<?xmlversion='1.0' encoding='utf-8'?>version="1.0" encoding="utf-8"?> <!DOCTYPE rfcSYSTEM "rfc2629.dtd"[ <!ENTITYI-D.ietf-bess-evpn-prefix-advertisement SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-bess-evpn-prefix-advertisement-11.xml">nbsp " "> <!ENTITYI-D.ietf-idr-tunnel-encaps SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-idr-tunnel-encaps-22.xml">zwsp "​"> <!ENTITYRFC2119 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">nbhy "‑"> <!ENTITYRFC4364 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4364.xml"> <!ENTITY RFC7348 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7348.xml"> <!ENTITY RFC7432 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7432.xml"> <!ENTITY RFC7606 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7606.xml"> <!ENTITY RFC7637 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7637.xml"> <!ENTITY RFC8174 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"> <!ENTITY RFC8365 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8365.xml"> <!ENTITY I-D.ietf-bess-evpn-irb-extended-mobility SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-bess-evpn-irb-extended-mobility-03.xml"> <!ENTITY I-D.ietf-nvo3-vxlan-gpe SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-ietf-nvo3-vxlan-gpe-10.xml"> <!ENTITY RFC4365 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4365.xml"> <!ENTITY RFC5798 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5798.xml"> <!ENTITY RFC7365 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7365.xml">wj "⁠"> ]> <rfcsubmissionType="IETF"xmlns:xi="http://www.w3.org/2001/XInclude" docName="draft-ietf-bess-evpn-inter-subnet-forwarding-15" number="9135" submissionType="IETF" category="std"ipr="trust200902"> <!-- Generated by id2xml 1.5.0 on 2021-08-06T22:40:56Z --> <?rfc strict="yes"?> <?rfc compact="yes"?> <?rfc subcompact="no"?> <?rfc symrefs="yes"?> <?rfc sortrefs="yes"?> <?rfc text-list-symbols="o*+-"?> <?rfc toc="yes"?>consensus="true" ipr="trust200902" obsoletes="" updates="" xml:lang="en" symRefs="true" sortRefs="true" tocInclude="true" version="3"> <front><title>Integrated<title abbrev="IRB EVPN">Integrated Routing and Bridging inEVPN</title>Ethernet VPN (EVPN)</title> <seriesInfo name="RFC" value="9135"/> <author initials="A." surname="Sajassi" fullname="Ali Sajassi"> <organization>Cisco Systems</organization><address><email>sajassi@cisco.com</email><address> <email>sajassi@cisco.com</email> </address> </author> <author initials="S." surname="Salam" fullname="Samer Salam"> <organization>Cisco Systems</organization><address><email>ssalam@cisco.com</email><address> <email>ssalam@cisco.com</email> </address> </author> <author initials="S." surname="Thoria" fullname="Samir Thoria"> <organization>Cisco Systems</organization><address><email>sthoria@cisco.com</email><address> <email>sthoria@cisco.com</email> </address> </author> <author initials="J." surname="Drake" fullname="John E Drake"> <organization>Juniper</organization><address><email>jdrake@juniper.net</email><address> <email>jdrake@juniper.net</email> </address> </author> <author initials="J." surname="Rabadan" fullname="Jorge Rabadan"> <organization>Nokia</organization><address><email>jorge.rabadan@nokia.com</email><address> <email>jorge.rabadan@nokia.com</email> </address> </author> <date year="2021"month="August"/>month="October"/> <workgroup>BESS WorkGroup</workgroup><abstract><t><keyword>IRB</keyword> <keyword>inter-subnet-forwarding</keyword> <keyword>symmetric</keyword> <keyword>asymmetric</keyword> <keyword>mobility</keyword> <abstract> <t> Ethernet VPN (EVPN) provides an extensible and flexiblemulti-homingmultihoming VPN solution over an MPLS/IP network for intra-subnet connectivity among Tenant Systems andEnd Devicesend devices that can be physical or virtual. However, there are scenarios for which there is a need for a dynamic and efficient inter-subnet connectivity among these Tenant Systems andEnd Devicesend devices while maintaining themulti-homingmultihoming capabilities of EVPN. This document describes an Integrated Routing and Bridging (IRB) solution based on EVPN to address such requirements.</t> </abstract> </front> <middle> <sectiontitle="Terminology" anchor="sect-1"><t> AC: Attachment Circuit</t> <t> ARP: Address Resolution Protocol</t>anchor="intro" numbered="true" toc="default"> <name>Introduction</name> <t>ARP table: A logical view of a forwarding table on a PE that maintains an IP to MAC binding entry on an IP interface for both IPv4 and IPv6. These entries are learned through ARP/ND or through EVPN.</t> <t> Broadcast Domain: As per <xref target="RFC7432"/>, an EVI consists of a single or multiple broadcast domains. In the case of VLAN-bundle and VLAN-based service models (see <xref target="RFC7432"/>), a broadcast domain is equivalent to an EVI. In the case of VLAN-aware bundle service model, an EVI contains multiple broadcast domains. Also, in this document, broadcast domain and subnet are equivalent terms and wherever "subnet" is used, it means "IP subnet"</t> <t> Broadcast Domain Route Target: refers to the Broadcast Domain assigned Route Target <xref target="RFC4364"/>. In the case of VLAN-aware bundle service model, all the broadcast domain instances in the MAC-VRF share the same Route Target</t> <t> Bridge Table: The instantiation of a broadcast domain in a MAC-VRF, as per <xref target="RFC7432"/>.</t> <t> Ethernet NVO tunnel: refers to Network Virtualization Overlay tunnels with Ethernet payload as specified for VxLAN in <xref target="RFC7348"/> and for NVGRE in <xref target="RFC7637"/>.</t> <t> EVI:EVPNInstance spanning the NVE/PE devices that are participating on that EVPN, as per <xref target="RFC7432"/>.</t> <t> EVPN: Ethernet Virtual Private Networks, as per <xref target="RFC7432"/>.</t> <t> IP NVO tunnel: it refers to Network Virtualization Overlay tunnels with IP payload (no MAC header in the payload) as specified for GPE in<xreftarget="I-D.ietf-nvo3-vxlan-gpe"/>.</t> <t> IP-VRF: A Virtual Routing and Forwarding table for IP routes on an NVE/PE. The IP routes could be populated by EVPN and IP-VPN address families. An IP-VRF is also an instantiation of a layer 3 VPN in an NVE/PE.</t> <t> IRB: Integrated Routing and Bridging interface. It connects an IP-VRF to a broadcast domain (or subnet).</t> <t> MAC-VRF: A Virtual Routing and Forwarding table for Media Access Control (MAC) addresses on an NVE/PE, as per <xref target="RFC7432"/>. A MAC-VRF is also an instantiation of an EVI in an NVE/PE.</t> <t> ND: Neighbor Discovery Protocol</t> <t> NVE: Network Virtualization Edge</t> <t> NVGRE: Network Virtualization Generic Routing Encapsulation, <xref target="RFC7637"/></t> <t> NVO: Network Virtualization Overlays</t> <t> RT-2: EVPN route type 2, i.e., MAC/IP Advertisement route, as defined in <xref target="RFC7432"/></t> <t> RT-5: EVPN route type 5, i.e., IP Prefix route. As defined in Section 3 of <xref target="I-D.ietf-bess-evpn-prefix-advertisement"/></t> <t> TS: Tenant System</t> <t> VA: Virtual Appliance</t> <t> VNI: Virtual Network Identifier. As in <xref target="RFC8365"/>, the term is used as a representation of a 24-bit NVO instance identifier, with the understanding that VNI will refer to a VXLAN Network Identifier in VXLAN, or Virtual Subnet Identifier in NVGRE, etc. unless it is stated otherwise.</t> <t> VTEP: VXLAN Termination End Point, as in <xref target="RFC7348"/>.</t> <t> VXLAN: Virtual Extensible LAN, as in <xref target="RFC7348"/>.</t> <t> This document also assumes familiarity with the terminology of <xref target="RFC7432"/>, <xref target="RFC8365"/> and <xref target="RFC7365"/>.</t> <section title="Requirements Language" anchor="sect-1.1"><t> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/> and RFC 8174 <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t> </section> </section> <section title="Introduction" anchor="sect-2"><t> EVPN <xref target="RFC7432"/>target="RFC7432" format="default"/> provides an extensible and flexiblemulti-homingmultihoming VPN solution over an MPLS/IP network for intra-subnet connectivity among Tenant Systems(TSes)(TSs) andEnd Devicesend devices that can be physical orvirtual;virtual, where an IP subnet is represented by an EVPNInstanceinstance (EVI) for a VLAN-based service or by an (EVI, VLAN) association for a VLAN-aware bundle service. However, there are scenarios for which there is a need for a dynamic and efficient inter-subnet connectivity among these Tenant Systems andEnd Devicesend devices while maintaining themulti-homingmultihoming capabilities of EVPN. This document describes an Integrated Routing and Bridging (IRB) solution based on EVPN to address such requirements.</t> <t>The inter-subnetInter-subnet communication istraditionally achieved attypically performed by centralizedL3 Gateway (L3GW) devices whereLayer 3 (L3) gateway (GW) devices, which enforce alltheinter-subnetforwarding is performedcommunication policies and perform alltheinter-subnetcommunication policies are enforced.forwarding. When twoTSesTSs belonging to two different subnets connected to the samePEProvider Edge (PE) wanted to communicate with each other, their traffic needed to be backhauled from the PE all the way to the centralized gateway where inter-subnet switching is performed and then sent back to the PE. For today's large multi-tenantdata center,Data Center (DC), this scheme is very inefficient and sometimes impractical.</t> <t> In order to overcome the drawback of the centralizedlayer-3L3 GW approach, IRB functionality is needed on the PEs (also referred to as EVPNNVEs)Network Virtualization Edges (NVEs)) attached toTSesTSs in order to avoid inefficient forwarding of tenant traffic (i.e., avoidback-haulingbackhauling andhair-pinning).hair pinning). When a PE with IRB capability receives tenant traffic over an Attachment Circuit (AC), itcan notcannot only locally bridge the tenant intra-subnet traffic but alsocanlocally route the tenant inter-subnet traffic on apacket by packet basispacket-by-packet basis, thus meeting the requirements for bothintraintra- and inter-subnet forwarding and avoiding non-optimal traffic forwarding associated with a centralizedlayer-3L3 GW approach.</t> <t> SomeTSesTSs run non-IP protocols in conjunction with their IP traffic. Therefore, it is important to handle both kinds of traffic optimally--- e.g., to bridge non-IP and intra-subnet traffic and to route inter-subnet IP traffic. Therefore, the solution needs to meet the following requirements:</t><t> R1:<dl> <dt>R1:</dt><dd> The solution must provide each tenant with IP routing of its inter-subnet traffic and Ethernet bridging of its intra-subnet traffic and non-routable traffic, where non-routable traffic refersbothto both non-IP traffic and IP traffic whose version differs from the IP version configured inthe IP-VRF.IP Virtual Routing and Forwarding (IP-VRF). For example, if an IP-VRF inaan NVE is configured for IPv6 and that NVE receives IPv4 traffic on the corresponding VLAN, then the IPv4 traffic is treated as non-routabletraffic.</t> <t> R2:traffic.</dd> <dt> R2:</dt><dd> The solution must allow IP routing of inter-subnet traffic to be disabled on a per-VLAN basis on those PEs that are backhauling that traffic to another PE forrouting.</t>routing.</dd></dl> </section> <section anchor="terms" numbered="true" toc="default"> <name>Terminology</name> <dl indent="10"> <dt>AC:</dt><dd>Attachment Circuit</dd> <dt>ARP:</dt><dd>Address Resolution Protocol</dd> <dt>ARP Table:</dt><dd> A logical view of a forwarding table on a PE that maintains an IP to a MAC binding entry on an IP interface for both IPv4 and IPv6. These entries are learned through ARP/ND or through EVPN.</dd> <dt>BD:</dt><dd>Broadcast Domain. As per <xref target="RFC7432" format="default"/>, an EVI consists of a single BD or multiple BDs. In the case of VLAN-bundle and VLAN-based service models (see <xref target="RFC7432" format="default"/>), a BD is equivalent to an EVI. In the case of a VLAN-aware bundle service model, an EVI contains multiple BDs. Also, in this document, "BD" and "subnet" are equivalent terms, and wherever "subnet" is used, it means "IP subnet".</dd> <dt>BD Route Target:</dt><dd>Refers to the broadcast-domain-assigned Route Target <xref target="RFC4364" format="default"/>. In the case of a VLAN-aware bundle service model, all the BD instances in the MAC-VRF share the same Route Target.</dd> <dt>BT:</dt><dd>Bridge Table. The instantiation of a BD in a MAC-VRF, as per <xref target="RFC7432" format="default"/>.</dd> <dt>CE:</dt><dd>Customer Edge</dd> <dt>DA:</dt><dd>Destination Address</dd> <dt>Ethernet NVO Tunnel:</dt><dd>Refers to Network Virtualization Overlay tunnels with an Ethernet payload, as specified for VXLAN in <xref target="RFC7348" format="default"/> and for NVGRE in <xref target="RFC7637" format="default"/>.