BESS WorkgroupInternet Engineering Task Force (IETF) A.Sajassi (Editor) INTERNET-DRAFTSajassi, Ed. Request for Comments: 8560 S. SalamIntended Status: StandardCategory: Standards Track Cisco ISSN: 2070-1721 N. Del Regno Verizon J. Rabadan NokiaExpires: July 31, 2019 January 31,May 2019(PBB-)EVPNSeamless Integration of Ethernet VPN (EVPN) with(PBB-)VPLS draft-ietf-bess-evpn-vpls-seamless-integ-07Virtual Private LAN Service (VPLS) and Their Provider Backbone Bridge (PBB) Equivalents Abstract This document specifies mechanisms for backward compatibility of Ethernet VPN (EVPN) and Provider Backbone Bridge Ethernet VPN (PBB- EVPN) solutions with Virtual Private LAN Service (VPLS) and Provider Backbone Bridge VPLS (PBB-VPLS) solutions. It also provides mechanisms for the seamless integration of these two technologies in the same MPLS/IP network on a per-VPN-instance basis. Implementation of this document enables service providers to introduce EVPN/PBB-EVPNPEsProvider Edges (PEs) in theirbrown-fieldbrownfield deployments of VPLS/PBB-VPLS networks. This document specifies the control-plane and forwarding behavior needed for the auto-discovery of the following: 1) a VPN instance, 2) multicast and unicast operation,as well as MAC-mobility operation in order to enableand 3) a Media Access Control (MAC) mobility operation. This enables seamless integration between EVPN and VPLS PEs as well as between PBB-VPLS and PBB-EVPN PEs. Status ofthisThis Memo ThisInternet-Draftissubmitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsan Internet Standards Track document. This document is a product of the Internet Engineering Task Force(IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum(IETF). It represents the consensus ofsix monthsthe IETF community. It has received public review andmay be updated, replaced, or obsoletedhas been approved for publication byother documents at any time. Itthe Internet Engineering Steering Group (IESG). Further information on Internet Standards isinappropriate to use Internet-Drafts as reference material or to cite them other than as "workavailable inprogress." The listSection 2 of RFC 7841. Information about the currentInternet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The liststatus ofInternet-Draft Shadow Directories canthis document, any errata, and how to provide feedback on it may beaccessedobtained athttp://www.ietf.org/shadow.htmlhttps://www.rfc-editor.org/info/rfc8560. Copyrightand LicenseNotice Copyright (c)20182019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents(http://trustee.ietf.org/license-info)(https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents11. Introduction . . . . . . . . . . . . . . . . . . . . . . . .. 42 1.1. Specification of Requirements . . . . . . . . . . . . . .54 1.2.Terms andAbbreviations . . . . . . . . . . . . . . . . . . . . . . 4 1.3. Terminology . . . . . . . . . . . . . . . . . . . . . . . 5 2. Requirements . . . . . . . . . . . . . . . . . . . . . . . .. 7 36 3. VPLS Integration with EVPN . . . . . . . . . . . . . . . . .. . 8 3.17 3.1. Capability Discovery . . . . . . . . . . . . . . . . . .. . 8 3.27 3.2. Forwarding Setup and Unicast Operation . . . . . . . . .. . 8 3.37 3.3. MAC Mobility . . . . . . . . . . . . . . . . . . . . . .. . 10 3.49 3.4. Multicast Operation . . . . . . . . . . . . . . . . . . ..103.4.13.4.1. Ingress Replication . . . . . . . . . . . . . . . . ..103.4.23.4.2. P2MP Tunnel . . . . . . . . . . . . . . . . . . . . .. 11 410 4. PBB-VPLS Integration with PBB-EVPN . . . . . . . . . . . . .. . 11 4.110 4.1. Capability Discovery . . . . . . . . . . . . . . . . . .. . 11 4.210 4.2. Forwarding Setup and Unicast Operation . . . . . . . . .. . 11 4.310 4.3. MAC Mobility . . . . . . . . . . . . . . . . . . . . . .. . 13 4.412 4.4. Multicast Operation . . . . . . . . . . . . . . . . . . .. 13 4.4.112 4.4.1. Ingress Replication . . . . . . . . . . . . . . . . .. 13 4.4.212 4.4.2. P2MPTunnel -Tunnel: Inclusive Tree . . . . . . . . . . . . .. 