rfc9014.original | rfc9014.txt | |||
---|---|---|---|---|
BESS Workgroup J. Rabadan (Ed.) | Internet Engineering Task Force (IETF) J. Rabadan, Ed. | |||
Internet Draft S. Sathappan | Request for Comments: 9014 S. Sathappan | |||
Intended status: Standards Track W. Henderickx | Category: Standards Track W. Henderickx | |||
Nokia | ISSN: 2070-1721 Nokia | |||
A. Sajassi | A. Sajassi | |||
Cisco | Cisco | |||
J. Drake | J. Drake | |||
Juniper | Juniper | |||
May 2021 | ||||
Expires: September 3, 2018 March 2, 2018 | Interconnect Solution for Ethernet VPN (EVPN) Overlay Networks | |||
Interconnect Solution for EVPN Overlay networks | ||||
draft-ietf-bess-dci-evpn-overlay-10 | ||||
Abstract | Abstract | |||
This document describes how Network Virtualization Overlays (NVO) can | This document describes how Network Virtualization Overlays (NVOs) | |||
be connected to a Wide Area Network (WAN) in order to extend the | can be connected to a Wide Area Network (WAN) in order to extend the | |||
layer-2 connectivity required for some tenants. The solution analyzes | Layer 2 connectivity required for some tenants. The solution | |||
the interaction between NVO networks running Ethernet Virtual Private | analyzes the interaction between NVO networks running Ethernet | |||
Networks (EVPN) and other L2VPN technologies used in the WAN, such as | Virtual Private Networks (EVPNs) and other Layer 2 VPN (L2VPN) | |||
Virtual Private LAN Services (VPLS), VPLS extensions for Provider | technologies used in the WAN, such as Virtual Private LAN Services | |||
Backbone Bridging (PBB-VPLS), EVPN or PBB-EVPN. It also describes how | (VPLSs), VPLS extensions for Provider Backbone Bridging (PBB-VPLS), | |||
the existing technical specifications apply to the Interconnection | EVPN, or PBB-EVPN. It also describes how the existing technical | |||
and extends the EVPN procedures needed in some cases. In particular, | specifications apply to the Interconnection and extends the EVPN | |||
this document describes how EVPN routes are processed on Gateways | procedures needed in some cases. In particular, this document | |||
(GWs) that interconnect EVPN-Overlay and EVPN-MPLS networks, as well | describes how EVPN routes are processed on Gateways (GWs) that | |||
as the Interconnect Ethernet Segment (I-ES) to provide multi-homing, | interconnect EVPN-Overlay and EVPN-MPLS networks, as well as the | |||
and the use of the Unknown MAC route to avoid MAC scale issues on | Interconnect Ethernet Segment (I-ES), to provide multihoming. This | |||
Data Center Network Virtualization Edge (NVE) devices. | document also describes the use of the Unknown MAC Route (UMR) to | |||
avoid issues of a Media Access Control (MAC) scale on Data Center | ||||
Status of this Memo | Network Virtualization Edge (NVE) devices. | |||
This Internet-Draft is submitted in full conformance with the | ||||
provisions of BCP 78 and BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF), its areas, and its working groups. Note that | ||||
other groups may also distribute working documents as Internet- | ||||
Drafts. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | Status of This Memo | |||
and may be updated, replaced, or obsoleted by other documents at any | ||||
time. It is inappropriate to use Internet-Drafts as reference | ||||
material or to cite them other than as "work in progress." | ||||
The list of current Internet-Drafts can be accessed at | This is an Internet Standards Track document. | |||
http://www.ietf.org/ietf/1id-abstracts.txt | ||||
The list of Internet-Draft Shadow Directories can be accessed at | This document is a product of the Internet Engineering Task Force | |||
http://www.ietf.org/shadow.html | (IETF). It represents the consensus of the IETF community. It has | |||
received public review and has been approved for publication by the | ||||
Internet Engineering Steering Group (IESG). Further information on | ||||
Internet Standards is available in Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on September 3, 2018. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9014. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Conventions and Terminology . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. Conventions and Terminology | |||
3. Decoupled Interconnect solution for EVPN overlay networks . . . 6 | 3. Decoupled Interconnect Solution for EVPN-Overlay Networks | |||
3.1. Interconnect requirements . . . . . . . . . . . . . . . . . 7 | 3.1. Interconnect Requirements | |||
3.2. VLAN-based hand-off . . . . . . . . . . . . . . . . . . . . 8 | 3.2. VLAN-Based Handoff | |||
3.3. PW-based (Pseudowire-based) hand-off . . . . . . . . . . . 8 | 3.3. PW-Based Handoff | |||
3.4. Multi-homing solution on the GWs . . . . . . . . . . . . . 9 | 3.4. Multihoming Solution on the GWs | |||
3.5. Gateway Optimizations . . . . . . . . . . . . . . . . . . . 9 | 3.5. Gateway Optimizations | |||
3.5.1. MAC Address Advertisement Control . . . . . . . . . . . 9 | 3.5.1. MAC Address Advertisement Control | |||
3.5.2. ARP/ND flooding control . . . . . . . . . . . . . . . . 10 | 3.5.2. ARP/ND Flooding Control | |||
3.5.3. Handling failures between GW and WAN Edge routers . . . 11 | 3.5.3. Handling Failures between GW and WAN Edge Routers | |||
4. Integrated Interconnect solution for EVPN overlay networks . . 11 | 4. Integrated Interconnect Solution for EVPN-Overlay Networks | |||
4.1. Interconnect requirements . . . . . . . . . . . . . . . . . 12 | 4.1. Interconnect Requirements | |||
4.2. VPLS Interconnect for EVPN-Overlay networks . . . . . . . . 13 | 4.2. VPLS Interconnect for EVPN-Overlay Networks | |||
4.2.1. Control/Data Plane setup procedures on the GWs . . . . 13 | 4.2.1. Control/Data Plane Setup Procedures on the GWs | |||
4.2.2. Multi-homing procedures on the GWs . . . . . . . . . . 14 | 4.2.2. Multihoming Procedures on the GWs | |||
4.3. PBB-VPLS Interconnect for EVPN-Overlay networks . . . . . . 14 | 4.3. PBB-VPLS Interconnect for EVPN-Overlay Networks | |||
4.3.1. Control/Data Plane setup procedures on the GWs . . . . 14 | 4.3.1. Control/Data Plane Setup Procedures on the GWs | |||
4.3.2. Multi-homing procedures on the GWs . . . . . . . . . . 15 | 4.3.2. Multihoming Procedures on the GWs | |||
4.4. EVPN-MPLS Interconnect for EVPN-Overlay networks . . . . . 15 | 4.4. EVPN-MPLS Interconnect for EVPN-Overlay Networks | |||
4.4.1. Control Plane setup procedures on the GWs . . . . . . . 15 | 4.4.1. Control plane Setup Procedures on the GWs | |||
4.4.2. Data Plane setup procedures on the GWs . . . . . . . . 17 | 4.4.2. Data Plane Setup Procedures on the GWs | |||
4.4.3. Multi-homing procedure extensions on the GWs . . . . . 18 | 4.4.3. Multihoming Procedure Extensions on the GWs | |||
4.4.4. Impact on MAC Mobility procedures . . . . . . . . . . . 20 | 4.4.4. Impact on MAC Mobility Procedures | |||
4.4.5. Gateway optimizations . . . . . . . . . . . . . . . . . 20 | 4.4.5. Gateway Optimizations | |||
4.4.6. Benefits of the EVPN-MPLS Interconnect solution . . . . 21 | 4.4.6. Benefits of the EVPN-MPLS Interconnect Solution | |||
4.5. PBB-EVPN Interconnect for EVPN-Overlay networks . . . . . . 22 | 4.5. PBB-EVPN Interconnect for EVPN-Overlay Networks | |||
4.5.1. Control/Data Plane setup procedures on the GWs . . . . 22 | 4.5.1. Control/Data Plane Setup Procedures on the GWs | |||
4.5.2. Multi-homing procedures on the GWs . . . . . . . . . . 22 | 4.5.2. Multihoming Procedures on the GWs | |||
4.5.3. Impact on MAC Mobility procedures . . . . . . . . . . . 23 | 4.5.3. Impact on MAC Mobility Procedures | |||
4.5.4. Gateway optimizations . . . . . . . . . . . . . . . . . 23 | 4.5.4. Gateway Optimizations | |||
4.6. EVPN-VXLAN Interconnect for EVPN-Overlay networks . . . . . 23 | 4.6. EVPN-VXLAN Interconnect for EVPN-Overlay Networks | |||
4.6.1. Globally unique VNIs in the Interconnect network . . . 24 | 4.6.1. Globally Unique VNIs in the Interconnect Network | |||
4.6.2. Downstream assigned VNIs in the Interconnect network . 24 | 4.6.2. Downstream-Assigned VNIs in the Interconnect Network | |||
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 25 | 5. Security Considerations | |||
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 26 | 6. IANA Considerations | |||
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26 | 7. References | |||
7.1. Normative References . . . . . . . . . . . . . . . . . . . 26 | 7.1. Normative References | |||
7.2. Informative References . . . . . . . . . . . . . . . . . . 27 | 7.2. Informative References | |||
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 28 | Acknowledgments | |||
9. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 28 | Contributors | |||
10. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 29 | Authors' Addresses | |||
1. Conventions and Terminology | 1. Introduction | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | [RFC8365] discusses the use of Ethernet Virtual Private Networks | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | (EVPNs) [RFC7432] as the control plane for Network Virtualization | |||
"OPTIONAL" in this document are to be interpreted as described in BCP | Overlays (NVOs), where VXLAN [RFC7348], NVGRE [RFC7637], or MPLS over | |||
14 [RFC2119] [RFC8174] when, and only when, they appear in all | GRE [RFC4023] can be used as possible data plane encapsulation | |||
capitals, as shown here. | options. | |||
AC: Attachment Circuit. | While this model provides a scalable and efficient multitenant | |||
solution within the Data Center, it might not be easily extended to | ||||
the Wide Area Network (WAN) in some cases, due to the requirements | ||||
and existing deployed technologies. For instance, a Service Provider | ||||
might have an already deployed Virtual Private LAN Service (VPLS) | ||||
[RFC4761] [RFC4762], VPLS extensions for Provider Backbone Bridging | ||||
(PBB-VPLS) [RFC7041], EVPN [RFC7432], or PBB-EVPN [RFC7623] network | ||||
that has to be used to interconnect Data Centers and WAN VPN users. | ||||
A Gateway (GW) function is required in these cases. In fact, | ||||
[RFC8365] discusses two main Data Center Interconnect (DCI) solution | ||||
groups: "DCI using GWs" and "DCI using ASBRs". This document | ||||
specifies the solutions that correspond to the "DCI using GWs" group. | ||||
ARP: Address Resolution Protocol. | It is assumed that the NVO GW and the WAN Edge functions can be | |||
decoupled into two separate systems or integrated into the same | ||||
system. The former option will be referred to as "Decoupled | ||||
Interconnect solution" throughout the document, whereas the latter | ||||
one will be referred to as "Integrated Interconnect solution". | ||||
BUM: refers to Broadcast, Unknown unicast and Multicast traffic. | The specified procedures are local to the redundant GWs connecting a | |||
DC to the WAN. The document does not preclude any combination across | ||||
different DCs for the same tenant. For instance, a "Decoupled" | ||||
solution can be used in GW1 and GW2 (for DC1), and an "Integrated" | ||||
solution can be used in GW3 and GW4 (for DC2). | ||||
CE: Customer Equipment. | While the Gateways and WAN Provider Edges (PEs) use existing | |||
specifications in some cases, the document also defines extensions | ||||
that are specific to DCI. In particular, those extensions are: | ||||
CFM: Connectivity Fault Management. | * The Interconnect Ethernet Segment (I-ES), an Ethernet Segment that | |||
can be associated to a set of pseudowires (PWs) or other tunnels. | ||||
The I-ES defined in this document is not associated with a set of | ||||
Ethernet links, as per [RFC7432], but rather with a set of virtual | ||||
tunnels (e.g., a set of PWs). This set of virtual tunnels is | ||||
referred to as vES [VIRTUAL-ES]. | ||||
DC and DCI: Data Center and Data Center Interconnect. | * The use of the Unknown MAC Route (UMR) in a DCI scenario. | |||
DC RR(s) and WAN RR(s): refers to the Data Center and Wide Area | * The processing of EVPN routes on Gateways with MAC-VRFs connecting | |||
Network Route Reflectors, respectively. | EVPN-Overlay and EVPN-MPLS networks, or EVPN-Overlay and EVPN- | |||
Overlay networks. | ||||
DF and NDF: Designated Forwarder and Non-Designated Forwarder. | 2. Conventions and Terminology | |||
EVPN: Ethernet Virtual Private Network, as in [RFC7432]. | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | ||||
"OPTIONAL" in this document are to be interpreted as described in | ||||
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | ||||
capitals, as shown here. | ||||
EVI: EVPN Instance. | AC: Attachment Circuit | |||
EVPN Tunnel binding: refers to a tunnel to a remote PE/NVE for a | ARP: Address Resolution Protocol | |||
given EVI. Ethernet packets in these bindings are encapsulated with | ||||
the Overlay or MPLS encapsulation and the EVPN label at the bottom of | ||||
the stack. | ||||
ES and vES: Ethernet Segment and virtual Ethernet Segment. | BUM: Broadcast, Unknown Unicast and Multicast (traffic) | |||
ESI: Ethernet Segment Identifier. | CE: Customer Equipment | |||
GW: Gateway or Data Center Gateway. | CFM: Connectivity Fault Management | |||
I-ES and I-ESI: Interconnect Ethernet Segment and Interconnect | DC: Data Center | |||
Ethernet Segment Identifier. An I-ES is defined on the GWs for multi- | ||||
homing to/from the WAN. | ||||
MAC-VRF: refers to an EVI instance in a particular node. | DCI: Data Center Interconnect | |||
MP2P and LSM tunnels: refer to Multi-Point to Point and Label | DF and NDF: Designated Forwarder | |||
Switched Multicast tunnels. | ||||
ND: Neighbor Discovery protocol. | EVI: EVPN Instance | |||
NVE: Network Virtualization Edge. | EVPN: Ethernet Virtual Private Network, as in [RFC7432] | |||
NVGRE: Network Virtualization using Generic Routing Encapsulation. | EVPN Tunnel binding: refers to a tunnel to a remote PE/NVE for a | |||
given EVI. Ethernet packets in these bindings are encapsulated | ||||
with the Overlay or MPLS encapsulation and the EVPN label at the | ||||
bottom of the stack. | ||||
NVO: refers to Network Virtualization Overlays. | ES: Ethernet Segment | |||
OAM: Operations and Maintenance. | ESI: Ethernet Segment Identifier | |||
PBB: Provider Backbone Bridging. | GW: Gateway or Data Center Gateway | |||
PE: Provider Edge. | I-ES and I-ESI: Interconnect Ethernet Segment and Interconnect | |||
Ethernet Segment Identifier. An I-ES is defined on the GWs for | ||||
