rfc9014v2.txt | rfc9014.txt | |||
---|---|---|---|---|
skipping to change at line 24 ¶ | skipping to change at line 24 ¶ | |||
Abstract | Abstract | |||
This document describes how Network Virtualization Overlays (NVOs) | This document describes how Network Virtualization Overlays (NVOs) | |||
can be connected to a Wide Area Network (WAN) in order to extend the | can be connected to a Wide Area Network (WAN) in order to extend the | |||
Layer 2 connectivity required for some tenants. The solution | Layer 2 connectivity required for some tenants. The solution | |||
analyzes the interaction between NVO networks running Ethernet | analyzes the interaction between NVO networks running Ethernet | |||
Virtual Private Networks (EVPNs) and other Layer 2 VPN (L2VPN) | Virtual Private Networks (EVPNs) and other Layer 2 VPN (L2VPN) | |||
technologies used in the WAN, such as Virtual Private LAN Services | technologies used in the WAN, such as Virtual Private LAN Services | |||
(VPLSs), VPLS extensions for Provider Backbone Bridging (PBB-VPLS), | (VPLSs), VPLS extensions for Provider Backbone Bridging (PBB-VPLS), | |||
EVPN, or PBB-EVPN. It also describes how the existing technical | EVPN, or PBB-EVPN. It also describes how the existing technical | |||
specifications apply to the Interconnection and extends the EVPN | specifications apply to the interconnection and extends the EVPN | |||
procedures needed in some cases. In particular, this document | procedures needed in some cases. In particular, this document | |||
describes how EVPN routes are processed on Gateways (GWs) that | describes how EVPN routes are processed on Gateways (GWs) that | |||
interconnect EVPN-Overlay and EVPN-MPLS networks, as well as the | interconnect EVPN-Overlay and EVPN-MPLS networks, as well as the | |||
Interconnect Ethernet Segment (I-ES), to provide multihoming. This | Interconnect Ethernet Segment (I-ES), to provide multihoming. This | |||
document also describes the use of the Unknown MAC Route (UMR) to | document also describes the use of the Unknown MAC Route (UMR) to | |||
avoid issues of a Media Access Control (MAC) scale on Data Center | avoid issues of a Media Access Control (MAC) scale on Data Center | |||
Network Virtualization Edge (NVE) devices. | Network Virtualization Edge (NVE) devices. | |||
Status of This Memo | Status of This Memo | |||
skipping to change at line 130 ¶ | skipping to change at line 130 ¶ | |||
[RFC4761] [RFC4762], VPLS extensions for Provider Backbone Bridging | [RFC4761] [RFC4762], VPLS extensions for Provider Backbone Bridging | |||
(PBB-VPLS) [RFC7041], EVPN [RFC7432], or PBB-EVPN [RFC7623] network | (PBB-VPLS) [RFC7041], EVPN [RFC7432], or PBB-EVPN [RFC7623] network | |||
that has to be used to interconnect Data Centers and WAN VPN users. | that has to be used to interconnect Data Centers and WAN VPN users. | |||
A Gateway (GW) function is required in these cases. In fact, | A Gateway (GW) function is required in these cases. In fact, | |||
[RFC8365] discusses two main Data Center Interconnect (DCI) solution | [RFC8365] discusses two main Data Center Interconnect (DCI) solution | |||
groups: "DCI using GWs" and "DCI using ASBRs". This document | groups: "DCI using GWs" and "DCI using ASBRs". This document | |||
specifies the solutions that correspond to the "DCI using GWs" group. | specifies the solutions that correspond to the "DCI using GWs" group. | |||
It is assumed that the NVO GW and the WAN Edge functions can be | It is assumed that the NVO GW and the WAN Edge functions can be | |||
decoupled into two separate systems or integrated into the same | decoupled into two separate systems or integrated into the same | |||
system. The former option will be referred to as "Decoupled | system. The former option will be referred to as "decoupled | |||
Interconnect solution" throughout the document, whereas the latter | interconnect solution" throughout the document, whereas the latter | |||
one will be referred to as "Integrated Interconnect solution". | one will be referred to as "integrated interconnect solution". | |||
The specified procedures are local to the redundant GWs connecting a | The specified procedures are local to the redundant GWs connecting a | |||
DC to the WAN. The document does not preclude any combination across | DC to the WAN. The document does not preclude any combination across | |||
different DCs for the same tenant. For instance, a "Decoupled" | different DCs for the same tenant. For instance, a "Decoupled" | |||
solution can be used in GW1 and GW2 (for DC1), and an "Integrated" | solution can be used in GW1 and GW2 (for DC1), and an "Integrated" | |||
solution can be used in GW3 and GW4 (for DC2). | solution can be used in GW3 and GW4 (for DC2). | |||
While the Gateways and WAN Provider Edges (PEs) use existing | While the Gateways and WAN Provider Edges (PEs) use existing | |||
specifications in some cases, the document also defines extensions | specifications in some cases, the document also defines extensions | |||
that are specific to DCI. In particular, those extensions are: | that are specific to DCI. In particular, those extensions are: | |||
skipping to change at line 250 ¶ | skipping to change at line 250 ¶ | |||
VNI/VSID: refers to VXLAN/NVGRE virtual identifiers | VNI/VSID: refers to VXLAN/NVGRE virtual identifiers | |||
VPLS: Virtual Private LAN Service | VPLS: Virtual Private LAN Service | |||
VSI: Virtual Switch Instance or VPLS instance in a particular PE | VSI: Virtual Switch Instance or VPLS instance in a particular PE | |||
VXLAN: Virtual eXtensible LAN | VXLAN: Virtual eXtensible LAN | |||
3. Decoupled Interconnect Solution for EVPN-Overlay Networks | 3. Decoupled Interconnect Solution for EVPN-Overlay Networks | |||
This section describes the Interconnect solution when the GW and WAN | This section describes the interconnect solution when the GW and WAN | |||
Edge functions are implemented in different systems. Figure 1 | Edge functions are implemented in different systems. Figure 1 | |||
depicts the reference model described in this section. Note that, | depicts the reference model described in this section. Note that, | |||
although not shown in Figure 1, GWs may have local Attachment | although not shown in Figure 1, GWs may have local Attachment | |||
Circuits (ACs). | Circuits (ACs). | |||
+--+ | +--+ | |||
|CE| | |CE| | |||
+--+ | +--+ | |||
| | | | |||
+----+ | +----+ | |||
skipping to change at line 285 ¶ | skipping to change at line 285 ¶ | |||
|<-EVPN-Overlay-->|<-VLAN->|<-WAN L2VPN->|<--PW-->|<--EVPN-Overlay->| | |<-EVPN-Overlay-->|<-VLAN->|<-WAN L2VPN->|<--PW-->|<--EVPN-Overlay->| | |||
handoff handoff | handoff handoff | |||
Figure 1: Decoupled Interconnect Model | Figure 1: Decoupled Interconnect Model | |||
The following section describes the interconnect requirements for | The following section describes the interconnect requirements for | |||
this model. | this model. | |||
3.1. Interconnect Requirements | 3.1. Interconnect Requirements | |||
