© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for E-VPN and PBB-

Slides:



Advertisements
Similar presentations
OLD DOG CONSULTING Challenges and Solutions for OAM in Point-to-Multipoint MPLS Adrian Farrel, Old Dog Consulting Ltd. Zafar Ali, Cisco Systems, Inc.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
IS-IS Extensions to support OTV Hasmit Grover Ayan Banerjee Dhananjaya Rao.
LSP-Ping extensions for MPLS-TP draft-nitinb-mpls-tp-lsp-ping- extensions-00 Nitin Bahadur Sami Boutros Rahul Aggarwal Eric Gray.
1 LSP-Trace over MPLS tunnels draft-nitinb-lsp-ping-over-mpls-tunnel-00 Nitin BahadurJuniper Networks Kireeti KompellaJuniper Networks IETF 69, MPLS WG,
Proactive fault detection in E-VPN (draft-vgovindan-l2vpn-evpn-bfd-00) Vengada Prasad Govindan, Samer Salam, Ali Sajassi IETF 88, November 2013 Vancouver.
61st IETF Washington DC November 2004 Detecting P2MP Data Plane Failures draft-yasukawa-mpls-p2mp-lsp-ping-00.txt Seisho Yasukawa -
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for P2MP PWs (draft-jain-pwe3-p2mp-pw-lsp-ping-00.txt)
Draft-boutros-bess-evpn-vpws-service-edge-gateway-00 Sami Boutros Ali Sajassi Patrice Brissette [Cisco Systems] Daniel Voyer [Bell Canada] IETF 92,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 LSP-Trace over MPLS tunnels draft-nitinb-lsp-ping-over-mpls-tunnel-01 Nitin BahadurJuniper Networks Kireeti KompellaJuniper Networks George SwallowCisco.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-segment- route-00.txt Ali Sajassi, Samer.
CS 540 Computer Networks II Sandy Wang
IETF 84, July 2012 Vancouver, Canada
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Draft-akiya-mpls-entropy-lsp-ping Nobo Akiya George Swallow Carlos Pignataro Nagendra Kumar IETF 88, Vancouver, Canada.
Softwire Mesh Framework: Multicast Mingwei Xu Yong Cui CERNET, China Chris Metz, Cisco 68 th IETF Meeting, Prague March 2007.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v3.0—8-1 Implementing IPv6 Implementing Dynamic IPv6 Addresses.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
Inter-Area P2MP Segmented LSPs draft-raggarwa-seamless-mcast-03.txt
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
MPLS WG1 Targeted mLDP Base mLDP spec didn’t consider use of LDP multipoint extensions over Targeted mLDP sessions LDP speaker must choose “upstream LSR”,
1 draft-rabadan-bess-evpn-ac-df-01 Jorge Rabadan Kiran Nagaraj Senthil Sathappan Vinod Prabhu Wim Henderickx AC-influenced DF Election for (PBB-)EVPN IETF.
E-VPN on UW System Network Michael Hare. Purpose of presentation A high level introduction to E-VPN A simple lab demonstration For our documentation,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Segment-based EVPN (S-EVPN) draft-li-l2vpn-segment-evpn-01 Zhenbin Li (Presenter) Lucy Yong Junlin Zhang March, 2014 London United Kingdom.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Draft-sajassi-l2vpn-pbb-vpls-mpls- access-00.txt July 28, 2008 PBB-VPLS.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-05.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Upstream mapping in Echo Request draft-ankur-mpls-upstream-mapping-00 Ankur.
Segment EVPN draft-li-l2vpn-segment-evpn Zhenbin Li Lucy Yong (Presenter) Junlin Zhang July, 2013 Berlin Germany.
LSP-Ping extensions for MPLS-TP draft-nitinb-mpls-tp-lsp-ping-extensions-01 Nitin Bahadur Sami Boutros Rahul Aggarwal Eric Gray 1IETF 77 MPLS WG IETF 77,
NVO3 Overlay P2MP Ping draft-xia-nvo3-overlay-p2mp-ping-00 Liang Xia, Weiguo Hao, Greg Mirsky July 2014 Toronto.
Pseudo Wire (PW) Virtual Circuit Connection Verification (VCCV) Update Thomas D. Nadeau Cisco Systems, Inc Rahul Aggarwal (Presenter) Juniper Networks.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
MPLS WG Meeting IETF 58 Paris Detecting MPLS Data Plane Failures in Inter-AS and inter-provider Scenarios draft-nadeau-mpls-interas-lspping-00.txt Tom.
76rd IETF - Hiroshima, Japan I. M. draft-wijnands-mpls-mldp-csc-02.
Active-active access in NVO3 network draft-hao-l2vpn-evpn-nvo3-active-active-00 July 20131Active-active access in NVO3 network Weiguo Hao(Huawei) Yizhou.
Multicast State Advertisement in EVPN draft-li-l2vpn-evpn-multicast-state-ad Zhenbin Li Junlin Zhang Huawei Technologies July, 2013 Berlin Germany.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
EVPN: Or how I learned to stop worrying and love the BGP
Draft-boutros-l2vpn-evpn-vpws-04.txt Sami Boutros Ali Sajassi Samer Salam Patrice Brissette John Drake Jeff Tantsura Dirk Steinberg Thomas Beckhaus IETF.
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
IETF 67, Nov 2006Slide 1 VCCV Extensions for Multi- Segment Pseudo-Wire draft-hart-pwe3-segmented-pw-vccv-01.txt draft-ietf-pwe3-segmented-pw-04.txt Mustapha.
Virtual Hub & Spoke with BGP EVPNs
L2VPN/EVPN/L3VPN Yang IETF-96 Berlin.
N. Kumar, C. Pignataro, F. Iqbal, Z. Ali (Presenter) - Cisco Systems
Greg Mirsky Jeff Tantsura Mach Chen Ilya Varlashkin
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
MVPN/EVPN Tunnel Aggregation with Common Labels Zhaohui Zhang (Juniper) Eric Rosen (Juniper) Wen Lin (Juniper) Zhenbin Li (Huawei) BESS WG 20-March-2018.
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
IETF 100, November 2017 Singapore
Draft-jain-bess-evpn-lsp-ping-05.txt Parag Jain, Samer Salam, Ali Sajassi (Cisco), Sami Boutros (VMware), Greg Mirsky (ZTE) IETF 99, July 2017 Prague.
Ryan Zheng Lizhong Jin Thomas Nadeau George Swallow
Technical Issues with draft-ietf-mpls-bfd-directed
Virtual Hub-and-Spoke in BGP EVPNs
Inter-AS MVPN: Multihoming Considerations
Extended Optimized Ingress Replication for EVPN
Bidirectional Forwarding Detection (BFD) for EVPN Ethernet Segment Failover Use Case draft-zwm-bess-es-failover-00 BESS WG IETF104# Prague Sandy Zhang.
Parag Jain, Samer Salam, Ali Sajassi (Cisco),
Supporting Flexible Algorithm Prefix SIDs in LSP Ping/Traceroute
EVPN control plane for Geneve draft-boutros-bess-evpn-geneve-03
Inter-AS OAM for SR Networks IETF 105, Montreal
BIER Penultimate Hop Popping draft-zzhang-bier-php-00
Presentation transcript:

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for E-VPN and PBB- EVPN (draft-jain-l2vpn-evpn-lsp-ping-00.txt) Parag Jain (Cisco Systems Inc.), Sami Boutros (Cisco Systems Inc.), Samer Salam (Cisco Systems Inc.)

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 LSP Ping Support for E-VPN and PBB-EVPN  Define LSP Ping procedures for E-VPN and PBB-EVPN  Support ingress replication and P2MP P-trees for Broadcast, multicast and unknown unicast.  Define 3 new sub-TLVs for Target FEC Stack for identifying various FEC under test

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 Proposed E-VPN MAC sub-TLV Format | Route Distinguisher | | (8 octets) | | Ethernet Segment Identifier | | (10 octets) | | | must be zero | | Ethernet Tag ID | | MAC Address | + (6 Octets) | | MAC Addr Len | IP Addr Len | | IP Address (4 or 16 Octets) | | EVI |

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 Proposed E-VPN Inclusive Multicast sub-TLV Format | Route Distinguisher | | (8 octets) | | Ethernet Segment Identifier | | (10 octets) | | | must be zero | | Ethernet Tag ID | | EVI |

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 Proposed E-VPN Auto-Discovery sub-TLV Format | Route Distinguisher | | (8 octets) | | Ethernet Segment Identifier | | (10 octets) | | | must be zero | | Ethernet Tag ID | | EVI |

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 Remote MAC Connectivity test  Echo Request with target FEC stack TLV containing E-VPN MAC sub-TLV.  Echo Request packet will be encaped with E-VPN MAC label as the bottom label: {Transport Label(s), E-VPN MAC Label}

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 Multicast Connectivity test for Ingress Replication  Echo Request with target FEC stack TLV containing E-VPN Inclusive Multicast sub-TLV.  Echo Request packet will be encaped with E-VPN Inclusive Multicast label as the bottom label: {Transport Label(s), E-VPN Inclusive multicast Label}  For PBB-EVPN, if remote PE is not DF for the tag (ISID) ID in the inclusive Multicast sub-TLV on some Ethernet Segments, the remote will reply with a special return code – “FEC exists on the router and the behavior is to drop the packet because of not DF”  For E-VPN case, Echo Request packet may carry an Ethernet AD sub-TLV and associated MPLS Split Horizon Label at the bottom of the MPLS label stack for the other remote MH PE who will respond with a special return code. “FEC exists on the router and the behavior is to drop the packet because of Split Horizon Filtering”

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 Multicast Connectivity test for P2MP P-tree  Echo request to the remote PE with the target FEC stack TLV containing E- VPN Inclusive Multicast sub-TLV.  When Using Inclusive P2MP P-trees, send Echo Request packet with the following label stack: {P2MP P-tree label}  When Using Aggregate Inclusive P2MP P-trees, send Echo Request packet with the following label stack: {P2MP P-tree label, Upstream assigned E-VPN Multicast Label }  For PBB-EVPN, if remote PE is not DF for the tag (ISID) ID in the inclusive Multicast sub-TLV on some Ethernet Segments, the remote will reply with a special return code – “FEC exists on the router and the behavior is to drop the packet because of not DF”  For E-VPN case, Echo Request packet may carry an Ethernet AD sub-TLV and associated MPLS Split Horizon Label at the bottom of the MPLS label stack for the other remote MH PE who will respond with a special return code. “FEC exists on the router and the behavior is to drop the packet because of Split Horizon Filtering”

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 Aliasing State Connectivity test  Echo request to the remote PE with the target FEC stack TLV containing E-VPN Ethernet AD sub-TLV.  Echo Request packet encaped with E-VPN Ethernet AD label as the bottom label: {Transport Label(s), E-VPN Ethernet AD Label}

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Next Steps  Seeking Feedback  Looking for WG adoption

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11