multihoming to/from the WAN. | ||||
PW: Pseudowire. | MAC Media Access Control | |||
RD: Route-Distinguisher. | MAC-VRF: refers to an EVI instance in a particular node | |||
RT: Route-Target. | MP2P and LSM tunnels: refer to multipoint-to-point and label | |||
switched multicast tunnels | ||||
S/C-TAG: refers to a combination of Service Tag and Customer Tag in a | ND: Neighbor Discovery | |||
802.1Q frame. | ||||
TOR: Top-Of-Rack switch. | NDF: Non-Designated Forwarder | |||
UMR: Unknown MAC Route. | NVE: Network Virtualization Edge | |||
VNI/VSID: refers to VXLAN/NVGRE virtual identifiers. | NVGRE: Network Virtualization using Generic Routing Encapsulation | |||
VPLS: Virtual Private LAN Service. | NVO: Network Virtualization Overlay | |||
VSI: Virtual Switch Instance or VPLS instance in a particular PE. | OAM: Operations, Administration, and Maintenance | |||
VXLAN: Virtual eXtensible LAN. | PBB: Provider Backbone Bridging | |||
2. Introduction | PE: Provider Edge | |||
[EVPN-Overlays] discusses the use of Ethernet Virtual Private | PW: Pseudowire | |||
Networks (EVPN) [RFC7432] as the control plane for Network | ||||
Virtualization Overlays (NVO), where VXLAN [RFC7348], NVGRE [RFC7637] | ||||
or MPLS over GRE [RFC4023] can be used as possible data plane | ||||
encapsulation options. | ||||
While this model provides a scalable and efficient multi-tenant | RD: Route Distinguisher | |||
solution within the Data Center, it might not be easily extended to | ||||
the Wide Area Network (WAN) in some cases due to the requirements and | ||||
existing deployed technologies. For instance, a Service Provider | ||||
might have an already deployed Virtual Private LAN Service (VPLS) | ||||
[RFC4761][RFC4762], VPLS extensions for Provider Backbone Bridging | ||||
(PBB-VPLS) [RFC7041], EVPN [RFC7432] or PBB-EVPN [RFC7623] network | ||||
that has to be used to interconnect Data Centers and WAN VPN users. A | ||||
Gateway (GW) function is required in these cases. In fact, [EVPN- | ||||
Overlays] discusses two main Data Center Interconnect solution | ||||
groups: "DCI using GWs" and "DCI using ASBRs". This document | ||||
specifies the solutions that correspond to the "DCI using GWs" group. | ||||
It is assumed that the NVO Gateway (GW) and the WAN Edge functions | RR: Route Reflector | |||
can be decoupled in two separate systems or integrated into the same | ||||
system. The former option will be referred as "Decoupled Interconnect | ||||
solution" throughout the document, whereas the latter one will be | ||||
referred as "Integrated Interconnect solution". | ||||
The specified procedures are local to the redundant GWs connecting a | RT: Route Target | |||
DC to the WAN. The document does not preclude any combination across | ||||
different DCs for the same tenant. For instance, a "Decoupled" | ||||
solution can be used in GW1 and GW2 (for DC1) and an "Integrated" | ||||
solution can be used in GW3 and GW4 (for DC2). | ||||
While the Gateways and WAN PEs use existing specifications in some | S/C-TAG: refers to a combination of Service Tag and Customer Tag in | |||
cases, the document also defines extensions that are specific to DCI. | a 802.1Q frame | |||
In particular, those extensions are: | ||||
o The Interconnect Ethernet Segment (I-ES), an Ethernet Segment that | TOR: Top-Of-Rack | |||
can be associated to a set of PWs or other tunnels. I-ES defined in | ||||
this document is not associated with a set of Ethernet links, as | ||||
per [RFC7432], but rather with a set of virtual tunnels (e.g., a | ||||
set of PWs). This set of virtual tunnels is referred to as vES | ||||
[VIRTUAL-ES]. | ||||
o The use of the Unknown MAC route in a DCI scenario. | UMR: Unknown MAC Route | |||
o The processing of EVPN routes on Gateways with MAC-VRFs connecting | vES: virtual Ethernet Segment | |||
EVPN-Overlay and EVPN-MPLS networks, or EVPN-Overlay and EVPN- | ||||
Overlay networks. | ||||
3. Decoupled Interconnect solution for EVPN overlay networks | VNI/VSID: refers to VXLAN/NVGRE virtual identifiers | |||
This section describes the interconnect solution when the GW and WAN | VPLS: Virtual Private LAN Service | |||
Edge functions are implemented in different systems. Figure 1 depicts | ||||
the reference model described in this section. Note that, although | VSI: Virtual Switch Instance or VPLS instance in a particular PE | |||
not shown in Figure 1, GWs may have local ACs (Attachment Circuits). | ||||
VXLAN: Virtual eXtensible LAN | ||||
3. Decoupled Interconnect Solution for EVPN-Overlay Networks | ||||
This section describes the Interconnect solution when the GW and WAN | ||||
Edge functions are implemented in different systems. Figure 1 | ||||
depicts the reference model described in this section. Note that, | ||||
although not shown in Figure 1, GWs may have local Attachment | ||||
Circuits (ACs). | ||||
+--+ | +--+ | |||
|CE| | |CE| | |||
+--+ | +--+ | |||
| | | | |||
+----+ | +----+ | |||
+----| PE |----+ | +----| PE |----+ | |||
+---------+ | +----+ | +---------+ | +---------+ | +----+ | +---------+ | |||
+----+ | +---+ +----+ +----+ +---+ | +----+ | +----+ | +---+ +----+ +----+ +---+ | +----+ | |||
|NVE1|--| | | |WAN | |WAN | | | |--|NVE3| | |NVE1|--| | | |WAN | |WAN | | | |--|NVE3| | |||
skipping to change at page 7, line 25 ¶ | skipping to change at line 276 ¶ | |||
| +---+ +----+ +----+ +---+ | | | +---+ +----+ +----+ +---+ | | |||
| NVO-1 | | WAN | | NVO-2 | | | NVO-1 | | WAN | | NVO-2 | | |||
| +---+ +----+ +----+ +---+ | | | +---+ +----+ +----+ +---+ | | |||
| | | |WAN | |WAN | | | | | | | | |WAN | |WAN | | | | | |||
+----+ | |GW2|--|Edge| |Edge|--|GW4| | +----+ | +----+ | |GW2|--|Edge| |Edge|--|GW4| | +----+ | |||
|NVE2|--| +---+ +----+ +----+ +---+ |--|NVE4| | |NVE2|--| +---+ +----+ +----+ +---+ |--|NVE4| | |||
+----+ +---------+ | | +---------+ +----+ | +----+ +---------+ | | +---------+ +----+ | |||
+--------------+ | +--------------+ | |||
|<-EVPN-Overlay-->|<-VLAN->|<-WAN L2VPN->|<--PW-->|<--EVPN-Overlay->| | |<-EVPN-Overlay-->|<-VLAN->|<-WAN L2VPN->|<--PW-->|<--EVPN-Overlay->| | |||
hand-off hand-off | handoff handoff | |||
Figure 1 Decoupled Interconnect model | Figure 1: Decoupled Interconnect Model | |||
The following section describes the interconnect requirements for | The following section describes the interconnect requirements for | |||
this model. | this model. | |||
3.1. Interconnect requirements | 3.1. Interconnect Requirements | |||
The Decoupled Interconnect architecture is intended to be deployed in | The Decoupled Interconnect architecture is intended to be deployed in | |||
networks where the EVPN-Overlay and WAN providers are different | networks where the EVPN-Overlay and WAN providers are different | |||
entities and a clear demarcation is needed. This solution solves the | entities and a clear demarcation is needed. This solution solves the | |||
following requirements: | following requirements: | |||
o A simple connectivity hand-off between the EVPN-Overlay network | * A simple connectivity handoff between the EVPN-Overlay network | |||
provider and the WAN provider so that QoS and security enforcement | provider and the WAN provider so that QoS and security enforcement | |||
is easily accomplished. | are easily accomplished. | |||
o Independence of the Layer Two VPN (L2VPN) technology deployed in | * Independence of the L2VPN technology deployed in the WAN. | |||
the WAN. | ||||
o Multi-homing between GW and WAN Edge routers, including per-service | * Multihoming between GW and WAN Edge routers, including per-service | |||
load balancing. Per-flow load balancing is not a strong requirement | load balancing. Per-flow load balancing is not a strong | |||
since a deterministic path per service is usually required for an | requirement, since a deterministic path per service is usually | |||
easy QoS and security enforcement. | required for an easy QoS and security enforcement. | |||
o Support of Ethernet OAM and Connectivity Fault Management (CFM) | * Support of Ethernet OAM and Connectivity Fault Management (CFM) | |||
[802.1AG][Y.1731] functions between the GW and the WAN Edge router | [IEEE.802.1AG] [Y.1731] functions between the GW and the WAN Edge | |||
to detect individual AC failures. | router to detect individual AC failures. | |||
o Support for the following optimizations at the GW: | * Support for the following optimizations at the GW: | |||
+ Flooding reduction of unknown unicast traffic sourced from the DC | ||||
Network Virtualization Edge devices (NVEs). | ||||
+ Control of the WAN MAC addresses advertised to the DC. | ||||
+ Address Resolution Protocol (ARP) and Neighbor Discovery (ND) | ||||
flooding control for the requests coming from the WAN. | ||||
3.2. VLAN-based hand-off | - Flooding reduction of unknown unicast traffic sourced from the | |||
DC Network Virtualization Edge (NVE) devices. | ||||
In this option, the hand-off between the GWs and the WAN Edge routers | - Control of the WAN MAC addresses advertised to the DC. | |||
is based on VLANs [802.1Q-2014]. This is illustrated in Figure 1 | ||||
(between the GWs in NVO-1 and the WAN Edge routers). Each MAC-VRF in | - Address Resolution Protocol (ARP) and Neighbor Discovery (ND) | |||
flooding control for the requests coming from the WAN. | ||||
3.2. VLAN-Based Handoff | ||||
In this option, the handoff between the GWs and the WAN Edge routers | ||||
is based on VLANs [IEEE.802.1Q]. This is illustrated in Figure 1 | ||||
(between the GWs in NVO-1 and the WAN Edge routers). Each MAC-VRF in | ||||
the GW is connected to a different VSI/MAC-VRF instance in the WAN | the GW is connected to a different VSI/MAC-VRF instance in the WAN | |||
Edge router by using a different C-TAG VLAN ID or a different | Edge router by using a different C-TAG VLAN ID or a different | |||
combination of S/C-TAG VLAN IDs that matches at both sides. | combination of S/C-TAG VLAN IDs that matches at both sides. | |||
This option provides the best possible demarcation between the DC and | This option provides the best possible demarcation between the DC and | |||
WAN providers and it does not require control plane interaction | WAN providers, and it does not require control plane interaction | |||
between both providers. The disadvantage of this model is the | between both providers. The disadvantage of this model is the | |||
provisioning overhead since the service has to be mapped to a C-TAG | provisioning overhead, since the service has to be mapped to a C-TAG | |||
or S/C-TAG VLAN ID combination at both GW and WAN Edge routers. | or S/C-TAG VLAN ID combination at both GW and WAN Edge routers. | |||
In this model, the GW acts as a regular Network Virtualization Edge | In this model, the GW acts as a regular Network Virtualization Edge | |||
(NVE) towards the DC. Its control plane, data plane procedures and | (NVE) towards the DC. Its control plane, data plane procedures, and | |||
interactions are described in [EVPN-Overlays]. | interactions are described in [RFC8365]. | |||
The WAN Edge router acts as a (PBB-)VPLS or (PBB-)EVPN PE with | The WAN Edge router acts as a (PBB-)VPLS or (PBB-)EVPN PE with | |||
attachment circuits (ACs) to the GWs. Its functions are described in | Attachment Circuits (ACs) to the GWs. Its functions are described in | |||
[RFC4761], [RFC4762], [RFC6074] or [RFC7432], [RFC7623]. | [RFC4761], [RFC4762], [RFC6074] or [RFC7432], [RFC7623]. | |||
3.3. PW-based (Pseudowire-based) hand-off | 3.3. PW-Based Handoff | |||
If MPLS between the GW and the WAN Edge router is an option, a PW- | If MPLS between the GW and the WAN Edge router is an option, a PW- | |||
based Interconnect solution can be deployed. In this option the | based Interconnect solution can be deployed. In this option, the | |||
hand-off between both routers is based on FEC128-based PWs [RFC4762] | handoff between both routers is based on FEC128-based PWs [RFC4762] | |||
or FEC129-based PWs (for a greater level of network automation) | or FEC129-based PWs (for a greater level of network automation) | |||
[RFC6074]. Note that this model still provides a clear demarcation | [RFC6074]. Note that this model still provides a clear demarcation | |||
boundary between DC and WAN (since there is a single PW between each | between DC and WAN (since there is a single PW between each MAC-VRF | |||
MAC-VRF and peer VSI), and security/QoS policies may be applied on a | and peer VSI), and security/QoS policies may be applied on a per-PW | |||
per PW basis. This model provides better scalability than a C-TAG | basis. This model provides better scalability than a C-TAG-based | |||
based hand-off and less provisioning overhead than a combined C/S-TAG | handoff and less provisioning overhead than a combined C/S-TAG | |||
hand-off. The PW-based hand-off interconnect is illustrated in Figure | handoff. The PW-based handoff interconnect is illustrated in | |||
1 (between the NVO-2 GWs and the WAN Edge routers). | Figure 1 (between the NVO-2 GWs and the WAN Edge routers). | |||
In this model, besides the usual MPLS procedures between GW and WAN | In this model, besides the usual MPLS procedures between GW and WAN | |||
Edge router [RFC3031], the GW MUST support an interworking function | Edge router [RFC3031], the GW MUST support an interworking function | |||
in each MAC-VRF that requires extension to the WAN: | in each MAC-VRF that requires extension to the WAN: | |||
o If a FEC128-based PW is used between the MAC-VRF (GW) and the VSI | * If a FEC128-based PW is used between the MAC-VRF (GW) and the VSI | |||
(WAN Edge), the corresponding VCID MUST be provisioned on the MAC- | (WAN Edge), the corresponding Virtual Connection Identifier (VCID) | |||
VRF and match the VCID used in the peer VSI at the WAN Edge router. | MUST be provisioned on the MAC-VRF and match the VCID used in the | |||
peer VSI at the WAN Edge router. | ||||
o If BGP Auto-discovery [RFC6074] and FEC129-based PWs are used | * If BGP Auto-discovery [RFC6074] and FEC129-based PWs are used | |||
between the GW MAC-VRF and the WAN Edge VSI, the provisioning of | between the GW MAC-VRF and the WAN Edge VSI, the provisioning of | |||
the VPLS-ID MUST be supported on the MAC-VRF and MUST match the | the VPLS-ID MUST be supported on the MAC-VRF and MUST match the | |||
VPLS-ID used in the WAN Edge VSI. | VPLS-ID used in the WAN Edge VSI. | |||
If a PW-based handoff is used, the GW's AC (or point of attachment to | If a PW-based handoff is used, the GW's AC (or point of attachment to | |||
the EVPN Instance) uses a combination of a PW label and VLAN IDs. PWs | the EVPN instance) uses a combination of a PW label and VLAN IDs. | |||
are treated as service interfaces defined in [RFC7432]. | PWs are treated as service interfaces, defined in [RFC7432]. | |||
3.4. Multi-homing solution on the GWs | 3.4. Multihoming Solution on the GWs | |||
EVPN single-active multi-homing, i.e. per-service load-balancing | EVPN single-active multihoming -- i.e., per-service load-balancing | |||
multi-homing is required in this type of interconnect. | multihoming -- is required in this type of interconnect. | |||
The GWs will be provisioned with a unique ES per WAN interconnect, | The GWs will be provisioned with a unique ES for each WAN | |||
and the hand-off attachment circuits or PWs between the GW and the | interconnect, and the handoff attachment circuits or PWs between the | |||
WAN Edge router will be assigned an ESI for such ES. The ESI will be | GW and the WAN Edge router will be assigned an ESI for such ES. The | |||
administratively configured on the GWs according to the procedures in | ESI will be administratively configured on the GWs according to the | |||
[RFC7432]. This Interconnect ES will be referred as "I-ES" hereafter, | procedures in [RFC7432]. This Interconnect ES will be referred to as | |||
and its identifier will be referred as "I-ESI". [RFC7432] describes | "I-ES" hereafter, and its identifier will be referred to as "I-ESI". | |||
different ESI Types. The use of Type 0 for the I-ESI is RECOMMENDED | Different ESI types are described in [RFC7432]. The use of Type 0 | |||
in this document. | for the I-ESI is RECOMMENDED in this document. | |||
The solution (on the GWs) MUST follow the single-active multi-homing | The solution (on the GWs) MUST follow the single-active multihoming | |||
procedures as described in [EVPN-Overlays] for the provisioned I-ESI, | procedures as described in [RFC8365] for the provisioned I-ESI -- | |||
i.e. Ethernet A-D routes per ES and per EVI will be advertised to the | i.e., Ethernet A-D routes per ES and per EVI will be advertised to | |||
DC NVEs for the multi-homing functions, ES routes will be advertised | the DC NVEs for the multihoming functions, and ES routes will be | |||
so that ES discovery and Designated Forwarder (DF) procedures can be | advertised so that ES discovery and Designated Forwarder (DF) | |||
followed. The MAC addresses learned (in the data plane) on the hand- | procedures can be followed. The MAC addresses learned (in the data | |||
off links will be advertised with the I-ESI encoded in the ESI field. | plane) on the handoff links will be advertised with the I-ESI encoded | |||
in the ESI field. | ||||
3.5. Gateway Optimizations | 3.5. Gateway Optimizations | |||
The following GW features are optional and optimize the control plane | The following GW features are optional and optimize the control plane | |||
and data plane in the DC. | and data plane in the DC. | |||
3.5.1. MAC Address Advertisement Control | 3.5.1. MAC Address Advertisement Control | |||
The use of EVPN in NVO networks brings a significant number of | The use of EVPN in NVO networks brings a significant number of | |||
benefits as described in [EVPN-Overlays]. However, if multiple DCs | benefits, as described in [RFC8365]. However, if multiple DCs are | |||
are interconnected into a single EVI, each DC will have to import all | interconnected into a single EVI, each DC will have to import all of | |||
of the MAC addresses from each of the other DCs. | the MAC addresses from each of the other DCs. | |||
Even if optimized BGP techniques like RT-constraint [RFC4684] are | Even if optimized BGP techniques like RT constraint [RFC4684] are | |||
used, the number of MAC addresses to advertise or withdraw (in case | used, the number of MAC addresses to advertise or withdraw (in case | |||
of failure) by the GWs of a given DC could overwhelm the NVEs within | of failure) by the GWs of a given DC could overwhelm the NVEs within | |||
that DC, particularly when the NVEs reside in the hypervisors. | that DC, particularly when the NVEs reside in the hypervisors. | |||
The solution specified in this document uses the 'Unknown MAC Route' | The solution specified in this document uses the Unknown MAC Route | |||
(UMR) which is advertised into a given DC by each of the DC's GWs. | (UMR) that is advertised into a given DC by each of the DC's GWs. | |||
This route is defined in [RFC7543] and is a regular EVPN MAC/IP | This route is defined in [RFC7543] and is a regular EVPN MAC/IP | |||
Advertisement route in which the MAC Address Length is set to 48, the | Advertisement route in which the MAC Address Length is set to 48, the | |||
MAC address is set to 0, and the ESI field is set to the DC GW's I- | MAC address is set to 0, and the ESI field is set to the DC GW's | |||
ESI. | I-ESI. | |||
An NVE within that DC that understands and process the UMR will send | An NVE within that DC that understands and processes the UMR will | |||
unknown unicast frames to one of the DCs GWs, which will then forward | send unknown unicast frames to one of the DC's GWs, which will then | |||
that packet to the correct egress PE. Note that, because the ESI is | forward that packet to the correct egress PE. Note that, because the | |||
set to the DC GW's I-ESI, all-active multi-homing can be applied to | ESI is set to the DC GW's I-ESI, all-active multihoming can be | |||
unknown unicast MAC addresses. An NVE that does not understand the | applied to unknown unicast MAC addresses. An NVE that does not | |||
Unknown MAC route will handle unknown unicast as described in | understand the Unknown MAC Route will handle unknown unicast as | |||
[RFC7432]. | described in [RFC7432]. | |||
This document proposes that local policy determines whether MAC | This document proposes that local policy determine whether MAC | |||
addresses and/or the UMR are advertised into a given DC. As an | addresses and/or the UMR are advertised into a given DC. As an | |||
example, when all the DC MAC addresses are learned in the | example, when all the DC MAC addresses are learned in the control/ | |||
control/management plane, it may be appropriate to advertise only the | management plane, it may be appropriate to advertise only the UMR. | |||
UMR. Advertising all the DC MAC addresses in the control/management | Advertising all the DC MAC addresses in the control/management plane | |||
plane is usually the case when the NVEs reside in hypervisors. Refer | is usually the case when the NVEs reside in hypervisors. Refer to | |||
to [EVPN-Overlays] section 7. | [RFC8365], Section 7. | |||
It is worth noting that the UMR usage in [RFC7543] and the UMR usage | It is worth noting that the UMR usage in [RFC7543] and the UMR usage | |||
in this document are different. In the former, a Virtual Spoke (V- | in this document are different. In the former, a Virtual Spoke | |||
spoke) does not necessarily learn all the MAC addresses pertaining to | (V-spoke) does not necessarily learn all the MAC addresses pertaining | |||
hosts in other V-spokes of the same network. The communication | to hosts in other V-spokes of the same network. The communication | |||
between two V-spokes is done through the DMG, until the V-spokes | between two V-spokes is done through the Default MAC Gateway (DMG) | |||
learn each other's MAC addresses. In this document, two leaf switches | until the V-spokes learn each other's MAC addresses. In this | |||
in the same DC are recommended to learn each other's MAC addresses | document, two leaf switches in the same DC are recommended for | |||
for the same EVI. The leaf to leaf communication is always direct and | V-spokes to learn each other's MAC addresses for the same EVI. The | |||
does not go through the GW. | leaf-to-leaf communication is always direct and does not go through | |||
the GW. | ||||
3.5.2. ARP/ND flooding control | 3.5.2. ARP/ND Flooding Control | |||
Another optimization mechanism, naturally provided by EVPN in the | Another optimization mechanism, naturally provided by EVPN in the | |||
GWs, is the Proxy ARP/ND function. The GWs should build a Proxy | GWs, is the Proxy ARP/ND function. The GWs should build a Proxy ARP/ | |||
ARP/ND cache table as per [RFC7432]. When the active GW receives an | ND cache table, as per [RFC7432]. When the active GW receives an | |||
ARP/ND request/solicitation coming from the WAN, the GW does a Proxy | ARP/ND request/solicitation coming from the WAN, the GW does a Proxy | |||
ARP/ND table lookup and replies as long as the information is | ARP/ND table lookup and replies as long as the information is | |||
available in its table. | available in its table. | |||
This mechanism is especially recommended on the GWs, since it | This mechanism is especially recommended on the GWs, since it | |||
protects the DC network from external ARP/ND-flooding storms. | protects the DC network from external ARP/ND-flooding storms. | |||
3.5.3. Handling failures between GW and WAN Edge routers | 3.5.3. Handling Failures between GW and WAN Edge Routers | |||
Link/PE failures are handled on the GWs as specified in [RFC7432]. | Link/PE failures are handled on the GWs as specified in [RFC7432]. | |||
The GW detecting the failure will withdraw the EVPN routes as per | The GW detecting the failure will withdraw the EVPN routes, as per | |||
[RFC7432]. | [RFC7432]. | |||
Individual AC/PW failures may be detected by OAM mechanisms. For | Individual AC/PW failures may be detected by OAM mechanisms. For | |||
instance: | instance: | |||
o If the Interconnect solution is based on a VLAN hand-off, Ethernet- | * If the Interconnect solution is based on a VLAN handoff, Ethernet- | |||
CFM [802.1AG][Y.1731] may be used to detect individual AC failures | CFM [IEEE.802.1AG] [Y.1731] may be used to detect individual AC | |||
on both, the GW and WAN Edge router. An individual AC failure will | failures on both the GW and WAN Edge router. An individual AC | |||
trigger the withdrawal of the corresponding A-D per EVI route as | failure will trigger the withdrawal of the corresponding A-D per | |||
well as the MACs learned on that AC. | EVI route as well as the MACs learned on that AC. | |||
o If the Interconnect solution is based on a PW hand-off, the Label | * If the Interconnect solution is based on a PW handoff, the Label | |||
Distribution Protocol (LDP) PW Status bits TLV [RFC6870] may be | Distribution Protocol (LDP) PW Status bits TLV [RFC6870] may be | |||
used to detect individual PW failures on both, the GW and WAN Edge | used to detect individual PW failures on both the GW and WAN Edge | |||
router. | router. | |||
4. Integrated Interconnect solution for EVPN overlay networks | 4. Integrated Interconnect Solution for EVPN-Overlay Networks | |||
When the DC and the WAN are operated by the same administrative | When the DC and the WAN are operated by the same administrative | |||
entity, the Service Provider can decide to integrate the GW and WAN | entity, the Service Provider can decide to integrate the GW and WAN | |||
Edge PE functions in the same router for obvious CAPEX and OPEX | Edge PE functions in the same router for obvious reasons to save as | |||
saving reasons. This is illustrated in Figure 2. Note that this model | relates to Capital Expenditure (CAPEX) and Operating Expenses (OPEX). | |||
does not provide an explicit demarcation link between DC and WAN | This is illustrated in Figure 2. Note that this model does not | |||
anymore. Although not shown in Figure 2, note that the GWs may have | provide an explicit demarcation link between DC and WAN anymore. | |||
local ACs. | Although not shown in Figure 2, note that the GWs may have local ACs. | |||
+--+ | +--+ | |||
|CE| | |CE| | |||
+--+ | +--+ | |||
| | | | |||
+----+ | +----+ | |||
+----| PE |----+ | +----| PE |----+ | |||
+---------+ | +----+ | +---------+ | +---------+ | +----+ | +---------+ | |||
+----+ | +---+ +---+ | +----+ | +----+ | +---+ +---+ | +----+ | |||
|NVE1|--| | | | | |--|NVE3| | |NVE1|--| | | | | |--|NVE3| | |||
skipping to change at page 12, line 30 ¶ | skipping to change at line 511 ¶ | |||
|NVE2|--| +---+ +---+ |--|NVE4| | |NVE2|--| +---+ +---+ |--|NVE4| | |||
+----+ +---------+ | | +---------+ +----+ | +----+ +---------+ | | +---------+ +----+ | |||
+--------------+ | +--------------+ | |||
|<--EVPN-Overlay--->|<-----VPLS--->|<---EVPN-Overlay-->| | |<--EVPN-Overlay--->|<-----VPLS--->|<---EVPN-Overlay-->| | |||
|<--PBB-VPLS-->| | |<--PBB-VPLS-->| | |||
Interconnect -> |<-EVPN-MPLS-->| | Interconnect -> |<-EVPN-MPLS-->| | |||
options |<--EVPN-Ovl-->|* | options |<--EVPN-Ovl-->|* | |||
|<--PBB-EVPN-->| | |<--PBB-EVPN-->| | |||
Figure 2 Integrated Interconnect model | ||||
* EVPN-Ovl stands for EVPN-Overlay (and it's an Interconnect option). | * EVPN-Ovl stands for EVPN-Overlay (and it's an Interconnect option). | |||
4.1. Interconnect requirements | Figure 2: Integrated Interconnect Model | |||
4.1. Interconnect Requirements | ||||
The Integrated Interconnect solution meets the following | The Integrated Interconnect solution meets the following | |||
requirements: | requirements: | |||
o Control plane and data plane interworking between the EVPN-overlay | * Control plane and data plane interworking between the EVPN-Overlay | |||
network and the L2VPN technology supported in the WAN, irrespective | network and the L2VPN technology supported in the WAN, | |||
of the technology choice, i.e. (PBB-)VPLS or (PBB-)EVPN, as | irrespective of the technology choice -- i.e., (PBB-)VPLS or | |||
depicted in Figure 2. | (PBB-)EVPN, as depicted in Figure 2. | |||
o Multi-homing, including single-active multi-homing with per-service | * Multihoming, including single-active multihoming with per-service | |||
load balancing or all-active multi-homing, i.e. per-flow load- | load balancing or all-active multihoming -- i.e., per-flow load- | |||
balancing, as long as the technology deployed in the WAN supports | balancing -- as long as the technology deployed in the WAN | |||
it. | supports it. | |||
o Support for end-to-end MAC Mobility, Static MAC protection and | * Support for end-to-end MAC Mobility, Static MAC protection and | |||
other procedures (e.g. proxy-arp) described in [RFC7432] as long as | other procedures (e.g., proxy-arp) described in [RFC7432] as long | |||