The Decoupled Interconnect architecture is intended to be deployed in | The decoupled interconnect architecture is intended to be deployed in | |||
networks where the EVPN-Overlay and WAN providers are different | networks where the EVPN-Overlay and WAN providers are different | |||
entities and a clear demarcation is needed. This solution solves the | entities and a clear demarcation is needed. This solution solves the | |||
following requirements: | following requirements: | |||
* A simple connectivity handoff between the EVPN-Overlay network | * A simple connectivity handoff between the EVPN-Overlay network | |||
provider and the WAN provider so that QoS and security enforcement | provider and the WAN provider so that QoS and security enforcement | |||
are easily accomplished. | are easily accomplished. | |||
* Independence of the L2VPN technology deployed in the WAN. | * Independence of the L2VPN technology deployed in the WAN. | |||
skipping to change at line 336 ¶ | skipping to change at line 336 ¶ | |||
between both providers. The disadvantage of this model is the | between both providers. The disadvantage of this model is the | |||
provisioning overhead, since the service has to be mapped to a C-TAG | provisioning overhead, since the service has to be mapped to a C-TAG | |||
or S/C-TAG VLAN ID combination at both GW and WAN Edge routers. | or S/C-TAG VLAN ID combination at both GW and WAN Edge routers. | |||
In this model, the GW acts as a regular Network Virtualization Edge | In this model, the GW acts as a regular Network Virtualization Edge | |||
(NVE) towards the DC. Its control plane, data plane procedures, and | (NVE) towards the DC. Its control plane, data plane procedures, and | |||
interactions are described in [RFC8365]. | interactions are described in [RFC8365]. | |||
The WAN Edge router acts as a (PBB-)VPLS or (PBB-)EVPN PE with | The WAN Edge router acts as a (PBB-)VPLS or (PBB-)EVPN PE with | |||
Attachment Circuits (ACs) to the GWs. Its functions are described in | Attachment Circuits (ACs) to the GWs. Its functions are described in | |||
[RFC4761], [RFC4762], [RFC6074] or [RFC7432], [RFC7623]. | [RFC4761], [RFC4762], [RFC6074], [RFC7432], and [RFC7623]. | |||
3.3. PW-Based Handoff | 3.3. PW-Based Handoff | |||
If MPLS between the GW and the WAN Edge router is an option, a PW- | If MPLS between the GW and the WAN Edge router is an option, a PW- | |||
based Interconnect solution can be deployed. In this option, the | based interconnect solution can be deployed. In this option, the | |||
handoff between both routers is based on FEC128-based PWs [RFC4762] | handoff between both routers is based on FEC128-based PWs [RFC4762] | |||
or FEC129-based PWs (for a greater level of network automation) | or FEC129-based PWs (for a greater level of network automation) | |||
[RFC6074]. Note that this model still provides a clear demarcation | [RFC6074]. Note that this model still provides a clear demarcation | |||
between DC and WAN (since there is a single PW between each MAC-VRF | between DC and WAN (since there is a single PW between each MAC-VRF | |||
and peer VSI), and security/QoS policies may be applied on a per-PW | and peer VSI), and security/QoS policies may be applied on a per-PW | |||
basis. This model provides better scalability than a C-TAG-based | basis. This model provides better scalability than a C-TAG-based | |||
handoff and less provisioning overhead than a combined C/S-TAG | handoff and less provisioning overhead than a combined C/S-TAG | |||
handoff. The PW-based handoff interconnect is illustrated in | handoff. The PW-based handoff interconnect is illustrated in | |||
Figure 1 (between the NVO-2 GWs and the WAN Edge routers). | Figure 1 (between the NVO-2 GWs and the WAN Edge routers). | |||
skipping to change at line 377 ¶ | skipping to change at line 377 ¶ | |||
the EVPN instance) uses a combination of a PW label and VLAN IDs. | the EVPN instance) uses a combination of a PW label and VLAN IDs. | |||
PWs are treated as service interfaces, defined in [RFC7432]. | PWs are treated as service interfaces, defined in [RFC7432]. | |||
3.4. Multihoming Solution on the GWs | 3.4. Multihoming Solution on the GWs | |||
EVPN single-active multihoming -- i.e., per-service load-balancing | EVPN single-active multihoming -- i.e., per-service load-balancing | |||
multihoming -- is required in this type of interconnect. | multihoming -- is required in this type of interconnect. | |||
The GWs will be provisioned with a unique ES for each WAN | The GWs will be provisioned with a unique ES for each WAN | |||
interconnect, and the handoff attachment circuits or PWs between the | interconnect, and the handoff attachment circuits or PWs between the | |||
GW and the WAN Edge router will be assigned an ESI for such ES. The | GW and the WAN Edge router will be assigned an ESI for each such ES. | |||
ESI will be administratively configured on the GWs according to the | The ESI will be administratively configured on the GWs according to | |||
procedures in [RFC7432]. This Interconnect ES will be referred to as | the procedures in [RFC7432]. This I-ES will be referred to as "I-ES" | |||
"I-ES" hereafter, and its identifier will be referred to as "I-ESI". | hereafter, and its identifier will be referred to as "I-ESI". | |||
Different ESI types are described in [RFC7432]. The use of Type 0 | Different ESI types are described in [RFC7432]. The use of Type 0 | |||
for the I-ESI is RECOMMENDED in this document. | for the I-ESI is RECOMMENDED in this document. | |||
The solution (on the GWs) MUST follow the single-active multihoming | The solution (on the GWs) MUST follow the single-active multihoming | |||
procedures as described in [RFC8365] for the provisioned I-ESI -- | procedures as described in [RFC8365] for the provisioned I-ESI -- | |||
i.e., Ethernet A-D routes per ES and per EVI will be advertised to | i.e., Ethernet A-D routes per ES and per EVI will be advertised to | |||
the DC NVEs for the multihoming functions, and ES routes will be | the DC NVEs for the multihoming functions, and ES routes will be | |||
advertised so that ES discovery and Designated Forwarder (DF) | advertised so that ES discovery and Designated Forwarder (DF) | |||
procedures can be followed. The MAC addresses learned (in the data | procedures can be followed. The MAC addresses learned (in the data | |||
plane) on the handoff links will be advertised with the I-ESI encoded | plane) on the handoff links will be advertised with the I-ESI encoded | |||
skipping to change at line 465 ¶ | skipping to change at line 465 ¶ | |||
3.5.3. Handling Failures between GW and WAN Edge Routers | 3.5.3. Handling Failures between GW and WAN Edge Routers | |||
Link/PE failures are handled on the GWs as specified in [RFC7432]. | Link/PE failures are handled on the GWs as specified in [RFC7432]. | |||
The GW detecting the failure will withdraw the EVPN routes, as per | The GW detecting the failure will withdraw the EVPN routes, as per | |||
[RFC7432]. | [RFC7432]. | |||