</dd> <dt>EVI:</dt><dd>EVPN Instance spanning NVE/PE devices that are participating on that EVPN, as per <xref target="RFC7432" format="default"/>.</dd> <dt>EVPN:</dt><dd>Ethernet VPN, as per <xref target="RFC7432" format="default"/>.</dd> <dt>IP NVO Tunnel:</dt><dd>Refers to Network Virtualization Overlay tunnels with IP payload (no MAC header in the payload) as specified for Generic Protocol Extension (GPE) in <xref target="I-D.ietf-nvo3-vxlan-gpe" format="default"/>.</dd> <dt>IP-VRF:</dt><dd>A Virtual Routing and Forwarding table for IP routes on an NVE/PE. The IP routes could be populated by EVPN and IP-VPN address families. An IP-VRF is also an instantiation of a Layer 3 VPN in an NVE/PE.</dd> <dt>IRB:</dt><dd>Integrated Routing and Bridging interface. It connects an IP-VRF to a BD (or subnet).</dd> <dt>MAC:</dt><dd>Media Access Control</dd> <dt>MAC-VRF:</dt><dd>A Virtual Routing and Forwarding table for MAC addresses on an NVE/PE, as per <xref target="RFC7432" format="default"/>. A MAC-VRF is also an instantiation of an EVI in an NVE/PE.</dd> <dt>ND:</dt><dd>Neighbor Discovery</dd> <dt>NVE:</dt><dd>Network Virtualization Edge</dd> <dt>NVGRE:</dt><dd>Network Virtualization Using Generic Routing Encapsulation, as per <xref target="RFC7637" format="default"/>.</dd> <dt>NVO:</dt><dd>Network Virtualization Overlay</dd> <dt>PE:</dt><dd>Provider Edge</dd> <dt>RT-2:</dt><dd>EVPN Route Type 2, i.e., MAC/IP Advertisement route, as defined in <xref target="RFC7432" format="default"/>.</dd> <dt>RT-5:</dt><dd>EVPN Route Type 5, i.e., IP Prefix route, as defined in <xref target="RFC9136" sectionFormat="of" section="3"/>.</dd> <dt>SA:</dt><dd>Source Address</dd> <dt>TS:</dt><dd>Tenant System</dd> <dt>VA:</dt><dd>Virtual Appliance</dd> <dt>VNI:</dt><dd>Virtual Network Identifier. As in <xref target="RFC8365" format="default"/>, the term is used as a representation of a 24-bit NVO instance identifier, with the understanding that "VNI" will refer to a VXLAN Network Identifier in VXLAN, or a Virtual Subnet Identifier in NVGRE, etc., unless it is stated otherwise.</dd> <dt>VTEP:</dt><dd>VXLAN Termination End Point, as per <xref target="RFC7348" format="default"/>.</dd> <dt>VXLAN:</dt><dd>Virtual eXtensible Local Area Network, as per <xref target="RFC7348" format="default"/>.</dd> </dl> <t> This document also assumes familiarity with the terminology of <xref target="RFC7365" format="default"/>, <xref target="RFC7432" format="default"/>, and <xref target="RFC8365" format="default"/>.</t> <section anchor="sect-1.1" numbered="true" toc="default"> <name>Requirements Language</name> <t> The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here. </t> </section> </section> <sectiontitle="EVPNanchor="sect-3" numbered="true" toc="default"> <name>EVPN PE Model for IRBOperation" anchor="sect-3"><t>Operation</name> <t> Since this document discusses IRB operation in relationship to EVPN MAC-VRF, IP-VRF, EVI,Broadcast Domain, Bridge Table,BD, bridge table, and IRB interfaces, it is important to understand the relationship between these components. Therefore, thefollowingPE model is illustrated below to a) describe these components and b) illustrate the relationship among them.</t> <figuretitle="EVPNanchor="fig-1"> <name>EVPN IRB PEModel" anchor="fig-1"><artwork><![CDATA[Model</name> <artwork name="" type="" align="left" alt=""><![CDATA[ +-------------------------------------------------------------+ | | | +------------------+ IRB PE | | Attachment | +------------------+ | | Circuit(AC1) | | +----------+ | MPLS/NVO tnl ----------------------*Bridge | | +----- | | | |Table(BT1)| | +-----------+ / \ \ | | | | *---------* |<--> |Eth| | | | | VLAN x | |IRB1| | \ / / | | | +----------+ | | | +----- | | | ... | | IP-VRF1 | | | | | +----------+ | | RD2/RT2 |MPLS/NVO tnl | | | |Bridge | | | | +----- | | | |Table(BT2)| |IRB2| | / \ \ | | | | *---------* |<--> |IP | ----------------------* VLAN y | | +-----------+ \ / / | AC2 | | +----------+ | +----- | | | MAC-VRF1 | | | +-+ RD1/RT1 | | | +------------------+ | | | | | +-------------------------------------------------------------+ ]]></artwork> </figure> <t> A tenant needing IRB services on aPE,PE requires anIP Virtual Routing and ForwardingIP-VRF table(IP-VRF)along with one or moreMAC Virtual Routing and Forwarding tables (MAC-VRFs).MAC-VRF tables. An IP-VRF, as defined in <xreftarget="RFC4364"/>,target="RFC4364" format="default"/>, is the instantiation of anIPVPNIP-VPN instance in a PE. A MAC-VRF, as defined in <xreftarget="RFC7432"/>,target="RFC7432" format="default"/>, is the instantiation of an EVI(EVPN Instance)in a PE. A MAC-VRF consists of one or more bridge tables, where each bridge table corresponds to a VLAN (broadcast domain). If service interfaces for an EVPN PE are configured inVLAN-BasedVLAN-based mode (i.e.,section 6.1 of RFC7432),<xref target="RFC7432" sectionFormat="of" section="6.1"/>), then there is only a single bridge table per MAC-VRF (per EVI)--- i.e., there is only one tenant VLAN per EVI. However, if service interfaces for an EVPN PE are configured inVLAN-Aware BundleVLAN-aware bundle mode (i.e.,section 6.3 of RFC7432),<xref target="RFC7432" sectionFormat="of" section="6.3"/>), then there are several bridge tables per MAC-VRF (per EVI)--- i.e., there are several tenant VLANs per EVI.</t> <t> Each bridge table is connected to an IP-VRF via an L3 interface calledIRB interface.an "IRB interface". Since a single tenant subnet is typically (and in this document) represented by a VLAN (and thus supported by a single bridge table), for a giventenanttenant, there are as many bridge tables as there aresubnets and thussubnets. Thus, there are also as many IRB interfaces between the tenant IP-VRF and the associated bridge tables as shown in the PE model above.</t> <t> IP-VRF is identified by its correspondingroute targetRoute Target androute distinguisherRoute Distinguisher, and MAC-VRF is also identified by its correspondingroute targetRoute Target androute distinguisher.Route Distinguisher. If operating in EVPNVLAN-BasedVLAN-based mode, then a receiving PE that receives an EVPN route withMAC- VRF route targeta MAC-VRF Route Target can identify the corresponding bridge table; however, if operating in EVPNVLAN-Aware BundleVLAN-aware bundle mode, then the receiving PE needs both the MAC-VRFroute targetRoute Target and VLAN ID in order to identify the corresponding bridge table.</t> </section> <sectiontitle="Symmetricanchor="sect-4" numbered="true" toc="default"> <name>Symmetric and AsymmetricIRB" anchor="sect-4"><t>IRB</name> <t> This document defines and describes two types of IRB solutions- namely-- namely, symmetric and asymmetric IRB. The description of symmetric and asymmetric IRB procedures relating to data path operations and tables in this document is a logical view of data path lookups and related tables. Actual implementations, while following this logical view, may not strictly adhere to it for performancetradeoffs.trade-offs. Specifically,</t><t><list style="symbols"><t>References<ul spacing="normal"> <li>References to an ARP table in the context of asymmetric IRB is a logical view of a forwarding table that maintains anIP to MACIP-to-MAC binding entry on alayerLayer 3 interface for both IPv4 and IPv6. These entries are not subject to ARP or NDprotocol.protocols. ForIP to MACIP-to-MAC bindingslearntlearned via EVPN, an implementation may choose to import these bindings directly to the respective forwarding table (such as an adjacency/next-hop table) as opposed to importing them to ARP or ND protocoltables.</t> <t>Referencestables.</li> <li>References to a host IP lookup followed by a host MAC lookup in the context of asymmetric IRBMAY<bcp14>MAY</bcp14> be collapsed into a single IP lookup in a hardwareimplementation.</t> </list> </t>implementation.</li> </ul> <t> In symmetricIRBIRB, as its name implies, the lookup operation is symmetric at both the ingress and egress PEs--- i.e., both ingress and egress PEs perform lookups on both MAC and IP addresses. The ingress PE performs a MAC lookup followed by an IPlookuplookup, and the egress PE performs an IP lookup followed by a MAClookuplookup, as depicted in the following figure.</t> <figuretitle="Symmetric IRB" anchor="fig2"><artwork><![CDATA[anchor="fig-2"> <name>Symmetric IRB</name> <artwork name="" type="" align="left" alt=""><![CDATA[ Ingress PE Egress PE +-------------------+ +------------------+ | | | | | +-> IP-VRF ----|---->---|-----> IP-VRF -+ | | | | | | | | BT1 BT2 | | BT3 BT2 | | | | | | | | ^ | | v | | | | | | | +-------------------+ +------------------+ ^ | | | TS1->-+ +->-TS2 ]]></artwork> </figure> <t> In symmetricIRBIRB, as shown infigure-2,<xref target="fig-2"/>, the inter-subnet forwarding between two PEs is done between their associated IP-VRFs. Therefore, the tunnel connecting these IP-VRFs can be either an IP-only tunnel (e.g., in the case of MPLS or GPE encapsulation) or an Ethernet NVO tunnel (e.g., in the case ofVxLANVXLAN encapsulation). If it is an Ethernet NVO tunnel, the TS1's IP packet is encapsulated in an Ethernet header consisting of ingress and egressPEsPE MAC addresses--- i.e., there is no need for the ingress PE to use the destination TS2's MAC address. Therefore, in symmetric IRB, there is no need for the ingress PE to maintain ARP entries for the association of the destination TS2's IP and MAC addressesassociationin its ARP table. Each PE participating in symmetric IRB only maintains ARP entries for locally connected hosts andmaintains MAC-VRFs/bridge tablesMAC-VRFs/BTs for only locally configured subnets.</t> <t> In asymmetric IRB, the lookup operation is asymmetric and the ingress PE performs threelookups;lookups, whereas the egress PE performs a single lookup--- i.e., the ingress PE performs a MAC lookup, followed by an IP lookup, followed by a MAC lookupagain; whereas, theagain. The egress PE performs just a single MAC lookup as depicted infigure 3<xref target="fig-3"/> below.</t> <figuretitle="Asymmetric IRB" anchor="fig-3"><artwork><![CDATA[anchor="fig-3"> <name>Asymmetric IRB</name> <artwork name="" type="" align="left" alt=""><![CDATA[ Ingress PE Egress PE +-------------------+ +------------------+ | | | | | +-> IP-VRF -> | | IP-VRF | | | | | | | | BT1 BT2 | | BT3 BT2 | | | | | | | | | | | +--|--->----|--------------+ | | | | | | v | +-------------------+ +----------------|-+ ^ | | | TS1->-+ +->-TS2 ]]></artwork> </figure> <t> In asymmetricIRBIRB, as shown infigure-3,<xref target="fig-3"/>, the inter-subnet forwarding between two PEs is done between their associatedMAC-VRFs/bridge tables.MAC-VRFs/BTs. Therefore, the MPLS or NVO tunnel used for inter-subnet forwardingMUST<bcp14>MUST</bcp14> be of type Ethernet. Since only MAC lookup is performed at the egress PE (e.g., no IP lookup), the TS1's IP packets need to be encapsulated with the destination TS2's MAC address. In order for the ingress PE to perform such encapsulation, it needs to maintain TS2's IP and MAC address association in its ARP table. Furthermore, it needs to maintain destination TS2's MAC address in the corresponding bridge table even though it may not have anyTSesTSs of the corresponding subnet locally attached. In other words, each PE participating in asymmetric IRBMUST<bcp14>MUST</bcp14> maintain ARP entries for remote hosts (hosts connected to other PEs) as well as maintainMAC-VRFs/bridge tablesMAC-VRFs/BTs and IRB interfaces for ALL subnets in anIP VRFIP-VRF, including subnets that may not be locally attached. Therefore, careful consideration of the PE scale aspects for its ARP table size, its IRB interfaces, and the number and size of its bridge tables should be given for the application of asymmetric IRB.</t> <t> It should be noted that whenever a PE performs a host IP lookup for a packet that is routed, the IPv4TTLTime To Live (TTL) or IPv6 hop limit for that packet is decremented byoneone, and if it reaches zero, the packet is discarded. In the case of symmetric IRB, theTTL/hopTTL / hop limit is decremented by both ingress and egress PEs (once byeach); whereas,each), whereas in the case of asymmetric IRB, theTTL/hopTTL / hop limit is decremented only once by the ingress PE.</t> <t> The following sections define the control and data plane procedures for symmetric and asymmetric IRB on ingress and egress PEs. The following figure is used to describe these procedures, showing a single IP-VRF and a number ofbroadcast domainsBDs on each PE for a given tenant.I.e.,That is, an IP-VRF connects one or more EVIs, and each EVI contains oneMAC-VRF,MAC-VRF; each MAC VRF consists of one or more bridge tables, one perbroadcast domain,BD; and a PE has an associated IRB interface for eachbroadcast domain.</t>BD.</t> <figuretitle="IRB forwarding" anchor="fig-4"><artwork><![CDATA[anchor="fig-4"> <name>IRB Forwarding</name> <artwork name="" type="" align="left" alt=""><![CDATA[ PE 1 +---------+ +-------------+ | | TS1-----| MACx| | | PE2(IP1/M1)(M1/IP1) |(BT1) | | | +-------------+ TS5-----| \ | | MPLS/ | |MACy (BT3) |-----TS3(IP5/M5)(M5/IP5) |IPx/Mx \ | |VxLAN/VXLAN/ | | / |(IP3/M3)(M3/IP3) | (IP-VRF1)|----| NVGRE |---|(IP-VRF1) | | / | | | | \ | TS2-----|(BT2) / | | | | (BT1) |-----TS4(IP2/M2)(M2/IP2) | | | | | |(IP4/M4)(M4/IP4) +-------------+ | | +-------------+ | | +---------+ ]]></artwork> </figure> <sectiontitle="IRBanchor="sect-4.1" numbered="true" toc="default"> <name>IRB Interface anditsIts MAC and IPaddresses" anchor="sect-4.1"><t>Addresses</name> <t> To support inter-subnet forwarding on a PE, the PE acts as an IPDefault Gatewaydefault gateway from the perspective of the attached Tenant Systems where default gateway MAC and IP addresses are configured on each IRB interface associated with its subnet andfallsfall into one of the following two options:</t><t><list style="numbers"><t>All<ol spacing="normal" type="1"><li anchor="opt1">All the PEs for a given tenant subnet use the same anycast default gateway IP and MAC addresses. On each PE,thisthese default gateway IP and MAC addresses correspond to the IRB interface connecting the bridge table associated with the tenant's VLAN to the corresponding tenant'sIP-VRF.</t> <t>EachIP-VRF.</li> <li anchor="opt2">Each PE for a given tenant subnet uses the same anycast default gateway IP address but its own MAC address. These MAC addresses are aliased to the same anycast default gateway IP address through the use of the Default Gateway extended community as specified in <xreftarget="RFC7432"/>,target="RFC7432" format="default"/>, which is carried in the EVPN MAC/IP Advertisement routes. On each PE, this default gateway IPaddressaddress, along with its associated MACaddressesaddresses, correspond to the IRB interface connecting the bridge table associated with the tenant's VLAN to the corresponding tenant'sIP-VRF.</t> </list> </t>IP-VRF.</li> </ol> <t> It is worth noting that if the applications that are running on theTSesTSs are employing or relying on any form of MAC security, then the first option(i.e.(i.e., using an anycast MAC address) should be used to ensure that the applications receive traffic from the same IRB interface MAC addressthatto which they aresending to.sending. If the second option is used, then the IRB interface MAC addressMUST<bcp14>MUST</bcp14> be the one used in the initial ARP reply or ND Neighbor Advertisement(NA)for(NA) for that TS.</t> <t> Although both of these options are applicable to both symmetric and asymmetric IRB,the option-1<xref target="opt1" format="none">option 1</xref> is recommended because of the ease of anycast MAC address provisioning on not only the IRB interface associated with a given subnet across all the PEs corresponding to that VLAN but also on all IRB interfaces associated with all the tenant's subnets across all the PEs corresponding to all the VLANs for that tenant. Furthermore, it simplifies the operation as there is no need for Default Gateway extended community advertisement and its associated MAC aliasing procedure. Yet another advantage is that following host mobility, the host does not need to refresh the default GW ARP/ND entry.</t> <t> Ifoption-1<xref target="opt1" format="none">option 1</xref> is used, an implementationMAY<bcp14>MAY</bcp14> choose to auto-derive the anycast MAC address. If auto-derivation is used, the anycast MACMUST<bcp14>MUST</bcp14> be auto-derived out of the following ranges (which are defined in <xreftarget="RFC5798"/>): <list style="symbols"> <t>Anycasttarget="RFC5798" format="default"/>): </t> <ul spacing="normal"> <li>Anycast IPv4 IRB case:00-00-5E-00-01-{VRID}</t> <t>Anycast00-00-5E-00-01-{VRID}</li> <li>Anycast IPv6 IRB case:00-00-5E-00-02-{VRID}</t> </list> </t>00-00-5E-00-02-{VRID}</li> </ul> <t> Where the last octet is generated based on a configurable Virtual Router ID(VRID, range 1-255)).(VRID) (range 1-255). If not explicitly configured, the default value for the VRID octet is '1'. Auto-derivation of the anycast MAC can only be used if there is certainty that the auto-derived MAC does not collide with any customer MAC address.</t> <t> In addition to IP anycast addresses, IRB interfaces can be configured with non-anycast IP addresses for the purpose of OAM (such as sending a traceroute/ping to these interfaces) for both symmetric and asymmetric IRB. These IP addresses need to be distributed as VPN routes when PEs operate in symmetric IRB mode. However, they don't need to be distributed if the PEs are operating in asymmetric IRB mode as the non-anycast IP addresses are configured along with their individualMACsMACs, and they get distributed via the EVPN routetype-2type 2 advertisement.</t> <t> Foroption-1,<xref target="opt1" format="none">option 1</xref> -- irrespective ofusingwhether only the anycast MAC address or both anycast and non-anycast MAC addresses (where the latter one is used for the purpose of OAM) are used on the sameIRB,IRB -- when a TS sends an ARP request or ND Neighbor Solicitation (NS) to the PEthatto which it isattached to,attached, the request is sent for the anycast IP address of the IRB interface associated with the TS'ssubnet and then thesubnet. The reply will use an anycast MAC address (in bothSourcethe source MAC in the Ethernet header andSendersender hardware address in the payload). For example, infigure 4,<xref target="fig-4"/>, TS1 is configured with the anycast IPx address as its default gateway IPaddress and thusaddress; thus, when it sends an ARP request for IPx (anycast IP address of the IRB interface for BT1), the PE1 sends an ARP reply with theMACxMACx, which is the anycast MAC address of that IRB interface. Traffic routed from IP-VRF1 to TS1 uses the anycast MAC address as the source MAC address.</t> </section> <sectiontitle="Operational Considerations" anchor="sect-4.2"><t>anchor="sect-4.2" numbered="true" toc="default"> <name>Operational Considerations</name> <t> Symmetric andAsymmetricasymmetric IRB modes may coexist in the same network, and an ingress PE that supports both forwarding modes for a given tenant can interwork with egress PEs that support either IRB mode. The egress PE will indicate the desired forwarding mode for a given host based on the presence of the Label2 field and the IP-VRFroute-targetRoute Target in the EVPN MAC/IP Advertisement route. If the Label2 field of the received MAC/IP Advertisement route for host H1 is non-zero, and one of itsroute-targetsRoute Targets identifies the IP-VRF, the ingress PE will useSymmetricsymmetric IRB mode when forwarding packets destined to H1. If the Label2 field is zero and the MAC/IP Advertisement route for H1 does not carry anyroute-targetRoute Target that identifies the IP-VRF, the ingress PE will useAsymmetricasymmetric mode when forwarding traffic to H1.</t> <t> As an example that illustrates the previous statement, suppose PE1 and PE2 need to forward packets from TS2 to TS4 inthe example of Figure 4.<xref target="fig-4"/>. Since both PEs are attached to the bridge table of the destination host,Symmetricsymmetric andAsymmetricasymmetric IRB modes are both possible as long as the ingress PE, PE1, supports both modes. The forwarding mode will depend on the mode configured in the egress PE, PE2. That is:</t><t><list style="numbers"><t>If<ol spacing="normal" type="1"><li>If PE2 is configured forSymmetricsymmetric IRB mode, PE2 will advertise TS4 MAC/IP addresses in a MAC/IP Advertisement route with a non-zero Label2 field, e.g.,Label2=Lx,Label2 = Lx, and aroute-targetRoute Target that identifies IP-VRF1 in PE1. IP4 will be installed in PE1'sIP-VRF1,IP-VRF1; TS4's ARP and MAC information will also be installed in PE1's IRB interface ARP table andBT1BT1, respectively. When a packet from TS2 destined to TS4 is looked up in PE1's IP-VRFroute-table,route table, a longest prefix match lookup will find IP4 in the IP-VRF, and PE1 will forward using theSymmetricsymmetric IRB mode and LabelLx.</t> <t>However,Lx.</li> <li>However, if PE2 is configured forAsymmetricasymmetric IRB mode, PE2 will advertise TS4 MAC/IP information in a MAC/IP Advertisement route with a zero Label2 field and noroute-targetRoute Target identifying IP-VRF1. In this case, PE2 will install TS4 information in its ARP table and BT1. When a packet from TS2 to TS4 arrives at PE1, a longest prefix match on IP-VRF1'sroute-tableroute table will yield the local IRB interface to BT1, where a subsequent ARP and bridge table lookup will provide the information for anAsymmetricasymmetric forwarding mode toPE2.</t> </list> </t>PE2.</li> </ol> <t> Refer to[I-D.ietf-bess-evpn-modes-interop]<xref target="I-D.ietf-bess-evpn-modes-interop"/> for more information about interoperability betweenSymmetricsymmetric andAsymmetricasymmetric forwarding modes.</t> <t> The choice betweenSymmetricsymmetric orAsymmetricasymmetric mode is based on the operator'spreferencepreference, and it is a trade-off between scale(better(which is better in theSymmetricsymmetric IRB mode) and control plane simplicity(Asymmetric(asymmetric IRB mode simplifies the control plane). In cases where a tenant has hosts for every subnet attached to all (ormost)most of) the PEs, the ARP and MAC entries need to be learned by all PEsanyway and thereforeanyway; therefore, theAsymmetricasymmetric IRB mode simplifies the forwarding model and saves space in the IP-VRFroute-table,route table, since host routes are not installed in theroute-table.route table. However, if the tenant does not need to stretch subnets (broadcast domains) to multiple PEs andinter-subnet-forwardinginter-subnet forwarding is needed, theSymmetricsymmetric IRB model will save ARP and bridge table space in all the PEs (in comparison with theAsymmetricasymmetric IRB model).</t> </section> </section> <sectiontitle="Symmetricanchor="sect-5" numbered="true" toc="default"> <name>Symmetric IRBProcedures" anchor="sect-5"><section title="ControlProcedures</name> <section anchor="sect-5.1" numbered="true" toc="default"> <name>Control Plane - AdvertisingPE" anchor="sect-5.1"><t>PE</name> <t> When a PE (e.g., PE1 infigure 4<xref target="fig-4"/> above) learns the MAC and IP address of a TS (e.g., via an ARP request or Neighbor Solicitation), it adds the MAC address to the correspondingMAC-VRF/bridge tableMAC-VRF/BT of that tenant's subnet and adds the IP address to the IP-VRF for that tenant. Furthermore, it adds this TS's MAC and IP address association to its ARP table orNDPNeighbor Discovery Protocol (NDP) cache. It then builds an EVPN MAC/IP Advertisement route (type 2) as follows and advertises it to other PEs participating in that tenant's VPN.</t><t><list style="symbols"><t>The<ul spacing="normal"> <li>The Length field of the BGP EVPNNLRINetwork Layer Reachability Information (NLRI) for an EVPN MAC/IP Advertisement routeMUST<bcp14>MUST</bcp14> be either 40 (if the IPv4 address is carried) or 52 (if the IPv6 address iscarried).</t> <t>Routecarried).</li> <li>The Route Distinguisher (RD), Ethernet Segment Identifier, Ethernet Tag ID, MAC Address Length, MAC Address, IP Address Length, IP Address, and MPLS Label1 fieldsMUST<bcp14>MUST</bcp14> be set per <xreftarget="RFC7432"/>target="RFC7432" format="default"/> and <xreftarget="RFC8365"/>.</t> <t>Thetarget="RFC8365" format="default"/>.</li> <li>The MPLS Label2 field is set to either an MPLS label or a VNI corresponding to the tenant's IP-VRF. In the case of an MPLS label, this field is encoded as 3 octets, where the high-order 20 bits contain the labelvalue.</t> </list> </t>value.</li> </ul> <t> Just as in <xreftarget="RFC7432"/>,target="RFC7432" format="default"/>, the RD, Ethernet Tag ID, MAC Address Length, MAC Address, IP Address Length, and IP Address fields are part of the route key used by BGP to compare routes. The rest of the fields are not part of the route key.</t> <t> This route is advertised along with the following two extended communities:</t><t><list style="numbers"><t>Encapsulation<ol spacing="normal" type="1"> <li>Encapsulation ExtendedCommunity</t> <t>Router'sCommunity</li> <li>EVPN Router's MAC ExtendedCommunity</t> </list> </t>Community</li> </ol> <t> This route is advertised with one or more Encapsulationextended communities [RFC9012],Extended Communities <xref target="RFC9012"/>, one for each encapsulation type supported by the advertising PE. If one or more encapsulation types require an Ethernet frame, a single EVPN Router's MACextended community, section 8.1,Extended Community (<xref target="sect-8.1"/>) is also advertised. This extended community specifies the MAC address to be used as the inner destination MAC address in an Ethernet frame sent to the advertising PE.</t> <t> This routeMUST<bcp14>MUST</bcp14> be advertised with tworoute targets,Route Targets, one corresponding to the MAC-VRF of the tenant's subnet and another corresponding to the tenant's IP-VRF.</t> </section> <sectiontitle="Controlanchor="sect-5.2" numbered="true" toc="default"> <name>Control Plane - ReceivingPE" anchor="sect-5.2"><t>PE</name> <t> When a PE (e.g., PE2 infigure 4<xref target="fig-4"/> above) receives this EVPN MAC/IP Advertisement route, it performs the following:</t><t><list style="symbols"><t>The<ul spacing="normal"> <li>The MAC-VRFroute targetRoute Target and Ethernet Tag, if the latter is non-zero, are used to identify the correct MAC-VRF and bridgetabletable, and if they arefoundfound, the MAC address is imported. The IP-VRFroute targetRoute Target is used to identify the correctIP-VRFIP-VRF, and if it isfoundfound, the IP address isimported.</t> </list> </t>imported.</li> </ul> <t> If the MPLSlabel2Label2 field is non-zero, it means that this route is to be used for symmetricIRBIRB, and the MPLS label2 value is to be used when sending a packet for this IP address to the advertising PE.</t> <t> If the receiving PE supports asymmetric IRB mode and receives this route with both the MAC-VRF and IP-VRFroute targetsRoute Targets but the MAC/IP Advertisement route does not includeMPLS label2 field and ifthereceiving PE supports asymmetric IRB mode,MPLS Label2 field, then the receiving PE installs the MAC address in the corresponding MAC-VRF and the (IP, MAC) association in the ARP table for that tenant (identified by the corresponding IP-VRFroute target).</t>Route Target).</t> <t> If the receiving PE receives this route with both the MAC-VRF and IP-VRFroute targetsRoute Targets, and if the receiving PE does not support either asymmetric or symmetric IRBmodes, then if itmodes but has the corresponding MAC-VRF, then it only imports the MAC address.</t> <t> If the receiving PE receives this route with both the MAC-VRF and IP-VRFroute targetsRoute Targets and the MAC/IP Advertisement route includes the MPLSlabel2Label2 field but the receiving PE only supports asymmetric IRB mode, then the receiving PEMUST<bcp14>MUST</bcp14> ignore the MPLSlabel2Label2 field and install the MAC address in the corresponding MAC-VRF and (IP, MAC) association in the ARP table for that tenant (identified by the corresponding IP-VRFroute target).</t>Route Target).</t> </section> <sectiontitle="Subnet route advertisement" anchor="sect-5.3"><t>anchor="sect-5.3" numbered="true" toc="default"> <name>Subnet Route Advertisement</name> <t> In the case of symmetric IRB, alayer-3Layer 3 subnet and IRB interface corresponding to aMAC-VRF/bridge table isMAC-VRF/BT are required to be provisioned at a PE only if that PE has locally attached hosts in that subnet. In order to enable inter-subnet routing across PEs in a deployment where not all subnets are provisioned at all PEs participating in an EVPN IRB instance, PEsMUST<bcp14>MUST</bcp14> advertise local subnet routes as EVPN RT-5. These subnet routes are required for bootstrapping host(MAC,IP)(IP, MAC) learning using gleaning procedures initiated by an inter-subnet data packet.</t> <t>I.e.,That is, if a given host's(MAC, IP)(IP, MAC) association is unknown, and an ingress PE needs to send a packet to that host, then that ingress PE needs to know which egress PEs are attached to the subnet in which the host resides in order to send the packet to one of those PEs, causing the PE receiving the packet to probe for that host. For example,Considerconsider a subnet A that is locally attached to PE1 and subnet B that is locally attached to PE2 andtoPE3. Host A in subnet A,thatwhich is attached toPE1PE1, initiates a data packet destined to host B in subnetB thatB, which is attached to PE3. If host B's(MAC, IP)(IP, MAC) has not yet beenlearnt eitherlearned via either a gratuitous ARP ORviaa prior gleaning procedure, a new gleaning procedureMUST<bcp14>MUST</bcp14> be triggered for host B's(MAC, IP)(IP, MAC) to belearntlearned and advertised across the EVPN network. Since host B's subnet is not local to PE1, an IP lookup for host B at PE1 will not trigger this gleaning procedure for host B's(MAC, IP).(IP, MAC). Therefore, PE1MUST<bcp14>MUST</bcp14> learn subnet B's prefix route via EVPN RT-5 advertised from PE2 and PE3, so it can route the packet to one of the PEs that have subnet B locally attached. Once the packet is received at PE2 OR PE3, and the route lookup yields a glean result, an ARP request is triggered and flooded across thelayer-2Layer 2 overlay. This ARP request would be received and replied to by host B, resulting in host B(MAC, IP)(IP, MAC) learning atPE3,PE3 and its advertisement across the EVPN network. Packets from host A to host B can now be routed directly from PE1 to PE3. Advertisement of local subnet EVPN RT-5 for anIP VRF MAYIP-VRF <bcp14>MAY</bcp14> typically be achieved viaprovisioning connectedprovisioning-connected route redistribution to BGP.</t> </section> <sectiontitle="Dataanchor="sect-5.4" numbered="true" toc="default"> <name>Data Plane - IngressPE" anchor="sect-5.4"><t>PE</name> <t> When an Ethernet frame is received by an ingress PE (e.g., PE1 infigure 4<xref target="fig-4"/> above), the PE uses the AC ID (e.g., VLAN ID) to identify the associatedMAC-VRF/bridge tableMAC-VRF/BT, and it performs a lookup on the destination MAC address. If the MAC address corresponds to its IRBInterfaceinterface MAC address, the ingress PE deduces that the packet must be inter-subnet routed. Hence, the ingress PE performs an IP lookup in the associated IP-VRF table. The lookup identifies the BGP next hop of the egress PE along with the tunnel/encapsulation type and the associated MPLS/VNI values. The ingress PE also decrements theTTL/hopTTL / hop limit for that packet byoneone, and if it reaches zero, the ingress PE discards the packet.</t> <t> If the tunnel type is that of an MPLS or IP-only NVO tunnel, then the TS's IP packet is sent over the tunnel without any Ethernet header. However, if the tunnel type is that of an Ethernet NVO tunnel, then an Ethernet header needs to be added to the TS's IP packet. The source MAC address of this inner Ethernet header is set to the ingress PE's router MACaddressaddress, and the destination MAC address of this inner Ethernet header is set to the egress PE's router MAC addresslearntlearned via the EVPN Router's MACextended communityExtended Community attached to the route. The MPLS VPN label is set to the received label2 in the route. In the case of the Ethernet NVO tunnel type, the VNI may be set one of two ways:</t><t><list style="hanging" hangIndent="6"> <t hangText="downstream mode:"><dl newline="false" spacing="normal"> <dt>downstream mode:</dt> <dd>The VNI is set to the received label2 in therouteroute, which is downstreamassigned.</t> <t hangText="global mode:">assigned.</dd> <dt>global mode:</dt> <dd>The VNI is set to the received label2 in therouteroute, which isdomain-wide assigned.assigned domain-wide. This VNI value from the received label2MUST<bcp14>MUST</bcp14> be the same as the locally configured VNI for theIP VRFIP-VRF as all PEs in the NVOMUST<bcp14>MUST</bcp14> be configured with the sameIP VRFIP-VRF VNI for this mode of operation. If the received label2 value does not match the locally configured VNIvaluevalue, the routeMUST NOT<bcp14>MUST NOT</bcp14> beusedused, and an error messageSHOULD logged.</t> </list> </t><bcp14>SHOULD</bcp14> be logged.</dd> </dl> <t> PEs may be configured to operate in one of these two modes depending on the administrative domain boundaries across PEs participating in theNVO,NVO and the PE's capability to support downstream VNI mode.</t> <t> In the case of NVO tunnel encapsulation, the outer source and destination IP addresses are set to the ingress and egress PE BGP next-hop IPaddressesaddresses, respectively.</t> </section> <sectiontitle="Dataanchor="sect-5.5" numbered="true" toc="default"> <name>Data Plane - EgressPE" anchor="sect-5.5"><t>PE</name> <t> When the tenant's MPLS or NVO encapsulated packet is received over an MPLS or NVO tunnel by the egress PE, the egress PE removes the NVO tunnel encapsulation and uses the VPN MPLS label (for MPLS encapsulation) or VNI (for NVO encapsulation) to identify the IP-VRF in which IP lookup needs to be performed. If the VPN MPLS label or VNI identifies aMAC- VRFMAC-VRF instead of an IP-VRF, then the procedures insection 6.4<xref target="sect-6.4"/> for asymmetric IRB are executed.</t> <t> The lookup in the IP-VRF identifies a local adjacency to the IRB interface associated with the egress subnet'sMAC-VRF/bridge table.MAC-VRF/BT. The egress PE also decrements theTTL/hopTTL / hop limit for that packet byoneone, and if it reaches zero, the egress PE discards the packet.</t> <t> The egress PE gets the destination TS's MAC address for that TS's IP address from its ARP table or NDPcache, itcache. It encapsulates the packet with that destination MAC address and a source MAC address corresponding to that IRB interface and sends the packet to its destination subnetMAC-VRF/bridge table.</t>MAC-VRF/BT.</t> <t> The destination MAC address lookup in theMAC-VRF/bridge tableMAC-VRF/BT results in the local adjacency (e.g., local interface) over which the Ethernet frame issent on.</t>sent.</t> </section> </section> <sectiontitle="Asymmetricanchor="sect-6" numbered="true" toc="default"> <name>Asymmetric IRBProcedures" anchor="sect-6"><section title="ControlProcedures</name> <section anchor="sect-6.1" numbered="true" toc="default"> <name>Control Plane - AdvertisingPE" anchor="sect-6.1"><t>PE</name> <t> When a PE (e.g., PE1 infigure 4<xref target="fig-4"/> above) learns the MAC and IP address of an attached TS (e.g., via an ARP request or ND Neighbor Solicitation), it populates itsMAC-VRF/bridge table,MAC-VRF/BT, IP-VRF, and ARP table or NDP cache just as in the case for symmetric IRB. It then builds an EVPN MAC/IP Advertisement route (type 2) as follows and advertises it to other PEs participating in that tenant's VPN.</t><t><list style="symbols"><t>The<ul spacing="normal"> <li>The Length field of the BGP EVPN NLRI for an EVPN MAC/IP Advertisement routeMUST<bcp14>MUST</bcp14> be either 37 (if an IPv4 address is carried) or 49 (if an IPv6 address iscarried).</t> <t>Route Distinguisher (RD),carried).</li> <li>The RD, Ethernet Segment Identifier, Ethernet Tag ID, MAC Address Length, MAC Address, IP Address Length, IP Address, and MPLS Label1 fieldsMUST<bcp14>MUST</bcp14> be set per <xreftarget="RFC7432"/>target="RFC7432" format="default"/> and <xreftarget="RFC8365"/>.</t> <t>Thetarget="RFC8365" format="default"/>.</li> <li>The MPLS Label2 fieldMUST NOT<bcp14>MUST NOT</bcp14> be included in thisroute.</t> </list> </t>route.</li> </ul> <t> Just as in <xreftarget="RFC7432"/>,target="RFC7432" format="default"/>, the RD, Ethernet Tag ID, MAC Address Length, MAC Address, IP Address Length, and IP Address fields are part of the route key used by BGP to compare routes. The rest of the fields are not part of the route key.</t> <t> This route is advertised along with the following extended community:</t><t><list style="symbols"><t>Tunnel<ul spacing="normal"> <li>Tunnel Type ExtendedCommunity</t> </list> </t>Community</li> </ul> <t> For asymmetric IRB mode, the EVPN Router's MACextended communityExtended Community is not needed because forwarding is performed using destination TS's MACaddressaddress, which is carried in this EVPN routetype-2type 2 advertisement.</t> <t> This routeMUST<bcp14>MUST</bcp14> always be advertised with the MAC-VRFroute target.Route Target. ItMAY<bcp14>MAY</bcp14> also be advertised with a secondroute targetRoute Target corresponding to the IP-VRF.</t> </section> <sectiontitle="Controlanchor="sect-6.2" numbered="true" toc="default"> <name>Control Plane - ReceivingPE" anchor="sect-6.2"><t>PE</name> <t> When a PE (e.g., PE2 infigure 4<xref target="fig-4"/> above) receives this EVPN MAC/IP Advertisement route, it performs the following:</t><t><list style="symbols"><t>Using<ul spacing="normal"> <li>Using the MAC-VRFroute target,Route Target, it identifies the corresponding MAC-VRF and imports the MAC address into it. For asymmetric IRB mode, it is assumed that all PEs participating in a tenant's VPN are configured with all subnets (i.e., all VLANs) and correspondingMAC-VRFs/bridge tablesMAC-VRFs/BTs even if there are no locally attachedTSesTSs for some of these subnets.The reason for thisThis is because the ingress PE needs to do forwarding based on the destination TS's MAC address and perform NVO tunnel encapsulation asathe property of a lookup inMAC-VRF/bridge table.</t> <t>Ifthe MAC-VRF/BT.</li> <li>If only the MAC-VRFroute targetRoute Target is used, then the receiving PE uses the MAC-VRFroute targetRoute Target to identify the corresponding IP-VRF -- i.e., many MAC-VRFroute targetsRoute Targets map to the same IP-VRF for a given tenant. In this case, MAC-VRF may be used by the receiving PE to identify the correspondingIP VRFIP-VRF via the IRB interface associated with the subnetMAC-VRF/bridge table.MAC-VRF/BT. In this case, the MAC-VRFroute targetRoute Target may be used by the receiving PE to identify the correspondingIP VRF.</t> <t>UsingIP-VRF.</li> <li>Using the MAC-VRFroute target,Route Target, the receiving PE identifies the corresponding ARP table or NDP cache for thetenanttenant, and it adds an entry to the ARP table or NDP cache for the TS's MAC and IP address association. It should be noted that the tenant's ARP table or NDP cache at the receiving PE is identified by all the MAC-VRFroute targetsRoute Targets for thattenant.</t> <t>Iftenant.</li> <li>If the IP-VRFroute targetRoute Target is included, it may be used to import the route to IP-VRF. If the IP-VRFroute-targetRoute Target is not included, MAC-VRF is used to derive the corresponding IP-VRF for import, as explained in the prior section. In both cases, an IP-VRF route is installed with the TS MAC binding included in the receivedroute.</t> </list> </t>route.</li> </ul> <t> If the receiving PE receives the MAC/IP Advertisement route with the MPLSlabel2Label2 field but the receiving PE only supports asymmetric IRB mode, then the receiving PEMUST<bcp14>MUST</bcp14> ignore the MPLSlabel2Label2 field and install the MAC address in the corresponding MAC-VRF and (IP, MAC) association in the ARP table or NDP cache for that tenant (with the IRB interface identified by the MAC-VRF).</t> </section> <sectiontitle="Dataanchor="sect-6.3" numbered="true" toc="default"> <name>Data Plane - IngressPE" anchor="sect-6.3"><t>PE</name> <t> When an Ethernet frame is received by an ingress PE (e.g., PE1 infigure 4<xref target="fig-4"/> above), the PE uses the AC ID (e.g., VLAN ID) to identify the associatedMAC-VRF/bridge tableMAC-VRF/BT, and it performs a lookup on the destination MAC address. If the MAC address corresponds to its IRBInterfaceinterface MAC address, the ingress PE deduces that the packet must be inter-subnet routed. Hence, the ingress PE performs an IP lookup in the associated IP-VRF table. The lookup identifies a local adjacency to the IRB interface associated with the egress subnet's MAC-VRF/ bridge table. The ingress PE also decrements theTTL/hopTTL / hop limit for that packet byoneone, and if it reaches zero, the ingress PE discards the packet.</t> <t> The ingress PE gets the destination TS's MAC address for that TS's IP address from its ARP table or NDPcache, itcache. It encapsulates the packet with that destination MAC address and a source MAC address corresponding to that IRB interface and sends the packet to its destination subnetMAC-VRF/bridge table.</t>MAC-VRF/BT.</t> <t> The destination MAC address lookup in theMAC-VRF/bridge tableMAC-VRF/BT results in a BGPnext hopnext-hop address of the egress PE along with label1 (L2 VPN MPLS label or VNI). The ingress PE encapsulates the packet using the Ethernet NVO tunnel of the choice (e.g.,VxLANVXLAN or NVGRE) and sends the packet to the egress PE. Because the packet forwarding is between the ingress PE'sMAC-VRF/bridge tableMAC-VRF/BT and the egress PE's MAC-VRF/ bridge table, the packet encapsulation procedures follow that of <xreftarget="RFC7432"/>target="RFC7432" format="default"/> for MPLS and <xreftarget="RFC8365"/>target="RFC8365" format="default"/> forVxLANVXLAN encapsulations.</t> </section> <sectiontitle="Dataanchor="sect-6.4" numbered="true" toc="default"> <name>Data Plane - EgressPE" anchor="sect-6.4"><t>PE</name> <t> When a tenant's Ethernet frame is received over an NVO tunnel by the egress PE, the egress PE removes the NVO tunnel encapsulation and uses the VPN MPLS label (for MPLS encapsulation) or VNI (for NVO encapsulation) to identify theMAC-VRF/bridge tableMAC-VRF/BT in which the MAC lookup needs to be performed.</t> <t> The MAC lookup results in a local adjacency (e.g., local interface) over which the packet needs to get sent.</t> <t> Note that the forwarding behavior on the egress PE is the same as the EVPN intra-subnet forwarding described in <xreftarget="RFC7432"/>target="RFC7432" format="default"/> for MPLS and <xreftarget="RFC8365"/>target="RFC8365" format="default"/> for NVO networks. In other words, all the packet processing associated with the inter-subnet forwarding semantics is confined to the ingress PE for asymmetric IRB mode.</t> <t> It should also be noted that <xreftarget="RFC7432"/>target="RFC7432" format="default"/> provides a different level of granularity for the EVPN label. Besides identifying the bridge domain table, it can be used to identify the egress interface or a destination MAC address on that interface. If an EVPN label is used for an egress interface or individual MAC address identification, then no MAC lookup is needed in the egress PE for MPLSencapsulationencapsulation, and the packet can be directly forwarded to the egress interface just based on the EVPN label lookup.</t> </section> </section> <sectiontitle="Mobility Procedure" anchor="sect-7"><t>anchor="sect-7" numbered="true" toc="default"> <name>Mobility Procedure</name> <t> When a TS moves from one NVE (aka source NVE) to another NVE (aka target NVE), it is important that the MACmobilityMobility proceduresarebe properly executed and the corresponding MAC-VRF and IP-VRF tables on all participating NVEsarebe updated. <xreftarget="RFC7432"/>target="RFC7432" format="default"/> describes the MACmobilityMobility procedures for L2-only services for both single-homed TS andmulti-homedmultihomed TS. This section describes the incremental procedures and BGP Extended Communities needed to handle the MACmobilityMobility for IRB. In order to place the emphasis on the differences between L2-only and IRB use cases, the incremental procedure is described for a single-homed TS with the expectation that the additional steps needed formulti-homed TS,a multihomed TS can be extended persection 15 of<xreftarget="RFC7432"/>.target="RFC7432" sectionFormat="of" section="15"/>. This section describes mobility procedures for both symmetric and asymmetric IRB. Although the language used in this section is for IPv4 ARP, it equally applies to IPv6 ND.</t> <t> When a TS moves from a source NVE to a target NVE, it can behave in one of the following three ways:</t><t><list style="numbers"><t>TS<ol spacing="normal" type="1"><li anchor="way1">TS initiates an ARP request upon a move to the targetNVE</t> <t>TSNVE.</li> <li anchor="way2">TS sends a data packet without first initiating an ARP request to the targetNVE</t> <t>TSNVE.</li> <li anchor="way3">TS is a silent host and neither initiates an ARP request nor sends anypackets</t> </list> </t>packets.</li> </ol> <t> Depending on theexpextedexpected TS's behavior, an NVE needs to handle at least thefirst bullet<xref target="way1" format="none">first</xref> option and should be able to handle the2nd<xref target="way2" format="none">second</xref> andthe 3rd bullet.<xref target="way3" format="none">third</xref> options. The following subsections describe the procedures for eachof themscenario where it is assumed that the MAC and IP addresses of a TS have a one-to-one relationship (i.e., there is one IP address per MAC address and vice versa). The procedures for host mobility detection in the presence of a many-to-one relationship is outside the scope of thisdocumentdocument, and it is covered in <xreftarget="I-D.ietf-bess-evpn-irb-extended-mobility"/>.target="I-D.ietf-bess-evpn-irb-extended-mobility" format="default"/>. Themany-to-one relationship means"many-to-one relationship" refers to many host IP addresses corresponding to a single host MAC address or many host MAC addresses corresponding to a single IP address. It should be noted that in the case of IPv6, aLink Locallink-local IP address does not count in a many-to-one relationship because that address is confined to a single EthernetSegmentsegment, and it is not used for hostmoblitymobility (i.e., bydefinitiondefinition, host mobility is between two different EthernetSegments).segments). Therefore, when an IPv6 host is configured with both a Global Unicast address (or a Unique Local address) and aLink Locallink-local address, for the purpose of host mobility, it is considered with a single IP address.</t> <sectiontitle="Initiatinganchor="sect-7.1" numbered="true" toc="default"> <name>Initiating agratutiousGratuitous ARP upon aMove" anchor="sect-7.1"><t>Move</name> <t> In thisscenarioscenario, when a TS moves from a source NVE to a target NVE, the TS initiates a gratuitous ARP upon the move to the target NVE.</t> <t> The targetNVENVE, upon receiving this ARP message, updates its MAC-VRF, IP-VRF, and ARP table with the host MAC, IP, and local adjacency information (e.g., local interface).</t> <t> Since this NVE has previously learned the same MAC and IP addresses from the source NVE, it recognizes that there has been a MACmovemove, and it initiates MACmobilityMobility procedures per <xreftarget="RFC7432"/>target="RFC7432" format="default"/> by advertising an EVPN MAC/IP Advertisement route with both the MAC and IP addresses filled in (persections 5.1Sections <xref target="sect-5.1" format="counter"/> and6.1)<xref target="sect-6.1" format="counter"/>) along with the MAC MobilityExtended Communityextended community, with the sequence number incremented by one. The target NVE also exercises the MAC duplication detection procedure insection 15.1 of<xreftarget="RFC7432"/>.</t>target="RFC7432" sectionFormat="of" section="15.1"/>.</t> <t> The sourceNVENVE, upon receiving this MAC/IP Advertisement route, realizes that the MAC has moved to the target NVE. It updates its MAC-VRF and IP-VRF table accordingly with the adjacency information of the target NVE. In the case of the asymmetric IRB, the source NVE also updates its ARP table with the received adjacencyinformationinformation, and in the case of the symmetric IRB, the source NVE removes the entry associated with the received(MAC, IP)(IP, MAC) from its local ARP table. It then withdraws its EVPN MAC/IP Advertisement route. Furthermore, it sends an ARP probe locally to ensure that the MAC is gone. If an ARP response is received, the source NVE updates its ARP entry for that (IP, MAC) and re-advertises an EVPN MAC/IP Advertisement route for that (IP, MAC) along with the MAC MobilityExtended Communityextended community, with the sequence number incremented by one. The source NVE also exercises the MAC duplication detection procedure insection 15.1 of<xreftarget="RFC7432"/>.</t>target="RFC7432" sectionFormat="of" section="15.1"/>.</t> <t> All other remote NVEdevicesdevices, upon receiving the MAC/IP Advertisement route with the MAC Mobility extendedcommunitycommunity, compare the sequence number in this advertisement with the one previously received. If the new sequence number is greater than the old one, then they update the MAC/IP addresses of the TS in their corresponding MAC-VRF and IP-VRF tables to point to the target NVE. Furthermore, upon receiving the MAC/IP withdraw for the TS from the source NVE, these remote PEs perform the cleanups for their BGP tables.</t> </section> <sectiontitle="Sendinganchor="sect-7.2" numbered="true" toc="default"> <name>Sending Data Traffic without an ARPRequest" anchor="sect-7.2"><t>Request</name> <t> In thisscenarioscenario, when a TS moves from a source NVE to a target NVE, the TS starts sending data traffic without first initiating an ARP request.</t> <t> The targetNVENVE, upon receiving the first data packet, learns the MAC address of the TS in the data plane and updates its MAC-VRF table with the MAC address and the local adjacency information (e.g., local interface) accordingly. The target NVE realizes that there has been a MAC move because the same MAC address has been learned remotely from the source NVE.</t> <t> If EVPN-IRB NVEs are configured to advertise MAC-only routes in addition to MAC-and-IP EVPN routes, then the following steps are taken:</t><t><list style="symbols"><t>The<ul spacing="normal"> <li>The targetNVENVE, upon learning this MAC address in the data plane, updates this MAC address entry in the corresponding MAC-VRF with the local adjacency information (e.g., local interface). It also recognizes that this MAC has moved and initiates MACmobilityMobility procedures per <xreftarget="RFC7432"/>target="RFC7432" format="default"/> by advertising an EVPN MAC/IP Advertisement route with only the MAC address filled in along with the MAC MobilityExtended Communityextended community, with the sequence number incremented byone.</t> <t>Theone.</li> <li>The sourceNVENVE, upon receiving this MAC/IP Advertisement route, realizes that the MAC has moved to the new NVE. It updates its MAC-VRF table with the adjacency information for that MAC address to point to the target NVE and withdraws its EVPN MAC/IP Advertisement route that has only the MAC address (if it has advertised such a route previously). Furthermore, it searches for the corresponding MAC-IP entry and sends an ARP probe for this(MAC,IP)(IP, MAC) pair. The ARP request message is sent both locally to all attachedTSesTSs in that subnet as well asit is sentto other NVEs participating in thatsubnetsubnet, including the target NVE. Note that the PE needs to maintain a correlation between MAC and MAC-IP route entries in the MAC-VRF to accomplishthis.</t> <t>Thethis.</li> <li>The target NVE passes the ARP request to its locally attachedTSesTSs, and when it receives the ARP response, it updates its IP-VRF and ARP table with the host(MAC, IP)(IP, MAC) information. It also sends an EVPN MAC/IP Advertisement route with both the MAC and IP addresses filled in along with the MAC MobilityExtended Communityextended community, with the sequence number set to the same value as the one for the MAC-onlyadvertisementAdvertisement route it sentpreviously.</t> <t>Whenpreviously.</li> <li>When the source NVE receives the EVPN MAC/IP Advertisement route, it updates its IP-VRF table with the new adjacency information (pointing to the target NVE). In the case of the asymmetric IRB, the source NVE also updates its ARP table with the received adjacencyinformationinformation, and in the case of the symmetric IRB, the source NVE removes the entry associated with the received(MAC, IP)(IP, MAC) from its local ARP table. Furthermore, it withdraws its previously advertised EVPN MAC/IP route with both the MAC and IP address fields filledin.</t> <t>Allin.</li> <li>All other remote NVEdevicesdevices, upon receiving the MAC/IPadvertisementAdvertisement route with the MAC Mobility extendedcommunitycommunity, compare the sequence number in this advertisement with the one previously received. If the new sequence number is greater than the old one, then they update the MAC/IP addresses of the TS in their corresponding MAC-VRF, IP-VRF, and ARP tables (in the case of asymmetric IRB) to point to the new NVE. Furthermore, upon receiving the MAC/IP withdraw for the TS from the old NVE, these remote PEs perform the cleanups for their BGPtables.</t> </list> </t>tables.</li> </ul> <t> If an EVPN-IRBNVEs areNVE is configured not to advertise MAC-only routes, then upon receiving the first data packet, it learns the MAC address of the TS and updates the MAC entry in the corresponding MAC-VRF table with the local adjacency information (e.g., local interface). It also realizes that there has been a MAC move because the same MAC address has been learned remotely from the source NVE. It uses the local MAC route to find the corresponding local MAC-IProute,route and sends a unicast ARP request to thehost and whenhost. When receiving an ARP response, it follows the procedure outlined insection 7.1.<xref target="sect-7.1"/>. In the prior case, where MAC-only routes are also advertised, this procedure of triggering a unicast ARP probe at the target PEMAY<bcp14>MAY</bcp14> also be used in addition to the source PE broadcast ARP probing procedure described earlier for better convergence.</t> </section> <sectiontitle="Silent Host" anchor="sect-7.3"><t>anchor="sect-7.3" numbered="true" toc="default"> <name>Silent Host</name> <t> In thisscenarioscenario, when a TS moves from a source NVE to a target NVE, the TS issilentsilent, and it neither initiates an ARP request noritsends any data traffic. Therefore, neither the target nor the source NVEs are aware of the MAC move.</t> <t> On the source NVE, an age-out timer (for the silent host that has moved) is used to trigger an ARP probe. This age-out timer can be either an ARP timer or a MAC age-outtimertimer, and this is an implementation choice. The ARP request gets sent both locally to all the attachedTSesTSs on that subnet as well asit gets sentto all the remote NVEs (including the target NVE) participating in that subnet. The source NVE alsowithdrawwithdraws the EVPN MAC/IP Advertisement route with only the MAC address (if it has previously advertised such a route).</t> <t> The target NVE passes the ARP request to its locally attachedTSesTSs, and when it receives the ARP response, it updates its MAC-VRF, IP-VRF, and ARP table with the host(MAC, IP)(IP, MAC) and local adjacency information (e.g., local interface). It also sends an EVPN MAC/IPadvertisementAdvertisement route with both the MAC and IP address fields filled in along with the MAC MobilityExtended Communityextended community, with the sequence number incremented by one.</t> <t> When the source NVE receives the EVPN MAC/IP Advertisement route, it updates its IP-VRF table with the new adjacency information (pointing to the target NVE). In the case of the asymmetric IRB, the source NVE also updates its ARP table with the received adjacencyinformationinformation, and in the case of the symmetric IRB, the source NVE removes the entry associated with the received(MAC, IP)(IP, MAC) from its local ARP table. Furthermore, it withdraws its previously advertised EVPN MAC/IP route with both the MAC and IP address fields filled in.</t> <t> All other remote NVEdevicesdevices, upon receiving the MAC/IP Advertisement route with the MAC Mobility extendedcommunitycommunity, compare the sequence number in this advertisement with the one previously received. If the new sequence number is greater than the old one, then they update the MAC/IP addresses of the TS in their corresponding MAC-VRF, IP-VRF, and ARP (in the case of asymmetric IRB) tables to point to the new NVE. Furthermore, upon receiving the MAC/IP withdraw for the TS from the old NVE, these remote PEs perform the cleanups for their BGP tables.</t> </section> </section> <sectiontitle="BGP Encoding" anchor="sect-8"><t>anchor="sect-8" numbered="true" toc="default"> <name>BGP Encoding</name> <t> This document defines one new BGP Extended Community for EVPN.</t> <sectiontitle="Router'sanchor="sect-8.1" numbered="true" toc="default"> <name>EVPN Router's MAC ExtendedCommunity" anchor="sect-8.1"><t>Community</name> <t> A new EVPN BGP Extended Community called "EVPN Router'sMACMAC" is introduced here. This new extended community is a transitive extended community withthea Type field of 0x06 (EVPN) andthea Sub-Type field of 0x03. It may be advertised along with the Encapsulation Extended Community defined insection 4.1 of<xreftarget="I-D.ietf-idr-tunnel-encaps"/>.</t>target="RFC9012" sectionFormat="of" section="4.1"/>.</t> <t> The EVPN Router's MAC Extended Community is encoded as an 8-octet value as follows:</t> <figuretitle="Router'sanchor="fig-5"> <name>EVPN Router's MAC ExtendedCommunity" anchor="fig-5"><artwork><![CDATA[Community</name> <artwork name="" type="" align="left" alt=""><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type=0x06 | Sub-Type=0x03 | EVPN Router's MAC | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | EVPN Router's MAC Cont'd | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure> <t> This extended community is used to carry the PE's MAC address for symmetric IRBscenariosscenarios, and it is sent with EVPN RT-2. The advertising PESHALL<bcp14>SHALL</bcp14> only attach a single EVPN Router's MAC Extended Community to a route. In case the receiving PE receives more than one EVPN Router's MAC Extended Community with a route, itSHALL<bcp14>SHALL</bcp14> process the first one in the list and not store and propagate the others.</t> </section> </section> <sectiontitle="Operationalanchor="sect-9" numbered="true" toc="default"> <name>Operational Models for Symmetric Inter-SubnetForwarding" anchor="sect-9"><t>Forwarding</name> <t> The following sections describe two main symmetric IRB forwarding scenarios (within a DC -- i.e., intra-DC) along with the corresponding procedures. In the following scenarios, without loss of generality, it is assumed that a given tenant is represented by a single IP-VPN instance. Therefore, on a given PE, a tenant is represented by a single IP-VRF table and one or more MAC-VRF tables.</t> <sectiontitle="IRB forwardinganchor="sect-9.1" numbered="true" toc="default"> <name>IRB Forwarding on NVEs for TenantSystems" anchor="sect-9.1"><t>Systems</name> <t> This section covers the symmetric IRB procedures for the scenario where eachTenant System (TS)TS is attached to one or moreNVEsNVEs, and its host IP and MAC addresses are learned by the attached NVEs and are distributed to all other NVEs that are interested in participating in both intra-subnet and inter-subnet communications with that TS.</t> <t> In this scenario, without loss of generality, it is assumed that NVEs operate in VLAN-based service interface mode with one bridge table(s) per MAC-VRF. Thus, for a given tenant, an NVE has one MAC-VRF for each tenant subnet (e.g., each VLAN) that is configured for extension viaVxLANVXLAN or NVGRE encapsulation. In the case of VLAN-aware bundling,theneach MAC-VRF consists of multipleBridge Tablesbridge tables (e.g., one bridge table per VLAN). The MAC-VRFs on an NVE for a given tenant are associated with an IP-VRF corresponding to that tenant (or IP-VPN instance) via their IRB interfaces.</t> <t> SinceVxLANVXLAN and NVGRE encapsulations require an inner Ethernet header (inner MACSA/DA),SA/DA) and sincefor inter-subnet traffic,a TS MAC address cannot beused,used for inter-subnet traffic, the ingress NVE's MAC address is used as an inner MAC SA. The NVE's MAC address is the device MACaddressaddress, and it is common across all MAC-VRFs and IP-VRFs. This MAC address is advertised using the new EVPN Router's MAC Extended Community(section 8.1).</t>(<xref target="sect-8.1"/>).</t> <t>Figure 6<xref target="fig-6"/> below illustrates thisscenarioscenario, where a given tenant (e.g., an IP-VPN instance) has three subnets represented by MAC-VRF1, MAC-VRF2, and MAC-VRF3 across two NVEs. There are fiveTSesTSs that are associated with these three MAC-VRFs -- i.e., TS1, TS4, and TS5 are on the same subnet (e.g., the same MAC-VRF/VLAN). TS1 and TS5 are associated with MAC-VRF1 on NVE1, while TS4 is associated with MAC-VRF1 on NVE2. TS2 is associated with MAC-VRF2 on NVE1, and TS3 is associated with MAC-VRF3 on NVE2. MAC-VRF1 and MAC-VRF2 on NVE1areare, inturnturn, associated with IP-VRF1 onNVE1NVE1, and MAC-VRF1 and MAC-VRF3 on NVE2 are associated with IP-VRF1 on NVE2. When TS1, TS5, and TS4 exchange traffic with each other, only the L2 forwarding (bridging) part of the IRB solution is exercised because all theseTSesTSs belong to the same subnet. However, when TS1 wants to exchange traffic with TS2 orTS3TS3, which belong to different subnets, both the bridging and routing parts of the IRB solution are exercised. The following subsections describe the control and dataplanesplane operations for this IRB scenario indetails.</t>detail.</t> <figuretitle="IRB forwardinganchor="fig-6"> <name>IRB Forwarding on NVEs for TenantSystems" anchor="fig-6"><artwork><![CDATA[Systems</name> <artwork name="" type="" align="left" alt=""><![CDATA[ NVE1 +---------+ +-------------+ | | TS1-----| MACx| | | NVE2(IP1/M1)(M1/IP1) |(MAC- | | | +-------------+ TS5-----| VRF1)\ | | MPLS/ | |MACy (MAC- |-----TS3(IP5/M5)(M5/IP5) | \ | |VxLAN/VXLAN/ | | / VRF3) |(IP3/M3)(M3/IP3) | (IP-VRF1)|----| NVGRE |---|(IP-VRF1) | | / | | | | \ | TS2-----|(MAC- / | | | | (MAC- |-----TS4(IP2/M2)(M2/IP2) | VRF2) | | | | VRF1) |(IP4/M4)(M4/IP4) +-------------+ | | +-------------+ | | +---------+ ]]></artwork> </figure> <sectiontitle="Controlanchor="sect-9.1.1" numbered="true" toc="default"> <name>Control PlaneOperation" anchor="sect-9.1.1"><t>Operation</name> <t> Each NVE advertises a MAC/IP Advertisement route (i.e.,Route Typeroute type 2) for each of itsTSesTSs with the following field set:</t><t><list style="symbols"><t>RD<ul spacing="normal"> <li>RD andESIEthernet Segment Identifier (ESI) per <xreftarget="RFC7432"/></t> <t>Ethernettarget="RFC7432" format="default"/></li> <li>Ethernet Tag =0; assuming0 (assuming VLAN-basedservice</t> <t>MACservice)</li> <li>MAC Address Length =48</t> <t>MAC48</li> <li>MAC Address = Mi; where(where i =1,2,3,4,1, 2, 3, 4, or55) inthe above example</t> <t>IP<xref target="fig-6"/>, above</li> <li>IP Address Length = 32 or128</t> <t>IP128</li> <li>IP Address = IPi; where(where i =1,2,3,4,1, 2, 3, 4, or55) inthe above example</t> <t>Label1<xref target="fig-6"/>, above</li> <li>Label1 = MPLSLabellabel or VNI corresponding toMAC-VRF</t> <t>Label2MAC-VRF</li> <li>Label2 = MPLSLabellabel or VNI corresponding toIP-VRF</t> </list> </t>IP-VRF</li> </ul> <t> Each NVE advertises an EVPN RT-2 route with two Route Targets (one corresponding to its MAC-VRF and the other corresponding to itsIP-VRF.IP-VRF). Furthermore, the EVPN RT-2 is advertised with two BGP Extended Communities. The first BGP Extended Community identifies the tunneltypetype, and it is calledEncapsulation"Encapsulation ExtendedCommunityCommunity" as defined in <xreftarget="I-D.ietf-idr-tunnel-encaps"/>target="RFC9012" format="default"/>, and the second BGP Extended Community includes the MAC address of the NVE (e.g., MACx for NVE1 or MACy for NVE2) as defined insection 8.1.<xref target="sect-8.1"/>. The EVPN Router's MAC Extendedcommunity MUSTCommunity <bcp14>MUST</bcp14> be added when the Ethernet NVO tunnel is used. If the IP NVO tunnel type is used, then there is no need to send this second Extended Community. It should be noted that the IP NVO tunnel type is only applicable to symmetric IRB procedures.</t> <t> Upon receiving this advertisement, the receiving NVE performs the following:</t><t><list style="symbols"><t>It<ul spacing="normal"> <li>It uses Route Targets corresponding to its MAC-VRF and IP-VRF for identifying these tables and subsequently importing the MAC and IP addresses intothem respectively.</t> <t>Itthem, respectively.</li> <li>It imports the MAC address from the MAC/IP Advertisement route into the MAC-VRF with the BGPNext Hopnext-hop address as the underlay tunnel destination address (e.g., VTEP DA forVxLANVXLAN encapsulation) andLabel1label1 as the VNI forVxLANVXLAN encapsulation or an EVPN label for MPLSencapsulation.</t> <t>Ifencapsulation.</li> <li>If the route carries the new EVPN Router's MAC ExtendedCommunity,Community and if the receiving NVE uses an Ethernet NVO tunnel, then the receiving NVE imports the IP address into IP-VRF with NVE's MAC address (from the new EVPN Router's MAC Extended Community) as the inner MACDA andDA, the BGPNext Hopnext-hop address as the underlay tunnel destination address, the VTEP DA forVxLAN encapsulationVXLAN encapsulation, andLabel2label2 as the IP-VPN VNI forVxLAN encapsulation.</t> <t>IfVXLAN encapsulation.</li> <li>If the receiving NVE uses MPLS encapsulation, then the receiving NVE imports the IP address into IP-VRF with the BGPNext Hopnext-hop address as the underlay tunnel destinationaddress,address andLabel2label2 as the IP-VPN label for MPLSencapsulation.</t> </list> </t>encapsulation.</li> </ul> <t> If the receiving NVE receives an EVPN RT-2 with onlyLabel1label1 and only a single Route Target corresponding toIP-VRF, or if it receivesIP-VRF; an EVPN RT-2 with only a single Route Target corresponding to MAC-VRF but with bothLabel1label1 andLabel2,label2; orif it receivesan EVPN RT-2 with a MACAddress Lengthaddress length of zero, then itMUST<bcp14>MUST</bcp14> use the treat-as-withdraw approach <xreftarget="RFC7606"/>target="RFC7606" format="default"/> andSHOULD<bcp14>SHOULD</bcp14> log an error message.</t> </section> <sectiontitle="Dataanchor="sect-9.1.2" numbered="true" toc="default"> <name>Data PlaneOperation" anchor="sect-9.1.2"><t>Operation</name> <t> The following description of thedata-planedata plane operation describes just the logicalfunctionsfunctions, and the actual implementation may differ.LetsLet's considerdata-planethe data plane operation when TS1 in subnet-1 (MAC-VRF1) on NVE1 wants to send traffic to TS3 in subnet-3 (MAC-VRF3) on NVE2.</t><t><list style="symbols"><t>NVE1<ul spacing="normal"> <li>NVE1 receives a packet with the MAC DA corresponding to the MAC-VRF1 IRB interface on NVE1 (the interface between MAC-VRF1 andIP-VRF1),IP-VRF1) andVLAN-tagthe VLAN tag corresponding toMAC-VRF1.</t> <t>UponMAC-VRF1.</li> <li>Upon receiving the packet, the NVE1 usesVLAN-tagthe VLAN tag to identify the MAC-VRF1. It then looks up the MAC DA and forwards the frame to its IRBinterface.</t> <t>Theinterface.</li> <li>The Ethernet header of the packet isstrippedstripped, and the packet is fed to theIP-VRFIP-VRF, where an IP lookup is performed on the destination IP address. NVE1 also decrements theTTL/hopTTL / hop limit for that packet byoneone, and if it reaches zero, NVE1 discards the packet. This lookup yields the outgoing NVO tunnel and the required encapsulation. If the encapsulation is for the Ethernet NVO tunnel, then it includes the egress NVE's MAC address as the inner MAC DA, the egress NVE's IP address (e.g., BGPNext Hopnext-hop address) as the VTEP DA, and the VPN-ID as the VNI. The inner MAC SA and VTEP SA are set to NVE's MAC and IPaddressesaddresses, respectively. If it isaan MPLS encapsulation, then the corresponding EVPN and LSP labels are added to the packet. The packet is then forwarded to the egressNVE.</t> <t>OnNVE.</li> <li>If the egressNVE, if theNVE receives a packetarrives onfrom the Ethernet NVO tunnel (e.g., it isVxLANVXLAN encapsulated), then it removes theNVO tunnel header is removed.Ethernet header. Since the inner MAC DA is the egress NVE's MAC address, the egress NVE knows that it needs to perform an IP lookup. It uses the VNI to identify the IP-VRF table. If the packet is MPLS encapsulated, then the EVPN label lookup identifies the IP-VRF table. Next, an IP lookup is performed for the destination TS(TS3)(TS3), which results in an access-facing IRB interface over which the packet is sent. Before sending the packet over this interface, the ARP table is consulted to get the destination TS's MAC address. NVE2 also decrements theTTL/hopTTL / hop limit for that packet byoneone, and if it reaches zero, NVE2 discards thepacket.</t> <t>Thepacket.</li> <li>The IP packet is encapsulated with an Ethernetheaderheader, with the MAC SA set to that of the IRB interface MAC address(i.e,(i.e., the IRB interface between MAC-VRF3 and IP-VRF1 on NVE2) and the MAC DA set to that of the destination TS (TS3) MAC address. The packet is sent to the corresponding MAC-VRF (i.e., MAC-VRF3)andand, after a lookup of MAC DA, is forwarded to the destination TS (TS3) over the correspondinginterface.</t> </list> </t>interface.</li> </ul> <t> In this symmetric IRB scenario, inter-subnet traffic between NVEs will always use the IP-VRF VNI/MPLS label. For instance, traffic from TS2 to TS4 will be encapsulated by NVE1 using NVE2's IP-VRFVNI/ MPLSVNI/MPLS label, as long as TS4's host IP is present in NVE1's IP-VRF.</t> </section> </section> <sectiontitle="IRB forwardinganchor="sect-9.2" numbered="true" toc="default"> <name>IRB Forwarding on NVEs for Subnets behind TenantSystems" anchor="sect-9.2"><t>Systems</name> <t> This section covers the symmetric IRB procedures for the scenario where someTenant Systems (TSes)TSs support one or more subnets and theseTSesTSs are associated with one or more NVEs. Therefore, besides the advertisement of MAC/IP addresses for eachTSTS, which can bemulti-homedmultihomed with All-Active redundancy mode, the associated NVE needs to also advertise the subnets statically configured on each TS.</t> <t> The main difference between this solution and the previous one is the additional advertisement corresponding to each subnet. These subnet advertisements are accomplished using the EVPN IP Prefix route defined in <xreftarget="I-D.ietf-bess-evpn-prefix-advertisement"/>.target="RFC9136" format="default"/>. These subnet prefixes are advertised with the IP address of their associated TS (which is in an overlay address space) as their next hop. The receiving NVEs perform recursive route resolution to resolve the subnet prefix with its advertising NVE so that they know which NVE to forward the packets to when they are destined for that subnet prefix.</t> <t> The advantage of this recursive route resolution is that when a TS moves from one NVE to another, there is no need to re-advertise any of the subnet prefixes for that TS. Allitthat is needed is to advertise the IP/MAC addresses associated with the TS itself and exercise the MACmobilityMobility procedures for that TS. The recursive route resolution automatically takes care of the updates for the subnet prefixes of that TS.</t> <t>Figure 7<xref target="fig-7"/> illustrates this scenario where a given tenant (e.g., an IP-VPN service) has three subnets represented by MAC-VRF1, MAC-VRF2, and MAC-VRF3 across two NVEs. There are fourTSesTSs associated with these three MAC-VRFs -- i.e., TS1 is connected to MAC-VRF1 on NVE1, TS2 is connected to MAC-VRF2 on NVE1, TS3 is connected toMAC- VRF3MAC-VRF3 on NVE2, and TS4 is connected to MAC-VRF1 on NVE2. TS1 has two subnet prefixes (SN1 andSN2)SN2), and TS3 has a single subnetprefix, SN3.prefix (SN3). The MAC-VRFs on each NVE are associated with their corresponding IP-VRF using their IRB interfaces. When TS4 and TS1 exchangeintra- subnetintra-subnet traffic, only the L2 forwarding (bridging) part of the IRB solution is used (i.e., the traffic only goes through their MAC-VRFs); however, when TS3 wants to forward traffic to SN1 or SN2 sitting behind TS1 (inter-subnet traffic), then both the bridging and routing parts of the IRB solution are exercised (i.e., the traffic goes through the corresponding MAC-VRFs and IP-VRFs). If TS4, for example, wants to reach SN1, it uses its default route and sends the packet to the MAC address associated with the IRB interface onNVE2,NVE2; NVE2 thenmakesperforms an IP lookup in itsIP-VRF,IP-VRF and finds an entry for SN1. The following subsections describe the control and dataplanesplane operations for this IRB scenario indetails.</t>detail.</t> <figuretitle="IRB forwardinganchor="fig-7"> <name>IRB Forwarding on NVEs forsubnetsSubnets behindTSes" anchor="fig-7"><artwork><![CDATA[TSs</name> <artwork name="" type="" align="left" alt=""><![CDATA[ NVE1 +----------+ SN1--+ +-------------+ | | |--TS1-----|(MAC- \ | | | SN2--+IP1/M1M1/IP1 | VRF1) \ | | | | (IP-VRF)|---| | | / | | | TS2-----|(MAC- / | | MPLS/ |IP2/M2M2/IP2 | VRF2) | |VxLAN/VXLAN/ | +-------------+ | NVGRE | +-------------+ | | SN3--+--TS3-----|(MAC-\ | | |IP3/M3M3/IP3 | VRF3)\ | | | | (IP-VRF)|---| | | / | | | TS4-----|(MAC- / | | |IP4/M4M4/IP4 | VRF1) | | | +-------------+ +----------+ NVE2 ]]></artwork> </figure> <t> Note that infigure 7,<xref target="fig-7"/>, above, SN1 and SN2 are configured on NVE1, which then advertises each in an IP Prefix route. Similarly, SN3 is configured on NVE2, which then advertises it in an IP Prefix route.</t> <sectiontitle="Controlanchor="sect-9.2.1" numbered="true" toc="default"> <name>Control PlaneOperation" anchor="sect-9.2.1"><t>Operation</name> <t> Each NVE advertises aRoute Type-5route type 5 (EVPN RT-5, IP Prefix route defined in <xreftarget="I-D.ietf-bess-evpn-prefix-advertisement"/>)target="RFC9136" format="default"/>) for each of its subnet prefixes with the IP address of its TS as the next hop(gateway address(Gateway Address field) as follows:</t><t><list style="symbols"><t>RD<ul spacing="normal"> <li>RD associated with theIP-VRF</t> <t>ESIIP-VRF</li> <li>ESI =0</t> <t>Ethernet0</li> <li>Ethernet Tag =0;</t> <t>IP0</li> <li>IP Prefix Length = 0 to 32 or 0 to128</t> <t>IP128</li> <li>IP Prefix =SNi</t> <t>GatewaySNi</li> <li>Gateway Address =IPi; IPIPi (IP address ofTS</t> <t>MPLSTS)</li> <li>MPLS Label =0</t> </list> </t>0</li> </ul> <t> This EVPN RT-5 is advertised with one or more Route Targets associated with the IP-VRF from which the route is originated.</t> <t> Each NVE also advertises an EVPN RT-2 (MAC/IP AdvertisementRoute)route) along withtheirits associated Route Targets and Extended Communities for each of itsTSesTSs exactly as described insection 9.1.1.</t><xref target="sect-9.1.1"/>.</t> <t> Upon receiving the EVPN RT-5 advertisement, the receiving NVE performs the following:</t><t><list style="symbols"><t>It<ul spacing="normal"> <li>It uses the Route Target to identify the correspondingIP-VRF</t> <t>ItIP-VRF.</li> <li>It imports the IP prefix into its corresponding IP-VRFthat isconfigured with an import RT that is one of the RTs being carried by the EVPN RT-5routeroute, along with the IP address of the associated TS as its nexthop.</t> </list> </t>hop.</li> </ul> <t> When receiving the EVPN RT-2 advertisement, the receiving NVE imports the MAC/IP addresses of the TS into the corresponding MAC-VRF and IP-VRF persection 9.1.1.<xref target="sect-9.1.1"/>. When both routes exist, recursive route resolution is performed to resolve the IP prefix (received in EVPN RT-5) to its corresponding NVE's IP address (e.g., its BGP next hop). The BGP next hop will be used as the underlay tunnel destination address (e.g., VTEP DA forVxLAN encapsulation)VXLAN encapsulation), and the EVPN Router's MAC will be used as the inner MAC forVxLANVXLAN encapsulation.</t> </section> <sectiontitle="Dataanchor="sect-9.2.2" numbered="true" toc="default"> <name>Data PlaneOperation" anchor="sect-9.2.2"><t>Operation</name> <t> The following description of thedata-planedata plane operation describes just the logicalfunctionsfunctions, and the actual implementation may differ.LetsLet's considerdata-planethe data plane operation when a hostonin SN1sittingbehind TS1 wants to send traffic to a hostsitting behindin SN3 behind TS3.</t><t><list style="symbols"><t>TS1 send<ul spacing="normal"> <li>TS1 sends a packet with MAC DA corresponding to the MAC-VRF1 IRB interface ofNVE1,NVE1 andVLAN-taga VLAN tag corresponding toMAC-VRF1.</t> <t>UponMAC-VRF1.</li> <li>Upon receiving the packet, the ingress NVE1 usesVLAN-tagthe VLAN tag to identify the MAC-VRF1. It then looks up the MAC DA and forwards the frame to its IRB interfacejust like section 9.1.1.</t> <t>Theas in <xref target="sect-9.1.1"/>.</li> <li>The Ethernet header of the packet isstrippedstripped, and the packet is fed to theIP-VRF; where,IP-VRF, where an IP lookup is performed on the destination address. This lookup yields the fields needed forVxLANVXLAN encapsulation with NVE2's MAC address as the inner MAC DA,NVE'2NVE2's IP address as the VTEP DA, and the VNI. The MAC SA is set to NVE1's MACaddressaddress, and the VTEP SA is set to NVE1's IP address. NVE1 also decrements theTTL/hopTTL / hop limit for that packet byoneone, and if it reaches zero, NVE1 discards thepacket.</t> <t>Thepacket.</li> <li>The packet is then encapsulated with the proper header based on the above info and is forwarded to the egress NVE(NVE2).</t> <t>On(NVE2).</li> <li>On the egress NVE (NVE2), assuming the packet isVxLANVXLAN encapsulated, theVxLANVXLAN and the inner Ethernet headers areremovedremoved, and the resultant IP packet is fed to the IP-VRF associated with thatthe VNI.</t> <t>Next,VNI.</li> <li>Next, a lookup is performed based on the IP DA (which is in SN3) in the associated IP-VRF of NVE2. The IP lookup yields the access-facing IRB interface over which the packet needs to be sent. Before sending the packet over this interface, the ARP table is consulted to get the destination TS (TS3) MAC address. NVE2 also decrements theTTL/hopTTL / hop limit for that packet byoneone, and if it reaches zero, NVE2 discards thepacket.</t> <t>Thepacket.</li> <li>The IP packet is encapsulated with an Ethernet header with the MAC SA set to that of the access-facing IRB interface of the egress NVE(NVE2)(NVE2), and the MAC DA is set to that of the destination TS (TS3) MAC address. The packet is sent to the corresponding MAC-VRF3andand, after a lookup of MAC DA, is forwarded to the destination TS (TS3) over the correspondinginterface.</t> </list> </t>interface.</li> </ul> </section> </section> </section> <sectiontitle="Acknowledgements" anchor="sect-10"><t> The authors would like to thank Sami Boutros, Jeffrey Zhang, Krzysztof Szarkowicz, Lukas Krattiger and Neeraj Malhotra for their valuable comments. The authors would also like to thank Linda Dunbar, Florin Balus, Yakov Rekhter, Wim Henderickx, Lucy Yong, and Dennis Cai for their feedback and contributions.</t> </section> <section title="Security Considerations" anchor="sect-11"><t>anchor="sect-11" numbered="true" toc="default"> <name>Security Considerations</name> <t> The security considerations forlayer-2Layer 2 forwarding in this document followthatthose of <xreftarget="RFC7432"/>target="RFC7432" format="default"/> for MPLS encapsulation andit follows thatthose of <xreftarget="RFC8365"/>target="RFC8365" format="default"/> forVxLANVXLAN or NVGRE encapsulations. This section describes additional considerations.</t> <t> This document describes a set of procedures forInter-Subnet Forwardinginter-subnet forwarding of tenant traffic across PEs (or NVEs). These procedures include bothlayer-2Layer 2 forwarding andlayer-3Layer 3 routing on apacket by packetpacket-by-packet basis. The security consideration forlayer-3Layer 3 routing in this document follows that of <xreftarget="RFC4365"/>target="RFC4365" format="default"/>, with the exceptionforof the application of routing protocols between CEs and PEs. Contrary to <xreftarget="RFC4364"/>,target="RFC4364" format="default"/>, this document does not describe route distribution techniques between CEs andPEs,PEs but rather considers the CEs asTSesTSs or VAs that do not run dynamic routing protocols. This can be considered a security advantage, since dynamic routing protocols can be blocked on the NVE/PE ACs, not allowing the tenant to interact with the infrastructure's dynamic routing protocols.</t> <t> The VPN scheme described in this document does not provide the quartet of security properties mentioned in <xreftarget="RFC4365"/>target="RFC4365" format="default"/> (confidentiality protection, source authentication, integrity protection, and replay protection). If these are desired, they must be provided by mechanisms that are outside the scope of the VPN mechanisms.</t> <t> In this document, the EVPN RT-5 is used for certain scenarios. This route uses an Overlay Index that requires a recursive resolution to a different EVPN route (an EVPN RT-2). Because of this, it is worth noting that any action that ends up filtering or modifying the EVPN RT-2 route used to convey the OverlayIndexes,Indexes will modify the resolution of the EVPN RT-5 and therefore the forwarding of packets to the remote subnet.</t> </section> <sectiontitle="IANA Considerations" anchor="sect-12"><t>anchor="sect-12" numbered="true" toc="default"> <name>IANA Considerations</name> <t> IANA has allocateda new transitive extended community Type of 0x06 andSub-Typeofvalue 0x03for EVPNin the "EVPN Extended Community Sub-Typesā€¯ registry as follows:</t> <table anchor="IANA_table"> <name></name> <thead> <tr> <th>Sub-Type Value</th> <th>Name</th> <th>Reference</th> </tr> </thead> <tbody> <tr> <td>0x03</td> <td>EVPN Router's MAC ExtendedCommunity.</t>Community</td> <td>RFC 9135</td> </tr> </tbody> </table> <t> This document has been listed as an additional reference for theMAC/ IPMAC/IP Advertisement route in theEVPN"EVPN RouteTypeTypes" registry.</t> </section> </middle> <back><references title="Normative References"> &I-D.ietf-bess-evpn-prefix-advertisement; &I-D.ietf-idr-tunnel-encaps; &RFC2119; &RFC4364; &RFC7348; &RFC7432; &RFC7606; &RFC7637; &RFC8174; &RFC8365;<displayreference target="I-D.ietf-bess-evpn-irb-extended-mobility" to="EXTENDED-MOBILITY"/> <displayreference target="I-D.ietf-nvo3-vxlan-gpe" to="VXLAN-GPE"/> <displayreference target="I-D.ietf-bess-evpn-modes-interop" to="EVPN"/> <references> <name>References</name> <references> <name>Normative References</name> <reference anchor='RFC9136' target="https://www.rfc-editor.org/info/rfc9136"> <front> <title>IP Prefix Advertisement in Ethernet VPN (EVPN)</title> <author initials='J' surname='Rabadan' fullname='Jorge Rabadan' role="editor"> <organization /> </author> <author initials='W' surname='Henderickx' fullname='Wim Henderickx'> <organization /> </author> <author initials='J' surname='Drake' fullname='John Drake'> <organization /> </author> <author initials='W' surname='Lin' fullname='Wen Lin'> <organization /> </author> <author initials='A' surname='Sajassi' fullname='Ali Sajassi'> <organization /> </author> <date year='2021' month='October' /> </front> <seriesInfo name="RFC" value="9136"/> <seriesInfo name="DOI" value="10.17487/RFC9136"/> </reference> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9012.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4364.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7432.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7606.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8365.xml"/> </references> <references> <name>Informative References</name> <reference anchor='I-D.ietf-bess-evpn-modes-interop'> <front> <title>EVPN Interoperability Modes</title> <author initials='L' surname='Krattiger' fullname='Lukas Krattiger' role="editor"> <organization /> </author> <author initials='A' surname='Sajassi' fullname='Ali Sajassi' role="editor"> <organization /> </author> <author initials='S' surname='Thoria' fullname='Samir Thoria'> <organization /> </author> <author initials='J' surname='Rabadan' fullname='Jorge Rabadan'> <organization /> </author> <author initials='J' surname='Drake' fullname='John Drake'> <organization /> </author> <date year='2021' month='May' day='26' /> </front> <seriesInfo name='Internet-Draft' value='draft-ietf-bess-evpn-modes-interop-00'/> <format type='TXT' target='https://www.ietf.org/internet-drafts/ draft-ietf-bess-evpn-modes-interop-00.txt'/> </reference> <reference anchor='I-D.ietf-bess-evpn-irb-extended-mobility'> <front> <title>Extended Mobility Procedures for EVPN-IRB</title> <author initials='N' surname='Malhotra' fullname='Neeraj Malhotra' role="editor"> <organization /> </author> <author initials='A' surname='Sajassi' fullname='Ali Sajassi'> <organization /> </author> <author initials='A' surname='Pattekar' fullname='Aparna Pattekar'> <organization /> </author> <author initials='J' surname='Rabadan' fullname='Jorge Rabadan'> <organization /> </author> <author initials='A' surname='Lingala' fullname='Avinash Lingala'> <organization /> </author> <author initials='J' surname='Drake' fullname='John Drake'> <organization /> </author> <date year='2021' month='October' day='2' /> <abstract><t>Procedure to handle host mobility in a layer 2 Network with EVPN control plane is defined as part of RFC 7432. EVPN has since evolved to find wider applicability across various IRB use cases that include distributing both MAC and IP reachability via a common EVPN control plane. MAC Mobility procedures defined in RFC 7432 are extensible to IRB use cases if a fixed 1:1 mapping between VM IP and MAC is assumed across VM moves. Generic mobility support for IP and MAC that allows these bindings to change across moves is required to support a broader set of EVPN IRB use cases, and requires further consideration. EVPN all-active multihoming further introduces scenarios that require additional consideration from mobility perspective. This document enumerates a set of design considerations applicable to mobility across these EVPN IRB use cases and defines generic sequence number assignment procedures to address these IRB use cases.</t></abstract> </front> <seriesInfo name='Internet-Draft' value='draft-ietf-bess-evpn-irb-extended-mobility-07'/> <format type='TXT' target='https://www.ietf.org/internet-drafts/draft-ietf-bess-evpn-irb-extended-mobility-07.txt'/> </reference> <reference anchor='I-D.ietf-nvo3-vxlan-gpe'> <front> <title>Generic Protocol Extension for VXLAN (VXLAN-GPE)</title> <author initials='F' surname='Maino' fullname='Fabio Maino' role="editor"> <organization /> </author> <author initials='L' surname='Kreeger' fullname='Larry Kreeger' role="editor"> <organization /> </author> <author initials='U' surname='Elzur' fullname='Uri Elzur' role="editor"> <organization /> </author> <date year='2021' month='September' day='22' /> <abstract><t>This document describes extending Virtual eXtensible Local Area Network (VXLAN), via changes to the VXLAN header, with four new capabilities: support for multi-protocol encapsulation, support for operations, administration and maintenance (OAM) signaling, support for ingress-replicated BUM Traffic (i.e. Broadcast, Unknown unicast, or Multicast), and explicit versioning. New protocol capabilities can be introduced via shim headers.</t></abstract> </front> <seriesInfo name='Internet-Draft' value='draft-ietf-nvo3-vxlan-gpe-12'/> <format type='TXT' target='https://www.ietf.org/internet-drafts/draft-ietf-nvo3-vxlan-gpe-12.txt'/> </reference> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7348.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7637.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4365.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5798.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7365.xml"/> </references><references title="Informative References"> &I-D.ietf-bess-evpn-irb-extended-mobility; &I-D.ietf-nvo3-vxlan-gpe; &RFC4365; &RFC5798; &RFC7365;</references> <section anchor="sect-10" numbered="false" toc="default"> <name>Acknowledgements</name> <t> The authors would like to thank <contact fullname="Sami Boutros"/>, <contact fullname="Jeffrey Zhang"/>, <contact fullname="Krzysztof Szarkowicz"/>, <contact fullname="Lukas Krattiger"/> and <contact fullname="Neeraj Malhotra"/> for their valuable comments. The authors would also like to thank <contact fullname="Linda Dunbar"/>, <contact fullname="Florin Balus"/>, <contact fullname="Yakov Rekhter"/>, <contact fullname="Wim Henderickx"/>, <contact fullname="Lucy Yong"/>, and <contact fullname="Dennis Cai"/> for their feedback and contributions.</t> </section> </back> </rfc>