EVPN-MPLS is the technology of choice in the WAN. | as EVPN-MPLS is the technology of choice in the WAN. | |||
o Independent inclusive multicast trees in the WAN and in the DC. | * Independent inclusive multicast trees in the WAN and in the DC. | |||
That is, the inclusive multicast tree type defined in the WAN does | That is, the inclusive multicast tree type defined in the WAN does | |||
not need to be the same as in the DC. | not need to be the same as in the DC. | |||
4.2. VPLS Interconnect for EVPN-Overlay networks | 4.2. VPLS Interconnect for EVPN-Overlay Networks | |||
4.2.1. Control/Data Plane setup procedures on the GWs | 4.2.1. Control/Data Plane Setup Procedures on the GWs | |||
Regular MPLS tunnels and TLDP/BGP sessions will be setup to the WAN | Regular MPLS tunnels and Targeted LDP (tLDP) / BGP sessions will be | |||
PEs and RRs as per [RFC4761], [RFC4762], [RFC6074] and overlay | set up to the WAN PEs and RRs as per [RFC4761], [RFC4762], and | |||
tunnels and EVPN will be setup as per [EVPN-Overlays]. Note that | [RFC6074], and overlay tunnels and EVPN will be set up as per | |||
different route-targets for the DC and for the WAN are normally | [RFC8365]. Note that different route targets for the DC and the WAN | |||
required (unless [RFC4762] is used in the WAN, in which case no WAN | are normally required (unless [RFC4762] is used in the WAN, in which | |||
route-target is needed). A single type-1 RD per service may be used. | case no WAN route target is needed). A single type-1 RD per service | |||
may be used. | ||||
In order to support multi-homing, the GWs will be provisioned with an | In order to support multihoming, the GWs will be provisioned with an | |||
I-ESI (see section 3.4), that will be unique per interconnection. The | I-ESI (see Section 3.4), which will be unique for each | |||
I-ES in this case will represent the group of PWs to the WAN PEs and | interconnection. In this case, the I-ES will represent the group of | |||
GWs. All the [RFC7432] procedures are still followed for the I-ES, | PWs to the WAN PEs and GWs. All the [RFC7432] procedures are still | |||
e.g. any MAC address learned from the WAN will be advertised to the | followed for the I-ES -- e.g., any MAC address learned from the WAN | |||
DC with the I-ESI in the ESI field. | will be advertised to the DC with the I-ESI in the ESI field. | |||
A MAC-VRF per EVI will be created in each GW. The MAC-VRF will have | A MAC-VRF per EVI will be created in each GW. The MAC-VRF will have | |||
two different types of tunnel bindings instantiated in two different | two different types of tunnel bindings instantiated in two different | |||
split-horizon-groups: | split-horizon groups: | |||
o VPLS PWs will be instantiated in the "WAN split-horizon-group". | * VPLS PWs will be instantiated in the WAN split-horizon group. | |||
o Overlay tunnel bindings (e.g. VXLAN, NVGRE) will be instantiated | * Overlay tunnel bindings (e.g., VXLAN, NVGRE) will be instantiated | |||
in the "DC split-horizon-group". | in the DC split-horizon group. | |||
Attachment circuits are also supported on the same MAC-VRF (although | Attachment circuits are also supported on the same MAC-VRF (although | |||
not shown in Figure 2), but they will not be part of any of the above | not shown in Figure 2), but they will not be part of any of the above | |||
split-horizon-groups. | split-horizon groups. | |||
Traffic received in a given split-horizon-group will never be | Traffic received in a given split-horizon group will never be | |||
forwarded to a member of the same split-horizon-group. | forwarded to a member of the same split-horizon group. | |||
As far as BUM flooding is concerned, a flooding list will be composed | As far as BUM flooding is concerned, a flooding list will be composed | |||
of the sub-list created by the inclusive multicast routes and the | of the sublist created by the inclusive multicast routes and the | |||
sub-list created for VPLS in the WAN. BUM frames received from a | sublist created for VPLS in the WAN. BUM frames received from a | |||
local Attachment Circuit (AC) will be forwarded to the flooding list. | local Attachment Circuit (AC) will be forwarded to the flooding list. | |||
BUM frames received from the DC or the WAN will be forwarded to the | BUM frames received from the DC or the WAN will be forwarded to the | |||
flooding list observing the split-horizon-group rule described above. | flooding list, observing the split-horizon group rule described | |||
above. | ||||
Note that the GWs are not allowed to have an EVPN binding and a PW to | Note that the GWs are not allowed to have an EVPN binding and a PW to | |||
the same far-end within the same MAC-VRF, so that loops and packet | the same far end within the same MAC-VRF, so that loops and packet | |||
duplication are avoided. In case a GW can successfully establish | duplication are avoided. In case a GW can successfully establish | |||
both, an EVPN binding and a PW to the same far-end PE, the EVPN | both an EVPN binding and a PW to the same far-end PE, the EVPN | |||
binding will prevail and the PW will be brought operationally down. | binding will prevail, and the PW will be brought down operationally. | |||
The optimizations procedures described in section 3.5 can also be | The optimization procedures described in Section 3.5 can also be | |||
applied to this model. | applied to this model. | |||
4.2.2. Multi-homing procedures on the GWs | 4.2.2. Multihoming Procedures on the GWs | |||
This model supports single-active multi-homing on the GWs. All-active | This model supports single-active multihoming on the GWs. All-active | |||
multi-homing is not supported by VPLS, therefore it cannot be used on | multihoming is not supported by VPLS; therefore, it cannot be used on | |||
the GWs. | the GWs. | |||
In this case, for a given EVI, all the PWs in the WAN split-horizon- | In this case, for a given EVI, all the PWs in the WAN split-horizon | |||
group are assigned to I-ES. All the single-active multi-homing | group are assigned to I-ES. All the single-active multihoming | |||
procedures as described by [EVPN-Overlays] will be followed for the | procedures as described by [RFC8365] will be followed for the I-ES. | |||
I-ES. | ||||
The non-DF GW for the I-ES will block the transmission and reception | The non-DF GW for the I-ES will block the transmission and reception | |||
of all the PWs in the "WAN split-horizon-group" for BUM and unicast | of all the PWs in the WAN split-horizon group for BUM and unicast | |||
traffic. | traffic. | |||
4.3. PBB-VPLS Interconnect for EVPN-Overlay networks | 4.3. PBB-VPLS Interconnect for EVPN-Overlay Networks | |||
4.3.1. Control/Data Plane setup procedures on the GWs | 4.3.1. Control/Data Plane Setup Procedures on the GWs | |||
In this case, there is no impact on the procedures described in | In this case, there is no impact on the procedures described in | |||
[RFC7041] for the B-component. However the I-component instances | [RFC7041] for the B-component. However, the I-component instances | |||
become EVI instances with EVPN-Overlay bindings and potentially local | become EVI instances with EVPN-Overlay bindings and potentially local | |||
attachment circuits. A number of MAC-VRF instances can be multiplexed | attachment circuits. A number of MAC-VRF instances can be | |||
into the same B-component instance. This option provides significant | multiplexed into the same B-component instance. This option provides | |||
savings in terms of PWs to be maintained in the WAN. | significant savings in terms of PWs to be maintained in the WAN. | |||
The I-ESI concept described in section 4.2.1 will also be used for | The I-ESI concept described in Section 4.2.1 will also be used for | |||
the PBB-VPLS-based Interconnect. | the PBB-VPLS-based Interconnect. | |||
B-component PWs and I-component EVPN-overlay bindings established to | B-component PWs and I-component EVPN-Overlay bindings established to | |||
the same far-end will be compared. The following rules will be | the same far end will be compared. The following rules will be | |||
observed: | observed: | |||
o Attempts to setup a PW between the two GWs within the B- | * Attempts to set up a PW between the two GWs within the B-component | |||
component context will never be blocked. | context will never be blocked. | |||
o If a PW exists between two GWs for the B-component and an | * If a PW exists between two GWs for the B-component and an attempt | |||
attempt is made to setup an EVPN binding on an I-component linked | is made to set up an EVPN binding on an I-component linked to that | |||
to that B-component, the EVPN binding will be kept operationally | B-component, the EVPN binding will be kept down operationally. | |||
down. Note that the BGP EVPN routes will still be valid but not | Note that the BGP EVPN routes will still be valid but not used. | |||
used. | ||||
o The EVPN binding will only be up and used as long as there is no | * The EVPN binding will only be up and used as long as there is no | |||
PW to the same far-end in the corresponding B-component. The EVPN | PW to the same far end in the corresponding B-component. The EVPN | |||
bindings in the I-components will be brought down before the PW in | bindings in the I-components will be brought down before the PW in | |||
the B-component is brought up. | the B-component is brought up. | |||
The optimizations procedures described in section 3.5 can also be | The optimization procedures described in Section 3.5 can also be | |||
applied to this Interconnect option. | applied to this Interconnect option. | |||
4.3.2. Multi-homing procedures on the GWs | 4.3.2. Multihoming Procedures on the GWs | |||
This model supports single-active multi-homing on the GWs. All-active | This model supports single-active multihoming on the GWs. All-active | |||
multi-homing is not supported by this scenario. | multihoming is not supported by this scenario. | |||
The single-active multi-homing procedures as described by [EVPN- | The single-active multihoming procedures as described by [RFC8365] | |||
Overlays] will be followed for the I-ES for each EVI instance | will be followed for the I-ES for each EVI instance connected to the | |||
connected to the B-component. Note that in this case, for a given | B-component. Note that in this case, for a given EVI, all the EVPN | |||
EVI, all the EVPN bindings in the I-component are assigned to the I- | bindings in the I-component are assigned to the I-ES. The non-DF GW | |||
ES. The non-DF GW for the I-ES will block the transmission and | for the I-ES will block the transmission and reception of all the | |||
reception of all the I-component EVPN bindings for BUM and unicast | I-component EVPN bindings for BUM and unicast traffic. When learning | |||
traffic. When learning MACs from the WAN, the non-DF MUST NOT | MACs from the WAN, the non-DF MUST NOT advertise EVPN MAC/IP routes | |||
advertise EVPN MAC/IP routes for those MACs. | for those MACs. | |||
4.4. EVPN-MPLS Interconnect for EVPN-Overlay networks | 4.4. EVPN-MPLS Interconnect for EVPN-Overlay Networks | |||
If EVPN for MPLS tunnels, EVPN-MPLS hereafter, is supported in the | If EVPN for MPLS tunnels (referred to as "EVPN-MPLS" hereafter) are | |||
WAN, an end-to-end EVPN solution can be deployed. The following | supported in the WAN, an end-to-end EVPN solution can be deployed. | |||
sections describe the proposed solution as well as the impact | The following sections describe the proposed solution as well as its | |||
required on the [RFC7432] procedures. | impact on the procedures from [RFC7432]. | |||
4.4.1. Control Plane setup procedures on the GWs | 4.4.1. Control plane Setup Procedures on the GWs | |||
The GWs MUST establish separate BGP sessions for sending/receiving | The GWs MUST establish separate BGP sessions for sending/receiving | |||
EVPN routes to/from the DC and to/from the WAN. Normally each GW will | EVPN routes to/from the DC and to/from the WAN. Normally, each GW | |||
setup one BGP EVPN session to the DC RR (or two BGP EVPN sessions if | will set up one BGP EVPN session to the DC RR (or two BGP EVPN | |||
there are redundant DC RRs) and one session to the WAN RR (or two | sessions if there are redundant DC RRs) and one session to the WAN RR | |||
sessions if there are redundant WAN RRs). | (or two sessions if there are redundant WAN RRs). | |||
In order to facilitate separate BGP processes for DC and WAN, EVPN | In order to facilitate separate BGP processes for DC and WAN, EVPN | |||
routes sent to the WAN SHOULD carry a different route-distinguisher | routes sent to the WAN SHOULD carry a different Route Distinguisher | |||
(RD) than the EVPN routes sent to the DC. In addition, although | (RD) than the EVPN routes sent to the DC. In addition, although | |||
reusing the same value is possible, different route-targets are | reusing the same value is possible, different route targets are | |||
expected to be handled for the same EVI in the WAN and the DC. Note | expected to be handled for the same EVI in the WAN and the DC. Note | |||
that the EVPN service routes sent to the DC RRs will normally include | that the EVPN service routes sent to the DC RRs will normally include | |||
a [TUNNEL-ENCAP] BGP encapsulation extended community with a | a [RFC9012] BGP encapsulation extended community with a different | |||
different tunnel type than the one sent to the WAN RRs. | tunnel type than the one sent to the WAN RRs. | |||
As in the other discussed options, an I-ES and its assigned I-ESI | As in the other discussed options, an I-ES and its assigned I-ESI | |||
will be configured on the GWs for multi-homing. This I-ES represents | will be configured on the GWs for multihoming. This I-ES represents | |||
the WAN EVPN-MPLS PEs to the DC but also the DC EVPN-Overlay NVEs to | the WAN EVPN-MPLS PEs to the DC but also the DC EVPN-Overlay NVEs to | |||
the WAN. Optionally, different I-ESI values are configured for | the WAN. Optionally, different I-ESI values are configured for | |||
representing the WAN and the DC. If different EVPN-Overlay networks | representing the WAN and the DC. If different EVPN-Overlay networks | |||
are connected to the same group of GWs, each EVPN-Overlay network | are connected to the same group of GWs, each EVPN-Overlay network | |||
MUST get assigned a different I-ESI. | MUST get assigned a different I-ESI. | |||