Individual AC/PW failures may be detected by OAM mechanisms. For | Individual AC/PW failures may be detected by OAM mechanisms. For | |||
instance: | instance: | |||
* If the Interconnect solution is based on a VLAN handoff, Ethernet- | * If the interconnect solution is based on a VLAN handoff, Ethernet- | |||
CFM [IEEE.802.1AG] [Y.1731] may be used to detect individual AC | CFM [IEEE.802.1AG] [Y.1731] may be used to detect individual AC | |||
failures on both the GW and WAN Edge router. An individual AC | failures on both the GW and WAN Edge router. An individual AC | |||
failure will trigger the withdrawal of the corresponding A-D per | failure will trigger the withdrawal of the corresponding A-D per | |||
EVI route as well as the MACs learned on that AC. | EVI route as well as the MACs learned on that AC. | |||
* If the Interconnect solution is based on a PW handoff, the Label | * If the interconnect solution is based on a PW handoff, the Label | |||
Distribution Protocol (LDP) PW Status bits TLV [RFC6870] may be | Distribution Protocol (LDP) PW Status bits TLV [RFC6870] may be | |||
used to detect individual PW failures on both the GW and WAN Edge | used to detect individual PW failures on both the GW and WAN Edge | |||
router. | router. | |||
4. Integrated Interconnect Solution for EVPN-Overlay Networks | 4. Integrated Interconnect Solution for EVPN-Overlay Networks | |||
When the DC and the WAN are operated by the same administrative | When the DC and the WAN are operated by the same administrative | |||
entity, the Service Provider can decide to integrate the GW and WAN | entity, the Service Provider can decide to integrate the GW and WAN | |||
Edge PE functions in the same router for obvious reasons to save as | Edge PE functions in the same router for obvious reasons to save as | |||
relates to Capital Expenditure (CAPEX) and Operating Expenses (OPEX). | relates to Capital Expenditure (CAPEX) and Operating Expenses (OPEX). | |||
skipping to change at line 511 ¶ | skipping to change at line 511 ¶ | |||
|NVE2|--| +---+ +---+ |--|NVE4| | |NVE2|--| +---+ +---+ |--|NVE4| | |||
+----+ +---------+ | | +---------+ +----+ | +----+ +---------+ | | +---------+ +----+ | |||
+--------------+ | +--------------+ | |||
|<--EVPN-Overlay--->|<-----VPLS--->|<---EVPN-Overlay-->| | |<--EVPN-Overlay--->|<-----VPLS--->|<---EVPN-Overlay-->| | |||
|<--PBB-VPLS-->| | |<--PBB-VPLS-->| | |||
Interconnect -> |<-EVPN-MPLS-->| | Interconnect -> |<-EVPN-MPLS-->| | |||
options |<--EVPN-Ovl-->|* | options |<--EVPN-Ovl-->|* | |||
|<--PBB-EVPN-->| | |<--PBB-EVPN-->| | |||
* EVPN-Ovl stands for EVPN-Overlay (and it's an Interconnect option). | * EVPN-Ovl stands for EVPN-Overlay (and it's an interconnect option). | |||
Figure 2: Integrated Interconnect Model | Figure 2: Integrated Interconnect Model | |||
4.1. Interconnect Requirements | 4.1. Interconnect Requirements | |||
The Integrated Interconnect solution meets the following | The integrated interconnect solution meets the following | |||
requirements: | requirements: | |||
* Control plane and data plane interworking between the EVPN-Overlay | * Control plane and data plane interworking between the EVPN-Overlay | |||
network and the L2VPN technology supported in the WAN, | network and the L2VPN technology supported in the WAN, | |||
irrespective of the technology choice -- i.e., (PBB-)VPLS or | irrespective of the technology choice -- i.e., (PBB-)VPLS or | |||
(PBB-)EVPN, as depicted in Figure 2. | (PBB-)EVPN, as depicted in Figure 2. | |||
* Multihoming, including single-active multihoming with per-service | * Multihoming, including single-active multihoming with per-service | |||
load balancing or all-active multihoming -- i.e., per-flow load- | load balancing or all-active multihoming -- i.e., per-flow load- | |||
balancing -- as long as the technology deployed in the WAN | balancing -- as long as the technology deployed in the WAN | |||
skipping to change at line 616 ¶ | skipping to change at line 616 ¶ | |||
4.3.1. Control/Data Plane Setup Procedures on the GWs | 4.3.1. Control/Data Plane Setup Procedures on the GWs | |||
In this case, there is no impact on the procedures described in | In this case, there is no impact on the procedures described in | |||
[RFC7041] for the B-component. However, the I-component instances | [RFC7041] for the B-component. However, the I-component instances | |||
become EVI instances with EVPN-Overlay bindings and potentially local | become EVI instances with EVPN-Overlay bindings and potentially local | |||
attachment circuits. A number of MAC-VRF instances can be | attachment circuits. A number of MAC-VRF instances can be | |||
multiplexed into the same B-component instance. This option provides | multiplexed into the same B-component instance. This option provides | |||
significant savings in terms of PWs to be maintained in the WAN. | significant savings in terms of PWs to be maintained in the WAN. | |||
The I-ESI concept described in Section 4.2.1 will also be used for | The I-ESI concept described in Section 4.2.1 will also be used for | |||
the PBB-VPLS-based Interconnect. | the PBB-VPLS-based interconnect. | |||
B-component PWs and I-component EVPN-Overlay bindings established to | B-component PWs and I-component EVPN-Overlay bindings established to | |||
the same far end will be compared. The following rules will be | the same far end will be compared. The following rules will be | |||
observed: | observed: | |||
* Attempts to set up a PW between the two GWs within the B-component | * Attempts to set up a PW between the two GWs within the B-component | |||
context will never be blocked. | context will never be blocked. | |||
* If a PW exists between two GWs for the B-component and an attempt | * If a PW exists between two GWs for the B-component and an attempt | |||
is made to set up an EVPN binding on an I-component linked to that | is made to set up an EVPN binding on an I-component linked to that | |||
B-component, the EVPN binding will be kept down operationally. | B-component, the EVPN binding will be kept down operationally. | |||
Note that the BGP EVPN routes will still be valid but not used. | Note that the BGP EVPN routes will still be valid but not used. | |||
* The EVPN binding will only be up and used as long as there is no | * The EVPN binding will only be up and used as long as there is no | |||
PW to the same far end in the corresponding B-component. The EVPN | PW to the same far end in the corresponding B-component. The EVPN | |||
bindings in the I-components will be brought down before the PW in | bindings in the I-components will be brought down before the PW in | |||
the B-component is brought up. | the B-component is brought up. | |||
The optimization procedures described in Section 3.5 can also be | The optimization procedures described in Section 3.5 can also be | |||
applied to this Interconnect option. | applied to this interconnect option. | |||
4.3.2. Multihoming Procedures on the GWs | 4.3.2. Multihoming Procedures on the GWs | |||
