Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),

Slides:



Advertisements
Similar presentations
History of VPLS at IETF Ali Sajassi November 12, 2002.
Advertisements

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Nortel Confidential Information 1 VPLS OAM (draft-mohan-l2vpn-vpls-oam) L2VPN WG, IETF-71 (Philadelphia) Mar 13, 2008 Dinesh Mohan (Nortel) Ali Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - Beijing VPLS PE Model with E-Tree Support Yuanlong Jiang.
BGP based Multi-homing in VPLS IETF-75
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
John Hoffmans – Geraldine Calvignac - Raymond Zhang - Nabil Bitar -
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
IETF-82 draft-bitar-datacenter-vpn-applicability-01.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-datacenter-vpn-applicability-01.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 77th IETF - Anahaim VPLS PE Model with E-Tree Support Yuanlong Jiang.
Extension to LDP-VPLS for Ethernet Broadcast and Multicast draft-delord-l2vpn-ldp-vpls-broadcast-exten-03 Presenter: Zhihua Liu, China Telecom IETF79,
VPLS Extensions for Provider Backbone Bridging - draft-balus-l2vpn-vpls-802.1ah-01.txt John Hoffmans – KPN Geraldine Calvignac - France Telecom Raymond.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-pbb-evpn-05.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-02.txt A. Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sd-l2vpn-evpn-overlay-02.txt A. Sajassi (Cisco), J. Drake (Juniper),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 184th IETF - Vancouver VPLS PE Model with E-Tree Support Yuanlong.
Draft-rabadan-bess-dci-evpn-overlay-00* Jorge Rabadan Senthil Sathappan Wim Henderickx Florin Balus Senad Palislamovic Ali Sajassi Dennis Cai Ravi Shekhar.
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu IETF82, TAIWAN.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-segment- route-00.txt Ali Sajassi, Samer.
VPLS Extensions for Provider Backbone Bridging - draft-balus-l2vpn-vpls-802.1ah-02.txt John Hoffmans – Geraldine Calvignac -
IETF 84, July 2012 Vancouver, Canada
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
Inter-Area P2MP Segmented LSPs draft-raggarwa-seamless-mcast-03.txt
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Ali Sajassi Florin Balus November 20, 2008 PBB-VPLS Consolidation Work.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for E-VPN and PBB-
1 draft-rabadan-bess-evpn-ac-df-01 Jorge Rabadan Kiran Nagaraj Senthil Sathappan Vinod Prabhu Wim Henderickx AC-influenced DF Election for (PBB-)EVPN IETF.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-virtual-eth- segment-00.txt A. Sajassi (Cisco),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Segment-based EVPN (S-EVPN) draft-li-l2vpn-segment-evpn-01 Zhenbin Li (Presenter) Lucy Yong Junlin Zhang March, 2014 London United Kingdom.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Draft-sajassi-l2vpn-pbb-vpls-mpls- access-00.txt July 28, 2008 PBB-VPLS.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-03.txt A. Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-05.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
Segment EVPN draft-li-l2vpn-segment-evpn Zhenbin Li Lucy Yong (Presenter) Junlin Zhang July, 2013 Berlin Germany.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-04.txt A. Sajassi.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-01.txt draft-raggarwa-l2vpn-vpls-mcast-ctrl-00.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update R. Aggarwal (Juniper), A. Sajassi (Cisco), W. Hendericx.
EVPN: Or how I learned to stop worrying and love the BGP
Draft-boutros-l2vpn-evpn-vpws-04.txt Sami Boutros Ali Sajassi Samer Salam Patrice Brissette John Drake Jeff Tantsura Dirk Steinberg Thomas Beckhaus IETF.
1 EVPN – Preference DF Election IETF95 – April 2016 draft-rabadan-bess-evpn-pref-df-00 Jorge Rabadan Senthil Sathappan Tony Przygienda Wen Lin Tapraj Singh.
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
Virtual Subnet : A L3VPN-based Subnet Extension Solution
E-VPN Update R. Aggarwal (Juniper), A. Sajassi (Cisco), W. Hendericx (Alcatel-Lucent), A. Isaac (Bloomberg), J. Uttaro (AT&T), N. Bitar (Verizon),
L2VPN/EVPN/L3VPN Yang IETF-96 Berlin.
Multi-domain MPLS Deployment Enhancement
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Virtual Hub-and-Spoke in BGP EVPNs
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
EVPN a very short introduction
draft-malhotra-bess-evpn-irb-extended-mobility-03
draft-ietf-bess-evpn-vpls-seamless- integ-01.txt
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco), S. Salam (Cisco), Nick DelRegno (Verizon), J. Rabadan (ALU) IETF 91, November 2014 Hawaii

2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net History  draft-sajassi-l2vpn-evpn-vpls-integration-00 was presented at IETF 88 (Nov/2013) in Vancouver  Added a few clarifications  For this IETF, it is republished as draft-sajassi-bess- evpn-vpls-seamless-integ-00

3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Scenario MPLS/IP Core xVPLS PE2 xEVPN PE3 CE1 CE2 CE xEVPN PE4 xEVPN PE1 xEVPN PE2 xVPLS PE3 xVPLS PE4 xVPLS PE5 xVPLS PE1 Seamless insertion of xEVPN into brown-field xVPLS deployment

4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Requirements 1.The solution MUST allow for staged migration towards (PBB-)EVPN on a site-by-site basis per VPN instance - e.g., new EVPN sites to be provisioned on (PBB-)EVPN PEs. 2.The solution MUST require no changes to existing VPLS or PBB-VPLS PEs, not even a software upgrade. 3.The solution MUST allow for the coexistence of PE nodes running (PBB- )EVPN and (PBB-)VPLS for the same VPN instance and single-homed segments. 4.The solution MUST support single-active redundancy of multi-homed networks and multi-homed devices for (PBB-)EVPN PEs. 5.In case of single-active redundancy, the participant VPN instances MAY span across both (PBB-)EVPN PEs and (PBB-)VPLS PEs as long as single-active redundancy is employed by (PBB-)EVPN PEs.

5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Requirements – Cont. 6.The solution SHOULD support all-active redundancy of multi-homed networks and multi-homed devices for (PBB-)EVPN PEs. 7.In case of all-active redundancy, the participant VPN instances SHOULD be confined to (PBB-)EVPN PEs only. 8.In case of all-active redundancy, the participant VPN instances MAY span across (PBB-)EVPN and (PBB-)VPLS PEs.

6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Capability Discovery  (PBB)-EVPN PEs are assumed to be bilingual in such seamless interop scenario and speak both EVPN & VPLS languages  (PBB)-VPLS PEs only advertise BGP VPLS AD route  (PBB)-EVPN PEs advertise both BGP EVPN AD (IM) route and BGP VPLS AD route  When a VPLS PE receives BGP EVPN routes, it ignore them (if one RT is used) – Operator may use two RTs and use RT constrain mechanism to prevent PBB-VPLS PEs from receiving routes from PBB-EVPN PEs  When a EVPN PE receives both EVPN and VPLS routes from the same peer for the same VPN, it gives precedence to EVPN AD route MPLS/IP Core xVPLS PE2 xEVPN PE3 CE1 CE2 CE xEVPN PE4 xEVPN PE1 xEVPN PE2 xVPLS PE3 xVPLS PE4 xVPLS PE5 xVPLS PE1

7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net PW and LSP Setup xVPLS PE6 xVPLS PE5 xVPLS PE7 xEVPN PE1 xEVPN PE2 xEVPN PE3 xEVPN PE4 CE1 CE2 CE  Consider PW & LSP setup on PE1  PE1 establishes PW with any remote PE that has only advertise VPLS AD route  PE1 establishes MP2P VPN FEC to any remote PE that has advertised EVPN AD route  PE1 learns BMACs in data plane via established PWs (from VPLS PEs) – this is analogous to dynamic learning in IEEE bridges

8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Unicast Operation  PE1 learns MACs in control plane via BGP MAC advertisements from xEVPN PEs  PE1 learns MACs in data plane over PWs from xVPLS PEs  PE1 updates its MAC table accordingly – A MAC can only be learned either in data plane or control plane but never both xVPLS PE6 xVPLS PE5 xVPLS PE7 xEVPN PE1 xEVPN PE2 xEVPN PE3 xEVPN PE4 CE1 CE2 CE

9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Multicast Operation  Consider Multicast operation on PE1  First, PE1 needs to form a new multicast pruned list per VPN instance which is union of the pruned PW set (or MP LSP) + pruned MP2P tunnels (or MP LSP) (using EVPN IM route) – Pruned PW set is obtained from MMRP application for PBB-VPLS – Pruned MP2P set is obtained from EVPN IM route per I-SID  Second, PE1 needs to enable its split- horizon filtering over the core using the above new list – across both PWs and MP2P tunnels (or both MP LSPs) xVPLS PE6 xVPLS PE5 xVPLS PE7 xEVPN PE1 xEVPN PE2 xEVPN PE3 xEVPN PE4 CE1 CE2 CE

10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Next Step  WG adoption ?