Received EVPN routes will never be reflected on the GWs but consumed | Received EVPN routes will never be reflected on the GWs but instead | |||
and re-advertised (if needed): | will be consumed and re-advertised (if needed): | |||
o Ethernet A-D routes, ES routes and Inclusive Multicast routes | * Ethernet A-D routes, ES routes, and Inclusive Multicast routes are | |||
are consumed by the GWs and processed locally for the | consumed by the GWs and processed locally for the corresponding | |||
corresponding [RFC7432] procedures. | [RFC7432] procedures. | |||
o MAC/IP advertisement routes will be received, imported and if | * MAC/IP advertisement routes will be received and imported, and if | |||
they become active in the MAC-VRF, the information will be re- | they become active in the MAC-VRF, the information will be re- | |||
advertised as new routes with the following fields: | advertised as new routes with the following fields: | |||
+ The RD will be the GW's RD for the MAC-VRF. | - The RD will be the GW's RD for the MAC-VRF. | |||
+ The ESI will be set to the I-ESI. | - The ESI will be set to the I-ESI. | |||
+ The Ethernet-tag value will be kept from the received NLRI. | - The Ethernet-tag value will be kept from the received NLRI the | |||
received NLRI. | ||||
+ The MAC length, MAC address, IP Length and IP address values | - The MAC length, MAC address, IP Length, and IP address values | |||
will be kept from the received NLRI. | will be kept from the received NLRI. | |||
+ The MPLS label will be a local 20-bit value (when sent to the | - The MPLS label will be a local 20-bit value (when sent to the | |||
WAN) or a DC-global 24-bit value (when sent to the DC for | WAN) or a DC-global 24-bit value (when sent to the DC for | |||
encapsulations using a VNI). | encapsulations using a VNI). | |||
+ The appropriate Route-Targets (RTs) and [TUNNEL-ENCAP] BGP | - The appropriate Route Targets (RTs) and [RFC9012] BGP | |||
Encapsulation extended community will be used according to | encapsulation extended community will be used according to | |||
[EVPN-Overlays]. | [RFC8365]. | |||
The GWs will also generate the following local EVPN routes that will | The GWs will also generate the following local EVPN routes that will | |||
be sent to the DC and WAN, with their corresponding RTs and [TUNNEL- | be sent to the DC and WAN, with their corresponding RTs and [RFC9012] | |||
ENCAP] BGP Encapsulation extended community values: | BGP encapsulation extended community values: | |||
o ES route(s) for the I-ESI(s). | * ES route(s) for the I-ESI(s). | |||
o Ethernet A-D routes per ES and EVI for the I-ESI(s). The A-D | * Ethernet A-D routes per ES and EVI for the I-ESI(s). The A-D per- | |||
per-EVI routes sent to the WAN and the DC will have consistent | EVI routes sent to the WAN and the DC will have consistent | |||
Ethernet-Tag values. | Ethernet-Tag values. | |||
o Inclusive Multicast routes with independent tunnel type value | * Inclusive Multicast routes with independent tunnel-type value for | |||
for the WAN and DC. E.g. a P2MP LSP may be used in the WAN | the WAN and DC. For example, a P2MP Label Switched Path (LSP) may | |||
whereas ingress replication may be used in the DC. The routes | be used in the WAN, whereas ingress replication may be used in the | |||
sent to the WAN and the DC will have a consistent Ethernet-Tag. | DC. The routes sent to the WAN and the DC will have a consistent | |||
Ethernet-Tag. | ||||
o MAC/IP advertisement routes for MAC addresses learned in local | * MAC/IP advertisement routes for MAC addresses learned in local | |||
attachment circuits. Note that these routes will not include the | attachment circuits. Note that these routes will not include the | |||
I-ESI, but ESI=0 or different from 0 for local multi-homed | I-ESI, but ESI=0 or different from 0 for local multihomed Ethernet | |||
Ethernet Segments (ES). The routes sent to the WAN and the DC | Segments (ES). The routes sent to the WAN and the DC will have a | |||
will have a consistent Ethernet-Tag. | consistent Ethernet-Tag. | |||
Assuming GW1 and GW2 are peer GWs of the same DC, each GW will | Assuming GW1 and GW2 are peer GWs of the same DC, each GW will | |||
generate two sets of the above local service routes: Set-DC will be | generate two sets of the above local service routes: set-DC will be | |||
sent to the DC RRs and will include A-D per EVI, Inclusive Multicast | sent to the DC RRs and will include an A-D per EVI, Inclusive | |||
and MAC/IP routes for the DC encapsulation and RT. Set-WAN will be | Multicast, and MAC/IP routes for the DC encapsulation and RT. Set- | |||
sent to the WAN RRs and will include the same routes but using the | WAN will be sent to the WAN RRs and will include the same routes but | |||
WAN RT and encapsulation. GW1 and GW2 will receive each other's set- | using the WAN RT and encapsulation. GW1 and GW2 will receive each | |||
DC and set-WAN. This is the expected behavior on GW1 and GW2 for | other's set-DC and set-WAN. This is the expected behavior on GW1 and | |||
locally generated routes: | GW2 for locally generated routes: | |||
o Inclusive multicast routes: when setting up the flooding lists | * Inclusive multicast routes: When setting up the flooding lists for | |||
for a given MAC-VRF, each GW will include its DC peer GW only in | a given MAC-VRF, each GW will include its DC peer GW only in the | |||
the EVPN-MPLS flooding list (by default) and not the EVPN- | EVPN-MPLS flooding list (by default) and not the EVPN-Overlay | |||
Overlay flooding list. That is, GW2 will import two Inclusive | flooding list. That is, GW2 will import two Inclusive Multicast | |||
Multicast routes from GW1 (from set-DC and set-WAN) but will | routes from GW1 (from set-DC and set-WAN) but will only consider | |||
only consider one of the two, having the set-WAN route higher | one of the two, giving the set-WAN route higher priority. An | |||
priority. An administrative option MAY change this preference so | administrative option MAY change this preference so that the set- | |||
that the set-DC route is selected first. | DC route is selected first. | |||
o MAC/IP advertisement routes for local attachment circuits: as | * MAC/IP advertisement routes for local attachment circuits: As | |||
above, the GW will select only one, having the route from the | above, the GW will select only one, giving the route from the set- | |||
set-WAN a higher priority. As with the Inclusive multicast | WAN a higher priority. As with the Inclusive multicast routes, an | |||
routes, an administrative option MAY change this priority. | administrative option MAY change this priority. | |||
4.4.2. Data Plane setup procedures on the GWs | 4.4.2. Data Plane Setup Procedures on the GWs | |||
The procedure explained at the end of the previous section will make | The procedure explained at the end of the previous section will make | |||
sure there are no loops or packet duplication between the GWs of the | sure there are no loops or packet duplication between the GWs of the | |||
same EVPN-Overlay network (for frames generated from local ACs) since | same EVPN-Overlay network (for frames generated from local ACs), | |||
only one EVPN binding per EVI (or per Ethernet Tag in case of VLAN- | since only one EVPN binding per EVI (or per Ethernet Tag in the case | |||
aware bundle services) will be setup in the data plane between the | of VLAN-aware bundle services) will be set up in the data plane | |||
two nodes. That binding will by default be added to the EVPN-MPLS | between the two nodes. That binding will by default be added to the | |||
flooding list. | EVPN-MPLS flooding list. | |||
As for the rest of the EVPN tunnel bindings, they will be added to | As for the rest of the EVPN tunnel bindings, they will be added to | |||
one of the two flooding lists that each GW sets up for the same MAC- | one of the two flooding lists that each GW sets up for the same MAC- | |||
VRF: | VRF: | |||
o EVPN-overlay flooding list (composed of bindings to the remote | * EVPN-Overlay flooding list (composed of bindings to the remote | |||
NVEs or multicast tunnel to the NVEs). | NVEs or multicast tunnel to the NVEs). | |||
o EVPN-MPLS flooding list (composed of MP2P or LSM tunnel to the | * EVPN-MPLS flooding list (composed of MP2P or LSM tunnel to the | |||
remote PEs) | remote PEs). | |||
Each flooding list will be part of a separate split-horizon-group: | Each flooding list will be part of a separate split-horizon group: | |||
the WAN split-horizon-group or the DC split-horizon-group. Traffic | the WAN split-horizon group or the DC split-horizon group. Traffic | |||
generated from a local AC can be flooded to both | generated from a local AC can be flooded to both split-horizon | |||
split-horizon-groups. Traffic from a binding of a split-horizon-group | groups. Traffic from a binding of a split-horizon group can be | |||
can be flooded to the other split-horizon-group and local ACs, but | flooded to the other split-horizon group and local ACs, but never to | |||
never to a member of its own split-horizon-group. | a member of its own split-horizon group. | |||
When either GW1 or GW2 receive a BUM frame on an MPLS tunnel | When either GW1 or GW2 receives a BUM frame on an MPLS tunnel, | |||
including an ESI label at the bottom of the stack, they will perform | including an ESI label at the bottom of the stack, they will perform | |||
an ESI label lookup and split-horizon filtering as per [RFC7432] in | an ESI label lookup and split-horizon filtering as per [RFC7432], in | |||
case the ESI label identifies a local ESI (I-ESI or any other non- | case the ESI label identifies a local ESI (I-ESI or any other nonzero | |||
zero ESI). | ESI). | |||
4.4.3. Multi-homing procedure extensions on the GWs | 4.4.3. Multihoming Procedure Extensions on the GWs | |||
This model supports single-active as well as all-active multi-homing. | This model supports single-active as well as all-active multihoming. | |||
All the [RFC7432] multi-homing procedures for the DF election on I- | All the [RFC7432] multihoming procedures for the DF election on | |||
ES(s) as well as the backup-path (single-active) and aliasing (all- | I-ES(s), as well as the backup-path (single-active) and aliasing | |||
active) procedures will be followed on the GWs. Remote PEs in the | (all-active) procedures, will be followed on the GWs. Remote PEs in | |||
EVPN-MPLS network will follow regular [RFC7432] aliasing or backup- | the EVPN-MPLS network will follow regular [RFC7432] aliasing or | |||
path procedures for MAC/IP routes received from the GWs for the same | backup-path procedures for MAC/IP routes received from the GWs for | |||
I-ESI. So will NVEs in the EVPN-Overlay network for MAC/IP routes | the same I-ESI. So will NVEs in the EVPN-Overlay network for MAC/IP | |||
received with the same I-ESI. | routes received with the same I-ESI. | |||
As far as the forwarding plane is concerned, by default, the EVPN- | As far as the forwarding plane is concerned, by default, the EVPN- | |||
Overlay network will have an analogous behavior to the access ACs in | Overlay network will have an analogous behavior to the access ACs in | |||
[RFC7432] multi-homed Ethernet Segments. | [RFC7432] multihomed Ethernet Segments. | |||
The forwarding behavior on the GWs is described below: | The forwarding behavior on the GWs is described below: | |||
o Single-active multi-homing; assuming a WAN split-horizon-group | * Single-active multihoming; assuming a WAN split-horizon group | |||
(comprised of EVPN-MPLS bindings), a DC split-horizon-group | (comprised of EVPN-MPLS bindings), a DC split-horizon group | |||
(comprised of EVPN-Overlay bindings) and local ACs on the GWs: | (comprised of EVPN-Overlay bindings), and local ACs on the GWs: | |||
+ Forwarding behavior on the non-DF: the non-DF MUST block | - Forwarding behavior on the non-DF: The non-DF MUST block | |||
ingress and egress forwarding on the EVPN-Overlay bindings | ingress and egress forwarding on the EVPN-Overlay bindings | |||
associated to the I-ES. The EVPN-MPLS network is considered to | associated to the I-ES. The EVPN-MPLS network is considered to | |||
be the core network and the EVPN-MPLS bindings to the remote | be the core network, and the EVPN-MPLS bindings to the remote | |||
PEs and GWs will be active. | PEs and GWs will be active. | |||
+ Forwarding behavior on the DF: the DF MUST NOT forward BUM or | - Forwarding behavior on the DF: The DF MUST NOT forward BUM or | |||
unicast traffic received from a given split-horizon-group to a | unicast traffic received from a given split-horizon group to a | |||
member of his own split-horizon group. Forwarding to other | member of its own split-horizon group. Forwarding to other | |||
split-horizon-groups and local ACs is allowed (as long as the | split-horizon groups and local ACs is allowed (as long as the | |||
ACs are not part of an ES for which the node is non-DF). As | ACs are not part of an ES for which the node is non-DF). As | |||
per [RFC7432] and for split-horizon purposes, when receiving | per [RFC7432] and for split-horizon purposes, when receiving | |||
BUM traffic on the EVPN-Overlay bindings associated to an I- | BUM traffic on the EVPN-Overlay bindings associated to an I-ES, | |||
ES, the DF GW SHOULD add the I-ESI label when forwarding to | the DF GW SHOULD add the I-ESI label when forwarding to the | |||
the peer GW over EVPN-MPLS. | peer GW over EVPN-MPLS. | |||
+ When receiving EVPN MAC/IP routes from the WAN, the non-DF | - When receiving EVPN MAC/IP routes from the WAN, the non-DF MUST | |||
MUST NOT re-originate the EVPN routes and advertise them to | NOT reoriginate the EVPN routes and advertise them to the DC | |||
the DC peers. In the same way, EVPN MAC/IP routes received | peers. In the same way, EVPN MAC/IP routes received from the | |||
from the DC MUST NOT be advertised to the WAN peers. This is | DC MUST NOT be advertised to the WAN peers. This is consistent | |||
consistent with [RFC7432] and allows the remote PE/NVEs know | with [RFC7432] and allows the remote PE/NVEs to know who the | |||
who the primary GW is, based on the reception of the MAC/IP | primary GW is, based on the reception of the MAC/IP routes. | |||
routes. | ||||
o All-active multi-homing; assuming a WAN split-horizon-group | * All-active multihoming; assuming a WAN split-horizon group | |||
(comprised of EVPN-MPLS bindings), a DC split-horizon-group | (comprised of EVPN-MPLS bindings), a DC split-horizon group | |||
(comprised of EVPN-Overlay bindings) and local ACs on the GWs: | (comprised of EVPN-Overlay bindings), and local ACs on the GWs: | |||
+ Forwarding behavior on the non-DF: the non-DF follows the same | - Forwarding behavior on the non-DF: The non-DF follows the same | |||
behavior as the non-DF in the single-active case but only for | behavior as the non-DF in the single-active case, but only for | |||
BUM traffic. Unicast traffic received from a split-horizon- | BUM traffic. Unicast traffic received from a split-horizon | |||
group MUST NOT be forwarded to a member of its own split- | group MUST NOT be forwarded to a member of its own split- | |||
horizon-group but can be forwarded normally to the other | horizon group but can be forwarded normally to the other split- | |||
split-horizon-groups and local ACs. If a known unicast packet | horizon groups and local ACs. If a known unicast packet is | |||
is identified as a "flooded" packet, the procedures for BUM | identified as a "flooded" packet, the procedures for BUM | |||
traffic MUST be followed. | traffic MUST be followed. | |||
+ Forwarding behavior on the DF: the DF follows the same | - Forwarding behavior on the DF: The DF follows the same behavior | |||
behavior as the DF in the single-active case but only for BUM | as the DF in the single-active case, but only for BUM traffic. | |||
traffic. Unicast traffic received from a split-horizon-group | Unicast traffic received from a split-horizon group MUST NOT be | |||
MUST NOT be forwarded to a member of its own split-horizon- | forwarded to a member of its own split-horizon group but can be | |||
group but can be forwarded normally to the other split- | forwarded normally to the other split-horizon group and local | |||
horizon-group and local ACs. If a known unicast packet is | ACs. If a known unicast packet is identified as a "flooded" | |||
identified as a "flooded" packet, the procedures for BUM | packet, the procedures for BUM traffic MUST be followed. As | |||
traffic MUST be followed. As per [RFC7432] and for split- | per [RFC7432] and for split-horizon purposes, when receiving | |||
horizon purposes, when receiving BUM traffic on the EVPN- | BUM traffic on the EVPN-Overlay bindings associated to an I-ES, | |||
Overlay bindings associated to an I-ES, the DF GW MUST add the | the DF GW MUST add the I-ESI label when forwarding to the peer | |||
I-ESI label when forwarding to the peer GW over EVPN-MPLS. | GW over EVPN-MPLS. | |||
+ Contrary to the single-active multi-homing case, both DF and | - Contrary to the single-active multihoming case, both DF and | |||
non-DF re-originate and advertise MAC/IP routes received from | non-DF reoriginate and advertise MAC/IP routes received from | |||
the WAN/DC peers, adding the corresponding I-ESI so that the | the WAN/DC peers, adding the corresponding I-ESI so that the | |||
remote PE/NVEs can perform regular aliasing as per [RFC7432]. | remote PE/NVEs can perform regular aliasing, as per [RFC7432]. | |||
The example in Figure 3 illustrates the forwarding of BUM traffic | The example in Figure 3 illustrates the forwarding of BUM traffic | |||
originated from an NVE on a pair of all-active multi-homing GWs. | originated from an NVE on a pair of all-active multihoming GWs. | |||
|<--EVPN-Overlay--->|<--EVPN-MPLS-->| | |<--EVPN-Overlay--->|<--EVPN-MPLS-->| | |||
+---------+ +--------------+ | +---------+ +--------------+ | |||
+----+ BUM +---+ | | +----+ BUM +---+ | | |||
|NVE1+----+----> | +-+-----+ | | |NVE1+----+----> | +-+-----+ | | |||
+----+ | | DF |GW1| | | | | +----+ | | DF |GW1| | | | | |||
| | +-+-+ | | ++--+ | | | +-+-+ | | ++--+ | |||
| | | | +--> |PE1| | | | | | +--> |PE1| | |||
| +--->X +-+-+ | ++--+ | | +--->X +-+-+ | ++--+ | |||
| NDF| | | | | | NDF| | | | | |||
+----+ | |GW2<-+ | | +----+ | |GW2<-+ | | |||
|NVE2+--+ +-+-+ | | |NVE2+--+ +-+-+ | | |||
+----+ +--------+ | +------------+ | +----+ +--------+ | +------------+ | |||
v | v | |||
+--+ | +--+ | |||
|CE| | |CE| | |||
+--+ | +--+ | |||
Figure 3 Multi-homing BUM forwarding | Figure 3: Multihoming BUM Forwarding | |||
GW2 is the non-DF for the I-ES and blocks the BUM forwarding. GW1 is | GW2 is the non-DF for the I-ES and blocks the BUM forwarding. GW1 is | |||
the DF and forwards the traffic to PE1 and GW2. Packets sent to GW2 | the DF and forwards the traffic to PE1 and GW2. Packets sent to GW2 | |||
will include the ESI-label for the I-ES. Based on the ESI-label, GW2 | will include the ESI label for the I-ES. Based on the ESI label, GW2 | |||
identifies the packets as I-ES-generated packets and will only | identifies the packets as I-ES-generated packets and will only | |||
forward them to local ACs (CE in the example) and not back to the | forward them to local ACs (CE in the example) and not back to the | |||
EVPN-Overlay network. | EVPN-Overlay network. | |||
4.4.4. Impact on MAC Mobility procedures | 4.4.4. Impact on MAC Mobility Procedures | |||
MAC Mobility procedures described in [RFC7432] are not modified by | MAC Mobility procedures described in [RFC7432] are not modified by | |||
this document. | this document. | |||
Note that an intra-DC MAC move still leaves the MAC attached to the | Note that an intra-DC MAC move still leaves the MAC attached to the | |||
same I-ES, so under the rules of [RFC7432] this is not considered a | same I-ES, so under the rules of [RFC7432], this is not considered a | |||
MAC mobility event. Only when the MAC moves from the WAN domain to | MAC Mobility event. Only when the MAC moves from the WAN domain to | |||
the DC domain (or from one DC to another) the MAC will be learned | the DC domain (or from one DC to another) will the MAC be learned | |||
from a different ES and the MAC Mobility procedures will kick in. | from a different ES, and the MAC Mobility procedures will kick in. | |||
The sticky bit indication in the MAC Mobility extended community MUST | The sticky-bit indication in the MAC Mobility extended community MUST | |||
be propagated between domains. | be propagated between domains. | |||
4.4.5. Gateway optimizations | 4.4.5. Gateway Optimizations | |||
All the Gateway optimizations described in section 3.5 MAY be applied | All the Gateway optimizations described in Section 3.5 MAY be applied | |||
to the GWs when the Interconnect is based on EVPN-MPLS. | to the GWs when the Interconnect is based on EVPN-MPLS. | |||
In particular, the use of the Unknown MAC Route, as described in | In particular, the use of the Unknown MAC Route, as described in | |||
section 3.5.1, solves some transient packet duplication issues in | Section 3.5.1, solves some transient packet-duplication issues in | |||
cases of all-active multi-homing, as explained below. | cases of all-active multihoming, as explained below. | |||
Consider the diagram in Figure 2 for EVPN-MPLS Interconnect and all- | Consider the diagram in Figure 2 for EVPN-MPLS Interconnect and all- | |||
active multi-homing, and the following sequence: | active multihoming, and the following sequence: | |||
a) MAC Address M1 is advertised from NVE3 in EVI-1. | (a) MAC Address M1 is advertised from NVE3 in EVI-1. | |||
b) GW3 and GW4 learn M1 for EVI-1 and re-advertise M1 to the WAN | (b) GW3 and GW4 learn M1 for EVI-1 and re-advertise M1 to the WAN | |||
with I-ESI-2 in the ESI field. | with I-ESI-2 in the ESI field. | |||
c) GW1 and GW2 learn M1 and install GW3/GW4 as next-hops following | (c) GW1 and GW2 learn M1 and install GW3/GW4 as next hops following | |||
the EVPN aliasing procedures. | the EVPN aliasing procedures. | |||
d) Before NVE1 learns M1, a packet arrives at NVE1 with | (d) Before NVE1 learns M1, a packet arrives at NVE1 with destination | |||
destination M1. If the Unknown MAC Route had not been | M1. If the Unknown MAC Route had not been advertised into the | |||
advertised into the DC, NVE1 would have flooded the packet | DC, NVE1 would have flooded the packet throughout the DC, in | |||
throughout the DC, in particular to both GW1 and GW2. If the | particular to both GW1 and GW2. If the same VNI/VSID is used | |||
same VNI/VSID is used for both known unicast and BUM traffic, | for both known unicast and BUM traffic, as is typically the | |||
as is typically the case, there is no indication in the packet | case, there is no indication in the packet that it is a BUM | |||
that it is a BUM packet and both GW1 and GW2 would have | packet, and both GW1 and GW2 would have forwarded it, creating | |||
forwarded it, creating packet duplication. However, because the | packet duplication. However, because the Unknown MAC Route had | |||
Unknown MAC Route had been advertised into the DC, NVE1 will | been advertised into the DC, NVE1 will unicast the packet to | |||
unicast the packet to either GW1 or GW2. | either GW1 or GW2. | |||
e) Since both GW1 and GW2 know M1, the GW receiving the packet | (e) Since both GW1 and GW2 know M1, the GW receiving the packet will | |||
will forward it to either GW3 or GW4. | forward it to either GW3 or GW4. | |||
4.4.6. Benefits of the EVPN-MPLS Interconnect solution | 4.4.6. Benefits of the EVPN-MPLS Interconnect Solution | |||
The [EVPN-Overlays] "DCI using ASBRs" solution and the GW solution | The "DCI using ASBRs" solution described in [RFC8365] and the GW | |||
with EVPN-MPLS Interconnect may be seen similar since they both | solution with EVPN-MPLS Interconnect may be seen as similar, since | |||
retain the EVPN attributes between Data Centers and throughout the | they both retain the EVPN attributes between Data Centers and | |||
WAN. However the EVPN-MPLS Interconnect solution on the GWs has | throughout the WAN. However, the EVPN-MPLS Interconnect solution on | |||
significant benefits compared to the "DCI using ASBRs" solution: | the GWs has significant benefits compared to the "DCI using ASBRs" | |||
solution: | ||||
o As in any of the described GW models, this solution supports the | * As in any of the described GW models, this solution supports the | |||
connectivity of local attachment circuits on the GWs. This is | connectivity of local attachment circuits on the GWs. This is not | |||
not possible in a "DCI using ASBRs" solution. | possible in a "DCI using ASBRs" solution. | |||
o Different data plane encapsulations can be supported in the DC | * Different data plane encapsulations can be supported in the DC and | |||
and the WAN, while a uniform encapsulation is needed in the "DCI | the WAN, while a uniform encapsulation is needed in the "DCI using | |||
using ASBRs" solution. | ASBRs" solution. | |||
o Optimized multicast solution, with independent inclusive | * Optimized multicast solution, with independent inclusive multicast | |||
multicast trees in DC and WAN. | trees in DC and WAN. | |||
o MPLS Label aggregation: for the case where MPLS labels are | * MPLS label aggregation: For the case where MPLS labels are | |||
signaled from the NVEs for MAC/IP Advertisement routes, this | signaled from the NVEs for MAC/IP advertisement routes, this | |||
solution provides label aggregation. A remote PE MAY receive a | solution provides label aggregation. A remote PE MAY receive a | |||
single label per GW MAC-VRF as opposed to a label per NVE/MAC- | single label per GW MAC-VRF, as opposed to a label per NVE/MAC-VRF | |||
VRF connected to the GW MAC-VRF. For instance, in Figure 2, PE | connected to the GW MAC-VRF. For instance, in Figure 2, PE would | |||
would receive only one label for all the routes advertised for a | receive only one label for all the routes advertised for a given | |||
given MAC-VRF from GW1, as opposed to a label per NVE/MAC-VRF. | MAC-VRF from GW1, as opposed to a label per NVE/MAC-VRF. | |||
o The GW will not propagate MAC mobility for the MACs moving | * The GW will not propagate MAC Mobility for the MACs moving within | |||
within a DC. Mobility intra-DC is solved by all the NVEs in the | a DC. Mobility intra-DC is solved by all the NVEs in the DC. The | |||
DC. The MAC Mobility procedures on the GWs are only required in | MAC Mobility procedures on the GWs are only required in case of | |||
case of mobility across DCs. | mobility across DCs. | |||
o Proxy-ARP/ND function on the DC GWs can be leveraged to reduce | * Proxy-ARP/ND function on the DC GWs can be leveraged to reduce | |||
ARP/ND flooding in the DC or/and in the WAN. | ARP/ND flooding in the DC or/and the WAN. | |||
4.5. PBB-EVPN Interconnect for EVPN-Overlay networks | 4.5. PBB-EVPN Interconnect for EVPN-Overlay Networks | |||
PBB-EVPN [RFC7623] is yet another Interconnect option. It requires | PBB-EVPN [RFC7623] is yet another Interconnect option. It requires | |||
the use of GWs where I-components and associated B-components are | the use of GWs where I-components and associated B-components are | |||
part of EVI instances. | part of EVI instances. | |||
4.5.1. Control/Data Plane setup procedures on the GWs | 4.5.1. Control/Data Plane Setup Procedures on the GWs | |||
EVPN will run independently in both components, the I-component MAC- | EVPN will run independently in both components, the I-component MAC- | |||
VRF and B-component MAC-VRF. Compared to [RFC7623], the DC C-MACs are | VRF and B-component MAC-VRF. Compared to [RFC7623], the DC customer | |||
no longer learned in the data plane on the GW but in the control | MACs (C-MACs) are no longer learned in the data plane on the GW but | |||
plane through EVPN running on the I-component. Remote C-MACs coming | in the control plane through EVPN running on the I-component. Remote | |||
from remote PEs are still learned in the data plane. B-MACs in the B- | C-MACs coming from remote PEs are still learned in the data plane. | |||
component will be assigned and advertised following the procedures | B-MACs in the B-component will be assigned and advertised following | |||
described in [RFC7623]. | the procedures described in [RFC7623]. | |||
An I-ES will be configured on the GWs for multi-homing, but its I-ESI | An I-ES will be configured on the GWs for multihoming, but its I-ESI | |||
will only be used in the EVPN control plane for the I-component EVI. | will only be used in the EVPN control plane for the I-component EVI. | |||
No non-reserved ESIs will be used in the control plane of the B- | No unreserved ESIs will be used in the control plane of the | |||