This model supports single-active multihoming on the GWs. All-active | This model supports single-active multihoming on the GWs. All-active | |||
multihoming is not supported by this scenario. | multihoming is not supported by this scenario. | |||
The single-active multihoming procedures as described by [RFC8365] | The single-active multihoming procedures as described by [RFC8365] | |||
will be followed for the I-ES for each EVI instance connected to the | will be followed for the I-ES for each EVI instance connected to the | |||
B-component. Note that in this case, for a given EVI, all the EVPN | B-component. Note that in this case, for a given EVI, all the EVPN | |||
bindings in the I-component are assigned to the I-ES. The non-DF GW | bindings in the I-component are assigned to the I-ES. The non-DF GW | |||
skipping to change at line 731 ¶ | skipping to change at line 731 ¶ | |||
Ethernet-Tag values. | Ethernet-Tag values. | |||
* Inclusive Multicast routes with independent tunnel-type value for | * Inclusive Multicast routes with independent tunnel-type value for | |||
the WAN and DC. For example, a P2MP Label Switched Path (LSP) may | the WAN and DC. For example, a P2MP Label Switched Path (LSP) may | |||
be used in the WAN, whereas ingress replication may be used in the | be used in the WAN, whereas ingress replication may be used in the | |||
DC. The routes sent to the WAN and the DC will have a consistent | DC. The routes sent to the WAN and the DC will have a consistent | |||
Ethernet-Tag. | Ethernet-Tag. | |||
* MAC/IP advertisement routes for MAC addresses learned in local | * MAC/IP advertisement routes for MAC addresses learned in local | |||
attachment circuits. Note that these routes will not include the | attachment circuits. Note that these routes will not include the | |||
I-ESI, but ESI=0 or different from 0 for local multihomed Ethernet | I-ESI value in the ESI field. These routes will include a zero | |||
Segments (ES). The routes sent to the WAN and the DC will have a | ESI or a non-zero ESI for local multihomed Ethernet Segments (ES). | |||
consistent Ethernet-Tag. | The routes sent to the WAN and the DC will have a consistent | |||
Ethernet-Tag. | ||||
Assuming GW1 and GW2 are peer GWs of the same DC, each GW will | Assuming GW1 and GW2 are peer GWs of the same DC, each GW will | |||
generate two sets of the above local service routes: set-DC will be | generate two sets of the above local service routes: set-DC will be | |||
sent to the DC RRs and will include an A-D per EVI, Inclusive | sent to the DC RRs and will include an A-D per EVI, Inclusive | |||
Multicast, and MAC/IP routes for the DC encapsulation and RT. Set- | Multicast, and MAC/IP routes for the DC encapsulation and RT. Set- | |||
WAN will be sent to the WAN RRs and will include the same routes but | WAN will be sent to the WAN RRs and will include the same routes but | |||
using the WAN RT and encapsulation. GW1 and GW2 will receive each | using the WAN RT and encapsulation. GW1 and GW2 will receive each | |||
other's set-DC and set-WAN. This is the expected behavior on GW1 and | other's set-DC and set-WAN. This is the expected behavior on GW1 and | |||
GW2 for locally generated routes: | GW2 for locally generated routes: | |||
skipping to change at line 913 ¶ | skipping to change at line 914 ¶ | |||
MAC Mobility event. Only when the MAC moves from the WAN domain to | MAC Mobility event. Only when the MAC moves from the WAN domain to | |||
the DC domain (or from one DC to another) will the MAC be learned | the DC domain (or from one DC to another) will the MAC be learned | |||
from a different ES, and the MAC Mobility procedures will kick in. | from a different ES, and the MAC Mobility procedures will kick in. | |||
The sticky-bit indication in the MAC Mobility extended community MUST | The sticky-bit indication in the MAC Mobility extended community MUST | |||
be propagated between domains. | be propagated between domains. | |||
4.4.5. Gateway Optimizations | 4.4.5. Gateway Optimizations | |||
All the Gateway optimizations described in Section 3.5 MAY be applied | All the Gateway optimizations described in Section 3.5 MAY be applied | |||
to the GWs when the Interconnect is based on EVPN-MPLS. | to the GWs when the interconnect is based on EVPN-MPLS. | |||
In particular, the use of the Unknown MAC Route, as described in | In particular, the use of the Unknown MAC Route, as described in | |||
Section 3.5.1, solves some transient packet-duplication issues in | Section 3.5.1, solves some transient packet-duplication issues in | |||
cases of all-active multihoming, as explained below. | cases of all-active multihoming, as explained below. | |||
Consider the diagram in Figure 2 for EVPN-MPLS Interconnect and all- | Consider the diagram in Figure 2 for EVPN-MPLS interconnect and all- | |||
active multihoming, and the following sequence: | active multihoming, and the following sequence: | |||
(a) MAC Address M1 is advertised from NVE3 in EVI-1. | (a) MAC Address M1 is advertised from NVE3 in EVI-1. | |||
(b) GW3 and GW4 learn M1 for EVI-1 and re-advertise M1 to the WAN | (b) GW3 and GW4 learn M1 for EVI-1 and re-advertise M1 to the WAN | |||
with I-ESI-2 in the ESI field. | with I-ESI-2 in the ESI field. | |||
(c) GW1 and GW2 learn M1 and install GW3/GW4 as next hops following | (c) GW1 and GW2 learn M1 and install GW3/GW4 as next hops following | |||
the EVPN aliasing procedures. | the EVPN aliasing procedures. | |||
skipping to change at line 947 ¶ | skipping to change at line 948 ¶ | |||
packet duplication. However, because the Unknown MAC Route had | packet duplication. However, because the Unknown MAC Route had | |||
been advertised into the DC, NVE1 will unicast the packet to | been advertised into the DC, NVE1 will unicast the packet to | |||
either GW1 or GW2. | either GW1 or GW2. | |||
(e) Since both GW1 and GW2 know M1, the GW receiving the packet will | (e) Since both GW1 and GW2 know M1, the GW receiving the packet will | |||
forward it to either GW3 or GW4. | forward it to either GW3 or GW4. | |||
4.4.6. Benefits of the EVPN-MPLS Interconnect Solution | 4.4.6. Benefits of the EVPN-MPLS Interconnect Solution | |||
The "DCI using ASBRs" solution described in [RFC8365] and the GW | The "DCI using ASBRs" solution described in [RFC8365] and the GW | |||
solution with EVPN-MPLS Interconnect may be seen as similar, since | solution with EVPN-MPLS interconnect may be seen as similar, since | |||
they both retain the EVPN attributes between Data Centers and | they both retain the EVPN attributes between Data Centers and | |||
throughout the WAN. However, the EVPN-MPLS Interconnect solution on | throughout the WAN. However, the EVPN-MPLS interconnect solution on | |||
the GWs has significant benefits compared to the "DCI using ASBRs" | the GWs has significant benefits compared to the "DCI using ASBRs" | |||
solution: | solution: | |||
* As in any of the described GW models, this solution supports the | * As in any of the described GW models, this solution supports the | |||