14 513 5. Security Considerations . . . . . . . . . . . . . . . . . . .. 14 613 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . .. 14 713 7. References . . . . . . . . . . . . . . . . . . . . . . . . .. 14 7.113 7.1. Normative References . . . . . . . . . . . . . . . . . .. 14 7.213 7.2. Informative References . . . . . . . . . . . . . . . . .. 1514 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . ..1511. Introduction Virtual Private LAN Service (VPLS) and Provider Backbone Bridging VPLS (PBB-VPLS) arewidely-deployed Layer-2widely deployed Layer 2 VPN (L2VPN) technologies. Many service providers who are looking at adopting Ethernet VPN (EVPN) and Provider Backbone Bridging EVPN (PBB-EVPN) want to preserve theirinvestmentinvestments in the VPLS and PBB-VPLS networks. Hence, they require mechanisms by which EVPN and PBB-EVPN technologies can be introduced into theirbrown-fieldbrownfield VPLS and PBB-VPLS networks without requiring any upgrades (software or hardware) to these networks. This document specifies procedures for the seamless integration of the two technologies in the same MPLS/IP network. Throughout this document, we use the term(PBB-)EVPN"(PBB-)EVPN" to correspond to both EVPN andPBB-EVPNPBB-EVPN, and we use the term(PBB-)VPLS"(PBB-)VPLS" to correspond to both VPLS and PBB-VPLS. This document specifies the control-plane and forwarding behavior needed for 1) auto-discovery of a VPN instance, 2) multicast and unicast operations,as well as MAC-mobility operation in order to enableand 3) a MAC mobility operation. This enables seamless integration between (PBB-)EVPN ProviderEdge(PE)Edge (PE) devices and (PBB-)VPLS PEs. VPLS PE +---+ |PE1| +---+ / EVPN/VPLS PE +---------------+ EVPN/VPLS PE +---+ | | +---+ |PE4|----| MPLS/IP |---|PE5| +---+ | Core | +---+ | | +---------------+ / \ +---+ +---+ |PE2| |PE3| +---+ +---+ VPLS PE VPLS PE Figure 1: Seamless Integration of (PBB-)EVPN&and (PBB-)VPLS Section 2 provides the details of the requirements. Section 3 specifies procedures for the seamless integration of VPLS and EVPN networks.And sectionSection 4 specifies procedures for the seamless integration of PBB-VPLS and PBB-EVPN networks. It should be noted that the scenarios for both PBB-VPLS integration with EVPN and VPLS integration with PBB-EVPN are not covered in this document because there haven't been any requirements from service providers for thesescenarios. The reason for that is thatscenarios; deploymentswhichthat employ PBB-VPLS typically require PBB encapsulation for various reasons. Hence, it is expected that for thosedeploymentsdeployments, the evolution path wouldbemove from PBB-VPLS towards PBB-EVPN. Furthermore, the evolution path from VPLS is expected tobemove towards EVPN. The seamless integration solution described in this document has the following attributes: - When ingress replication is used for multi-destination traffic delivery, the solution reduces the scope of[MMRP]MMRP (which is a soft- stateprotocol)protocol defined in Clause 10 of [IEEE.802.1Q]) to only that of existing VPLSPEs,PEs and uses the more robust BGP-based mechanism for multicast pruning among new EVPN PEs. - It is completely backward compatible. - New PEs can leverage the extensivemulti-homingmultihoming mechanisms and provisioning simplifications of (PBB-)EVPN:a.(a) Auto-sensing ofMHNMultihomed Networks (MHNs) /MHD b.Multihomed Devices (MHDs) (b) Auto-discovery of redundancygroup c.groups (c) Auto-provisioning of Designated Forwarder election and VLAN carving 1.1. Specification of Requirements The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 1.2.Terms andAbbreviationsBroadcast Domain: In a bridged network,B-MAC: Backbone MAC, e.g., thebroadcast domain corresponds to a Virtual LAN (VLAN), where a VLAN is typically represented by a single VLAN ID (VID) but can be represented by several VIDs where Shared VLAN Learning (SVL) is used per [IEEE.802.1ah]. Bridge Table: An instantiation of a broadcast domain on a MAC-VRF RIB: Routing Information Base - An instantiation of a routing table on a MAC-VRF FIB: Forwarding Information Base - An instantiation of a forwarding table onPE's MAC address C-MAC: Customer MAC, e.g., aMAC-VRFhost or CE's MAC address CE: A Customer Edge device, e.g., a host, router, orswitch. MAC-VRF: A Virtual Routing and Forwarding table for Media Access Control (MAC) addresses on an EVPN PE. MAC address: Media Access Control address C-MAC address: Customer MAC address - e.g., host or CE's MAC address B-MAC address: Backbone MAC address - e.g., PE's MAC addressswitch ES: Ethernetsegment (ES): RefersSegment -- refers to the set of Ethernet links that connects a customer site (device or network) to one or morePEs. Ethernet Tag: An Ethernet Tag identifies a particular broadcast domain, e.g., a VLAN. An EVPN instance consists of one or more broadcast domainsPEs FEC: Forwarding Equivalence Class FIB: Forwarding Information Base -- an instantiation of a forwarding table on a MAC-VRF I-SID: Service Instance Identifier LSP: Label Switched Path MAC: Media Access Control MAC-VRF: A Virtual Routing and Forwarding table for Media Access Control (MAC) addresses on an EVPN PE MHD:Multi-HomedMultihomed Device MHN:Multi-HomedMultihomed NetworkP2MP: Point to Multipoint - a P2MP LSP typically refers to a LSP for multicast trafficMP2P: Multipoint to Point- a-- an MP2P LSP typically refers toaan LSP for unicast traffic as the result ofdownstream-assigneda downstream- assigned label P2MP: Point to Multipoint -- a P2MP LSP typically refers to an LSP for multicast traffic PBB: Provider Backbone Bridge (PBB-)EVPN: Both PBB-EVPN and EVPN -- this document uses this abbreviation when a given description applies to both technologies (PBB-)VPLS: Both PBB-VPLS and VPLS -- this document uses this abbreviation when a given description applies to both technologies PE: Provider Edge device PW: Pseudowire RIB: Routing Information Base -- an instantiation of a routing table on a MAC-VRF VSI: Virtual Switch Instance VPLS: Virtual Private LAN ServiceSingle-Active Redundancy Mode:VPLS A-D: Virtual Private LAN Service with BGP-based auto-discovery as in [RFC6074] 1.3. Terminology All-Active redundancy mode: Whenonly a single PE, amongallthePEs attached to an Ethernetsegment, issegment are allowed to forward known unicast traffic to/from that Ethernet segment for a given VLAN, then the Ethernet segment is definedto beas operating inSingle-ActiveAll-Active redundancy mode.All-Active Redundancy Mode:Bridge table: An instantiation of a broadcast domain on a MAC-VRF (VPN Routing and Forwarding). Broadcast domain: In a bridged network, the broadcast domain corresponds to a Virtual LAN (VLAN), where a VLAN is typically represented by a single VLAN ID (VID) but can be represented by several VIDs where Shared VLAN Learning (SVL) is used, per [IEEE.802.1Q]. Ethernet Tag: An Ethernet Tag identifies a particular broadcast domain, e.g., a VLAN. An EVPN instance consists of one or more broadcast domains. Single-Active redundancy mode: When only a single PE, among all the PEs attached to an Ethernetsegment aresegment, is allowed to forwardknown unicasttraffic to/from that Ethernet segment for a given VLAN, then the Ethernet segment is definedto beas operating inAll-ActiveSingle-Active redundancy mode.(PBB-)EVPN: refers to both, PBB-EVPN and EVPN. This document uses this abbreviation when a given description applies to both technologies. (PBB-)VPLS: refers to both, PBB-VPLS and VPLS. This document uses this abbreviation when a given description applies to both technologies. VPLS A-D: refers to Virtual Private LAN Services with BGP-based Auto Discovery as in [RFC6074]. PW: Pseudowire I-SID: Ethernet Services Instance Identifier2. RequirementsFollowingThe following are the key requirements for backward compatibility between (PBB-)EVPN and (PBB-)VPLS: 1. The solution must allow for staged migration towards (PBB-)EVPN on a site-by-site basis per VPNinstance -instance, e.g., new EVPN sites to be provisioned on (PBB-)EVPN Provider Edge devices (PEs). 2. The solution must not require any changes to existing VPLS orPBB- VPLSPBB-VPLS PEs, not even a software upgrade. 3. The solution must allow for theco-existencecoexistence of PE devices running (PBB-)EVPN and (PBB-)VPLS for the same VPN instance andsingle-homedsingle- homed segments. 4. The solution must support single-active redundancy ofmulti-homedmultihomed networks andmulti-homedmultihomed devices for (PBB-)EVPN PEs. 5. Incasecases of single-active redundancy, the participant VPN instances may span across both (PBB-)EVPN PEs and (PBB-)VPLS PEs as long as the MHD or MHN is connected to (PBB-)EVPN PEs. 6.The supportSupport of the All-Active redundancy mode across both (PBB-)EVPN PEs and (PBB-)VPLS PEs is outside the scope of this document.All- ActiveAll-Active redundancy is not applicable to VPLS and PBB-VPLS. Therefore, when EVPN (or PBB-EVPN) PEs need to operate seamlessly with VPLS (or PBB-VPLS) PEs,thenthey MUST use a redundancy mode that is applicable to VPLS (or PBB-VPLS). This redundancy mode isSingle- Active.Single-Active. These requirements collectively allow for the seamless insertion ofthe(PBB-)EVPN technology intobrown-fieldbrownfield (PBB-)VPLS deployments.33. VPLS Integration with EVPN In order to support seamless integration with VPLS PEs, this document requires that VPLS PEs support VPLS A-D per[RFC6074][RFC6074], and it requires EVPN PEs to support both BGP EVPN routes per [RFC7432] and VPLS A-D per [RFC6074]. All the logic for seamless integration shall reside on the EVPN PEs. If a VPLS instance issetupset up without the use of VPLS A-D, it is still possible (but cumbersome) for EVPN PEs to integrateintothat VPLS instance by manually configuringPseudowirespseudowires (PWs) to all the VPLS PEs in that instance (i.e., the integration is no longer seamless).3.13.1. Capability Discovery The EVPN PEs MUST advertise both the BGP VPLSAuto-Discoveryauto-discovery (A-D) route as well as the BGP EVPN Inclusive Multicast Ethernet Tag (IMET) route for a given VPN instance. The VPLS PEs only advertise the BGP VPLS A-D route, per the procedures specified in [RFC4761], [RFC4762] and [RFC6074]. The operator may decide to use the same Route Target (RT) to identify a VPN on both EVPN and VPLS networks. In this case, when a VPLS PE receives the EVPN IMET route, it MUST ignore it on the basis that it belongs to an unknownSAFI.Subsequent Address Family Identifier (SAFI). However, the operator may choose to use two RTs--- one to identify the VPN on the VPLS network and another for the EVPN network -- and employRT-constrainedRT Constrain mechanisms [RFC4684] in order to prevent BGP EVPN routes from reaching the VPLS PEs. When an EVPN PE receives both a VPLS A-D route as well as an EVPN IMET route from a given remote PE for the same VPN instance, it MUST give preference to the EVPN route for the purpose of discovery. This ensures that, at the end of the route exchanges, allEVPN capableEVPN-capable PEs discover otherEVPN capableEVPN-capable PEs in addition to the VPLS-only PEs for that VPN instance. Furthermore, all the VPLS-only PEs will discover the EVPN PEs as if they were standard VPLS PEs. In other words, when the discovery phase is complete, the EVPN PEs will have discovered all the PEs in the VPN instance along with their associated capability (EVPN or VPLS-only), whereas the VPLS PEs will have discovered all the PEs in the VPN instance as if they were all VPLS- only PEs.3.23.2. Forwarding Setup and Unicast Operation The procedures for the forwarding state setup and unicast operation on the VPLS PE are per [RFC8077], [RFC4761], and [RFC4762]. The procedures for forwarding state setup and unicast operation on the EVPN PE are as follows: - The EVPN PE MUST establish a PW to each remote PE from which it has received only a VPLS A-D route for the corresponding VPNinstance,instance and MUST set up the label stack corresponding to the PW FEC. For seamless integration between EVPN and VPLS PEs, the PW that issetupset up between a pair of VPLS and EVPN PEs is between the VSI of the VPLS PE and the MAC-VRF of the EVPN PE. - The EVPN PE MUST set up the label stack corresponding to the MP2P VPN unicast FEC to any remote PE that has advertised an EVPN IMET route. - If an EVPN PE receives a VPLS A-D route from a given PE, it sets up a PW to that PE. If it then receives an EVPN IMET route from the same PE,thenthe EVPN PE MUST bring that PW operationally down. - If an EVPN PE receives an EVPN IMET route followed by a VPLS A-D route from the same PE, then the EVPN PE willsetupset up the PW but MUST keep it operationally down. - In case VPLS A-D is not used in some VPLS PEs, the EVPN PEs need to be provisioned manually with PWs to those remote VPLS PEs for each VPN instance. In that case, if an EVPN PE receives an EVPN IMET route from a PE to which a PW exists, the EVPN PE MUST bring the PW operationally down. When the EVPN PE receives traffic over the VPLS PWs, it learns the associated C-MAC addresses in thedata-plane.data plane. The C-MAC addresses learned over these PWs MUST be injected into the bridge table of the associated MAC-VRF on that EVPN PE. The learned C-MAC addresses MAY also be injected into the RIB/FIB tables of the associated MAC-VRF on that EVPN PE. For seamless integration between EVPN and VPLS PEs,sincebecause these PWs belong to the same split-horizon group([RFC4761](see [RFC4761] and [RFC4762]) as the MP2P EVPN service tunnels,thenthe C-MAC addresses learned and associatedtowith the PWs MUST NOT be advertised in the control plane to any remote EVPN PEs. This is because every EVPN PE can send and receive traffic directly to/from every VPLS PE belonging to the same VPNinstance and thusinstance; thus, every EVPN PE can learn the C-MAC addresses over the corresponding PWs directly. The C-MAC addresses learned over local Attachment Circuits (ACs) by an EVPN PE are learned indata-plane.the data plane. For EVPN PEs, these C-MAC addresses MUST be injected into the corresponding MAC-VRF and advertised in thecontrol-planecontrol plane using BGP EVPN routes. Furthermore, the C-MAC addresses learned in the control plane via the BGP EVPN routes sent by remote EVPNPEs,PEs are injected into the corresponding MAC-VRF table. In case of a link failure in a single-active EthernetSegment,segment, the EVPN PEs MUST perform both of the following tasks:a)1. send a BGPmass-withdrawmass withdraw to the EVPN peersb)2. follow existing VPLS MAC Flush procedures with the VPLSpeers. 3.3peers 3.3. MAC Mobility In EVPN, host addresses (C-MAC addresses) can move around among EVPN PEs or even between EVPN and VPLS PEs. When a C-MAC address moves from an EVPN PE to a VPLS PE,thenas soon asBroadcast/Unknown-unicast/MulticastBroadcast, Unknown Unicast, and Multicast (BUM) traffic is initiated from that MAC address, it is flooded to all other PEs (both VPLS and EVPNPEs)PEs), and the receiving PEs update their MAC tables (VSI or MAC- VRF). The EVPN PEs do not advertise the C-MAC addresses learned over the PW to each other because every EVPN PE learns them directly over its associated PW to that VPLS PE. If onlyknown-unicastknown unicast traffic is initiated from the moved C-MAC address toward a known C-MAC,then this canthe resultincan be the black-holing of traffic destined to the C-MAC that has moved until there isaBUM traffic that has been originated with the movedC- MACC-MAC address as the source MAC address (e.g., as a result of the MACage- outage-out timerexpires).expiring). Such black-holing happens for traffic destined to the moved C-MAC from both EVPN and VPLSPEs. It should be noted that such black-holing behaviorPEs and is typical for VPLS PEs. When a C-MAC address moves from a VPLS PE to an EVPN PE, then as soon as any traffic is initiated from that C-MAC address, the C-MAC is learned and advertised in the BGP to other EVPNPEsPEs, and the MAC mobility procedure isexercisedperformed among EVPN PEs. For BUM traffic, both EVPN and VPLS PEs learn the new location of the moved C-MAC address; however, if there is onlyknown-unicastknown unicast traffic, then only EVPN PEs learn the new location of the C-MAC that has movedbutand not VPLS PEs. This can result in the black-holing of traffic sent from VPLS PEs destined to the C-MAC that has moved until there isaBUM traffic originated with the moved C-MAC address as the source MAC address (e.g., as a result of the MAC age-out timerexpires).expiring). Such black-holing happens for traffic destined to the moved C-MAC for only VPLS PEs but not for EVPNPEs. It should be noted that such black-holing behaviorPEs and is typical for VPLS PEs.3.43.4. Multicast Operation3.4.13.4.1. Ingress Replication The procedures for multicast operation on the VPLSPE,PE using ingressreplication,replication are per [RFC4761], [RFC4762], and [RFC7080]. The procedures for multicast operation on the EVPNPE,PE for ingressreplication,replication are as follows: - The EVPN PE builds a replication sub-list to all the remote EVPN PEs per EVPN instance as the result of the exchange of the EVPN IMET routes per [RFC7432]. This will be referred to as sub-list A. It comprises MP2P service tunnels (for ingress replication) used for delivering EVPN BUM traffic [RFC7432]. - The EVPN PE builds a replication sub-list per VPLS instance to all the remote VPLS PEs. This will be referred to as sub-list B. It comprises PWs from the EVPN PE in question to all the remote VPLS PEs in the same VPLS instance. The replication list, maintained per VPN instance, on a given EVPN PE will be the union of sub-list A and sub-list B. The EVPN PE MUST enablesplit-horizonsplit horizon over all the entries in the replicationlist,list across both PWs and MP2P service tunnels.3.4.23.4.2. P2MP Tunnel The procedures for multicast operation on the EVPN PEs using P2MP tunnels are outside of the scope of this document.44. PBB-VPLS Integration with PBB-EVPN In order to support seamless integration between PBB-VPLS and PBB- EVPN PEs, this document requires that PBB-VPLS PEs support VPLS A-D per [RFC6074] and PBB-EVPN PEs support both BGP EVPN routes per [RFC7432] and VPLS A-D per [RFC6074]. All the logic for this seamless integration shall reside on the PBB-EVPN PEs.4.14.1. Capability Discovery The procedures for capability discovery are per Section3.1 above. 4.23.1. 4.2. Forwarding Setup and Unicast Operation The procedures for forwarding state setup and unicast operation on the PBB-VPLS PE are per [RFC8077] and [RFC7080]. The procedures for forwarding state setup and unicast operation on the PBB-EVPN PE are as follows: - The PBB-EVPN PE MUST establish a PW to each remote PBB-VPLS PE from which it has received only a VPLS A-D route for the corresponding VPNinstance,instance and MUST set up the label stack corresponding to the PW FEC. For seamless integration between PBB-EVPN and PBB-VPLS PEs, the PW that issetupset up between a pair of PBB-VPLS and PBB-EVPNPEs,PEs is between the B-components of PBB-EVPN PE and PBB-VPLS PE persectionSection 4 of [RFC7041]. - The PBB-EVPN PE MUST set up the label stack corresponding to the MP2P VPN unicast FEC to any remote PBB-EVPN PE that has advertised an EVPN IMET route. - If a PBB-EVPN PE receives a VPLS A-D route from a given PE, it sets up a PW to that PE. If it then receives an EVPN IMET route from the same PE,thenthe PBB-EVPN PE MUST bring that PW operationally down. - If a PBB-EVPN PE receives an EVPN IMET route followed by a VPLS A-D route from the same PE, then the PBB-EVPN PE willsetupset up the PW but MUST keep it operationally down. - In case VPLS A-D is not used in some PBB-VPLS PEs, the PBB-EVPN PEs need to be provisioned manually with PWs to those remotePBB-VPLSPBB- VPLS PEs for each VPN instance. In that case, if a PBB-EVPN PE receives an EVPN IMET route from a PE to which a PW exists, the PBB-EVPN PE MUST bring the PW operationally down. - When the PBB-EVPN PE receives traffic over the PBB-VPLS PWs, it learns the associated B-MAC addresses in thedata-plane.data plane. The B-MAC addresses learned over these PWs MUST be injected into the bridge table of the associated MAC-VRF on that PBB-EVPN PE. The learnedB- MACB-MAC addresses MAY also be injected into the RIB/FIB tables of the associatedtheMAC-VRF on that BPP-EVPN PE. For seamless integration between PBB-EVPN and PBB-VPLS PEs, since these PWsbelongsbelong to the same split-horizon group as the MP2P EVPN service tunnels,thenthe B-MAC addresses learned and associatedtowith the PWs MUST NOT be advertised in the control plane to any remote PBB-EVPN PEs. This is because every PBB-EVPN PE can send and receive traffic directly to/from every PBB-VPLS PE belonging to the same VPN instance. - The C-MAC addresses learned over local Attachment Circuits (ACs) byana PBB-EVPN PE are learned indata-plane.the data plane. For PBB-EVPN PEs, theseC- MACC-MAC addresses are learned in the I-component of PBB-EVPN PEs andtheyare not advertised in thecontrol-planecontrol plane, per [RFC7623]. - The B-MAC addresses learned in the control plane via the BGP EVPN routes sent by remote PBB-EVPNPEs,PEs are injected into the corresponding MAC-VRF table. In case of a link failure in a single-active EthernetSegment,segment, the PBB-EVPN PEs MUST perform both of the following tasks:a)1. send a BGP B-MAC withdraw message to the PBB-EVPN peersOR*or* MAC advertisement with the MAC Mobility extended communityb)2. follow existing VPLS MAC Flush procedures with the PBB-VPLS peers4.34.3. MAC Mobility In PBB-EVPN, a given B-MAC address can be learned either over the BGPcontrol-planecontrol plane from a remote PBB-EVPNPE,PE or in thedata-planedata plane over a PW from a remote PBB-VPLS PE. There is no mobility associated withB- MACB-MAC addresses in this context. Hence, when the same B-MAC address shows up behind both a remote PBB-VPLS PE as well as a PBB-EVPN PE, the local PE can deduce that it is an anomaly and SHOULD notify the operator.4.44.4. Multicast Operation4.4.14.4.1. Ingress Replication The procedures for multicast operation on the PBB-VPLSPE,PE using ingressreplication,replication are per [RFC7041] and [RFC7080]. The procedures for multicast operation on the PBB-EVPNPE,PE for ingressreplication,replication are as follows: - The PBB-EVPN PE builds a replication sub-list per I-SID to all the remote PBB-EVPN PEs in a given VPN instance as a result of the exchange of the EVPN IMET routes, as described in [RFC7623]. This will be referred to as sub-list A. It comprises MP2P service tunnels used for delivering PBB-EVPN BUM traffic. - The PBB-EVPN PE builds a replication sub-list per VPN instance to all the remote PBB-VPLS PEs. This will be referred to as sub-list B. It comprises PWs from the PBB-EVPN PE in question to all the remote PBB-VPLS PEs in the same VPN instance. - The PBB-EVPN PE may further prune sub-listB,B on aper I-SID basis,per-I-SID basis by running[MMRP]MMRP (see Clause 10 of [IEEE.802.1Q]) over the PBB-VPLS network. This will be referred to as sub-list C. This list comprises a pruned set of the PWs inthesub-list B. The replication list maintained per I-SID on a given PBB-EVPN PE will be the union of sub-list A and sub-list B if[MMRP]MMRP is notused,used and the union of sub-list A and sub-list C if[MMRP]MMRP is used. Note that the PE MUST enablesplit-horizonsplit horizon over all the entries in the replication list, across both pseudowires and MP2P service tunnels.4.4.24.4.2. P2MPTunnel -Tunnel: Inclusive Tree The procedures for multicast operation on the PBB-EVPN PEs using P2MP tunnels are outside of the scope of this document.55. Security Considerations All the security considerations in [RFC4761], [RFC4762], [RFC7080], [RFC7432], and [RFC7623] apply directly to this document becausethis documentit leverages thecontrol planecontrol-plane andthe data planedata-plane procedures described inthesethose RFCs. This document does not introduce any new security considerations beyondthatthose of the above RFCs because the advertisements and processing of MAC addresses in BGP followthat of [RFC7432][RFC7432], and the processing of MAC addresses learned over PWsfollow that offollows [RFC4761], [RFC4762], and [RFC7080].66. IANA Considerations This document has noactions for IANA. 7IANA actions. 7. References7.17.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March<https://www.rfc- editor.org/info/rfc2119>. [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <https://www.rfc-editor.org/info/rfc8174>. [RFC8077] Martini, et al., "Pseudowire Setup and Maintenance using the Label Distribution Protocol", RFC 8077, February 2017. [RFC7432] Sajassi et al., "BGP MPLS Based Ethernet VPN", RFC 7432, February, 2015. [RFC7623] Sajassi et al., "Provider Backbone Bridging Combined with Ethernet VPN (PBB-EVPN)", RFC 7623, September, 2015.1997, <https://www.rfc-editor.org/info/rfc2119>. [RFC4761] Kompella, K.,Ed.,Ed. and Y. Rekhter, Ed., "Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling", RFC 4761, DOI 10.17487/RFC4761, January 2007,<http://www.rfc- editor.org/info/rfc4761>.<https://www.rfc-editor.org/info/rfc4761>. [RFC4762] Lasserre, M.,Ed.,Ed. and V. Kompella, Ed., "Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007,<http://www.rfc- editor.org/info/rfc4762>. [RFC7041] Balus et al., "Extensions to VPLS PE model for Provider Backbone Bridging", RFC 7041, November 2013.<https://www.rfc-editor.org/info/rfc4762>. [RFC6074]Rosen et al.,Rosen, E., Davie, B., Radoaca, V., and W. Luo, "Provisioning, Auto-Discovery, and Signaling in Layer 2 Virtual Private Networks (L2VPNs)", RFC 6074, DOI 10.17487/RFC6074, January2011. 7.2 Informative References [MMRP] Clause 10 of "IEEE Standard for Local and metropolitan area networks - Media Access Control (MAC) Bridges2011, <https://www.rfc-editor.org/info/rfc6074>. [RFC7041] Balus, F., Ed., Sajassi, A., Ed., and N. Bitar, Ed., "Extensions to the VirtualBridged Local Area Networks", IEEE Std 802.1Q, 2013. [RFC7080] Sajassi et al., "VPLS Interoperability withPrivate LAN Service (VPLS) Provider Edge (PE) Model for Provider BackboneBridges",Bridging", RFC7080, December, 2013. [IEEE.802.1ah]7041, DOI 10.17487/RFC7041, November 2013, <https://www.rfc-editor.org/info/rfc7041>. [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A., Uttaro, J., Drake, J., and W. Henderickx, "BGP MPLS-Based Ethernet VPN", RFC 7432, DOI 10.17487/RFC7432, February 2015, <https://www.rfc-editor.org/info/rfc7432>. [RFC7623] Sajassi, A., Ed., Salam, S., Bitar, N., Isaac, A., and W. Henderickx, "Provider Backbone Bridging Combined with Ethernet VPN (PBB-EVPN)", RFC 7623, DOI 10.17487/RFC7623, September 2015, <https://www.rfc-editor.org/info/rfc7623>. [RFC8077] Martini, L., Ed. and G. Heron, Ed., "Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)", STD 84, RFC 8077, DOI 10.17487/RFC8077, February 2017, <https://www.rfc-editor.org/info/rfc8077>. [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <https://www.rfc-editor.org/info/rfc8174>. 7.2. Informative References [IEEE.802.1Q] IEEE, "IEEE Standard for Local andmetropolitan area networks - Media Access Control (MAC)Metropolitan Area Network -- Bridges andVirtualBridgedLocal AreaNetworks",Clauses 25 and 26,IEEEStdStandard 802.1Q, DOI10.1109/IEEESTD.2011.6009146.10.1109/IEEESTD.2018.8403927, July 2018. [RFC4684]Marques et al.,Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, R., Patel, K., and J. Guichard, "Constrained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs)", RFC 4684,November, 2006.DOI 10.17487/RFC4684, November 2006, <https://www.rfc-editor.org/info/rfc4684>. [RFC7080] Sajassi, A., Salam, S., Bitar, N., and F. Balus, "Virtual Private LAN Service (VPLS) Interoperability with Provider Backbone Bridges", RFC 7080, DOI 10.17487/RFC7080, December 2013, <https://www.rfc-editor.org/info/rfc7080>. Authors' Addresses Ali Sajassi (editor) Cisco Email: sajassi@cisco.com Samer Salam Cisco Email: ssalam@cisco.com Nick Del Regno Verizon Email: nick.delregno@verizon.com Jorge Rabadan Nokia Email: jorge.rabadan@nokia.com