Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

History of VPLS at IETF Ali Sajassi November 12, 2002.
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
BGP based Multi-homing in VPLS IETF-75
MPLS VPN.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
Ethernet VPN (EVPN) - Casos de Uso e Aplicação
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Multi-homed network in EVPN draft-hao-evpn-mhn-00 July 20131MHN in EVPN Weiguo Hao(Huawei) Yizhou Li(Huawei) Pei Xu(Huawei)
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-02 Yimin Shen (Juniper Networks) Rahul Aggarwal (Arktan Inc) Wim Henderickx.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
Ietf-64 draft-kulmala-l3vpn-interas-option-d-01.txt Additional Inter AS option for BGP/MPLS IP VPN IETF-64 draft-kulmala-l3vpn-interas-option-d-01.txt.
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
V1.1 VPLS Principle. Objectives Understand the basics of mpls layer 2 VPN Understand VPLS principle.
Draft-boutros-bess-evpn-vpws-service-edge-gateway-00 Sami Boutros Ali Sajassi Patrice Brissette [Cisco Systems] Daniel Voyer [Bell Canada] IETF 92,
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP AS AN MVPN PE-CE Protocol draft-keyupate-l3vpn-mvpn-pe-ce-00 Keyur Patel,
72nd IETF Dublin July 2008 Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-01.txt Yuji.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-segment- route-00.txt Ali Sajassi, Samer.
CS 540 Computer Networks II Sandy Wang
IETF 84, July 2012 Vancouver, Canada
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
1 IETF 901draft-keyupate-l2vpn-fat-pw-bgp-01 Extensions to BGP Signaled Pseudowires to support Flow-Aware Transport Labels draft-keyupate-l2vpn-fat-pw-bgp-01.
Draft-jounay-pwe3-p2mp-pw-requirements-01.txt IETF 70 PWE3 Working Group Vancouver, December 2007 F. Jounay, P. Niger, France Telecom Y. Kamite, NTT Communications.
1 draft-rabadan-bess-evpn-ac-df-01 Jorge Rabadan Kiran Nagaraj Senthil Sathappan Vinod Prabhu Wim Henderickx AC-influenced DF Election for (PBB-)EVPN IETF.
E-VPN on UW System Network Michael Hare. Purpose of presentation A high level introduction to E-VPN A simple lab demonstration For our documentation,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-virtual-eth- segment-00.txt A. Sajassi (Cisco),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
IDR WG 6PE-Alt draft-manral-idr-mpls-explicit-null-00.txt Vishwas Manral, IPInfusion Manoj Dutta, IPInfusion IETF 71, Philadelphia, PA, USA.
Segment EVPN draft-li-l2vpn-segment-evpn Zhenbin Li Lucy Yong (Presenter) Junlin Zhang July, 2013 Berlin Germany.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
BGP-based Auto-Discovery for L2VPNs draft-hlmu-l2vpn-bgp-discovery-00.txt Sue Hares - Vasile Radoaca -
Active-active access in NVO3 network draft-hao-l2vpn-evpn-nvo3-active-active-00 July 20131Active-active access in NVO3 network Weiguo Hao(Huawei) Yizhou.
Multicast State Advertisement in EVPN draft-li-l2vpn-evpn-multicast-state-ad Zhenbin Li Junlin Zhang Huawei Technologies July, 2013 Berlin Germany.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
EVPN: Or how I learned to stop worrying and love the BGP
Draft-boutros-l2vpn-evpn-vpws-04.txt Sami Boutros Ali Sajassi Samer Salam Patrice Brissette John Drake Jeff Tantsura Dirk Steinberg Thomas Beckhaus IETF.
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
MPLS Virtual Private Networks (VPNs)
MPLS VPN Implementation
Draft-boutros-bess-evpn-auto-provisioning-01 Sami Boutros Rex Fernando Ali Sajassi Kitty Pang Tapraj Singh IETF 95, April 2015 Buenos Aires.
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Framework for EVPN Designated Forwarder Election Extensibility
EVPN Interworking with IPVPN
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
EVPN a very short introduction
EVPN multi-homing port-active load-balancing IETF-101 [London]
EVPN multi-homing port-active load-balancing IETF-103 [Bangkok]
BGP VPN service for SRv6 Plus IETF 105, Montreal
Bidirectional Forwarding Detection (BFD) for EVPN Ethernet Segment Failover Use Case draft-zwm-bess-es-failover-00 BESS WG IETF104# Prague Sandy Zhang.
Parag Jain, Samer Salam, Ali Sajassi (Cisco),
EVPN and L2 Access Protocols: Single-Flow-Active load-balancing mode
EVPN control plane for Geneve draft-boutros-bess-evpn-geneve-03
Presentation transcript:

draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada

E-VPN For VPWS E-VPN enables the following characteristics for VPWS: – Active/standby redundancy. – Active/active multi-homing with flow-based load-balancing. – Eliminates the need for single-segment and multi-segment PW signaling – Provides faster convergence using data-plane prefix independent convergence upon node or link failure in comparison to control-plane convergence with PW redundancy.

How it works? [E-VPN] has the ability to forward customer traffic to/from a given customer Attachment Circuit (aka Ethernet AD route) without any MAC lookup. This capability is ideal in providing P2P services (aka VPWS services). [MEF] defines EVPL service as P2P service between a pair of ACs (designated by VLANs). EVPL can be considered as a VPWS with only two ACs. In delivering an EVPL service, traffic forwarding capability of E-VPN between a pair of Ethernet AD routes is used; whereas, for more general VPWS, traffic forwarding capability of E- VPN among a group of Ethernet AD routes (one Ether AD route per AC/site) is used. MPLS label associated with the destination Ether AD route can be used in forwarding user traffic to the destination AC.

BGP Extensions No new BGP messages. Repurposes Ethernet AD route to signal P2P services. – Ethernet Segment Identifier field is set to the ESI of the attachment circuit of the VPWS service instance. – Ethernet Tag field is set to 0 in the case of an Ethernet Private Wire service, and to the VLAN identifier associated with the service for Ethernet Virtual Private Wire service. – Route- Target (RT) extended community attribute identifies the service instance (together with the Ethernet Tag field when non-zero)

Operation.. Ethernet Ethernet Native | | Native Service | | Service (AC) | | | | | | (AC) | V V V V V V | | | | | PE1 |======|ASBR1|==|ASBR2|===| PE3 | | | | | | | CE1| | | |CE2 | | | | | | | PE2 |======|ASBR3|==|ASBR4|===| PE4 | | ^ ^ | Provider Edge 1 ^ Provider Edge 2 | | | | | E-VPN Inter-provider point | | | iBGP sessions between PE1, PE2, ASBR1, ASBR3, and PE3, PE4, ASBR2, ASBR4. eBGP sessions between ASBR1, ASBR2, ASBR3, and ASBR4. Exchange E-VPN Ethernet A-D routes - one route per AC. ASBRs re-advertise routes with Next Hop self. CE link between is an C-TAG or S-TAG interface as described in [802.1Q]. A VPWS with multiple sites or multiple EVPL services on the same CE port can be included in one EVI between 2 or more PEs. An Ethernet Tag corresponding to each P2P connection and known to both PEs is used to identify the services multiplexed in the same EVI. In CE multi-homing, Ethernet AD Route encodes the ESI associated with the CE. This allows flow-based load- balancing of traffic between PEs. Ethernet Segment route may be used too, for discovery of multi-homed CEs.

P2P PW and EVPN Comparison P2P PW redundancy is limited to Active/Standby mode, while with E-VPN both Active/Active and Active/Standby. P2P PW, backup PWs are not used to carry traffic, while E-VPN traffic can be load-balanced among primary and secondary PEs. On link or node failure, E- VPN can trigger failover with the withdrawal of a single BGP route per service, whereas with VPWS PW redundancy, the failover sequence requires exchange of two control plane messages: one message to deactivate the group of primary PWs and a second message to activate the group of backup PWs associated with the access link. E- VPN may employ data plane local repair and PIC mechanisms not available with P2P PW.

Next steps Comments are appreciated. Thank you 7