connectivity of local attachment circuits on the GWs. This is not | connectivity of local attachment circuits on the GWs. This is not | |||
possible in a "DCI using ASBRs" solution. | possible in a "DCI using ASBRs" solution. | |||
* Different data plane encapsulations can be supported in the DC and | * Different data plane encapsulations can be supported in the DC and | |||
the WAN, while a uniform encapsulation is needed in the "DCI using | the WAN, while a uniform encapsulation is needed in the "DCI using | |||
ASBRs" solution. | ASBRs" solution. | |||
skipping to change at line 982 ¶ | skipping to change at line 983 ¶ | |||
* The GW will not propagate MAC Mobility for the MACs moving within | * The GW will not propagate MAC Mobility for the MACs moving within | |||
a DC. Mobility intra-DC is solved by all the NVEs in the DC. The | a DC. Mobility intra-DC is solved by all the NVEs in the DC. The | |||
MAC Mobility procedures on the GWs are only required in case of | MAC Mobility procedures on the GWs are only required in case of | |||
mobility across DCs. | mobility across DCs. | |||
* Proxy-ARP/ND function on the DC GWs can be leveraged to reduce | * Proxy-ARP/ND function on the DC GWs can be leveraged to reduce | |||
ARP/ND flooding in the DC or/and the WAN. | ARP/ND flooding in the DC or/and the WAN. | |||
4.5. PBB-EVPN Interconnect for EVPN-Overlay Networks | 4.5. PBB-EVPN Interconnect for EVPN-Overlay Networks | |||
PBB-EVPN [RFC7623] is yet another Interconnect option. It requires | PBB-EVPN [RFC7623] is yet another interconnect option. It requires | |||
the use of GWs where I-components and associated B-components are | the use of GWs where I-components and associated B-components are | |||
part of EVI instances. | part of EVI instances. | |||
4.5.1. Control/Data Plane Setup Procedures on the GWs | 4.5.1. Control/Data Plane Setup Procedures on the GWs | |||
EVPN will run independently in both components, the I-component MAC- | EVPN will run independently in both components, the I-component MAC- | |||
VRF and B-component MAC-VRF. Compared to [RFC7623], the DC customer | VRF and B-component MAC-VRF. Compared to [RFC7623], the DC customer | |||
MACs (C-MACs) are no longer learned in the data plane on the GW but | MACs (C-MACs) are no longer learned in the data plane on the GW but | |||
in the control plane through EVPN running on the I-component. Remote | in the control plane through EVPN running on the I-component. Remote | |||
C-MACs coming from remote PEs are still learned in the data plane. | C-MACs coming from remote PEs are still learned in the data plane. | |||
skipping to change at line 1031 ¶ | skipping to change at line 1032 ¶ | |||
C-MACs learned from the B-component will be advertised in EVPN within | C-MACs learned from the B-component will be advertised in EVPN within | |||
the I-component EVI scope. If the C-MAC was previously known in the | the I-component EVI scope. If the C-MAC was previously known in the | |||
I-component database, EVPN would advertise the C-MAC with a higher | I-component database, EVPN would advertise the C-MAC with a higher | |||
sequence number, as per [RFC7432]. From the perspective of Mobility | sequence number, as per [RFC7432]. From the perspective of Mobility | |||
and the related procedures described in [RFC7432], the C-MACs learned | and the related procedures described in [RFC7432], the C-MACs learned | |||
from the B-component are considered local. | from the B-component are considered local. | |||
4.5.4. Gateway Optimizations | 4.5.4. Gateway Optimizations | |||
All the considerations explained in Section 4.4.5 are applicable to | All the considerations explained in Section 4.4.5 are applicable to | |||
the PBB-EVPN Interconnect option. | the PBB-EVPN interconnect option. | |||
4.6. EVPN-VXLAN Interconnect for EVPN-Overlay Networks | 4.6. EVPN-VXLAN Interconnect for EVPN-Overlay Networks | |||
If EVPN for Overlay tunnels is supported in the WAN, and a GW | If EVPN for Overlay tunnels is supported in the WAN, and a GW | |||
function is required, an end-to-end EVPN solution can be deployed. | function is required, an end-to-end EVPN solution can be deployed. | |||
While multiple Overlay tunnel combinations at the WAN and the DC are | While multiple Overlay tunnel combinations at the WAN and the DC are | |||
possible (MPLSoGRE, NVGRE, etc.), VXLAN is described here, given its | possible (MPLSoGRE, NVGRE, etc.), VXLAN is described here, given its | |||
popularity in the industry. This section focuses on the specific | popularity in the industry. This section focuses on the specific | |||
case of EVPN for VXLAN (EVPN-VXLAN hereafter) and the impact on the | case of EVPN for VXLAN (EVPN-VXLAN hereafter) and the impact on the | |||
[RFC7432] procedures. | [RFC7432] procedures. | |||
The procedures described in Section 4.4 apply to this section, too, | The procedures described in Section 4.4 apply to this section, too, | |||
only substituting EVPN-MPLS for EVPN-VXLAN control plane specifics | only substituting EVPN-MPLS for EVPN-VXLAN control plane specifics | |||
and using [RFC8365] "Local Bias" procedures instead of Section 4.4.3. | and using [RFC8365] "Local Bias" procedures instead of Section 4.4.3. | |||
Since there are no ESI labels in VXLAN, GWs need to rely on "Local | Since there are no ESI labels in VXLAN, GWs need to rely on "Local | |||
Bias" to apply split horizon on packets generated from the I-ES and | Bias" to apply split horizon on packets generated from the I-ES and | |||
sent to the peer GW. | sent to the peer GW. | |||
This use case assumes that NVEs need to use the VNIs or VSIDs as | This use case assumes that NVEs need to use the VNIs or VSIDs as | |||
globally unique identifiers within a data center, and a Gateway needs | globally unique identifiers within a Data Center, and a Gateway needs | |||
to be employed at the edge of the data-center network to translate | to be employed at the edge of the Data-Center network to translate | |||
the VNI or VSID when crossing the network boundaries. This GW | the VNI or VSID when crossing the network boundaries. This GW | |||
function provides VNI and tunnel-IP-address translation. The use | function provides VNI and tunnel-IP-address translation. The use | |||
case in which local downstream-assigned VNIs or VSIDs can be used | case in which local downstream-assigned VNIs or VSIDs can be used | |||
(like MPLS labels) is described by [RFC8365]. | (like MPLS labels) is described by [RFC8365]. | |||
While VNIs are globally significant within each DC, there are two | While VNIs are globally significant within each DC, there are two | |||
possibilities in the Interconnect network: | possibilities in the interconnect network: | |||
1. Globally unique VNIs in the Interconnect network. In this case, | 1. Globally unique VNIs in the interconnect network. In this case, | |||
the GWs and PEs in the Interconnect network will agree on a | the GWs and PEs in the interconnect network will agree on a | |||
