rfc9521xml2.original.xml | rfc9521.xml | |||
---|---|---|---|---|
<?xml version="1.0" encoding="iso-8859-1"?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<?rfc toc="yes"?> | ||||
<?rfc symrefs="yes" ?> | ||||
<?rfc sortrefs="yes" ?> | ||||
<?rfc compact="yes" ?> | ||||
<?rfc subcompact="no" ?> | ||||
<rfc category="std" ipr="trust200902" docName="draft-ietf-nvo3-bfd-geneve-13" co | <!DOCTYPE rfc [ | |||
nsensus="true" submissionType="IETF"> | <!ENTITY nbsp " "> | |||
<!ENTITY zwsp "​"> | ||||
<!ENTITY nbhy "‑"> | ||||
<!ENTITY wj "⁠"> | ||||
]> | ||||
<front> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" category=" | |||
<title abbrev="BFD for Geneve"> BFD for Geneve </title> | std" consensus="true" docName="draft-ietf-nvo3-bfd-geneve-13" number="9521" ipr= | |||
"trust200902" tocInclude="true" symRefs="true" sortRefs="true" updates="" obsole | ||||
tes="" xml:lang="en" version="3"> | ||||
<author fullname="Xiao Min" initials="X" surname="Min"> | <!-- xml2rfc v2v3 conversion 3.18.0 --> | |||
<organization>ZTE Corp.</organization> | <front> | |||
<address> | ||||
<postal> | ||||
<street/> | ||||
<!-- Reorder these if your country does things differently --> | <title abbrev="BFD for Geneve">Bidirectional Forwarding Detection (BFD) for | |||
Generic Network | ||||
Virtualization Encapsulation (Geneve)</title> | ||||
<seriesInfo name="RFC" value="9521"/> | ||||
<author fullname="Xiao Min" initials="X" surname="Min"> | ||||
<organization>ZTE Corp.</organization> | ||||
<address> | ||||
<postal> | ||||
<street/> | ||||
<city>Nanjing</city> | <city>Nanjing</city> | |||
<region/> | ||||
<code/> | ||||
<country>China</country> | ||||
</postal> | ||||
<phone>+86 18061680168</phone> | ||||
<email>xiao.min2@zte.com.cn</email> | ||||
<region/> | ||||
<code/> | ||||
<country>China</country> | ||||
</postal> | ||||
<phone>+86 18061680168</phone> | ||||
<email>xiao.min2@zte.com.cn</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Greg Mirsky" initials="G" surname="Mirsky"> | ||||
<author fullname="Greg Mirsky" initials="G" surname="Mirsky"> | ||||
<organization>Ericsson</organization> | <organization>Ericsson</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street></street> | <street/> | |||
<!-- Reorder these if your country does things differently --> | ||||
<city></city> | ||||
<region></region> | ||||
<code></code> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<phone></phone> | ||||
<email>gregimirsky@gmail.com</email> | <city/> | |||
<region/> | ||||
<code/> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<phone/> | ||||
<email>gregimirsky@gmail.com</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Santosh Pallagatti" initials="S" surname="Pallagatti"> | ||||
<author fullname="Santosh Pallagatti" initials="S" surname="Pallagatti"> | ||||
<organization>VMware</organization> | <organization>VMware</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street/> | <street/> | |||
<!-- Reorder these if your country does things differently --> | ||||
<city></city> | ||||
<region/> | ||||
<code/> | ||||
<country>India</country> | ||||
</postal> | ||||
<phone></phone> | ||||
<email>santosh.pallagatti@gmail.com</email> | <city/> | |||
<region/> | ||||
<code/> | ||||
<country>India</country> | ||||
</postal> | ||||
<phone/> | ||||
<email>santosh.pallagatti@gmail.com</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Jeff Tantsura" initials="J" surname="Tantsura"> | ||||
<author fullname="Jeff Tantsura" initials="J" surname="Tantsura"> | ||||
<organization>Nvidia</organization> | <organization>Nvidia</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street/> | <street/> | |||
<!-- Reorder these if your country does things differently --> | ||||
<city></city> | ||||
<region/> | ||||
<code/> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<phone></phone> | ||||
<email>jefftant.ietf@gmail.com</email> | <city/> | |||
<region/> | ||||
<code/> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<phone/> | ||||
<email>jefftant.ietf@gmail.com</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Sam Aldrin" initials="S" surname="Aldrin"> | ||||
<author fullname="Sam Aldrin" initials="S" surname="Aldrin"> | ||||
<organization>Google</organization> | <organization>Google</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street/> | <street/> | |||
<!-- Reorder these if your country does things differently --> | ||||
<city></city> | ||||
<region/> | ||||
<code/> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<phone></phone> | <city/> | |||
<region/> | ||||
<code/> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<phone/> | ||||
<email>aldrin.ietf@gmail.com</email> | ||||
<email>aldrin.ietf@gmail.com</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<date year="2024" month="January" /> | ||||
<date year="2023"/> | <area>rtg</area> | |||
<workgroup>nvo3</workgroup> | ||||
<area>Routing</area> | ||||
<workgroup>NVO3 Working Group</workgroup> | ||||
<keyword>Request for Comments</keyword> | ||||
<keyword>RFC</keyword> | ||||
<keyword>Internet Draft</keyword> | ||||
<keyword>I-D</keyword> | ||||
<abstract> | <abstract> | |||
<t> This document describes the use of the Bidirectional Forwarding Detection (BFD) protocol in point-to-point | <t> This document describes the use of the Bidirectional Forwarding Detect ion (BFD) protocol in point-to-point | |||
Generic Network Virtualization Encapsulation (Geneve) unicast tunnels used to make up an overlay network. </t> | Generic Network Virtualization Encapsulation (Geneve) unicast tunnels used to make up an overlay network. </t> | |||
</abstract> | </abstract> | |||
</front> | ||||
</front> | <middle> | |||
<section> | ||||
<middle> | <name>Introduction</name> | |||
<t>"Geneve: Generic Network Virtualization Encapsulation" <xref target="RF | ||||
<section title="Introduction"> | C8926" format="default"/> provides an encapsulation scheme | |||
<t> "Generic Network Virtualization Encapsulation" (Geneve) <xref target="RFC8 | ||||
926"/> provides an encapsulation scheme | ||||
that allows building an overlay network of tunnels by decoupling the address s pace of the attached virtual hosts from | that allows building an overlay network of tunnels by decoupling the address s pace of the attached virtual hosts from | |||
that of the network. </t> | that of the network. </t> | |||
<t> This document describes the use of the Bidirectional Forwarding Detect | ||||
<t> This document describes the use of Bidirectional Forwarding Detection (BFD | ion (BFD) protocol <xref target="RFC5880"/> | |||
) protocol <xref target="RFC5880"/> | to enable monitoring the continuity of the path between two Geneve tunnel endp | |||
to enable monitoring the continuity of the path between two Geneve tunnel endp | oints, which may be a Network | |||
oints, which may be a NVE (Network | Virtualization Edge (NVE) or another device acting as a Geneve tunnel endpoint | |||
Virtualization Edge) or another device acting as a Geneve tunnel endpoint. Spe | . Specifically, the asynchronous mode of BFD, | |||
cifically, the asynchronous mode of BFD, | as defined in <xref target="RFC5880"/>, is used to monitor a point-to-point (P | |||
as defined in <xref target="RFC5880"/>, is used to monitor a P2P Geneve tunnel | 2P) Geneve tunnel. The support for the BFD Echo function is outside | |||
. The support for BFD Echo function is outside | the scope of this document. For simplicity, an NVE is used to represent the Ge | |||
the scope of this document. For simplicity, NVE is used to represent the Genev | neve tunnel endpoint. | |||
e tunnel endpoint. | A Tenant System (TS) is used to represent the physical or virtual device attac | |||
TS (Tenant System) is used to represent the physical or virtual device attache | hed to a Geneve tunnel endpoint from the | |||
d to a Geneve tunnel endpoint from the | outside. A Virtual Access Point (VAP) is the NVE side of the interface between | |||
outside. VAP (Virtual Access Point) is the NVE side of the interface between t | the NVE and the TS, and a VAP is a | |||
he NVE and the TS, and a VAP is a | ||||
logical network port (virtual or physical) into a specific virtual network. Fo r detailed definitions and descriptions | logical network port (virtual or physical) into a specific virtual network. Fo r detailed definitions and descriptions | |||
of NVE, TS and VAP, please refer to <xref target="RFC7365"/> and <xref target= | of NVE, TS, and VAP, please refer to <xref target="RFC7365"/> and <xref target | |||
"RFC8014"/>. </t> | ="RFC8014"/>. </t> | |||
<t> The use cases and the deployment of BFD for Geneve are mostly | ||||
<t> The use cases and the deployment of BFD for Geneve are mostly consistent w | consistent with what's described in Sections <xref target="RFC8971" section= | |||
ith what's described in Section 1 and 3 of | "1" | |||
<xref target="RFC8971"/> ("Bidirectional Forwarding Detection (BFD) for Virtua | sectionFormat="bare"/> and <xref target="RFC8971" section="3" | |||
l eXtensible Local Area Network (VXLAN)"). | sectionFormat="bare"/> of <xref target="RFC8971"/>. One exception is the | |||
One exception is on the usage of Management VNI, which is described in <xref t | usage of the Management Virtual Network Identifier (VNI), which is described | |||
arget="I-D.ietf-nvo3-geneve-oam"/> and outside | in <xref | |||
the scope of this document. </t> | target="I-D.ietf-nvo3-geneve-oam"/> and is outside the scope of this | |||
document. </t> | ||||
<t> As specified in Section 4.2 of <xref target="RFC8926"/>, Geneve MUST be us | <t> As specified in <xref target="RFC8926" sectionFormat="of" | |||
ed with congestion-controlled traffic or | section="4.2"/>, Geneve <bcp14>MUST</bcp14> be used with | |||
within a traffic-managed controlled environment (TMCE) to avoid congestion, th | congestion controlled traffic or within a Traffic-Managed Controlled | |||
at requirement applies to BFD traffic too. | Environment (TMCE) to avoid congestion; that requirement also applies to B | |||
Specifically, considering the complexity and immaturity of BFD congestion cont | FD | |||
rol mechanism, BFD for Geneve MUST be used | traffic. Specifically, considering the complexity and immaturity of | |||
within a TMCE unless BFD is really congestion controlled. As an alternative to | the BFD congestion control mechanism, BFD for Geneve <bcp14>MUST</bcp14> | |||
a real congestion control, an operator of | be used within a TMCE unless BFD is really congestion controlled. As an | |||
a TMCE deploying BFD for Geneve is required to provision the rates at which BF | alternative to a real congestion control, an operator of a TMCE | |||
D is transmitted to avoid congestion and | deploying BFD for Geneve is required to provision the rates at which BFD | |||
false failure detection. </t> | is transmitted to avoid congestion and false failure detection. </t> | |||
</section> | ||||
<section title="Conventions Used in This Document"> | ||||
<section title="Abbreviations"> | ||||
<t> BFD: Bidirectional Forwarding Detection</t> | ||||
<t> FCS: Frame Check Sequence</t> | ||||
<t> Geneve: Generic Network Virtualization Encapsulation</t> | ||||
<t> NVE: Network Virtualization Edge</t> | ||||
<t> TMCE: Traffic-Managed Controlled Environment</t> | ||||
<t> TS: Tenant System</t> | ||||
<t> VAP: Virtual Access Point</t> | ||||
<t> VNI: Virtual Network Identifier</t> | ||||
<t> VXLAN: Virtual eXtensible Local Area Network</t> | ||||
</section> | </section> | |||
<section> | ||||
<section title="Requirements Language"> | <name>Conventions Used in This Document</name> | |||
<t> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | <section> | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", | <name>Abbreviations</name> | |||
"NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be int | <dl newline="false" spacing="normal"> | |||
erpreted as described in BCP 14 | <dt>BFD:</dt><dd>Bidirectional Forwarding Detection</dd> | |||
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, th | <dt>FCS:</dt><dd>Frame Check Sequence</dd> | |||
ey appear in all capitals, as shown here.</t> | <dt>Geneve:</dt><dd>Generic Network Virtualization Encapsulation</dd> | |||
<dt>NVE:</dt><dd>Network Virtualization Edge</dd> | ||||
<dt>TMCE:</dt><dd>Traffic-Managed Controlled Environment</dd> | ||||
<dt>TS:</dt><dd>Tenant System</dd> | ||||
<dt>VAP:</dt><dd>Virtual Access Point</dd> | ||||
<dt>VNI:</dt><dd>Virtual Network Identifier</dd> | ||||
<dt>VXLAN:</dt><dd>Virtual eXtensible Local Area Network</dd> | ||||
</dl> | ||||
</section> | ||||
<section> | ||||
<name>Requirements Language</name> | ||||
<t> | ||||
The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", | ||||
"<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | ||||
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", | ||||
"<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | ||||
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are | ||||
to be interpreted as described in BCP 14 <xref target="RFC2119"/> | ||||
<xref target="RFC8174"/> when, and only when, they appear in all capitals, | ||||
as shown here. | ||||
</t> | ||||
</section> | ||||
</section> | </section> | |||
<section> | ||||
<name>BFD Packet Transmission over a Geneve Tunnel</name> | ||||
</section> | <t> Since the Geneve data packet payload may be either an Ethernet frame | |||
or an IP packet, this document defines two formats of BFD packet | ||||
<section title="BFD Packet Transmission over Geneve Tunnel"> | encapsulation in Geneve. The BFD session is originated and terminated at | |||
the VAP of an NVE. The selection of the BFD packet encapsulation is | ||||
<t> Since the Geneve data packet payload may be either an Ethernet frame or an | based on how the VAP encapsulates the data packets. If the payload is | |||
IP packet, this document defines two | IP, then BFD over IP is carried in the payload. If the payload is | |||
formats of BFD packet encapsulation in Geneve. The BFD session is originated a | Ethernet, then BFD over IP over Ethernet is carried in the payload. This o | |||
nd terminated at the VAP of an NVE. The selection | ccurs in | |||
of the BFD packet encapsulation is based on how the VAP encapsulates the data | the same manner as BFD over IP in the IP payload case, regardless of | |||
packets. If the payload is | what the Ethernet payload might normally carry.</t> | |||
IP, then BFD over IP is carried in the payload. If the payload is Ethernet, th | </section> | |||
en BFD over IP over Ethernet is carried in | <section anchor="ethernet-ip-encaps-section"> | |||
the payload, in the same manner as BFD over IP in the IP payload case, regardl | <name>BFD Encapsulation with the Inner Ethernet/IP/UDP Header</name> | |||
ess of what the Ethernet payload might normally carry.</t> | <t> If the VAP that originates the BFD packets is used to encapsulate | |||
Ethernet data frames, then the BFD packets are encapsulated in Geneve as | ||||
</section> | described below. The Geneve packet formats over IPv4 and IPv6 are | |||
defined in Sections <xref target="RFC8926" sectionFormat="bare" section="3 | ||||
<section anchor="ethernet-ip-encaps-section" title="BFD Encapsulation With Inn | .1"/> | |||
er Ethernet/IP/UDP Header"> | and <xref target="RFC8926" sectionFormat="bare" section="3.2"/> of <xref | |||
target="RFC8926"/>, respectively. The outer IP/UDP and Geneve headers are | ||||
<t> If the VAP that originates the BFD packets is used to encapsulate Ethernet | encoded by the sender as defined in <xref target="RFC8926"/>. Note that | |||
data frames, then the BFD packets are | the outer IP header and the inner IP header may not be of the same | |||
encapsulated in Geneve as described below. The Geneve packet formats over IPv4 | address family. In other words, an outer IPv6 header accompanied by an | |||
and IPv6 are defined in Section 3.1 and | inner IPv4 header and an outer IPv4 header accompanied by an inner IPv6 | |||
3.2 of <xref target="RFC8926"/> respectively. The Outer IP/UDP and Geneve head | header are both possible. </t> | |||
ers are encoded by the sender | <figure anchor="Figure_1"> | |||
as defined in <xref target="RFC8926"/>. Note that the outer IP header and the | <name>Geneve Encapsulation of a BFD Control Packet with the Inner Ethern | |||
inner IP header may not be of the same | et/IP/UDP Header</name> | |||
address family. In other words, an outer IPv6 header accompanied by an inner I | <artwork align="left"><![CDATA[ | |||
Pv4 header and an outer IPv4 header accompanied | ||||
by an inner IPv6 header are both possible. </t> | ||||
<figure anchor="Figure_1" title="Geneve Encapsulation of BFD Control Packet | ||||
With the Inner Ethernet/IP/UDP Header"> | ||||
<artwork align="left"><![CDATA[ | ||||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
~ Outer Ethernet Header ~ | ~ Outer Ethernet Header ~ | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
~ Outer IPvX Header ~ | ~ Outer IPvX Header ~ | |||
| | | | | | |||
skipping to change at line 266 ¶ | skipping to change at line 236 ¶ | |||
| | | | | | |||
~ Inner UDP Header ~ | ~ Inner UDP Header ~ | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
~ BFD Control Packet ~ | ~ BFD Control Packet ~ | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Outer Ethernet FCS | | | Outer Ethernet FCS | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
]]></artwork> | ]]></artwork> | |||
</figure> | </figure> | |||
<t> The BFD packet <bcp14>MUST</bcp14> be carried inside the inner Etherne | ||||
<t> The BFD packet MUST be carried inside the inner Ethernet frame of the G | t frame of the Geneve packet. | |||
eneve packet. | ||||
The inner Ethernet frame carrying the BFD Control packet has the fo llowing format: | The inner Ethernet frame carrying the BFD Control packet has the fo llowing format: | |||
<list> | </t> | |||
<t>Inner Ethernet Header: | ||||
<list> | ||||
<t>Destination MAC: MAC address of a V | ||||
AP of the terminating NVE.</t> | ||||
<t>Source MAC: MAC address of a VAP of | ||||
the originating NVE.</t> | ||||
</list> | ||||
</t> | ||||
<t>IP Header: | ||||
<list> | ||||
<t>Source IP: IP address of a VAP of t | ||||
he originating NVE. If the VAP of the originating NVE | ||||
has no IP address, then the IP address | ||||
0.0.0.0 for IPv4 or ::/128 for IPv6 MUST be used.</t> | ||||
<t>Destination IP: IP address of a VAP | ||||
of the terminating NVE. If the VAP of the terminating | ||||
NVE has no IP address, then the IP add | ||||
ress 127.0.0.1 for IPv4 or ::1/128 for IPv6 MUST be used.</t> | ||||
<t>TTL or Hop Limit: MUST be set to 25 | ||||
5 in accordance with <xref target="RFC5881"/> that specifies the IPv4/IPv6 singl | ||||
e-hop BFD.</t> | ||||
</list> | ||||
</t> | ||||
<t> The fields of the UDP header and the BFD Control packet ar | ||||
e encoded as specified in <xref target="RFC5881"/>.</t> | ||||
</list> | ||||
</t> | ||||
<t> When the BFD packets are encapsulated in Geneve in this way, the Geneve | ||||
header defined in <xref target="RFC8926"/> | ||||
follows the value set below.</t> | ||||
<t> | ||||
<list> | ||||
<t> Opt Len field MUST be set consistent with the Geneve specification <xre | ||||
f target="RFC8926"/> depending on whether | ||||
or not Geneve options are present in the frame. The use of Geneve option | ||||
s with BFD is beyond the scope of this document.</t> | ||||
<t> O bit MUST be set to 1, which indicates this packet contains a contr | ||||
ol message.</t> | ||||
<t> C bit MUST be set to 0, which indicates there isn't any critical option | <dl newline="true" spacing="normal"> | |||
.</t> | <dt>Inner Ethernet Header:</dt> | |||
<dd> | ||||
<dl newline="false" spacing="normal"> | ||||
<dt>Destination MAC:</dt> | ||||
<dd>Media Access Control (MAC) address of a VAP of the terminating NV | ||||
E.</dd> | ||||
<t> Protocol Type field MUST be set to 0x6558 (Ethernet frame).</t> | <dt>Source MAC:</dt> | |||
<dd>MAC address of a VAP of the originating NVE.</dd> | ||||
</dl> | ||||
</dd> | ||||
</dl> | ||||
<t> Virtual Network Identifier (VNI) field MUST be set to the VNI number th | <dl newline="true" spacing="normal"> | |||
at the originating VAP is mapped to.</t> | <dt>IP Header:</dt> | |||
</list> | <dd> | |||
</t> | <dl newline="false" spacing="normal"> | |||
<dt>Source IP:</dt> | ||||
<dd>IP address of a VAP of the originating | ||||
NVE. If the VAP of the originating NVE has no IP address, then the | ||||
IP address 0.0.0.0 for IPv4 or ::/128 for IPv6 <bcp14>MUST</bcp14> | ||||
be used.</dd> | ||||
<section title="Demultiplexing BFD packet when payload is Ethernet"> | <dt>Destination IP:</dt> | |||
<dd>IP address of a VAP of the terminating | ||||
NVE. If the VAP of the terminating NVE has no IP address, then the | ||||
IP address 127.0.0.1 for IPv4 or ::1/128 for IPv6 | ||||
<bcp14>MUST</bcp14> be used.</dd> | ||||
<t> Once a packet is received, the NVE validates the packet as described in | <dt>TTL or Hop Limit:</dt> | |||
<xref target="RFC8926"/>. When the | <dd>The TTL for IPv4 or Hop Limit for IPv6 <bcp14>MUST</bcp14> be set | |||
payload is Ethernet, the Protocol Type field equals 0x6558. The Destinati | to 255 in | |||
on MAC address of the inner Ethernet frame | accordance with <xref target="RFC5881"/>, which specifies the | |||
matches the MAC address of a VAP which is mapped to the same VNI as the r | IPv4/IPv6 single-hop BFD.</dd> | |||
eceived VNI. Then the Destination IP, the UDP | </dl> | |||
destination port and the TTL or Hop Limit of the inner IP packet MUST be | <t>The fields of the UDP header and the BFD Control packet are | |||
validated to determine whether the received | encoded as specified in <xref target="RFC5881"/>.</t> | |||
packet can be processed by BFD, i.e., the three field values of the inner | </dd> | |||
IP packet MUST be in compliance with what's | </dl> | |||
defined in Section 4 of this document, as well as Section 4 of <xref targ | <t> When the BFD packets are encapsulated in Geneve in this way, the | |||
et="RFC5881"/>. If the validation fails, the | Geneve header defined in <xref target="RFC8926"/> follows the value | |||
received packet MUST NOT be processed by BFD.</t> | set below.</t> | |||
<t> In BFD over Geneve, a BFD session is originated and terminated at a VAP. | <ul spacing="normal"> | |||
Usually one NVE owns | <li>The Opt Len field <bcp14>MUST</bcp14> be set as consistent with the | |||
multiple VAPs. Since multiple BFD sessions may be running between two NVEs, | Geneve specification (<xref target="RFC8926"/>) depending on whether | |||
there needs to be a mechanism | or not Geneve options are present in the frame. The use of Geneve option | |||
for demultiplexing received BFD packets to the proper session. Furthermore, | s with BFD is beyond the scope of this document.</li> | |||
due to the fact that | <li>The O bit <bcp14>MUST</bcp14> be set to 1, which indicates this pack | |||
<xref target="RFC8014"/> allows for N-to-1 mapping between VAP and VNI at on | et contains a control message.</li> | |||
e NVE, multiple BFD sessions | <li>The C bit <bcp14>MUST</bcp14> be set to 0, which indicates there isn | |||
between two NVEs for the same VNI are allowed. Also note that a BFD session | 't any critical option.</li> | |||
can only be established between | <li>The Protocol Type field <bcp14>MUST</bcp14> be set to 0x6558 (Ethern | |||
two VAPs that are mapped to the same VNI and use the same way to encapsulate | et frame).</li> | |||
data packets. </t> | <li>The Virtual Network Identifier (VNI) field <bcp14>MUST</bcp14> be se | |||
t to the VNI number that the originating VAP is mapped to.</li> | ||||
</ul> | ||||
<section> | ||||
<name>Demultiplexing a BFD Packet When the Payload Is Ethernet</name> | ||||
<t> Once a packet is received, the NVE validates the packet as | ||||
described in <xref target="RFC8926"/>. When the payload is Ethernet, | ||||
the Protocol Type field equals 0x6558. The destination MAC address of | ||||
the inner Ethernet frame matches the MAC address of a VAP, which is | ||||
mapped to the same VNI as the received VNI. Then, the destination IP, | ||||
the UDP destination port, and the TTL or Hop Limit of the inner IP | ||||
packet <bcp14>MUST</bcp14> be validated to determine whether | ||||
the received packet can be processed by BFD (i.e., the three field | ||||
values of the inner IP packet <bcp14>MUST</bcp14> be in compliance | ||||
with what's defined in <xref target="ethernet-ip-encaps-section"/> of | ||||
this document, as well as <xref target="RFC5881" sectionFormat="of" | ||||
section="4"/>). If the validation fails, the received packet | ||||
<bcp14>MUST NOT</bcp14> be processed by BFD.</t> | ||||
<t> If the BFD packet is received with Your Discriminator equals to 0, then | <t> In BFD over Geneve, a BFD session is originated and terminated at | |||
the BFD session SHOULD be identified using | a VAP. Usually one NVE owns multiple VAPs. Since multiple BFD sessions | |||
may be running between two NVEs, there needs to be a mechanism for | ||||
demultiplexing received BFD packets to the proper | ||||
session. Furthermore, due to the fact that <xref target="RFC8014"/> | ||||
allows for N-to-1 mapping between VAPs and VNIs at one NVE, multiple BFD | ||||
sessions between two NVEs for the same VNI are allowed. Also, note that | ||||
a BFD session can only be established between two VAPs that are mapped | ||||
to the same VNI and that use the same way to encapsulate data packets. < | ||||
/t> | ||||
<t> If the BFD packet is received with the value of the Your Discriminat | ||||
or field set to 0, then the BFD session <bcp14>SHOULD</bcp14> be identified usin | ||||
g | ||||
the VNI number and the inner Ethernet/IP header. The inner Ethernet/IP he ader stands for the source MAC, the source IP, | the VNI number and the inner Ethernet/IP header. The inner Ethernet/IP he ader stands for the source MAC, the source IP, | |||
the destination MAC, and the destination IP. An implementation MAY use th e inner UDP port source number to aid in | the destination MAC, and the destination IP. An implementation <bcp14>MAY </bcp14> use the inner UDP port source number to aid in | |||
demultiplexing incoming BFD Control packets. If it fails to identify the BFD session, the incoming BFD Control packets | demultiplexing incoming BFD Control packets. If it fails to identify the BFD session, the incoming BFD Control packets | |||
MUST be dropped, and an exception event indicating the failure should be | <bcp14>MUST</bcp14> be dropped, and an exception event indicating the fai | |||
reported to the management.</t> | lure should be reported to the management.</t> | |||
<t> If the BFD packet is received with a non-zero Your Discriminator, | ||||
<t> If the BFD packet is received with non-zero Your Discriminator, then the | then the BFD session <bcp14>MUST</bcp14> be demultiplexed only with | |||
BFD session MUST be demultiplexed | the Your Discriminator as the key. </t> | |||
only with Your Discriminator as the key. </t> | </section> | |||
</section> | </section> | |||
<section anchor="ip-encaps-section"> | ||||
</section> | <name>BFD Encapsulation with the Inner IP/UDP Header</name> | |||
<t> If the VAP that originates the BFD packets is used to encapsulate IP | ||||
<section anchor="ip-encaps-section" title="BFD Encapsulation With Inner IP/UDP | data packets, then the BFD packets are encapsulated in Geneve as | |||
Header"> | described below. The Geneve packet formats over IPv4 and IPv6 are | |||
defined in Sections <xref target="RFC8926" | ||||
<t> If the VAP that originates the BFD packets is used to encapsulate IP data | sectionFormat="bare" section="3.1"/> and <xref target="RFC8926" | |||
packets, then the BFD packets are | sectionFormat="bare" section="3.2"/> of <xref target="RFC8926"/>, | |||
encapsulated in Geneve as described below. The Geneve packet formats over IPv4 | respectively. The outer IP/UDP and Geneve headers are encoded by the | |||
and IPv6 are defined in Section 3.1 and | sender as defined in <xref target="RFC8926"/>. Note that the outer IP | |||
3.2 of <xref target="RFC8926"/> respectively. The Outer IP/UDP and Geneve head | header and the inner IP header may not be of the same address family. In | |||
ers are encoded by the sender | other words, an outer IPv6 header accompanied by an inner IPv4 header | |||
as defined in <xref target="RFC8926"/>. Note that the outer IP header and the | and an outer IPv4 header accompanied by an inner IPv6 header are both | |||
inner IP header may not be of the same | possible. </t> | |||
address family. In other words, an outer IPv6 header accompanied by an inner I | <figure anchor="Figure_2"> | |||
Pv4 header and an outer IPv4 header accompanied | <name>Geneve Encapsulation of a BFD Control Packet with the Inner IP/UDP | |||
by an inner IPv6 header are both possible. </t> | Header</name> | |||
<artwork align="left"><![CDATA[ | ||||
<figure anchor="Figure_2" title="Geneve Encapsulation of BFD Control Packet | ||||
With the Inner IP/UDP Header"> | ||||
<artwork align="left"><![CDATA[ | ||||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
~ Ethernet Header ~ | ~ Ethernet Header ~ | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
~ Outer IPvX Header ~ | ~ Outer IPvX Header ~ | |||
| | | | | | |||
skipping to change at line 385 ¶ | skipping to change at line 377 ¶ | |||
| | | | | | |||
~ Inner UDP Header ~ | ~ Inner UDP Header ~ | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
~ BFD Control Packet ~ | ~ BFD Control Packet ~ | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| FCS | | | FCS | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
]]></artwork> | ]]></artwork> | |||
</figure> | </figure> | |||
<t> The BFD packet <bcp14>MUST</bcp14> be carried inside the inner IP pack | ||||
<t> The BFD packet MUST be carried inside the inner IP packet of the Geneve | et of the Geneve packet. | |||
packet. | ||||
The inner IP packet carrying the BFD Control packet has the following forma t: | The inner IP packet carrying the BFD Control packet has the following forma t: | |||
<list> | </t> | |||
<t>Inner IP header: | <dl newline="true" spacing="normal"> | |||
<list> | <dt>Inner IP Header:</dt> | |||
<t>Source IP: IP address of a VAP of t | <dd> | |||
he originating NVE.</t> | <dl spacing="normal" newline="false"> | |||
<t>Destination IP: IP address of a VAP | <dt>Source IP:</dt> | |||
of the terminating NVE.</t> | <dd>IP address of a VAP of the originating NVE.</dd> | |||
<t>TTL or Hop Limit: MUST be set to 25 | ||||
5 in accordance with <xref target="RFC5881"/> that specifies the IPv4/IPv6 singl | ||||
e-hop BFD.</t> | ||||
</list> | ||||
</t> | ||||
<t> The fields of the UDP header and the BFD Control packet ar | <dt>Destination IP:</dt> | |||
e encoded as specified in <xref target="RFC5881"/>.</t> | <dd>IP address of a VAP of the terminating NVE.</dd> | |||
</list> | <dt>TTL or Hop Limit:</dt> | |||
</t> | <dd>The TTL for IPv4 or Hop Limit for IPv6 <bcp14>MUST</bcp14> be set | |||
to 255 in accordance with <xref target="RFC5881"/>, which specifies the IPv4/IP | ||||
v6 single-hop BFD.</dd> | ||||
</dl> | ||||
<t> The fields of the UDP header and the BFD Control packet are enco | ||||
ded as specified in <xref target="RFC5881"/>.</t> | ||||
</dd> | ||||
</dl> | ||||
<t> When the BFD packets are encapsulated in Geneve in this way, the Geneve header defined in <xref target="RFC8926"/> | <t> When the BFD packets are encapsulated in Geneve in this way, the Genev e header defined in <xref target="RFC8926"/> | |||
follows the value set below.</t> | follows the value set below.</t> | |||
<t> | <ul spacing="normal"> | |||
<list> | <li>The Opt Len field <bcp14>MUST</bcp14> be set as consistent with the | |||
<t> Opt Len field MUST be set consistent with the Geneve specification <xre | Geneve specification (<xref target="RFC8926"/>) depending on whether | |||
f target="RFC8926"/> depending on whether | or not Geneve options are present in the frame. The use of Geneve option | |||
or not Geneve options are present in the frame. The use of Geneve option | s with BFD is beyond the scope of this document.</li> | |||
s with BFD is beyond the scope of this document.</t> | <li>The O bit <bcp14>MUST</bcp14> be set to 1, which indicates this pack | |||
et contains a control message.</li> | ||||
<t> O bit MUST be set to 1, which indicates this packet contains a contr | <li>The C bit <bcp14>MUST</bcp14> be set to 0, which indicates there isn | |||
ol message.</t> | 't any critical option.</li> | |||
<li>The Protocol Type field <bcp14>MUST</bcp14> be set to 0x0800 (IPv4) | ||||
<t> C bit MUST be set to 0, which indicates there isn't any critical option | or 0x86DD (IPv6), depending on the address family | |||
.</t> | of the inner IP packet.</li> | |||
<li>The Virtual Network Identifier (VNI) field <bcp14>MUST</bcp14> be se | ||||
<t> Protocol Type field MUST be set to 0x0800 (IPv4) or 0x86DD (IPv6), depe | t to the VNI number that the originating VAP is mapped to.</li> | |||
nding on the address family | </ul> | |||
of the inner IP packet.</t> | <section> | |||
<name>Demultiplexing a BFD Packet When the Payload Is IP</name> | ||||
<t> Virtual Network Identifier (VNI) field MUST be set to the VNI number th | <t> Once a packet is received, the NVE validates the packet as | |||
at the originating VAP is mapped to.</t> | described in <xref target="RFC8926"/>. When the payload is IP, the | |||
</list> | Protocol Type field equals 0x0800 or 0x86DD. The destination IP | |||
</t> | address of the inner IP packet matches the IP address of a VAP, which | |||
is mapped to the same VNI as the received VNI. Then, the UDP | ||||
<section title="Demultiplexing BFD packet when payload is IP"> | destination port and the TTL or Hop Limit of the inner IP packet | |||
<bcp14>MUST</bcp14> be validated to determine whether or not the receive | ||||
<t> Once a packet is received, the NVE validates the packet as described in | d | |||
<xref target="RFC8926"/>. When the | packet can be processed by BFD (i.e., the two field values of the | |||
payload is IP, the Protocol Type field equals 0x0800 or 0x86DD. The Desti | inner IP packet <bcp14>MUST</bcp14> be in compliance with what's | |||
nation IP address of the inner IP packet matches | defined in <xref sectionFormat="of" target="ip-encaps-section"/> of | |||
the IP address of a VAP which is mapped to the same VNI as the received V | this document as well as <xref target="RFC5881" sectionFormat="of" | |||
NI. Then the UDP destination port and the TTL or Hop | section="4"/>). If the validation fails, the received packet | |||
Limit of the inner IP packet MUST be validated to determine whether the r | <bcp14>MUST NOT</bcp14> be processed by BFD.</t> | |||
eceived packet can be processed by BFD, i.e., | <t> If the BFD packet is received with the value of the Your Discriminat | |||
the two field values of the inner IP packet MUST be in compliance with wh | or field set to 0, then the BFD session <bcp14>SHOULD</bcp14> be identified usin | |||
at's defined in Section 5 of this document, as well | g the VNI | |||
as Section 4 of <xref target="RFC5881"/>. If the validation fails, the re | number and the inner IP header. The inner IP header stands for the source | |||
ceived packet MUST NOT be processed by BFD.</t> | IP and the destination IP. An implementation <bcp14>MAY</bcp14> | |||
<t> If the BFD packet is received with Your Discriminator equals to 0, then | ||||
the BFD session SHOULD be identified using the VNI | ||||
number and the inner IP header. The inner IP header stands for the source | ||||
IP and the destination IP. An implementation MAY | ||||
use the inner UDP port source number to aid in demultiplexing incoming BF D Control packets. If it fails to identify the BFD session, | use the inner UDP port source number to aid in demultiplexing incoming BF D Control packets. If it fails to identify the BFD session, | |||
the incoming BFD Control packets MUST be dropped, and an exception event | the incoming BFD Control packets <bcp14>MUST</bcp14> be dropped, and an e | |||
indicating the failure should be reported to the management.</t> | xception event indicating the failure should be reported to the management.</t> | |||
<t> If the BFD packet is received with a non-zero Your Discriminator, th | ||||
<t> If the BFD packet is received with non-zero Your Discriminator, then the | en the BFD session <bcp14>MUST</bcp14> be demultiplexed | |||
BFD session MUST be demultiplexed | only with the Your Discriminator as the key. </t> | |||
only with Your Discriminator as the key. </t> | </section> | |||
</section> | </section> | |||
<section> | ||||
</section> | <name>Security Considerations</name> | |||
<t> Security issues discussed in <xref target="RFC8926"/> and <xref target | ||||
<section title="Security Considerations"> | ="RFC5880"/> apply to this document. Particularly, | |||
<t> Security issues discussed in <xref target="RFC8926"/> and <xref target="RF | ||||
C5880"/> apply to this document. Particularly, | ||||
the BFD is an application that is run at the two Geneve tunnel endpoints. The IP underlay network and/or the Geneve option | the BFD is an application that is run at the two Geneve tunnel endpoints. The IP underlay network and/or the Geneve option | |||
can provide security between the peers, which are subject to the issue of over load described below. The BFD introduces no | can provide security between the peers, which are subject to the issue of over load described below. The BFD introduces no | |||
security vulnerabilities when run in this manner. Considering Geneve does not have any inherent security mechanisms, BFD | security vulnerabilities when run in this manner. Considering Geneve does not have any inherent security mechanisms, BFD | |||
authentication as specified in <xref target="RFC5880"/> is RECOMMENDED to be u | authentication as specified in <xref target="RFC5880"/> is <bcp14>RECOMMENDED< | |||
tilized.</t> | /bcp14> to be utilized.</t> | |||
<t> This document supports establishing multiple BFD sessions between the same | ||||
pair of NVEs, each BFD session over | ||||
a pair of VAPs residing in the same pair of NVEs, there SHOULD be a mechanism | ||||
to control the maximum number of such | ||||
sessions that can be active at the same time. Particularly, assuming an exampl | ||||
e that each NVE of the pair of NVEs has N VAPs | ||||
using Ethernet as the payload, then there could be N squared BFD sessions runn | ||||
ing between the pair of NVEs. Considering N | ||||
could be a high number, the N squared BFD sessions could result in overload of | ||||
the NVE. In this case, it's recommended | ||||
that N BFD sessions covering all N VAPs are run for the pair of NVEs. Generall | ||||
y speaking, the number of BFD sessions is | ||||
supposed to be enough as long as all VAPs of the pair of NVEs are covered.</t> | ||||
</section> | <t> | |||
This document supports establishing multiple BFD sessions between the | ||||
same pair of NVEs. For each BFD session over a pair of VAPs residing | ||||
in the same pair of NVEs, there <bcp14>SHOULD</bcp14> be a mechanism to control | ||||
the | ||||
maximum number of such sessions that can be active at the same time. | ||||
Particularly, assuming an example that each NVE of the pair | ||||
of NVEs has N VAPs using Ethernet as the payload, then there could be N | ||||
squared BFD sessions running between the pair of NVEs. Considering N | ||||
could be a high number, the N squared BFD sessions could result in | ||||
overload of the NVE. In this case, it's recommended that N BFD sessions | ||||
covering all N VAPs are run for the pair of NVEs. Generally speaking, | ||||
the number of BFD sessions is supposed to be enough as long as all VAPs | ||||
of the pair of NVEs are covered.</t> | ||||
</section> | ||||
<section> | ||||
<name>IANA Considerations</name> | ||||
<t>This document has no IANA actions.</t> | ||||
</section> | ||||
<section title="IANA Considerations"> | </middle> | |||
<t> This document has no IANA action requested.</t> | <back> | |||
</section> | ||||
<section title="Acknowledgements"> | <displayreference target="I-D.ietf-nvo3-geneve-oam" to="GENEVE-OAM"/> | |||
<t> The authors would like to acknowledge Reshad Rahman, Jeffrey Haas, and Mat | ||||
thew Bocci for their guidance | ||||
on this work.</t> | ||||
<t> The authors would like to acknowledge David Black for his explanation on t | ||||
he mapping relation between VAP | ||||
and VNI.</t> | ||||
<t> The authors would like to acknowledge Stewart Bryant, Anoop Ghanwani, Jeff | ||||
rey Haas, Reshad Rahman, Matthew | ||||
Bocci, Andrew Alston, Magnus Westerlund, Paul Kyzivat, Sheng Jiang, Carl Walla | ||||
ce, Roman Danyliw, John Scudder, | ||||
Donald Eastlake, Eric Vyncke, Zaheduzzaman Sarker, and Lars Eggert for their t | ||||
horough review and very helpful | ||||
comments.</t> | ||||
</section> | ||||
</middle> | <references> | |||
<name>References</name> | ||||
<references> | ||||
<name>Normative References</name> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5 | ||||
880.xml"/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5 | ||||
881.xml"/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2 | ||||
119.xml"/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | ||||
174.xml"/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | ||||
926.xml"/> | ||||
</references> | ||||
<references> | ||||
<name>Informative References</name> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7 | ||||
365.xml"/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | ||||
014.xml"/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | ||||
971.xml"/> | ||||
<back> | <!-- [I-D.ietf-nvo3-geneve-oam] IESG state I-D Exists. Used Long Way | |||
to fix D. Black's initials. --> | ||||
<references title="Normative References"> | <reference anchor="I-D.ietf-nvo3-geneve-oam" target="https://datatracker.ietf.or | |||
<?rfc include="reference.RFC.5880"?> | g/doc/html/draft-ietf-nvo3-geneve-oam-09"> | |||
<?rfc include="reference.RFC.5881"?> | <front> | |||
<?rfc include="reference.RFC.2119"?> | <title>OAM for use in GENEVE</title> | |||
<?rfc include="reference.RFC.8174"?> | <author initials="G." surname="Mirsky" fullname="Greg Mirsky"> | |||
<?rfc include="reference.RFC.8926"?> | <organization>Ericsson</organization> | |||
</author> | ||||
<author initials="S." surname="Boutros" fullname="Sami Boutros"> | ||||
<organization>Ciena</organization> | ||||
</author> | ||||
<author initials="D." surname="Black" fullname="David L. Black"> | ||||
<organization>Dell EMC</organization> | ||||
</author> | ||||
<author initials="S." surname="Pallagatti" fullname="Santosh Pallagatti"> | ||||
<organization>VMware</organization> | ||||
</author> | ||||
<date month="December" day="6" year="2023"/> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-nvo3-geneve-oam-09"/> | ||||
</reference> | ||||
</references> | ||||
</references> | </references> | |||
<references title="Informative References"> | <section numbered="false"> | |||
<?rfc include="reference.RFC.7365"?> | <name>Acknowledgements</name> | |||
<?rfc include="reference.RFC.8014"?> | <t> The authors would like to acknowledge <contact fullname="Reshad | |||
<?rfc include="reference.RFC.8971"?> | Rahman"/>, <contact fullname="Jeffrey Haas"/>, and <contact fullname="Matt | |||
<?rfc include="reference.I-D.ietf-nvo3-geneve-oam"?> | hew | |||
</references> | Bocci"/> for their guidance on this work.</t> | |||
<t> The authors would like to acknowledge <contact fullname="David Black"/ | ||||
> | ||||
for his explanation on the mapping relation between VAPs and VNIs.</t> | ||||
<t> The authors would like to acknowledge <contact fullname="Stewart | ||||
Bryant"/>, <contact fullname="Anoop Ghanwani"/>, <contact fullname="Jeffre | ||||
y | ||||
Haas"/>, <contact fullname="Reshad Rahman"/>, <contact fullname="Matthew | ||||
Bocci"/>, <contact fullname="Andrew Alston"/>, <contact fullname="Magnus | ||||
Westerlund"/>, <contact fullname="Paul Kyzivat"/>, <contact fullname="Shen | ||||
g | ||||
Jiang"/>, <contact fullname="Carl Wallace"/>, <contact fullname="Roman | ||||
Danyliw"/>, <contact fullname="John Scudder"/>, <contact fullname="Donald | ||||
Eastlake 3rd"/>, <contact fullname="Éric Vyncke"/>, | ||||
<contact fullname="Zaheduzzaman Sarker"/>, and <contact fullname="Lars Egg | ||||
ert"/> for | ||||
their thorough review and very helpful comments.</t> | ||||
</section> | ||||
</back> | </back> | |||
</rfc> | </rfc> | |||
End of changes. 60 change blocks. | ||||
462 lines changed or deleted | 452 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |