Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-03.txt A. Sajassi.

Slides:



Advertisements
Similar presentations
History of VPLS at IETF Ali Sajassi November 12, 2002.
Advertisements

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - Beijing VPLS PE Model with E-Tree Support Yuanlong Jiang.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 LSP-Ping and BFD for MPLS-TP draft-nitinb-mpls-tp-lsp-ping-bfd- procedures-00.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Directory Assisted TRILL Encapsulation by non-TRILL nodes (Directory Reliant Smart End Node) Linda Dunbar Donald Eastlake Radia Perlman Igor Gashinsky.
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-03 Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc) Wim Henderickx (Alcatel-Lucent)
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 77th IETF - Anahaim VPLS PE Model with E-Tree Support Yuanlong Jiang.
Virtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-virtual-subnet-10 Xiaohu Xu (Huawei) Susan Hares (Huawei) Yongbing Fan.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-pbb-evpn-05.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-02.txt A. Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sd-l2vpn-evpn-overlay-02.txt A. Sajassi (Cisco), J. Drake (Juniper),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 184th IETF - Vancouver VPLS PE Model with E-Tree Support Yuanlong.
ARP Scenarios CIS 81 and CST 311 Rick Graziani Fall 2005.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How IP Address Protocols Work INTRO v2.0—4-1.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
Draft-rabadan-bess-dci-evpn-overlay-00* Jorge Rabadan Senthil Sathappan Wim Henderickx Florin Balus Senad Palislamovic Ali Sajassi Dennis Cai Ravi Shekhar.
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-segment- route-00.txt Ali Sajassi, Samer.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Exploring the Packet Delivery Process.
Chapter 19 Binding Protocol Addresses (ARP) A frame transmitted across a physical network must contain the hardware address of the destination. Before.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for E-VPN and PBB-
NVO3 Framework and Data Plane Requirement Addition Lucy Yong Linda Dunbar March 2013 Orlando FL draft-yong-nvo3-frwk-dpreq-addition-00.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-virtual-eth- segment-00.txt A. Sajassi (Cisco),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Entropy Labels in MPLS Forwarding draft-kompella-mpls-entropy-label-02
Inter-AS Options for NVO3 and BGP/MPLS VPN Weiguo Hao, Lucy Yong, Sue Hares, Robert Raszuk Luyuan Fang, Osama Zia, Shahram Davari, Andrew Qu March 2015.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-05.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
Optimized Ingress Replication solution for EVPN
Segment EVPN draft-li-l2vpn-segment-evpn Zhenbin Li Lucy Yong (Presenter) Junlin Zhang July, 2013 Berlin Germany.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets Claes Larsen, CCAI.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-04.txt A. Sajassi.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
Multicast Issues in Networks Using NVO3 Anoop Ghanwani, Dell Linda Dunbar, Huawei Vinay Bannai, Paypal Ram Krishnan, Brocade draft-ghanwani-nvo3-mcast-issues-011.
Control Word Reserved bit for use in E-Tree draft-delord-pwe3-cw-bit-etree-00.txt Simon Delord, Raymond Key – Telstra Frederic Jounay - France Telecom.
Active-active access in NVO3 network draft-hao-l2vpn-evpn-nvo3-active-active-00 July 20131Active-active access in NVO3 network Weiguo Hao(Huawei) Yizhou.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Multicast State Advertisement in EVPN draft-li-l2vpn-evpn-multicast-state-ad Zhenbin Li Junlin Zhang Huawei Technologies July, 2013 Berlin Germany.
Generic Overlay OAM and Datapath Failure Detection Kanwar Singh (Nuage Networks) Pradeep Jain, Florin Balus Nuage Networks Wim Henderickx Alcatel-Lucent,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update R. Aggarwal (Juniper), A. Sajassi (Cisco), W. Hendericx.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
Draft-rabadan-l2vpn-evpn-prefix-advertisement-01 Jorge Rabadan Wim Hendericks Florin Balus Senad Palislamovic Aldrin Isaac IP Prefix Advertisement in EVPN.
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
BIER Use Case in VXLAN draft-wang-bier-vxlan-use-case-00 Linda Wang (Presenting) Sandy. Zhang & F. Hu.
1 draft-rabadan-l2vpn-evpn-prefix-advertisement-03 Jorge Rabadan Wim Henderickx Florin Balus Senad Palislamovic Aldrin Isaac Ali Sajassi John Drake IP.
Virtual Hub & Spoke with BGP EVPNs
MAC Address Tables on Connected Switches
draft-xu-isis-nvo-cp-00 Xiaohu Xu (Huawei) Saumya Dikshit (Cisco)
Virtual Hub-and-Spoke in BGP EVPNs
EVPN Interworking with IPVPN
draft-ietf-bess-evpn-igmp-mld-proxy- 01.txt
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
draft-sajassi-bess-evpn-fast-df- recovery-02.txt
EVPN Inter-subnet Multicast Forwarding
draft-sajassi-bess-evpn-fast-df- recovery-00.txt
Virtual Hub-and-Spoke in BGP EVPNs
Applicability of EVPN to NVO3 Networks
Parag Jain, Samer Salam, Ali Sajassi (Cisco),
draft-malhotra-bess-evpn-irb-extended-mobility-03
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-03.txt A. Sajassi (Cisco), S. Salam (Cisco), Y. Rekhter (Juniper), John Drake (Juniper), Wim Henderickx (ALU), Florin Balus (Nuage), Lucy Yong (Huawei), Linda Dunbar (Huawei) IETF 89, March 2014 London

2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Changes from rev02  Rev02 covered only asymmetric IRB Scenarios where it was assumed when IRB functionality is present in PE devices, the ingress PE performs both L2 and L3 lookup; whereas, egress PE only performs L2 lookup  This rev of the draft expands the scenarios to include symmetric IRB where both ingress and egress PE devices perform L2 & L3 lookup

3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Asymmetric IRB

4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Symmetric IRB Advantage of Symmetric IRB: No need to maintain the MAC addresses of all the remote hosts attached to other PEs in the local ARP table More efficient encapsulation where Ethernet header is not needed when forwarding packets between PEs IP1, M1 IP2, M2

5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Operation  NVE1 advertises IP1 route and M1 MAC address of VM1 along with their labels and their associated RTs to other NVEs  NVE2 upon receiving this advertisement from NVE1, imports IP1 into its IP-VRF and M1 into its MAC-VRF  When NVE2 wants to send an intra-subnet packet to VM1, it encapsulates it the Ethernet frame with MAC DA of M1 with label1  When NVE2 wants to send an inter-subnet packet to VM1, it encapsulates the IP packet with IP DA of IP1 with label2

6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Next Steps  The authors would like to request for WG call very soon