common VNI for a given EVI. The RT to be used in the | common VNI for a given EVI. The RT to be used in the | |||
Interconnect network can be autoderived from the agreed-upon | interconnect network can be autoderived from the agreed-upon | |||
Interconnect VNI. The VNI used inside each DC MAY be the same as | interconnect VNI. The VNI used inside each DC MAY be the same as | |||
the Interconnect VNI. | the interconnect VNI. | |||
2. Downstream-assigned VNIs in the Interconnect network. In this | 2. Downstream-assigned VNIs in the interconnect network. In this | |||
case, the GWs and PEs MUST use the proper RTs to import/export | case, the GWs and PEs MUST use the proper RTs to import/export | |||
the EVPN routes. Note that even if the VNI is downstream | the EVPN routes. Note that even if the VNI is downstream | |||
assigned in the Interconnect network, and unlike option (a), it | assigned in the interconnect network, and unlike option (a), it | |||
only identifies the <Ethernet Tag, GW> pair and not the <Ethernet | only identifies the <Ethernet Tag, GW> pair and not the <Ethernet | |||
Tag, egress PE> pair. The VNI used inside each DC MAY be the | Tag, egress PE> pair. The VNI used inside each DC MAY be the | |||
same as the Interconnect VNI. GWs SHOULD support multiple VNI | same as the interconnect VNI. GWs SHOULD support multiple VNI | |||
spaces per EVI (one per Interconnect network they are connected | spaces per EVI (one per interconnect network they are connected | |||
to). | to). | |||
In both options, NVEs inside a DC only have to be aware of a single | In both options, NVEs inside a DC only have to be aware of a single | |||
VNI space, and only GWs will handle the complexity of managing | VNI space, and only GWs will handle the complexity of managing | |||
multiple VNI spaces. In addition to VNI translation above, the GWs | multiple VNI spaces. In addition to VNI translation above, the GWs | |||
will provide translation of the tunnel source IP for the packets | will provide translation of the tunnel source IP for the packets | |||
generated from the NVEs, using their own IP address. GWs will use | generated from the NVEs, using their own IP address. GWs will use | |||
that IP address as the BGP next hop in all the EVPN updates to the | that IP address as the BGP next hop in all the EVPN updates to the | |||
Interconnect network. | interconnect network. | |||
The following sections provide more details about these two options. | The following sections provide more details about these two options. | |||
4.6.1. Globally Unique VNIs in the Interconnect Network | 4.6.1. Globally Unique VNIs in the Interconnect Network | |||
Considering Figure 2, if a host H1 in NVO-1 needs to communicate with | Considering Figure 2, if a host H1 in NVO-1 needs to communicate with | |||
a host H2 in NVO-2, and assuming that different VNIs are used in each | a host H2 in NVO-2, and assuming that different VNIs are used in each | |||
DC for the same EVI (e.g., VNI-10 in NVO-1 and VNI-20 in NVO-2), then | DC for the same EVI (e.g., VNI-10 in NVO-1 and VNI-20 in NVO-2), then | |||
the VNIs MUST be translated to a common Interconnect VNI (e.g., VNI- | the VNIs MUST be translated to a common interconnect VNI (e.g., VNI- | |||
100) on the GWs. Each GW is provisioned with a VNI translation | 100) on the GWs. Each GW is provisioned with a VNI translation | |||
mapping so that it can translate the VNI in the control plane when | mapping so that it can translate the VNI in the control plane when | |||
sending BGP EVPN route updates to the Interconnect network. In other | sending BGP EVPN route updates to the interconnect network. In other | |||
words, GW1 and GW2 MUST be configured to map VNI-10 to VNI-100 in the | words, GW1 and GW2 MUST be configured to map VNI-10 to VNI-100 in the | |||
BGP update messages for H1's MAC route. This mapping is also used to | BGP update messages for H1's MAC route. This mapping is also used to | |||
translate the VNI in the data plane in both directions: that is, | translate the VNI in the data plane in both directions: that is, | |||
VNI-10 to VNI-100 when the packet is received from NVO-1 and the | VNI-10 to VNI-100 when the packet is received from NVO-1 and the | |||
reverse mapping from VNI-100 to VNI-10 when the packet is received | reverse mapping from VNI-100 to VNI-10 when the packet is received | |||
from the remote NVO-2 network and needs to be forwarded to NVO-1. | from the remote NVO-2 network and needs to be forwarded to NVO-1. | |||
The procedures described in Section 4.4 will be followed, considering | The procedures described in Section 4.4 will be followed, considering | |||
that the VNIs advertised/received by the GWs will be translated | that the VNIs advertised/received by the GWs will be translated | |||
accordingly. | accordingly. | |||
4.6.2. Downstream-Assigned VNIs in the Interconnect Network | 4.6.2. Downstream-Assigned VNIs in the Interconnect Network | |||
In this case, if a host H1 in NVO-1 needs to communicate with a host | In this case, if a host H1 in NVO-1 needs to communicate with a host | |||
H2 in NVO-2, and assuming that different VNIs are used in each DC for | H2 in NVO-2, and assuming that different VNIs are used in each DC for | |||
the same EVI, e.g., VNI-10 in NVO-1 and VNI-20 in NVO-2, then the | the same EVI, e.g., VNI-10 in NVO-1 and VNI-20 in NVO-2, then the | |||
VNIs MUST be translated as in Section 4.6.1. However, in this case, | VNIs MUST be translated as in Section 4.6.1. However, in this case, | |||
there is no need to translate to a common Interconnect VNI on the | there is no need to translate to a common interconnect VNI on the | |||
GWs. Each GW can translate the VNI received in an EVPN update to a | GWs. Each GW can translate the VNI received in an EVPN update to a | |||
locally assigned VNI advertised to the Interconnect network. Each GW | locally assigned VNI advertised to the interconnect network. Each GW | |||
can use a different Interconnect VNI; hence, this VNI does not need | can use a different interconnect VNI; hence, this VNI does not need | |||
to be agreed upon on all the GWs and PEs of the Interconnect network. | to be agreed upon on all the GWs and PEs of the interconnect network. | |||
The procedures described in Section 4.4 will be followed, taking into | The procedures described in Section 4.4 will be followed, taking into | |||
account the considerations above for the VNI translation. | account the considerations above for the VNI translation. | |||
5. Security Considerations | 5. Security Considerations | |||
This document applies existing specifications to a number of | This document applies existing specifications to a number of | |||
Interconnect models. The security considerations included in those | interconnect models. The security considerations included in those | |||
documents, such as [RFC7432], [RFC8365], [RFC7623], [RFC4761], and | documents, such as [RFC7432], [RFC8365], [RFC7623], [RFC4761], and | |||
