard to compute values of the above configuration parameters. The types of configuration errors that can arise are:
Before describing how to formalize the above design in Alloy, its main intuitions are captured in the following requirements:
RouterInterfaceRequirements
The following shows an Alloy formalization of network component types, subtypes and their attributes. It also shows a formalization of Requirements 12 and 14 above. The complete formalization is provided in the Appendix. Comment lines begin with “—”.
The Alloy version of RouterInterfaceRequirements is:
The Alloy version of RoutingRequirements is:
The Alloy version of Requirement 12 is:
The following states that between every hubExternalInterface x and spokeExternalInterface y there is a greTunnel whose local physical is x and remotePhysical is y or vice versa.
The Alloy version of Requirement 14 is:
Configuration Synthesis
The following shows how to synthesize the initial network with connectivity and routing.
Define PhysicalSpec=
RouterInterfaceRequirements
SubnettingRequirements
RoutingRequirements
Define a scope consisting of:
1 hubRouter
Now request Alloy to find a model for PhysicalSpec in the above scope. The result is synthesis of the network shown in
It does so by producing the following values of configuration parameters:
Note that Alloy automatically produces instances of object types in the scope, e.g., wanRouter—0, hubRouter—0, spokeRouter—0. Spoke router 302 and hub router 304 are not directly connected, in accordance with Requirement 9, above.
Requirement Strengthening
In order to add an overlay network to the previous network, extend the previous scope with a GRE tunnel 400 then request Alloy to satisfy (PhysicalSpec A GRERequirements). Alloy synthesizes the network shown in
Alloy automatically sets up the GRE tunnel between the spoke router 402 and hub router 404 and enables RIP routing on the GRE tunnel.
To make GRE tunnels 406 secure, extend the previous scope with an IPSec tunnel 408 and request Alloy to satisfy (PhysicalSpec A GRERequirements A SecureGRERequirements). Alloy synthesizes the network shown in
Alloy automatically places the IPSec tunnel between the correct physical interfaces to protect the GRE tunnel.
In order to add an access server 410 to this network extend the previous scope with an access server, one internal interface, and one external interface and request Alloy to satisfy (PhysicalSpec GRERequirements SecureGRERequirements AccessServerRequirements). Alloy synthesizes the network shown in
Note that the access server is placed in parallel with only the spoke router, not with any other router, and has the correct routing protocols enabled on its interfaces.
Component Addition
In order to add a new spoke site to the previous network, extend the scope of the network in
The new spoke router 502 is physically connected just to the WAN router 400 as required by Requirement 8. Moreover, GRE tunnel 504 and IPSec tunnel 506 are automatically set up between the new spoke router 502 and hub router 404 and physical interfaces and GRE tunnel 504 are placed in the correct routing domains.
In order to add a new hub site to this network, extend the scope of the network shown in
Finally, in order to permit IKE and ESP (protocols of IPSec) packets through the physical interfaces of hub and spoke routers, one can extend the above scope of the network shown in
FullVPNSpec=(PhysicalSpec GRERequirements SecureGRERequirements AccessServerRequirements FirewallPolicyRequirements)
Alloy then synthesizes the network of
Requirement Verification: Identifying Incorrect Firewall Policies
When the network in
The predicate below states that IPSec is blocked if there is some ESP or IKE packet which is blocked.
The predicate below states that a packet is blocked if there is some firewall policy protecting an external interface that denies the protocol for that packet:
If the scope of the network in
In other words, firewallPolicy—8, applied on externalInterface—0 on the WAN router, blocks ike—0.
Identifying Advertisement of Private Subnets into WAN
Another problem that arose during deployment of the VPN solution into an existing network occurs because existing networks contain “legacy” routers that have no concept of internal or external subnets as do spoke routers. Thus, if the VPN is grafted into an existing network as shown in
This predicate states that an internal subnet is advertised to the WAN if there is a legacy router with two interfaces, one attached to an internal subnet and another to an external subnet, and both have the same routing protocol enabled on them. Now, if we increase the scope of the network of
In other words, PhysicalInterface—0 and physicalInterface—1 can be placed on legacyRouter—0, one can be connected to an internal subnet, the other to an external subnet, and yet both can belong to ospfDomain—0.
Writing Efficient Requirements
Scope Splitting
One critical parameter to control in Alloy is the size of the scope. If it gets too large it should be split up and the specification changed, if necessary. Consider the following specification declaring router and interface types, and a relation chassis mapping an interface to its router. Also define EmptyCond to be an empty set of constraints to satisfy (Alloy requires some constraint before it can be run).
When Alloy tries to find a model for EmptyCond in a scope consisting of 50 routers and 50 interfaces it crashes. This is because the cross product of the set of all routers and chassis' has 50*50=2500 pairs. Each subset of this product is a value of the chassis relation. Since there are 2ˆ2500 subsets, there are that many possible values to enumerate.
Now, try splitting the scope and redefining the specification:
Requirements containing quantifiers are transformed into Boolean form by instantiating quantified variables in all possible ways. The number of instantiations is the product of the number of instantiations of each quantified variable. The number of instantiations of each quantified variable is the size of the scope of that variable. In order to prevent the Boolean form from becoming excessively large, one can keep the number of quantified variables in a requirement as small as possible. For example, consider the definition of FirewallPolicyRequirements in which only two explicit quantifiers appear per requirement:
A more compact definition in which five quantifiers appear in a single requirement is:
In both cases, the number of IPSec tunnels in the scope is 4 and the number of firewall policies 9. However, there is a large difference in the size of the Boolean formula produced (for the entire VPN specification). In the first case, the formula contains 216,026 clauses and 73,4262 literals, and the entire process (compilation to solution) took 2 minutes and 59 seconds. In the second case, the formula contains 601,721 clauses and 2,035,140 literals and the entire process took 8 minutes and 19 seconds.
Avoiding Unintended Answers
Consider the requirement:
Between every hub and spoke router there is a GRE tunnel
This does not exclude GRE tunnels between hub and WAN routers, or between spoke and WAN routers or between WAN and WAN routers. It is possible to strengthen the above requirement to preclude these possibilities, e.g.:
There is no GRE tunnel between a hub and WAN router
There is no GRE tunnel between a spoke and WAN router
There is no GRE tunnel between WAN routers
. . .
This can be quite unwieldy. An alternative is to specify just the first requirement but supply, in the scope, only the number of tunnels intended by the requirement. Alloy will consume these to satisfy the requirement. Thereafter, it will not have any more tunnels left to produce unintended possibilities. One will now have to carefully calculate the scope but at least requirements become much less in number. Not only is the size of associated Boolean formulas reduced, but also requirements become easier to visualize.
While the network configuration management by model finding method has been described in the context of a virtual private network, the method is equally applicable to other protocols, including but not limited to, VoIP and mobile hosted networks.
Portions of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
While there has been described and illustrated a method of network configuration management by model finding, it will be apparent to those skilled in the art that variations and modifications are possible without deviating from the broad teachings and scope of the invention which shall be limited solely by the scope of the claims appended hereto.
This application claims the benefit of the filing date of U.S. Provisional Patent Application No. 60/630,056, filed Nov. 22, 2004, the disclosure of which is hereby incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60630056 | Nov 2004 | US |