Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.

Slides:



Advertisements
Similar presentations
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Advertisements

BGP based Multi-homing in VPLS IETF-75
MPLS VPN.
Identifying MPLS Applications
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
John Hoffmans – Geraldine Calvignac - Raymond Zhang - Nabil Bitar -
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Ethernet VPN (EVPN) - Casos de Uso e Aplicação
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Multi-homed network in EVPN draft-hao-evpn-mhn-00 July 20131MHN in EVPN Weiguo Hao(Huawei) Yizhou Li(Huawei) Pei Xu(Huawei)
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
BGP L3VPN Virtual PE draft-fang-l3vpn-virtual-pe-01
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
IETF-82 draft-bitar-datacenter-vpn-applicability-01.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-datacenter-vpn-applicability-01.txt.
VPLS Extensions for Provider Backbone Bridging - draft-balus-l2vpn-vpls-802.1ah-01.txt John Hoffmans – KPN Geraldine Calvignac - France Telecom Raymond.
Draft-boutros-bess-evpn-vpws-service-edge-gateway-00 Sami Boutros Ali Sajassi Patrice Brissette [Cisco Systems] Daniel Voyer [Bell Canada] IETF 92,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-pbb-evpn-05.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-02.txt A. Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sd-l2vpn-evpn-overlay-02.txt A. Sajassi (Cisco), J. Drake (Juniper),
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 184th IETF - Vancouver VPLS PE Model with E-Tree Support Yuanlong.
Draft-rabadan-bess-dci-evpn-overlay-00* Jorge Rabadan Senthil Sathappan Wim Henderickx Florin Balus Senad Palislamovic Ali Sajassi Dennis Cai Ravi Shekhar.
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu IETF82, TAIWAN.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-segment- route-00.txt Ali Sajassi, Samer.
VPLS Extensions for Provider Backbone Bridging - draft-balus-l2vpn-vpls-802.1ah-02.txt John Hoffmans – Geraldine Calvignac -
IETF 84, July 2012 Vancouver, Canada
Inter AS option D (draft-mapathak-interas-option-d-00) Manu Pathak Keyur Patel Arjun Sreekantiah November 2012.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for E-VPN and PBB-
1 draft-rabadan-bess-evpn-ac-df-01 Jorge Rabadan Kiran Nagaraj Senthil Sathappan Vinod Prabhu Wim Henderickx AC-influenced DF Election for (PBB-)EVPN IETF.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-virtual-eth- segment-00.txt A. Sajassi (Cisco),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Segment-based EVPN (S-EVPN) draft-li-l2vpn-segment-evpn-01 Zhenbin Li (Presenter) Lucy Yong Junlin Zhang March, 2014 London United Kingdom.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Draft-sajassi-l2vpn-pbb-vpls-mpls- access-00.txt July 28, 2008 PBB-VPLS.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-03.txt A. Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-05.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
Segment EVPN draft-li-l2vpn-segment-evpn Zhenbin Li Lucy Yong (Presenter) Junlin Zhang July, 2013 Berlin Germany.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-04.txt A. Sajassi.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Active-active access in NVO3 network draft-hao-l2vpn-evpn-nvo3-active-active-00 July 20131Active-active access in NVO3 network Weiguo Hao(Huawei) Yizhou.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update R. Aggarwal (Juniper), A. Sajassi (Cisco), W. Hendericx.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
EVPN: Or how I learned to stop worrying and love the BGP
Draft-boutros-l2vpn-evpn-vpws-04.txt Sami Boutros Ali Sajassi Samer Salam Patrice Brissette John Drake Jeff Tantsura Dirk Steinberg Thomas Beckhaus IETF.
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
EDCS IETF 81, Jul/2011, Quebec City, Canadadraft-bashandy-idr-bgp-repair-label-02 Scalable Loop Free BGP FRR Using Repair Label draft-bashandy-idr-bgp-repair-label-02.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
Virtual Hub & Spoke with BGP EVPNs
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Draft-boutros-bess-evpn-auto-provisioning-01 Sami Boutros Rex Fernando Ali Sajassi Kitty Pang Tapraj Singh IETF 95, April 2015 Buenos Aires.
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Multicast Pruning for PBB-VPLS
EVPN Interworking with IPVPN
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
EVPN a very short introduction
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Virtual Hub-and-Spoke in BGP EVPNs
EVPN Interworking with IPVPN
EVPN control plane for Geneve draft-boutros-bess-evpn-geneve-03
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar (Verizon), Aldrin Issac (Bloomberg), Samer Salam (Cisco), Sami Boutros (Cisco), Florin Balus (ALU), Wim Henderickx (ALU), Clarence Filsfils (Cisco), Dennis Cai (Cisco) July 28 th, 2011 IETF Quebec City

2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Additional Requirements (PBB-EVPN) 1.MAC Advertisement Route Scalability To support millions of C-MAC addresses (million of VMs) 2.C-MAC Mobility with MAC sub-netting Support C-MAC address mobility while retaining the scalability benefits of MAC sub-netting 3.C-MAC Address Learning and Confinement MES nodes to maintain C-MAC addresses in their RIB & FIB for active flows ONLY

3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Additional Requirements (PBB-EVPN) 4.Interworking with TRILL & 802.1aq/.1Qbp networks and C-MAC Transparency To avoid learning of C-MACs by DC WAN Edge PE 5.Per Site Policy To support connectivity policy rules at the granularity of a site (or segment) 6.Avoiding C-MAC flushing To avoid C-MAC flushing upon link, port, or node failure for multi- homed devices 7.Avoid transient loop for known unicast when doing egress MAC lookup

4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Solution Overview  Advertise local B-MAC addresses in BGP to all other PEs that have at least one VPN in common just like E-VPN  Build a forwarding table from remote BGP advertisements just like E- VPN (e.g., association of B-MAC to MPLS labels)  PEs perform PBB functionality just like PBB-VPLS C-MAC learning for traffic received from ACs and C-MAC/B-MAC association for traffic received from core PE2 PE1 PE3 LACP CE1 CE2 MPLS BE B Single B-MAC to represent site ID can derive the B-MAC automatically from system MAC address of LACP B-MAC = Site ID

5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Advantages 1.MAC Advertisement Route Scalability A single B-MAC represents a multi-homed site A single B-MAC can represent all single-homed sites A single C-MAC represents a single VM => several order of magnitude difference between C-MAC & B- MAC 2.C-MAC Mobility with MAC sub-netting Typically C-MACs are not managed and thus can not be sub-netted B-MACs on the other hand are always managed and can easily be sub-netted Even when C-MACs are sub-netted, VM mobility contradicts the effect of sub-netting

6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Advantages – Cont. 3.C-MAC Address Learning and Confinement With C-MAC learning in control plane, C-MACs are always in RIBs and maybe also in FIBs With C-MAC learning in data plane, C-MACs are never in RIBs and they are only present in FIBs for active flow. 4.Interworking with TRILL & 802.1aq/.1bp networks and C-MAC Transparency PBB encapsulation enables end-to-end tunneling of C-MAC addresses for the access networks thus avoiding termination and learning by DC WAN Edge PE

7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Advantages – Cont. 5.Per Site Policy Since B-MAC addresses are per site, BGP policy per MAC gives us very nice set of per-site policy 6.Avoiding C-MAC flushing Since B-MAC represent a site, a link, port, or node failure doesn’t change the B-MAC address – it only changes number of next hop for that B-MAC 7.Avoid transient loop for known unicast when doing egress MAC lookup Since B-MAC SA is always transmitted with every frame, checking of every frame against its source MAC SA for known unicast frame is already provided by PBB

8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net BGP Encoding  Ethernet A-D is not needed and it is not used Avoids different modes of operation associated with this route Simplifies operation and provisioning  MAC Mobility Extended Community (delta to rev 01) It is a transitive extended community When advertised with a B-MAC route, it signals all the C-MAC forwarding tables associated with the I-SIDs corresponding to the RTs should be flushed

9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Network Multi-Homing: Active/Active Per VLAN Load-Balancing  Each MES advertises two MAC routes per Ethernet Segment: one with high Local Pref for active VLANs, and another with low Local Pref for standby VLANs. Use MES RD with LSBit reset (Standby) or set (Active) to differentiate the prefixes.  Remote MES installs the route with higher local pref into FIB for associated B-MAC.  MES1 MAC Routes: Route 1: RD11, B-MAC1, RT1, RT3, RT5, Local Pref = High Route 2: RD12, B-MAC1, RT2, RT4, RT6, Local Pref = Low  MES2 MAC Routes: Route 1: RD22, B-MAC1, RT1, RT3, RT5, Local Pref = Low Route 2: RD21, B-MAC1, RT2, RT4, RT6, Local Pref = High MES1 MES2 VLAN 1,3,5 VLAN 2,4,6 ESI1, B-MAC1 MES3 VPNB-MACNHPref RT1B-MAC1MES1High RT1B-MAC1MES2Low RT2B-MAC1MES1Low RT2B-MAC1MES2High L2RIB VPNB-MACNH RT1B-MAC1MES1 RT2B-MAC1MES2 L2FIB

10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Future Considerations  ARP suppression  Anything else ?