[RFC4762] apply to this document whenever those technologies are | [RFC4762] apply to this document whenever those technologies are | |||
used. | used. | |||
As discussed, [RFC8365] discusses two main DCI solution groups: "DCI | As discussed, [RFC8365] discusses two main DCI solution groups: "DCI | |||
using GWs" and "DCI using ASBRs". This document specifies the | using GWs" and "DCI using ASBRs". This document specifies the | |||
solutions that correspond to the "DCI using GWs" group. It is | solutions that correspond to the "DCI using GWs" group. It is | |||
important to note that the use of GWs provides a superior level of | important to note that the use of GWs provides a superior level of | |||
security on a per-tenant basis, compared to the use of ASBRs. This | security on a per-tenant basis, compared to the use of ASBRs. This | |||
is due to the fact that GWs need to perform a MAC lookup on the | is due to the fact that GWs need to perform a MAC lookup on the | |||
skipping to change at line 1154 ¶ | skipping to change at line 1155 ¶ | |||
In addition, the GW optimizations specified in this document provide | In addition, the GW optimizations specified in this document provide | |||
additional protection of the DC tenant systems. For instance, the | additional protection of the DC tenant systems. For instance, the | |||
MAC-address advertisement control and Unknown MAC Route defined in | MAC-address advertisement control and Unknown MAC Route defined in | |||
Section 3.5.1 protect the DC NVEs from being overwhelmed with an | Section 3.5.1 protect the DC NVEs from being overwhelmed with an | |||
excessive number of MAC/IP routes being learned on the GWs from the | excessive number of MAC/IP routes being learned on the GWs from the | |||
WAN. The ARP/ND flooding control described in Section 3.5.2 can | WAN. The ARP/ND flooding control described in Section 3.5.2 can | |||
reduce/suppress broadcast storms being injected from the WAN. | reduce/suppress broadcast storms being injected from the WAN. | |||
Finally, the reader should be aware of the potential security | Finally, the reader should be aware of the potential security | |||
implications of designing a DCI with the Decoupled Interconnect | implications of designing a DCI with the decoupled interconnect | |||
solution (Section 3) or the Integrated Interconnect solution | solution (Section 3) or the integrated interconnect solution | |||
(Section 4). In the Decoupled Interconnect solution, the DC is | (Section 4). In the decoupled interconnect solution, the DC is | |||
typically easier to protect from the WAN, since each GW has a single | typically easier to protect from the WAN, since each GW has a single | |||
logical link to one WAN PE, whereas in the Integrated solution, the | logical link to one WAN PE, whereas in the Integrated solution, the | |||
GW has logical links to all the WAN PEs that are attached to the | GW has logical links to all the WAN PEs that are attached to the | |||
tenant. In either model, proper control plane and data plane | tenant. In either model, proper control plane and data plane | |||
policies should be put in place in the GWs in order to protect the DC | policies should be put in place in the GWs in order to protect the DC | |||
from potential attacks coming from the WAN. | from potential attacks coming from the WAN. | |||
6. IANA Considerations | 6. IANA Considerations | |||
This document has no IANA actions. | This document has no IANA actions. | |||
7. References | 7. References | |||
7.1. Normative References | 7.1. Normative References | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | ||||
Requirement Levels", BCP 14, RFC 2119, | ||||
DOI 10.17487/RFC2119, March 1997, | ||||
<https://www.rfc-editor.org/info/rfc2119>. | ||||
[RFC4761] Kompella, K., Ed. and Y. Rekhter, Ed., "Virtual Private | [RFC4761] Kompella, K., Ed. and Y. Rekhter, Ed., "Virtual Private | |||
LAN Service (VPLS) Using BGP for Auto-Discovery and | LAN Service (VPLS) Using BGP for Auto-Discovery and | |||
Signaling", RFC 4761, DOI 10.17487/RFC4761, January 2007, | Signaling", RFC 4761, DOI 10.17487/RFC4761, January 2007, | |||
<https://www.rfc-editor.org/info/rfc4761>. | <https://www.rfc-editor.org/info/rfc4761>. | |||
[RFC4762] Lasserre, M., Ed. and V. Kompella, Ed., "Virtual Private | [RFC4762] Lasserre, M., Ed. and V. Kompella, Ed., "Virtual Private | |||
LAN Service (VPLS) Using Label Distribution Protocol (LDP) | LAN Service (VPLS) Using Label Distribution Protocol (LDP) | |||
Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007, | Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007, | |||
<https://www.rfc-editor.org/info/rfc4762>. | <https://www.rfc-editor.org/info/rfc4762>. | |||
skipping to change at line 1199 ¶ | skipping to change at line 1205 ¶ | |||
"Extensions to the Virtual Private LAN Service (VPLS) | "Extensions to the Virtual Private LAN Service (VPLS) | |||
Provider Edge (PE) Model for Provider Backbone Bridging", | Provider Edge (PE) Model for Provider Backbone Bridging", | |||
RFC 7041, DOI 10.17487/RFC7041, November 2013, | RFC 7041, DOI 10.17487/RFC7041, November 2013, | |||
<https://www.rfc-editor.org/info/rfc7041>. | <https://www.rfc-editor.org/info/rfc7041>. | |||
[RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A., | [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A., | |||
Uttaro, J., Drake, J., and W. Henderickx, "BGP MPLS-Based | Uttaro, J., Drake, J., and W. Henderickx, "BGP MPLS-Based | |||
Ethernet VPN", RFC 7432, DOI 10.17487/RFC7432, February | Ethernet VPN", RFC 7432, DOI 10.17487/RFC7432, February | |||
2015, <https://www.rfc-editor.org/info/rfc7432>. | 2015, <https://www.rfc-editor.org/info/rfc7432>. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC7543] Jeng, H., Jalil, L., Bonica, R., Patel, K., and L. Yong, | |||
Requirement Levels", BCP 14, RFC 2119, | "Covering Prefixes Outbound Route Filter for BGP-4", | |||
DOI 10.17487/RFC2119, March 1997, | RFC 7543, DOI 10.17487/RFC7543, May 2015, | |||
<https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc7543>. | |||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | ||||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | ||||
May 2017, <https://www.rfc-editor.org/info/rfc8174>. | ||||
[RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, | ||||
"The BGP Tunnel Encapsulation Attribute", RFC 9012, | ||||
DOI 10.17487/RFC9012, April 2021, | ||||
<https://www.rfc-editor.org/info/rfc9012>. | ||||
[RFC7623] Sajassi, A., Ed., Salam, S., Bitar, N., Isaac, A., and W. | [RFC7623] Sajassi, A., Ed., Salam, S., Bitar, N., Isaac, A., and W. | |||
Henderickx, "Provider Backbone Bridging Combined with | Henderickx, "Provider Backbone Bridging Combined with | |||
Ethernet VPN (PBB-EVPN)", RFC 7623, DOI 10.17487/RFC7623, | Ethernet VPN (PBB-EVPN)", RFC 7623, DOI 10.17487/RFC7623, | |||
September 2015, <https://www.rfc-editor.org/info/rfc7623>. | September 2015, <https://www.rfc-editor.org/info/rfc7623>. | |||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | ||||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | ||||
May 2017, <https://www.rfc-editor.org/info/rfc8174>. | ||||
[RFC8365] Sajassi, A., Ed., Drake, J., Ed., Bitar, N., Shekhar, R., | [RFC8365] Sajassi, A., Ed., Drake, J., Ed., Bitar, N., Shekhar, R., | |||
Uttaro, J., and W. Henderickx, "A Network Virtualization | Uttaro, J., and W. Henderickx, "A Network Virtualization | |||
Overlay Solution Using Ethernet VPN (EVPN)", RFC 8365, | Overlay Solution Using Ethernet VPN (EVPN)", RFC 8365, | |||
DOI 10.17487/RFC8365, March 2018, | DOI 10.17487/RFC8365, March 2018, | |||
<https://www.rfc-editor.org/info/rfc8365>. | <https://www.rfc-editor.org/info/rfc8365>. | |||
[RFC7543] Jeng, H., Jalil, L., Bonica, R., Patel, K., and L. Yong, | [RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, | |||
"Covering Prefixes Outbound Route Filter for BGP-4", | "The BGP Tunnel Encapsulation Attribute", RFC 9012, | |||
RFC 7543, DOI 10.17487/RFC7543, May 2015, | DOI 10.17487/RFC9012, April 2021, | |||
<https://www.rfc-editor.org/info/rfc7543>. | <https://www.rfc-editor.org/info/rfc9012>. | |||
7.2. Informative References | 7.2. Informative References | |||
[IEEE.802.1AG] | ||||
IEEE, "IEEE Standard for Local and Metropolitan Area | ||||
Networks Virtual Bridged Local Area Networks Amendment 5: | ||||
Connectivity Fault Management", IEEE standard 802.1ag- | ||||
2007, January 2008. | ||||
[IEEE.802.1Q] | ||||
IEEE, "IEEE Standard for Local and metropolitan area | ||||
networks--Bridges and Bridged Networks", IEEE standard | ||||
802.1Q-2014, DOI 10.1109/IEEESTD.2014.6991462, December | ||||
2014, <https://doi.org/10.1109/IEEESTD.2014.6991462>. | ||||
[RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol | ||||
Label Switching Architecture", RFC 3031, | ||||
DOI 10.17487/RFC3031, January 2001, | ||||
<https://www.rfc-editor.org/info/rfc3031>. | ||||
[RFC4023] Worster, T., Rekhter, Y., and E. Rosen, Ed., | ||||
"Encapsulating MPLS in IP or Generic Routing Encapsulation | ||||
(GRE)", RFC 4023, DOI 10.17487/RFC4023, March 2005, | ||||
<https://www.rfc-editor.org/info/rfc4023>. | ||||
[RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, | [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, | |||
R., Patel, K., and J. Guichard, "Constrained Route | R., Patel, K., and J. Guichard, "Constrained Route | |||
Distribution for Border Gateway Protocol/MultiProtocol | Distribution for Border Gateway Protocol/MultiProtocol | |||
Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual | Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual | |||
Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, | Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, | |||
November 2006, <https://www.rfc-editor.org/info/rfc4684>. | November 2006, <https://www.rfc-editor.org/info/rfc4684>. | |||
[RFC6870] Muley, P., Ed. and M. Aissaoui, Ed., "Pseudowire | ||||
Preferential Forwarding Status Bit", RFC 6870, | ||||
DOI 10.17487/RFC6870, February 2013, | ||||
<https://www.rfc-editor.org/info/rfc6870>. | ||||
[RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, | [RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, | |||
L., Sridhar, T., Bursell, M., and C. Wright, "Virtual | L., Sridhar, T., Bursell, M., and C. Wright, "Virtual | |||
eXtensible Local Area Network (VXLAN): A Framework for | eXtensible Local Area Network (VXLAN): A Framework for | |||
Overlaying Virtualized Layer 2 Networks over Layer 3 | Overlaying Virtualized Layer 2 Networks over Layer 3 | |||
Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014, | Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014, | |||
<https://www.rfc-editor.org/info/rfc7348>. | <https://www.rfc-editor.org/info/rfc7348>. | |||
[RFC7637] Garg, P., Ed. and Y. Wang, Ed., "NVGRE: Network | [RFC7637] Garg, P., Ed. and Y. Wang, Ed., "NVGRE: Network | |||
Virtualization Using Generic Routing Encapsulation", | Virtualization Using Generic Routing Encapsulation", | |||
RFC 7637, DOI 10.17487/RFC7637, September 2015, | RFC 7637, DOI 10.17487/RFC7637, September 2015, | |||
<https://www.rfc-editor.org/info/rfc7637>. | <https://www.rfc-editor.org/info/rfc7637>. | |||
[RFC4023] Worster, T., Rekhter, Y., and E. Rosen, Ed., | ||||
"Encapsulating MPLS in IP or Generic Routing Encapsulation | ||||
(GRE)", RFC 4023, DOI 10.17487/RFC4023, March 2005, | ||||
<https://www.rfc-editor.org/info/rfc4023>. | ||||
[Y.1731] ITU-T, "OAM functions and mechanisms for Ethernet based | ||||
networks", ITU-T Recommendation Y.1731, August 2019. | ||||
[IEEE.802.1AG] | ||||
IEEE, "IEEE Standard for Local and Metropolitan Area | ||||
Networks Virtual Bridged Local Area Networks Amendment 5: | ||||
Connectivity Fault Management", IEEE standard 802.1ag- | ||||
2007, January 2008. | ||||
[IEEE.802.1Q] | ||||
IEEE, "IEEE Standard for Local and metropolitan area | ||||
networks--Bridges and Bridged Networks", IEEE standard | ||||
802.1Q-2014, DOI 10.1109/IEEESTD.2014.6991462, December | ||||
2014, <https://doi.org/10.1109/IEEESTD.2014.6991462>. | ||||
[RFC6870] Muley, P., Ed. and M. Aissaoui, Ed., "Pseudowire | ||||
Preferential Forwarding Status Bit", RFC 6870, | ||||
DOI 10.17487/RFC6870, February 2013, | ||||
<https://www.rfc-editor.org/info/rfc6870>. | ||||
[RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol | ||||
Label Switching Architecture", RFC 3031, | ||||
DOI 10.17487/RFC3031, January 2001, | ||||
<https://www.rfc-editor.org/info/rfc3031>. | ||||
[VIRTUAL-ES] | [VIRTUAL-ES] | |||
Sajassi, A., Brissette, P., Schell, R., Drake, J. E., and | Sajassi, A., Brissette, P., Schell, R., Drake, J. E., and | |||
J. Rabadan, "EVPN Virtual Ethernet Segment", Work in | J. Rabadan, "EVPN Virtual Ethernet Segment", Work in | |||
Progress, Internet-Draft, draft-ietf-bess-evpn-virtual- | Progress, Internet-Draft, draft-ietf-bess-evpn-virtual- | |||
eth-segment-06, 9 March 2020, | eth-segment-06, 9 March 2020, | |||
<https://tools.ietf.org/html/draft-ietf-bess-evpn-virtual- | <https://tools.ietf.org/html/draft-ietf-bess-evpn-virtual- | |||
eth-segment-06>. | eth-segment-06>. | |||
[Y.1731] ITU-T, "OAM functions and mechanisms for Ethernet based | ||||
networks", ITU-T Recommendation Y.1731, August 2019. | ||||
Acknowledgments | Acknowledgments | |||
The authors would like to thank Neil Hart, Vinod Prabhu, and Kiran | The authors would like to thank Neil Hart, Vinod Prabhu, and Kiran | |||
Nagaraj for their valuable comments and feedback. We would also like | Nagaraj for their valuable comments and feedback. We would also like | |||
to thank Martin Vigoureux and Alvaro Retana for their detailed | to thank Martin Vigoureux and Alvaro Retana for their detailed | |||
reviews and comments. | reviews and comments. | |||
Contributors | Contributors | |||
In addition to the authors listed on the front page, the following | In addition to the authors listed on the front page, the following | |||
End of changes. 42 change blocks. | ||||
97 lines changed or deleted | 98 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |