Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-virtual-eth- segment-00.txt A. Sajassi (Cisco),

Slides:



Advertisements
Similar presentations
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Advertisements

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - Beijing VPLS PE Model with E-Tree Support Yuanlong Jiang.
BGP based Multi-homing in VPLS IETF-75
BGP based Multi-homing in Virtual Private LAN Service
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Ethernet VPN (EVPN) - Casos de Uso e Aplicação
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Multi-homed network in EVPN draft-hao-evpn-mhn-00 July 20131MHN in EVPN Weiguo Hao(Huawei) Yizhou Li(Huawei) Pei Xu(Huawei)
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
Implementing Layer 3 High Availability
COS 461: Computer Networks
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
1 Multipoint Ethernet Connection Protection
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
Extension to LDP-VPLS for Ethernet Broadcast and Multicast draft-delord-l2vpn-ldp-vpls-broadcast-exten-03 Presenter: Zhihua Liu, China Telecom IETF79,
Draft-boutros-bess-evpn-vpws-service-edge-gateway-00 Sami Boutros Ali Sajassi Patrice Brissette [Cisco Systems] Daniel Voyer [Bell Canada] IETF 92,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-pbb-evpn-05.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-02.txt A. Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sd-l2vpn-evpn-overlay-02.txt A. Sajassi (Cisco), J. Drake (Juniper),
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-segment- route-00.txt Ali Sajassi, Samer.
IETF 84, July 2012 Vancouver, Canada
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
OSPFv3 as a PE-CE Routing Protocol
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
73rd IETF Minneapolis Nov Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-02.txt.
1 draft-rabadan-bess-evpn-ac-df-01 Jorge Rabadan Kiran Nagaraj Senthil Sathappan Vinod Prabhu Wim Henderickx AC-influenced DF Election for (PBB-)EVPN IETF.
E-VPN on UW System Network Michael Hare. Purpose of presentation A high level introduction to E-VPN A simple lab demonstration For our documentation,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
Applicability of Existing Solutions to the Problem Space draft-takeda-l1vpn-applicability-03.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-03.txt A. Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-05.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
Segment EVPN draft-li-l2vpn-segment-evpn Zhenbin Li Lucy Yong (Presenter) Junlin Zhang July, 2013 Berlin Germany.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Active-active access in NVO3 network draft-hao-l2vpn-evpn-nvo3-active-active-00 July 20131Active-active access in NVO3 network Weiguo Hao(Huawei) Yizhou.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
EVPN: Or how I learned to stop worrying and love the BGP
Draft-boutros-l2vpn-evpn-vpws-04.txt Sami Boutros Ali Sajassi Samer Salam Patrice Brissette John Drake Jeff Tantsura Dirk Steinberg Thomas Beckhaus IETF.
1 EVPN – Preference DF Election IETF95 – April 2016 draft-rabadan-bess-evpn-pref-df-00 Jorge Rabadan Senthil Sathappan Tony Przygienda Wen Lin Tapraj Singh.
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
Virtual Hub & Spoke with BGP EVPNs
Virtual Subnet : A L3VPN-based Subnet Extension Solution
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
Framework for EVPN Designated Forwarder Election Extensibility
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
MVPN/EVPN Tunnel Aggregation with Common Labels Zhaohui Zhang (Juniper) Eric Rosen (Juniper) Wen Lin (Juniper) Zhenbin Li (Huawei) BESS WG 20-March-2018.
Preference-based EVPN DF Election draft-rabadan-bess-evpn-pref-df-02
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
EVPN a very short introduction
draft-sajassi-bess-evpn-fast-df- recovery-02.txt
draft-malhotra-bess-evpn-unequal-lb-00
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
draft-sajassi-bess-evpn-fast-df- recovery-00.txt
EVPN multi-homing port-active load-balancing IETF-101 [London]
Virtual Hub-and-Spoke in BGP EVPNs
EVPN multi-homing port-active load-balancing IETF-103 [Bangkok]
Bidirectional Forwarding Detection (BFD) for EVPN Ethernet Segment Failover Use Case draft-zwm-bess-es-failover-00 BESS WG IETF104# Prague Sandy Zhang.
Neeraj Malhotra (Arrcus) Ali Sajassi (Cisco) Jorge Rabadan (Nokia)
draft-malhotra-bess-evpn-irb-extended-mobility-03
EVPN and L2 Access Protocols: Single-Flow-Active load-balancing mode
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-virtual-eth- segment-00.txt A. Sajassi (Cisco), P. Brissette (Cisco), R. Schell (Verizon), J. Drake (Juniper), T. Singh (Juniper) IETF 91, November 2014 Hawaii

2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net MPLS/IP Network MPLS/IP Network PE3 CE3 PE4 PE1 Cust A CE1 3 rd Party Carrier Ethernet Network Cust A CE2 Cust B CE5 Cust B CE6 Cust A CE4  A single ENNI to handle all of the following AC types -Single-homed AC -Multi-homed w/ Single-Active AC -Multi-homed w/ All-Active AC (optional)  A single ENNI can carry many ACs of the same type – e.g., several thousands single- homed ACs, + several hundreds of multi-homed ACs  Switching must be supported among active ACs belonging to the same service instance on the same ENNI

3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net VZ PIP VZ PIP PE4 CE3 PE5 PE1 CE2 PE2 CE3 PE3 CE4 ENNI-1 ENNI-2 ENNI-3 ENNI-4 CE1

4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Characteristics  Different ACs are represented by different VLANs.  So that they can take different paths within.1Q network for redundancy  Relationship between ACs and physical ports (ENNIs) is arbitrary  Cannot assume all VLANs are available on a set of ENNI ports (as is the case with current ES definition)

5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net General Requirements – Cont.  An AC can carry one or more VLANs  An AC carries typically a single VLAN (VLAN-based or VLAN bundle)  In general case, an AC can carry several VLANs (VLAN-aware bundle)  A redundancy group consists of two or more ACs on different PEs (w/ one AC per PE) – e.g., an ESI corresponds to this AC set  Different redundancy groups can be spread across different ENNIs – e.g., ENNI ports may not be common for all redundancy groups

6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net General Requirements – Cont.  For PBB-EVPN, I-SID mapping is still done as before  A single VLAN can map to an I-SID  Several VLANs can map to an I-SID  For PBB-EVPN, DF election is still based on as before  For I-SID-a, ESI-x is active on PE1 but ESI-x is blocked on PE2

7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Provisioning Requirements  For A-A & S-A MH scenarios, ES in here corresponds to a set of ACs (as opposed to physical ports) – e.g., two or more ACs is associated with an ESI.  For S-A MH, there is no additional requirements for BMAC allocations beyond what is in the PBB-EVPN draft  For A-A MHD/MHN, there will be one B-MAC per ESI as before (optional)  Minimize introduction of new parameters (and thus the overhead of their provisioning) for Virtual ES as much as possible

8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Fast Convergence Requirement  There should be a mechanism equivalent to mass- withdraw such that upon an ENNI failure, only a single message is need to the remote PEs in the redundancy group to activate fail-over procedures as opposed to tens of thousands of BGP messages

9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net OAM Requirements  Need to do monitoring on per AC basis and the ability to switch from AC-a on PE1 to AC-b on PE2 upon AC-a failure

10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Failure/Recovery Requirements  Failure & failure recovery of a SH AC MUST NOT impact any other ACs (within its own EVI) or other EVIs – no flushing what so ever  Failure & failure recovery of A/A MH AC MUST NOT impact any other ACs (within its own EVI) or other EVIs – no flushing what so ever  Failure & failure recovery of S/A MH AC MUST only impact the service instance associated with that AC – e.g., flushing SHALL be limited to that single service instance (I-SID)  Failure & failure recovery of S/A MH AC MAY only impact C- MACs associated with MHD/MHNs for that service instance – e.g., flushing SHALL be limited to single service instance (I-SID) and only CMACs for S-A MHD/MHNs. In other words, CMAC for SHD/SHN SHALL NOT be impacted.

11 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Solution for PBB-EVPN  Existing PBB-EVPN solution (per IETF draft) is leveraged with the following simple modifications:  Associate ACs with ESI (instead of physical ports)  BMAC assignment remains the same as before (to meet the MUST requirements)  One shared BMAC for both SHD/SHN and S-A MHD/MHN  One individual BMAC per A-A customer MHD/MHN  For S-A/A-A scenarios, DF election is done as before per (ESI, I- SID) => Existing PBB-EVPN solution can be leveraged entirely as long as ES is model as {set of ACs/EFPs) instead of (set of physical ports)

12 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net MPLS/IP Network MPLS/IP Network PE3 CE3 PE4 PE1 CE11 PE2 3 rd Party Carrier Ethernet Network Cust D CE15 CE12 Cust C Cust A CE1 A C D E B

13 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Failure Handling  A & B: CFM running on PE detects AC failure and advertises the shared B-MAC with the MAC mobility Ext. Comm. and a list of affected I-SIDs (typically one!)  In this approach flushing is limited to the CMACs associated with the shared BMAC for the affected I-SID(s)  If it is needed to confine the flooding further, then we can use two shared BMACs – one for SH and another for S-A MH. In this case, the flooding will be limited to C-MACs associated with S-A MHDs/MHNs for the affected I-SID  C: If ENNI port fails, then the corresponding PE advertises the shared BMAC with MAC mobility Ext. Comm. but without any I-SID list Or send multiple messages to cover all the I-SIDs  D: This results in shared BMAC to be withdrawn and effectively giving the result for “C”  E: Same as “D”

14 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Solution with Fast Convergence  Upon ENNI failure, we need to do two things: a)DF election for all impacted ESIs b)Flushing of BDs for the impacted I-SIDs  Fast convergence of (b) is automatically achieved when shared BMAC is advertised with MAC mobility Extend Community (either without any I-SID list or with a list of I-SIDs)  How do we do fast convergence for (a) ???  One possible way is to color all vES’s for the same ENNI with the same color. Then when the ENNI fails, the corresponding PE withdraws that color

15 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Fast Convergence for (a) – Cont.  Procedure 1.When a vES is configured, the PE color the vES with this MAC and advertises the ES routes of that ENNI with this color (this MAC is ONLY used in Control Plane) 2.All other PEs (in the group) take note of this color 3.Upon an ENNI failure, the PE sends the flush message as before but with this new Ext. Comm. 4.Other PEs will use this info to a.Flush their impacted CMACs b.initiate DF election across all affected vES’s 5.PEs also upon receiving ES withdrawals, will clean up their tables

16 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net MPLS/IP Network MPLS/IP Network PE4 CE3 PE5 PE1 CE1 PE2 CE2 PE3 CE3 ENNI-1 ENNI-2 ENNI-3 ENNI-4

17 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net New EVPN BGP Extended Community 0x060x03ENNI MAC ENNI MAC – Cont.

18 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net New EVPN BGP Extended Community 0x060x04Base I-SID 24-bit map Cont. 24-bit map represents the next 24 I-SID after the base For example based I-SID of with 24-bit map of zero means, only a single I-SID of I-SID of with bit map of 0x means there are two I-SIDs, and 10026