component EVI as per [RFC7623], that is, the I-ES will be represented | B-component EVI, as per [RFC7623]. That is, the I-ES will be | |||
to the WAN PBB-EVPN PEs using shared or dedicated B-MACs. | represented to the WAN PBB-EVPN PEs using shared or dedicated B-MACs. | |||
The rest of the control plane procedures will follow [RFC7432] for | The rest of the control plane procedures will follow [RFC7432] for | |||
the I-component EVI and [RFC7623] for the B-component EVI. | the I-component EVI and [RFC7623] for the B-component EVI. | |||
From the data plane perspective, the I-component and B-component EVPN | From the data plane perspective, the I-component and B-component EVPN | |||
bindings established to the same far-end will be compared and the I- | bindings established to the same far end will be compared, and the | |||
component EVPN-overlay binding will be kept down following the rules | I-component EVPN-Overlay binding will be kept down following the | |||
described in section 4.3.1. | rules described in Section 4.3.1. | |||
4.5.2. Multi-homing procedures on the GWs | 4.5.2. Multihoming Procedures on the GWs | |||
This model supports single-active as well as all-active multi-homing. | ||||
This model supports single-active as well as all-active multihoming. | ||||
The forwarding behavior of the DF and non-DF will be changed based on | The forwarding behavior of the DF and non-DF will be changed based on | |||
the description outlined in section 4.4.3, only replacing the "WAN | the description outlined in Section 4.4.3, substituting the WAN | |||
split-horizon-group" for the B-component, and using [RFC7623] | split-horizon group for the B-component, and using [RFC7623] | |||
procedures for the traffic sent or received on the B-component. | procedures for the traffic sent or received on the B-component. | |||
4.5.3. Impact on MAC Mobility procedures | 4.5.3. Impact on MAC Mobility Procedures | |||
C-MACs learned from the B-component will be advertised in EVPN within | C-MACs learned from the B-component will be advertised in EVPN within | |||
the I-component EVI scope. If the C-MAC was previously known in the | the I-component EVI scope. If the C-MAC was previously known in the | |||
I-component database, EVPN would advertise the C-MAC with a higher | I-component database, EVPN would advertise the C-MAC with a higher | |||
sequence number, as per [RFC7432]. From a Mobility perspective and | sequence number, as per [RFC7432]. From the perspective of Mobility | |||
the related procedures described in [RFC7432], the C-MACs learned | and the related procedures described in [RFC7432], the C-MACs learned | |||
from the B-component are considered local. | from the B-component are considered local. | |||
4.5.4. Gateway optimizations | 4.5.4. Gateway Optimizations | |||
All the considerations explained in section 4.4.5 are applicable to | All the considerations explained in Section 4.4.5 are applicable to | |||
the PBB-EVPN Interconnect option. | the PBB-EVPN Interconnect option. | |||
4.6. EVPN-VXLAN Interconnect for EVPN-Overlay networks | 4.6. EVPN-VXLAN Interconnect for EVPN-Overlay Networks | |||
If EVPN for Overlay tunnels is supported in the WAN and a GW function | If EVPN for Overlay tunnels is supported in the WAN, and a GW | |||
is required, an end-to-end EVPN solution can be deployed. While | function is required, an end-to-end EVPN solution can be deployed. | |||
multiple Overlay tunnel combinations at the WAN and the DC are | While multiple Overlay tunnel combinations at the WAN and the DC are | |||
possible (MPLSoGRE, nvGRE, etc.), VXLAN is described here, given its | possible (MPLSoGRE, NVGRE, etc.), VXLAN is described here, given its | |||
popularity in the industry. This section focuses on the specific case | popularity in the industry. This section focuses on the specific | |||
of EVPN for VXLAN (EVPN-VXLAN hereafter) and the impact on the | case of EVPN for VXLAN (EVPN-VXLAN hereafter) and the impact on the | |||
[RFC7432] procedures. | [RFC7432] procedures. | |||
The procedures described in section 4.4 apply to this section too, | The procedures described in Section 4.4 apply to this section, too, | |||
only replacing EVPN-MPLS for EVPN-VXLAN control plane specifics and | only substituting EVPN-MPLS for EVPN-VXLAN control plane specifics | |||
using [EVPN-Overlays] "Local Bias" procedures instead of section | and using [RFC8365] "Local Bias" procedures instead of Section 4.4.3. | |||
4.4.3. Since there are no ESI-labels in VXLAN, GWs need to rely on | Since there are no ESI labels in VXLAN, GWs need to rely on "Local | |||
"Local Bias" to apply split-horizon on packets generated from the I- | Bias" to apply split horizon on packets generated from the I-ES and | |||
ES and sent to the peer GW. | sent to the peer GW. | |||
This use-case assumes that NVEs need to use the VNIs or VSIDs as a | This use case assumes that NVEs need to use the VNIs or VSIDs as | |||
globally unique identifiers within a data center, and a Gateway needs | globally unique identifiers within a data center, and a Gateway needs | |||
to be employed at the edge of the data center network to translate | to be employed at the edge of the data-center network to translate | |||
the VNI or VSID when crossing the network boundaries. This GW | the VNI or VSID when crossing the network boundaries. This GW | |||
function provides VNI and tunnel IP address translation. The use-case | function provides VNI and tunnel-IP-address translation. The use | |||
in which local downstream assigned VNIs or VSIDs can be used (like | case in which local downstream-assigned VNIs or VSIDs can be used | |||
MPLS labels) is described by [EVPN-Overlays]. | (like MPLS labels) is described by [RFC8365]. | |||
While VNIs are globally significant within each DC, there are two | While VNIs are globally significant within each DC, there are two | |||
possibilities in the Interconnect network: | possibilities in the Interconnect network: | |||
a) Globally unique VNIs in the Interconnect network: | 1. Globally unique VNIs in the Interconnect network. In this case, | |||
In this case, the GWs and PEs in the Interconnect network will | the GWs and PEs in the Interconnect network will agree on a | |||
agree on a common VNI for a given EVI. The RT to be used in the | common VNI for a given EVI. The RT to be used in the | |||
Interconnect network can be auto-derived from the agreed | Interconnect network can be autoderived from the agreed-upon | |||
Interconnect VNI. The VNI used inside each DC MAY be the same | Interconnect VNI. The VNI used inside each DC MAY be the same as | |||
as the Interconnect VNI. | the Interconnect VNI. | |||
b) Downstream assigned VNIs in the Interconnect network. | 2. Downstream-assigned VNIs in the Interconnect network. In this | |||
In this case, the GWs and PEs MUST use the proper RTs to | case, the GWs and PEs MUST use the proper RTs to import/export | |||
import/export the EVPN routes. Note that even if the VNI is | the EVPN routes. Note that even if the VNI is downstream | |||
downstream assigned in the Interconnect network, and unlike | assigned in the Interconnect network, and unlike option (a), it | |||
option (a), it only identifies the <Ethernet Tag, GW> pair and | only identifies the <Ethernet Tag, GW> pair and not the <Ethernet | |||
not the <Ethernet Tag, egress PE> pair. The VNI used inside | Tag, egress PE> pair. The VNI used inside each DC MAY be the | |||
each DC MAY be the same as the Interconnect VNI. GWs SHOULD | same as the Interconnect VNI. GWs SHOULD support multiple VNI | |||
support multiple VNI spaces per EVI (one per Interconnect | spaces per EVI (one per Interconnect network they are connected | |||
network they are connected to). | to). | |||
In both options, NVEs inside a DC only have to be aware of a single | In both options, NVEs inside a DC only have to be aware of a single | |||
VNI space, and only GWs will handle the complexity of managing | VNI space, and only GWs will handle the complexity of managing | |||
multiple VNI spaces. In addition to VNI translation above, the GWs | multiple VNI spaces. In addition to VNI translation above, the GWs | |||
will provide translation of the tunnel source IP for the packets | will provide translation of the tunnel source IP for the packets | |||
generated from the NVEs, using their own IP address. GWs will use | generated from the NVEs, using their own IP address. GWs will use | |||
that IP address as the BGP next-hop in all the EVPN updates to the | that IP address as the BGP next hop in all the EVPN updates to the | |||
Interconnect network. | Interconnect network. | |||
The following sections provide more details about these two options. | The following sections provide more details about these two options. | |||
4.6.1. Globally unique VNIs in the Interconnect network | 4.6.1. Globally Unique VNIs in the Interconnect Network | |||
Considering Figure 2, if a host H1 in NVO-1 needs to communicate with | Considering Figure 2, if a host H1 in NVO-1 needs to communicate with | |||
a host H2 in NVO-2, and assuming that different VNIs are used in each | a host H2 in NVO-2, and assuming that different VNIs are used in each | |||
DC for the same EVI, e.g. VNI-10 in NVO-1 and VNI-20 in NVO-2, then | DC for the same EVI (e.g., VNI-10 in NVO-1 and VNI-20 in NVO-2), then | |||
the VNIs MUST be translated to a common Interconnect VNI (e.g. VNI- | the VNIs MUST be translated to a common Interconnect VNI (e.g., VNI- | |||
100) on the GWs. Each GW is provisioned with a VNI translation | 100) on the GWs. Each GW is provisioned with a VNI translation | |||
mapping so that it can translate the VNI in the control plane when | mapping so that it can translate the VNI in the control plane when | |||
sending BGP EVPN route updates to the Interconnect network. In other | sending BGP EVPN route updates to the Interconnect network. In other | |||
words, GW1 and GW2 MUST be configured to map VNI-10 to VNI-100 in the | words, GW1 and GW2 MUST be configured to map VNI-10 to VNI-100 in the | |||
BGP update messages for H1's MAC route. This mapping is also used to | BGP update messages for H1's MAC route. This mapping is also used to | |||
translate the VNI in the data plane in both directions, that is, VNI- | translate the VNI in the data plane in both directions: that is, | |||
10 to VNI-100 when the packet is received from NVO-1 and the reverse | VNI-10 to VNI-100 when the packet is received from NVO-1 and the | |||
mapping from VNI-100 to VNI-10 when the packet is received from the | reverse mapping from VNI-100 to VNI-10 when the packet is received | |||
remote NVO-2 network and needs to be forwarded to NVO-1. | from the remote NVO-2 network and needs to be forwarded to NVO-1. | |||
The procedures described in section 4.4 will be followed, considering | The procedures described in Section 4.4 will be followed, considering | |||
that the VNIs advertised/received by the GWs will be translated | that the VNIs advertised/received by the GWs will be translated | |||
accordingly. | accordingly. | |||
4.6.2. Downstream assigned VNIs in the Interconnect network | 4.6.2. Downstream-Assigned VNIs in the Interconnect Network | |||
In this case, if a host H1 in NVO-1 needs to communicate with a host | In this case, if a host H1 in NVO-1 needs to communicate with a host | |||
H2 in NVO-2, and assuming that different VNIs are used in each DC for | H2 in NVO-2, and assuming that different VNIs are used in each DC for | |||
the same EVI, e.g. VNI-10 in NVO-1 and VNI-20 in NVO-2, then the VNIs | the same EVI, e.g., VNI-10 in NVO-1 and VNI-20 in NVO-2, then the | |||
MUST be translated as in section 4.6.1. However, in this case, there | VNIs MUST be translated as in Section 4.6.1. However, in this case, | |||
is no need to translate to a common Interconnect VNI on the GWs. Each | there is no need to translate to a common Interconnect VNI on the | |||
GW can translate the VNI received in an EVPN update to a locally | GWs. Each GW can translate the VNI received in an EVPN update to a | |||
assigned VNI advertised to the Interconnect network. Each GW can use | locally assigned VNI advertised to the Interconnect network. Each GW | |||
a different Interconnect VNI, hence this VNI does not need to be | can use a different Interconnect VNI; hence, this VNI does not need | |||
agreed on all the GWs and PEs of the Interconnect network. | to be agreed upon on all the GWs and PEs of the Interconnect network. | |||
The procedures described in section 4.4 will be followed, taking the | The procedures described in Section 4.4 will be followed, taking into | |||
considerations above for the VNI translation. | account the considerations above for the VNI translation. | |||
5. Security Considerations | 5. Security Considerations | |||
This document applies existing specifications to a number of | This document applies existing specifications to a number of | |||
Interconnect models. The Security Considerations included in those | Interconnect models. The security considerations included in those | |||
documents, such as [RFC7432], [EVPN-Overlays], [RFC7623], [RFC4761] | documents, such as [RFC7432], [RFC8365], [RFC7623], [RFC4761], and | |||
and [RFC4762] apply to this document whenever those technologies are | [RFC4762] apply to this document whenever those technologies are | |||
used. | used. | |||
As discussed, [EVPN-Overlays] discusses two main DCI solution groups: | As discussed, [RFC8365] discusses two main DCI solution groups: "DCI | |||
"DCI using GWs" and "DCI using ASBRs". This document specifies the | using GWs" and "DCI using ASBRs". This document specifies the | |||
solutions that correspond to the "DCI using GWs" group. It is | solutions that correspond to the "DCI using GWs" group. It is | |||
important to note that the use of GWs provide a superior level of | important to note that the use of GWs provides a superior level of | |||
security on a per tenant basis, compared to the use of ASBRs. This is | security on a per-tenant basis, compared to the use of ASBRs. This | |||
due to the fact that GWs need to perform a MAC lookup on the frames | is due to the fact that GWs need to perform a MAC lookup on the | |||
being received from the WAN, and they apply security procedures, such | frames being received from the WAN, and they apply security | |||
as filtering of undesired frames, filtering of frames with a source | procedures, such as filtering of undesired frames, filtering of | |||
MAC that matches a protected MAC in the DC or application of MAC | frames with a source MAC that matches a protected MAC in the DC, or | |||
duplication procedures defined in [RFC7432]. On ASBRs though, traffic | application of MAC-duplication procedures defined in [RFC7432]. On | |||
is forwarded based on a label or VNI swap and there is usually no | ASBRs, though, traffic is forwarded based on a label or VNI swap, and | |||
visibility of the encapsulated frames, which can carry malicious | there is usually no visibility of the encapsulated frames, which can | |||
traffic. | carry malicious traffic. | |||
In addition, the GW optimizations specified in this document, provide | In addition, the GW optimizations specified in this document provide | |||
additional protection of the DC Tenant Systems. For instance, the MAC | additional protection of the DC tenant systems. For instance, the | |||
address advertisement control and Unknown MAC Route defined in | MAC-address advertisement control and Unknown MAC Route defined in | |||
section 3.5.1 protect the DC NVEs from being overwhelmed with an | Section 3.5.1 protect the DC NVEs from being overwhelmed with an | |||
excessive number MAC/IP routes being learned on the GWs from the WAN. | excessive number of MAC/IP routes being learned on the GWs from the | |||
The ARP/ND flooding control described in 3.5.2 can reduce/suppress | WAN. The ARP/ND flooding control described in Section 3.5.2 can | |||
broadcast storms being injected from the WAN. | reduce/suppress broadcast storms being injected from the WAN. | |||
Finally, the reader should be aware of the potential security | Finally, the reader should be aware of the potential security | |||
implications of designing a DCI with the Decoupled Interconnect | implications of designing a DCI with the Decoupled Interconnect | |||
solution (section 3) or the Integrated Interconnect solution (section | solution (Section 3) or the Integrated Interconnect solution | |||
4). In the Decoupled Interconnect solution the DC is typically easier | (Section 4). In the Decoupled Interconnect solution, the DC is | |||
to protect from the WAN, since each GW has a single logical link to | typically easier to protect from the WAN, since each GW has a single | |||
one WAN PE, whereas in the Integrated solution, the GW has logical | logical link to one WAN PE, whereas in the Integrated solution, the | |||
links to all the WAN PEs that are attached to the tenant. In either | GW has logical links to all the WAN PEs that are attached to the | |||
model, proper control plane and data plane policies should be put in | tenant. In either model, proper control plane and data plane | |||
place in the GWs in order to protect the DC from potential attacks | policies should be put in place in the GWs in order to protect the DC | |||
coming from the WAN. | from potential attacks coming from the WAN. | |||
6. IANA Considerations | 6. IANA Considerations | |||
This document has no IANA actions. | This document has no IANA actions. | |||
7. References | 7. References | |||
7.1. Normative References | 7.1. Normative References | |||
[RFC4761] Kompella, K., Ed., and Y. Rekhter, Ed., "Virtual Private | [RFC4761] Kompella, K., Ed. and Y. Rekhter, Ed., "Virtual Private | |||
LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling", | LAN Service (VPLS) Using BGP for Auto-Discovery and | |||
RFC 4761, DOI 10.17487/RFC4761, January 2007, <http://www.rfc- | Signaling", RFC 4761, DOI 10.17487/RFC4761, January 2007, | |||
editor.org/info/rfc4761>. | <https://www.rfc-editor.org/info/rfc4761>. | |||
[RFC4762] Lasserre, M., Ed., and V. Kompella, Ed., "Virtual Private | [RFC4762] Lasserre, M., Ed. and V. Kompella, Ed., "Virtual Private | |||
LAN Service (VPLS) Using Label Distribution Protocol (LDP) | LAN Service (VPLS) Using Label Distribution Protocol (LDP) | |||
Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007, | Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007, | |||
<http://www.rfc-editor.org/info/rfc4762>. | <https://www.rfc-editor.org/info/rfc4762>. | |||
[RFC6074] Rosen, E., Davie, B., Radoaca, V., and W. Luo, | [RFC6074] Rosen, E., Davie, B., Radoaca, V., and W. Luo, | |||
"Provisioning, Auto-Discovery, and Signaling in Layer 2 Virtual | "Provisioning, Auto-Discovery, and Signaling in Layer 2 | |||
Private Networks (L2VPNs)", RFC 6074, DOI 10.17487/RFC6074, January | Virtual Private Networks (L2VPNs)", RFC 6074, | |||
2011, <http://www.rfc-editor.org/info/rfc6074>. | DOI 10.17487/RFC6074, January 2011, | |||
<https://www.rfc-editor.org/info/rfc6074>. | ||||
[RFC7041] Balus, F., Ed., Sajassi, A., Ed., and N. Bitar, Ed., | [RFC7041] Balus, F., Ed., Sajassi, A., Ed., and N. Bitar, Ed., | |||
"Extensions to the Virtual Private LAN Service (VPLS) Provider Edge | "Extensions to the Virtual Private LAN Service (VPLS) | |||
(PE) Model for Provider Backbone Bridging", RFC 7041, DOI | Provider Edge (PE) Model for Provider Backbone Bridging", | |||
10.17487/RFC7041, November 2013, <http://www.rfc- | RFC 7041, DOI 10.17487/RFC7041, November 2013, | |||
editor.org/info/rfc7041>. | <https://www.rfc-editor.org/info/rfc7041>. | |||
[RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A., | [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A., | |||
Uttaro, J., Drake, J., and W. Henderickx, "BGP MPLS-Based Ethernet | Uttaro, J., Drake, J., and W. Henderickx, "BGP MPLS-Based | |||
VPN", RFC 7432, DOI 10.17487/RFC7432, February 2015, <http://www.rfc- | Ethernet VPN", RFC 7432, DOI 10.17487/RFC7432, February | |||
editor.org/info/rfc7432>. | 2015, <https://www.rfc-editor.org/info/rfc7432>. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March | Requirement Levels", BCP 14, RFC 2119, | |||
1997, <http://www.rfc-editor.org/info/rfc2119>. | DOI 10.17487/RFC2119, March 1997, | |||
<https://www.rfc-editor.org/info/rfc2119>. | ||||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
<http://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
[TUNNEL-ENCAP] Rosen et al., "The BGP Tunnel Encapsulation | [RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, | |||
Attribute", draft-ietf-idr-tunnel-encaps-08, work in progress, | "The BGP Tunnel Encapsulation Attribute", RFC 9012, | |||
January 11, 2018. | DOI 10.17487/RFC9012, April 2021, | |||
<https://www.rfc-editor.org/info/rfc9012>. | ||||
[RFC7623] Sajassi et al., "Provider Backbone Bridging Combined with | [RFC7623] Sajassi, A., Ed., Salam, S., Bitar, N., Isaac, A., and W. | |||
Ethernet VPN (PBB-EVPN)", RFC 7623, September, 2015, <http://www.rfc- | Henderickx, "Provider Backbone Bridging Combined with | |||
editor.org/info/rfc7623>. | Ethernet VPN (PBB-EVPN)", RFC 7623, DOI 10.17487/RFC7623, | |||
September 2015, <https://www.rfc-editor.org/info/rfc7623>. | ||||
[EVPN-Overlays] Sajassi-Drake et al., "A Network Virtualization | [RFC8365] Sajassi, A., Ed., Drake, J., Ed., Bitar, N., Shekhar, R., | |||
Overlay Solution using EVPN", draft-ietf-bess-evpn-overlay-11.txt, | Uttaro, J., and W. Henderickx, "A Network Virtualization | |||
work in progress, January 2018. | Overlay Solution Using Ethernet VPN (EVPN)", RFC 8365, | |||
DOI 10.17487/RFC8365, March 2018, | ||||
<https://www.rfc-editor.org/info/rfc8365>. | ||||
[RFC7543] Jeng, H., Jalil, L., Bonica, R., Patel, K., and L. Yong, | [RFC7543] Jeng, H., Jalil, L., Bonica, R., Patel, K., and L. Yong, | |||
"Covering Prefixes Outbound Route Filter for BGP-4", RFC 7543, DOI | "Covering Prefixes Outbound Route Filter for BGP-4", | |||
10.17487/RFC7543, May 2015, <https://www.rfc- | RFC 7543, DOI 10.17487/RFC7543, May 2015, | |||
editor.org/info/rfc7543>. | <https://www.rfc-editor.org/info/rfc7543>. | |||
7.2. Informative References | 7.2. Informative References | |||
[RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, | [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, | |||
R., Patel, K., and J. Guichard, "Constrained Route Distribution for | R., Patel, K., and J. Guichard, "Constrained Route | |||
Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) | Distribution for Border Gateway Protocol/MultiProtocol | |||
Internet Protocol (IP) Virtual Private Networks (VPNs)", RFC 4684, | Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual | |||
DOI 10.17487/RFC4684, November 2006, <http://www.rfc- | Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, | |||
editor.org/info/rfc4684>. | November 2006, <https://www.rfc-editor.org/info/rfc4684>. | |||
[RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, | [RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, | |||
L., Sridhar, T., Bursell, M., and C. Wright, "Virtual eXtensible | L., Sridhar, T., Bursell, M., and C. Wright, "Virtual | |||
Local Area Network (VXLAN): A Framework for Overlaying Virtualized | eXtensible Local Area Network (VXLAN): A Framework for | |||
Layer 2 Networks over Layer 3 Networks", RFC 7348, DOI | Overlaying Virtualized Layer 2 Networks over Layer 3 | |||
10.17487/RFC7348, August 2014, <http://www.rfc- | Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014, | |||
editor.org/info/rfc7348>. | <https://www.rfc-editor.org/info/rfc7348>. | |||
[RFC7637] Garg, P., et al., "NVGRE: Network Virtualization using | [RFC7637] Garg, P., Ed. and Y. Wang, Ed., "NVGRE: Network | |||
Generic Routing Encapsulation", RFC 7637, September, 2015 | Virtualization Using Generic Routing Encapsulation", | |||
RFC 7637, DOI 10.17487/RFC7637, September 2015, | ||||
<https://www.rfc-editor.org/info/rfc7637>. | ||||
[RFC4023] Worster, T., Rekhter, Y., and E. Rosen, Ed., | [RFC4023] Worster, T., Rekhter, Y., and E. Rosen, Ed., | |||
"Encapsulating MPLS in IP or Generic Routing Encapsulation (GRE)", | "Encapsulating MPLS in IP or Generic Routing Encapsulation | |||
RFC 4023, DOI 10.17487/RFC4023, March 2005, <http://www.rfc- | (GRE)", RFC 4023, DOI 10.17487/RFC4023, March 2005, | |||
editor.org/info/rfc4023>. | <https://www.rfc-editor.org/info/rfc4023>. | |||
[Y.1731] ITU-T Recommendation Y.1731, "OAM functions and mechanisms | [Y.1731] ITU-T, "OAM functions and mechanisms for Ethernet based | |||
for Ethernet based networks", July 2011. | networks", ITU-T Recommendation Y.1731, August 2019. | |||
[802.1AG] IEEE 802.1AG_2007, "IEEE Standard for Local and | [IEEE.802.1AG] | |||
Metropolitan Area Networks - Virtual Bridged Local Area Networks | IEEE, "IEEE Standard for Local and Metropolitan Area | |||
Amendment 5: Connectivity Fault Management", January 2008. | Networks Virtual Bridged Local Area Networks Amendment 5: | |||
Connectivity Fault Management", IEEE standard 802.1ag- | ||||
2007, January 2008. | ||||
[802.1Q-2014] IEEE 802.1Q-2014, "IEEE Standard for Local and | [IEEE.802.1Q] | |||
metropolitan area networks--Bridges and Bridged Networks", December | IEEE, "IEEE Standard for Local and metropolitan area | |||
2014. | networks--Bridges and Bridged Networks", IEEE standard | |||
802.1Q-2014, DOI 10.1109/IEEESTD.2014.6991462, December | ||||
2014, <https://doi.org/10.1109/IEEESTD.2014.6991462>. | ||||
[RFC6870] Muley, P., Ed., and M. Aissaoui, Ed., "Pseudowire | [RFC6870] Muley, P., Ed. and M. Aissaoui, Ed., "Pseudowire | |||
Preferential Forwarding Status Bit", RFC 6870, DOI 10.17487/RFC6870, | Preferential Forwarding Status Bit", RFC 6870, | |||
February 2013, <http://www.rfc-editor.org/info/rfc6870>. | DOI 10.17487/RFC6870, February 2013, | |||
<https://www.rfc-editor.org/info/rfc6870>. | ||||
[RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol | [RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol | |||
Label Switching Architecture", RFC 3031, DOI 10.17487/RFC3031, | Label Switching Architecture", RFC 3031, | |||
January 2001, <http://www.rfc-editor.org/info/rfc3031>. | DOI 10.17487/RFC3031, January 2001, | |||
<https://www.rfc-editor.org/info/rfc3031>. | ||||
[VIRTUAL-ES] Sajassi et al., "EVPN Virtual Ethernet Segment", draft- | [VIRTUAL-ES] | |||
sajassi-bess-evpn-virtual-eth-segment-03, work in progress, February | Sajassi, A., Brissette, P., Schell, R., Drake, J. E., and | |||
2018. | J. Rabadan, "EVPN Virtual Ethernet Segment", Work in | |||
Progress, Internet-Draft, draft-ietf-bess-evpn-virtual- | ||||
eth-segment-06, 9 March 2020, | ||||
<https://tools.ietf.org/html/draft-ietf-bess-evpn-virtual- | ||||
eth-segment-06>. | ||||
8. Acknowledgments | Acknowledgments | |||
The authors would like to thank Neil Hart, Vinod Prabhu and Kiran | The authors would like to thank Neil Hart, Vinod Prabhu, and Kiran | |||
Nagaraj for their valuable comments and feedback. We would also like | Nagaraj for their valuable comments and feedback. We would also like | |||
to thank Martin Vigoureux and Alvaro Retana for his detailed review | to thank Martin Vigoureux and Alvaro Retana for their detailed | |||
and comments. | reviews and comments. | |||
9. Contributors | Contributors | |||
In addition to the authors listed on the front page, the following | In addition to the authors listed on the front page, the following | |||
co-authors have also contributed to this document: | coauthors have also contributed to this document: | |||
Ravi Shekhar | Ravi Shekhar | |||
Juniper Networks | ||||
Anil Lohiya | Anil Lohiya | |||
Juniper Networks | ||||
Wen Lin | Wen Lin | |||
Juniper Networks | Juniper Networks | |||
Florin Balus | Florin Balus | |||
Cisco | ||||
Patrice Brissette | Patrice Brissette | |||
Cisco | Cisco | |||
Senad Palislamovic | Senad Palislamovic | |||
Nokia | Nokia | |||
Dennis Cai | Dennis Cai | |||
Alibaba | Alibaba | |||
10. Authors' Addresses | Authors' Addresses | |||
Jorge Rabadan | Jorge Rabadan (editor) | |||
Nokia | Nokia | |||
777 E. Middlefield Road | 777 E. Middlefield Road | |||
Mountain View, CA 94043 USA | Mountain View, CA 94043 | |||
United States of America | ||||
Email: jorge.rabadan@nokia.com | Email: jorge.rabadan@nokia.com | |||
Senthil Sathappan | Senthil Sathappan | |||
Nokia | Nokia | |||
Email: senthil.sathappan@nokia.com | Email: senthil.sathappan@nokia.com | |||
Wim Henderickx | Wim Henderickx | |||
Nokia | Nokia | |||
Email: wim.henderickx@nokia.com | Email: wim.henderickx@nokia.com | |||
Ali Sajassi | Ali Sajassi | |||
Cisco | Cisco | |||
Email: sajassi@cisco.com | Email: sajassi@cisco.com | |||
John Drake | John Drake | |||
Juniper | Juniper | |||
Email: jdrake@juniper.net | Email: jdrake@juniper.net | |||
End of changes. 283 change blocks. | ||||
814 lines changed or deleted | 850 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |