summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc6329.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6329.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6329.txt')
-rw-r--r--doc/rfc/rfc6329.txt2075
1 files changed, 2075 insertions, 0 deletions
diff --git a/doc/rfc/rfc6329.txt b/doc/rfc/rfc6329.txt
new file mode 100644
index 0000000..7fc4ba8
--- /dev/null
+++ b/doc/rfc/rfc6329.txt
@@ -0,0 +1,2075 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) D. Fedyk, Ed.
+Request for Comments: 6329 Alcatel-Lucent
+Category: Standards Track P. Ashwood-Smith, Ed.
+ISSN: 2070-1721 Huawei
+ D. Allan
+ Ericsson
+ N. Bragg
+ Ciena Limited
+ P. Unbehagen
+ Avaya
+ April 2012
+
+
+ IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging
+
+Abstract
+
+ 802.1aq Shortest Path Bridging (SPB) has been standardized by the
+ IEEE as the next step in the evolution of the various spanning tree
+ and registration protocols. 802.1aq allows for true shortest path
+ forwarding in a mesh Ethernet network context utilizing multiple
+ equal cost paths. This permits it to support much larger Layer 2
+ topologies, with faster convergence, and vastly improved use of the
+ mesh topology. Combined with this is single point provisioning for
+ logical connectivity membership, which includes point-to-point,
+ point-to-multipoint, and multipoint-to-multipoint variations. This
+ memo documents the IS-IS changes required to support this IEEE
+ protocol and provides some context and examples.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc6329.
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 1]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+Copyright Notice
+
+ Copyright (c) 2012 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 2]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+Table of Contents
+
+ 1. Introduction ....................................................4
+ 2. Terminology .....................................................4
+ 3. Conventions Used in This Document ...............................5
+ 4. 802.1aq Overview ................................................6
+ 4.1. Multi-Topology Support .....................................8
+ 4.2. Data Path SPBM - Unicast ...................................8
+ 4.3. Data Path SPBM - Multicast (Head-End Replication) ..........9
+ 4.4. Data Path SPBM - Multicast (Tandem Replication) ............9
+ 4.5. Data Path SPBV Broadcast ..................................11
+ 4.6. Data Path SPBV Unicast ....................................11
+ 4.7. Data Path SPBV Multicast ..................................12
+ 5. SPBM Example ...................................................12
+ 6. SPBV Example ...................................................14
+ 7. SPB Supported Adjacency types ..................................16
+ 8. SPB IS-IS Adjacency Addressing .................................16
+ 9. IS-IS Area Address and SYSID ...................................17
+ 10. Level 1/2 Adjacency ...........................................17
+ 11. Shortest Path Default Tie-Breaking ............................17
+ 12. Shortest Path ECT .............................................18
+ 13. Hello (IIH) Protocol Extensions ...............................19
+ 13.1. SPB-MCID Sub-TLV .........................................20
+ 13.2. SPB-Digest Sub-TLV .......................................21
+ 13.3. SPB Base VLAN Identifiers (SPB-B-VID) Sub-TLV ............23
+ 14. Node Information Extensions ...................................24
+ 14.1. SPB Instance (SPB-Inst) Sub-TLV ..........................24
+ 14.1.1. SPB Instance Opaque ECT-ALGORITHM
+ (SPB-I-OALG) Sub-TLV ..............................28
+ 15. Adjacency Information Extensions ..............................29
+ 15.1. SPB Link Metric (SPB-Metric) Sub-TLV .....................29
+ 15.1.1. SPB Adjacency Opaque ECT-ALGORITHM
+ (SPB-A-OALG) Sub-TLV ..............................30
+ 16. Service Information Extensions ................................30
+ 16.1. SPBM Service Identifier and Unicast Address
+ (SPBM-SI) Sub-TLV ........................................30
+ 16.2. SPBV MAC Address (SPBV-ADDR) Sub-TLV .....................32
+ 17. Security Considerations .......................................34
+ 18. IANA Considerations ...........................................34
+ 19. References ....................................................35
+ 19.1. Normative References .....................................35
+ 19.2. Informative References ...................................36
+ 20. Acknowledgments ...............................................36
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 3]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+1. Introduction
+
+ 802.1aq Shortest Path Bridging (SPB) [802.1aq] has been standardized
+ by the IEEE as the next step in the evolution of the various spanning
+ tree and registration protocols. 802.1aq allows for true shortest
+ path forwarding in an Ethernet mesh network context utilizing
+ multiple equal cost paths. This permits SPB to support much larger
+ Layer 2 topologies, with faster convergence, and vastly improved use
+ of the mesh topology. Combined with this is single point
+ provisioning for logical connectivity membership, which includes
+ point-to-point (E-LINE), point-to-multipoint (E-TREE), and
+ multipoint-to-multipoint (E-LAN) variations.
+
+ The control protocol for 802.1aq is IS-IS [IS-IS] augmented with a
+ small number of TLVs and sub-TLVs. This supports two Ethernet
+ encapsulating data paths, 802.1ad (Provider Bridges) [PB] and 802.1ah
+ (Provider Backbone Bridges) [PBB]. This memo documents those TLVs
+ while providing some overview.
+
+ Note that 802.1aq requires no state machine or other substantive
+ changes to [IS-IS]. 802.1aq simply requires a new Network Layer
+ Protocol Identifier (NLPID) and set of TLVs. In the event of
+ confusion between this document and [IS-IS], [IS-IS] should be taken
+ as authoritative.
+
+2. Terminology
+
+ In addition to well-understood IS-IS terms, this memo uses
+ terminology from IEEE 802.1 and introduces a few terms:
+
+ 802.1ad Provider Bridges (PBs) - Q-in-Q encapsulation
+ 802.1ah Provider Backbone Bridges (PBBs), MAC-IN-MAC
+ encapsulation
+ 802.1aq Shortest Path Bridging (SPB)
+ Base VID VID used to identify a VLAN in management operations
+ B-DA Backbone Destination Address 802.1ah PBB
+ B-MAC Backbone MAC Address
+ B-SA Backbone Source Address in 802.1ah PBB header
+ B-VID Backbone VLAN ID in 802.1ah PBB header
+ B-VLAN Backbone Virtual LAN
+ BPDU Bridge PDU
+ BridgeID 64-bit quantity = (Bridge Priority:16)<<48 | SYSID:48
+ BridgePriority 16-bit relative priority of a node for tie-breaking
+ C-MAC Customer MAC. Inner MAC in 802.1ah PBB header
+ C-VID Customer VLAN ID
+ ECT-ALGORITHM 32-bit unique ID of an SPF tie-breaking set of rules
+ ECT-MASK 64-bit mask XORed with BridgeID during tie-breaking
+ E-LAN Bidirectional Logical Connectivity between >2 UNIs
+
+
+
+Fedyk, et al. Standards Track [Page 4]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ E-LINE Bidirectional Logical Connectivity between two UNIs
+ E-TREE Asymmetric Logical Connectivity between UNIs
+ FDB Filtering Database: {DA/VID}->{next hops}
+ I-SID Ethernet Services Instance Identifier used for
+ Logical Grouping for E-LAN/LINE/TREE UNIs
+ LAN Local Area Network
+ LSDB Link State Database
+ LSP Link State PDU
+ MAC Media Access Control
+ MAC-IN-MAC Ethernet in Ethernet framing as per 802.1ah [PBB]
+ MDT Multicast Distribution Tree
+ MMRP Multiple MAC Registration Protocol 802.1ak [MMRP]
+ MT Multi-Topology. As used in [MT]
+ MT ID Multi-Topology Identifier (12 bits). As used in [MT]
+ NLPID Network Layer Protocol Identifier: IEEE 802.1aq= 0xC1
+ NNI Network-Network Interface
+ Q-in-Q Additional S-VID after a C-VID (802.1ad) [PB]
+ PBB Provider Backbone Bridge - forwards using PBB
+ Ingress Check Source Forwarding Check - drops misdirected frames
+ (S,G) Source & Group - identity of a source-specific tree
+ (*,G) Any Source & Group - identity of a shared tree
+ S-VID Service VLAN ID
+ SA Source Address
+ SPB Shortest Path Bridging - generally all of 802.1aq
+ SPB Shortest Path Bridge - device implementing 802.1aq
+ SPB-instance Logical SPB instance correlated by MT ID
+ SPBM Device implementing SPB MAC mode
+ SPBV Device implementing SPB VID mode
+ SPSourceID 20-bit identifier of the source of multicast frames
+ SPT Shortest Path Tree computed by one ECT-ALGORITHM
+ SPT Region A set of SPBs with identical VID usage on their NNIs
+ SPVID Shortest Path VLAN ID: a C-VID or S-VID that
+ identifies the source
+ STP Spanning Tree Protocol
+ UNI User-Network Interface: customer-to-SPB attach point
+ VID VLAN ID: 12-bit logical identifier after MAC header
+ VLAN Virtual LAN: a logical network in the control plane
+
+3. Conventions Used in This Document
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+ The lowercase forms with an initial capital "Must", "Must Not",
+ "Shall", "Shall Not", "Should", "Should Not", "May", and "Optional"
+ in this document are to be interpreted in the sense defined in
+
+
+
+
+Fedyk, et al. Standards Track [Page 5]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ [RFC2119], but are used where the normative behavior is defined in
+ documents published by SDOs other than the IETF.
+
+4. 802.1aq Overview
+
+ This section provides an overview of the behavior of [802.1aq] and is
+ not intended to be interpreted as normative text. For the definitive
+ behavior, the reader should consult [802.1aq]. Nonetheless,
+ lowercase forms with initial capitalization of the conventions in RFC
+ 2119 are used in this section to give the reader an indication of the
+ intended normative behaviors as above.
+
+ 802.1aq utilizes 802.1Q-based Ethernet bridging. The filtering
+ database (FDB) is populated as a consequence of the topology computed
+ from the IS-IS database. For the reader unfamiliar with IEEE
+ terminology, the definition of Ethernet behavior is almost entirely
+ in terms of "filtering" (of broadcast traffic) rather than
+ "forwarding" (the explicit direction of unicast traffic). This
+ document uses the generic term "forwarding", and it has to be
+ understood that these two terms simply represent different ways of
+ expressing the same behaviors.
+
+ 802.1aq supports multiple modes of operation depending on the type of
+ data plane and the desired behavior. For the initial two modes of
+ 802.1aq (SPBV and SPBM), routes are shortest path, are forward- and
+ reverse-path symmetric with respect to any source/destination pair
+ within the SPB domain, and are congruent with respect to unicast and
+ multicast. Hence, the shortest path tree (SPT) to a given node is
+ congruent with the multicast distribution tree (MDT) from a given
+ node. The MDT for a given VLAN is a pruned subset of the complete
+ MDT for a given node that is identical to its SPT. Symmetry and
+ congruency preserve packet ordering and proper fate sharing of
+ Operations, Administration, and Maintenance (OAM) flows by the
+ forwarding path. Such modes are fully supported by existing
+ [802.1ag] and [Y.1731] OAM mechanisms.
+
+ VLANs provide a natural delineation of service instances. 802.1aq
+ supports two modes, SPB VID (SPBV) and SPB MAC (SPBM). In SPBV,
+ multiple VLANS can be used to distribute load on different shortest
+ path trees (each computed by a different tie-breaking rule) on a
+ service basis. In SPBM, service instances are delineated by I-SIDs
+ but VLANs again can be used to distribute load on different shortest
+ path trees.
+
+ There are two encapsulation methods supported. SPBM can be used in a
+ PBB network implementing PBB (802.1ah [PBB]) encapsulation. SPBV can
+ be used in PB networks implementing VLANs, PB (802.1aq [PB]), or PBB
+
+
+
+
+Fedyk, et al. Standards Track [Page 6]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ encapsulation. The two modes can co-exist simultaneously in an SPB
+ network.
+
+ The practical design goals for SPBV and SPBM in the current 802.1aq
+ specification are networks of size 100 nodes and 1000 nodes
+ respectively. However, since SPBV can be sparsely used in an SPB
+ region it can simply span a large SPB region with a small number of
+ SPVIDs.
+
+ In SPBM and SPBV each bridge has at least one unique "known" MAC
+ address which is advertised by IS-IS in the SYSID.
+
+ In the forwarding plane, SPBM uses the combination of one or more
+ B-VIDs and "known" Backbone-MAC (B-MAC) addresses that have been
+ advertised in IS-IS. The term Backbone simply implies an
+ encapsulation that is often used in the backbone networks, but the
+ encapsulation is useful in other types of networks where hiding
+ C-MACs is useful.
+
+ The SPBM filtering database (FDB) is computed and installed for
+ unicast and multicast MAC addresses, while the SPBV filtering
+ database is computed and installed for unidirectional VIDs (referred
+ to as SPVIDs), after which MAC reachability is learned (exactly as in
+ bridged Ethernet) for unicast MACs.
+
+ Both SPBV and SPBM use source-specific multicast trees. If they
+ share the same ECT-ALGORITHM (32-bit worldwide unique definition of
+ the computation), the tree is the same SPT. For SPBV, (S,G) is
+ encoded by a source-specific VID (the SPVID) and a standard Group MAC
+ address. For SPBM, (S,G) is encoded in the destination B-MAC address
+ as the concatenation of a 20-bit SPB wide unique nodal nickname
+ (referred to as the SPSourceID) and the 24-bit I-SID together with
+ the B-VID that corresponds to the ECT-ALGORITHM network wide.
+
+ 802.1aq supports membership attributes that are advertised with the
+ I-SID (SPBM) or Group Address (SPBV) that defines the group.
+ Individual members can be transmitters (T) and/or receivers (R)
+ within the group, and the multicast state is appropriately sized to
+ these requests. Multicast group membership is possible even without
+ transmit membership by performing head-end replication to the
+ receivers thereby eliminating transit multicast state entirely.
+
+ Some highly connected mesh networks provide for path diversity by
+ offering multiple equal cost alternatives between nodes. Since
+ congruency and symmetry Must be honored, a single tree may leave some
+ links under-utilized. By using different deterministic tie-breakers,
+ up to 16 shortest paths of arbitrary diversity are possible between
+ any pair of nodes. This distributes the traffic on a VLAN basis.
+
+
+
+Fedyk, et al. Standards Track [Page 7]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ SPBV and SPBM May share a single SPT with a single ECT-ALGORITHM or
+ use any combination of the 16 ECT-ALGORITHMs. An extensible
+ framework permits additional or alternative algorithms with other
+ properties and parameters (e.g., ECMP, (*,G)) to also be supported
+ without any changes in this or the IEEE documents.
+
+4.1. Multi-Topology Support
+
+ SPB incorporates the multi topology features of [MT] thereby allowing
+ multiple logical SPB instances within a single IS-IS instance.
+
+ To accomplish this, all SPB-related information is either explicitly
+ or implicitly associated with a Multi-Topology Identifier (MT ID).
+ SPB information related to a given MT ID thus forms a single logical
+ SPB instance.
+
+ Since SPB has its own adjacency metrics and those metrics are also
+ associated with an MT ID, it is possible to have different adjacency
+ metrics (or infinite metrics) for SPB adjacencies that are not only
+ distinct from IP or other NLPIDs riding in this IS-IS instance, but
+ also distinct from those used by other SPB instances in the same
+ IS-IS instance.
+
+ Data plane traffic for a given MT ID is intrinsically isolated by the
+ VLANs assigned to the SPB instance in question. Therefore, VLANs
+ (represented by VIDs in TLVs and in the data plane) Must Not overlap
+ between SPB instances (regardless of how the control planes are
+ isolated).
+
+ The [MT] mechanism when applied to SPB allows different routing
+ metrics and topology subsets for different classes of services.
+
+ The use of [MT] other than the default MT ID #0 is completely
+ OPTIONAL.
+
+ The use of [MT] to separate SPB from other NLPIDs is also OPTIONAL.
+
+4.2. Data Path SPBM - Unicast
+
+ Unicast frames in SPBM are encapsulated as per 802.1ah [PBB]. A
+ Backbone Source Address (B-SA), Backbone Destination Address (B-DA),
+ Backbone VLAN ID (B-VID), and an I-Component Service Instance ID
+ (I-TAG) are used to encapsulate the Ethernet frame. The B-SA is a
+ B-MAC associated with the ingress 802.1aq bridge, usually the "known"
+ B-MAC of that entire bridge. The B-DA is one of the "known" B-MACs
+ associated with the egress 802.1aq bridge. The B-VID and I-TAG are
+ mapped based on the physical or logical UNI port (untagged, or tagged
+ either by S-TAG or C-TAG) being bridged. Normal learning and
+
+
+
+Fedyk, et al. Standards Track [Page 8]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ broadcast to unknown C-MACs is applied as per [PBB] at the
+ ingress/egress SPBs only.
+
+ Unlike [PBB] on a (*,G) tree, the B-DA forwarding on tandem nodes
+ (NNI to NNI) is performed without learning. Instead, the output of
+ 802.1aq computations, based on the TLVs specified in this document,
+ is used to populate the filtering databases (FDBs). The FDB entries
+ map {B-DA, B-VID} to an outgoing interface and are only populated
+ from the IS-IS database and computations.
+
+ The B-SA/B-VID is checked on tandem nodes against the ingress port.
+ If the B-SA/B-VID (as a destination) entry in the FDB does not point
+ to the port on which the packet arrived, the packet is discarded.
+ This is referred to as an ingress check and serves as a very powerful
+ loop mitigation mechanism.
+
+4.3. Data Path SPBM - Multicast (Head-End Replication)
+
+ Head-end replication is supported for instances where there is a
+ sparse community of interest or a low likelihood of multicast
+ traffic. Head-end replication requires no multicast state in the
+ core. A UNI port wishing to use head-end replication Must Not
+ advertise its I-SID membership with the Transmit (T) bit set but
+ instead Must locally and dynamically construct the appropriate
+ unicast serial replication to all the other receivers (Receive (R)
+ bit set) of the same I-SID.
+
+ When an unknown customer unicast or a multicast frame arrives at an
+ SPBM User-Network Interface (UNI) port that has been configured to
+ replicate only at the head end, the packet is replicated once for
+ each receiver, encapsulated, and sent as a unicast frame. The set of
+ receivers is determined by inspecting the IS-IS database for other
+ SPBs that have registered interest in the same I-SID with the R bit
+ set. This R bit / I-SID pair is found in the SPBM Service Identifier
+ and Unicast Address (SPBM-SI) sub-TLV. The packets are encapsulated
+ as per the SPBM unicast forwarding above.
+
+4.4. Data Path SPBM - Multicast (Tandem Replication)
+
+ Tandem replication uses the shortest path tree to replicate frames
+ only where the tree forks and there is at least one receiver on each
+ branch. Tandem replication is bandwidth efficient but uses multicast
+ FDB entries (state) in core bridges, which might be unnecessary if
+ there is little multicast traffic demand. The head-end replication
+ mode is best suited for the case where there is little or no true
+ multicast traffic for an I-SID. Tandem replication is triggered on
+ transit nodes when the I-SID is advertised with the T bit set.
+
+
+
+
+Fedyk, et al. Standards Track [Page 9]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ Broadcast, unknown unicast, or multicast frames arriving at an SPBM
+ UNI port are encapsulated with a B-DA multicast address that uniquely
+ identifies the encapsulating node (the root of the Multicast
+ Distribution Tree) and the I-SID scoping this multicast.
+
+ This B-DA address is a well-formed multicast group address (as per
+ 802.1Q and 802.1ah) that concatenates the SPSourceID A' with the
+ I-SID M (written as DA=<A',M> and uniquely identifying the (S,G)
+ tree). This exact format is given in Figure 1 below:
+
+ M L TYP
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |1|1|0|0|SPSrcMS| SPSrc [8:15] | SPSrc [0:7] | I-SID [16:23] |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | I-SID [8:15] | I-SID [0:7] |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 1: SPBM Multicast Address Format
+ (SPSrcMS represents SPSrc [16:19])
+
+ Note: In Figure 1, the index numbering from less significant bit to
+ more significant bit within a byte or field within a byte gives
+ the wire order of the bits in the address consistent with the IETF
+ format in the rest of this document. (The IEEE convention for
+ number representation reverses the bits within an octet compared
+ with IETF practice.)
+
+ o M is the multicast bit, always set to 1 for a multicast DA. (It
+ is the lowest bit in the most significant byte.)
+
+ o L is the local bit, always set to 1 for an SPBM-constructed
+ multicast DA.
+
+ o TYP is the SPSourceID type. 00 is the only type supported at this
+ time.
+
+ o SPSrc (SPSourceID) is a 20-bit quantity that uniquely identifies a
+ SPBM node for all B-VIDs allocated to SPBM operation. This is
+ just the SPSourceID advertised in the SPB Instance (SPB-Inst) sub-
+ TLV. The value SPSourceID = 0 has special significance; it is
+ advertised by an SPBM node that has been configured to assign its
+ SPSourceID dynamically, which requires LSDB synchronization, but
+ where the SPSourceID assignment has not yet completed.
+
+ o I-SID is the 24-bit I-Component Service ID advertised in the SPBM
+ Service Identifier TLV. It occupies the lower 24 bits of the SPBM
+ multicast DA. The I-SID value 0xfff is reserved for SPBM control
+ traffic (refer to the default I-SID in [802.1aq]).
+
+
+
+Fedyk, et al. Standards Track [Page 10]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ This multicast address format is used as the DA on frames when they
+ are first encapsulated at ingress to the SPBM network. The DA is
+ also installed into the FDBs on all SPBM nodes that are on the
+ corresponding SPT between the source and other nodes that have
+ registered receiver interest in the same I-SID.
+
+ Just as with unicast forwarding, the B-SA/B-VID May be used to
+ perform an ingress check, but the SPSourceID encoded in the DA and
+ the "drop-on-unknown" functionality of the FDB in [PBB] achieve the
+ same effect.
+
+ The I-Component at the egress SPBM device has completely standard
+ [PBB] behavior and therefore will:
+
+ 1) learn the remote C-SA to B-SA relationship and
+
+ 2) bridge the original customer frame to the set of local UNI ports
+ that are associated with the I-SID.
+
+4.5. Data Path SPBV Broadcast
+
+ When a packet for an unknown DA arrives at an SPBV UNI port, VID
+ translation (or VID encapsulation for untagged Frames) with the
+ corresponding SPVID for this VLAN and ingress SPB is performed.
+
+ SPVID forwarding is simply an SPT that follows normal VLAN forwarding
+ behavior, with the exception that the SPVID is unidirectional. As a
+ result, shared VLAN learning (SVL) is used between the forward- and
+ reverse-path SPVIDs associated with the same Base VID to allow SPBV
+ unicast forwarding to operate in the normal reverse learning fashion.
+
+ Ingress check is done by simply verifying that the bridge to which
+ the SPVID has been assigned is indeed "shortest path" reachable over
+ the link over which the packet tagged with that SPVID arrived. This
+ is computed from the IS-IS database and is implied when the SPVID is
+ associated with a specific incoming port.
+
+4.6. Data Path SPBV Unicast
+
+ When a packet for a known DA arrives at an SPBV UNI port, VID
+ translation (or VID encapsulation for untagged Frames) with the
+ corresponding SPVID for this VLAN and ingress bridge is performed.
+
+ Since the SPVID will have been configured to follow a source-specific
+ SPT and the DA is known, the packet will follow the source-specific
+ path towards the destination C-MAC.
+
+ Ingress check is as per the previous SPBV section.
+
+
+
+Fedyk, et al. Standards Track [Page 11]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+4.7. Data Path SPBV Multicast
+
+ C-DA multicast addresses May be advertised from SPBV UNI ports.
+ These may be configured or learned through the Multiple MAC
+ Registration Protocol (MMRP). MMRP is terminated at the edge of the
+ SPBV network and IS-IS carries the multicast addresses. Tandem SPBV
+ devices will check to see if they are on the SPF tree between SPBV
+ UNI ports advertising the same C-DA multicast address, and if so will
+ install multicast state to follow the SPBV SPF trees.
+
+ Ingress check is as per the previous two SPBV sections.
+
+5. SPBM Example
+
+ Consider the small example network shown in Figure 2. Nodes are
+ drawn in boxes with the last nibble of their B-MAC address :1..:7.
+ The rest of the B-MAC address nibbles are 4455-6677-00xx. Links are
+ drawn as "--" and "/", while the interface indexes are drawn as
+ numbers next to the links. UNI ports are shown as "<==>" with the
+ desired I-SID shown at the end of the UNI ports as "i1".
+
+ +----+ +----+
+ | :4 | 2 ------1 | :5 | <==> i1
+ +----+ +----+
+ 1 3 3 2
+ / \ / \
+ 1 4 3 2
+ +----+ +----+ +----+
+ i1 <==> | :1 | 2----1 | :2 | 2------1 | :3 | <==> i1
+ +----+ +----+ +----+
+ 3 6 5 3
+ \ / \ /
+ 3 2 1 2
+ +----+ +----+
+ | :6 | 1-------3 | :7 | <==> i1
+ +----+ +----+
+
+ Figure 2: SPBM Example 7-Node Network
+
+ Using the default ECT-ALGORITHM (00-80-C2-01), which picks the equal
+ cost path with the lowest BridgeID, this ECT-ALGORITHM is assigned to
+ B-VID 100. When all links have the same cost, then the 1-hop
+ shortest paths are all direct and the 2-hop shortest paths (which are
+ of course symmetric) are as follows:
+
+ { 1-2-3, 1-2-5, 1-2-7, 6-2-5,
+ 4-2-7, 4-1-6, 5-2-7, 6-2-3, 4-2-3 }
+
+
+
+
+Fedyk, et al. Standards Track [Page 12]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ Node :1's unicast forwarding table therefore routes toward B-MACs :7,
+ :3, and :5 via interface/2, while its single-hop paths are all direct
+ as can be seen from its FDB given in Figure 3.
+
+ Node :1 originates multicast since it is at the head of the MDT to
+ nodes :3, :5, and :7 and is a transmitter of I-SID 1, which nodes :3,
+ :5, and :7 all wish to receive. Node :1 therefore produces a
+ multicast forwarding entry whose DA contains its SPSourceID (which is
+ the last 20 bits of the B-MAC in the example) and the I-SID 1. Node
+ :1 thereafter sends packets matching this entry to interface if/2
+ with B-VID=100. Node :1's full unicast (U) and multicast (M) table
+ is shown in Figure 3. Note that the IN/IF (incoming interface) field
+ is not specified for unicast traffic, and for multicast traffic has
+ to point back to the root of the tree, unless it is the head of the
+ tree -- in which case, we use the convention if/00. Since node :1 is
+ not transit for any multicast, it only has a single entry for the
+ root of its tree for I-SID=1.
+
+ +-------+-------------------+------+-----------------+
+ | IN/IF | DESTINATION ADDR | BVID | OUT/IF(s) |
+ +-------+-------------------+------+-----------------+
+ U| if/** | 4455-6677-0002 | 0100 | {if/2 }
+ U| if/** | 4455-6677-0003 | 0100 | {if/2 }
+ U| if/** | 4455-6677-0004 | 0100 | {if/1 }
+ U| if/** | 4455-6677-0005 | 0100 | {if/2 }
+ U| if/** | 4455-6677-0006 | 0100 | {if/3 }
+ U| if/** | 4455-6677-0007 | 0100 | {if/2 }
+ M| if/00 | 7300-0100-0001 | 0100 | {if/2 }
+
+ Figure 3: SPBM Node :1 FDB - Unicast (U) and Multicast (M)
+
+ Node :2, being at the center of the network, has direct 1-hop paths
+ to all other nodes; therefore, its unicast FDB simply sends packets
+ with the given B-MAC/B-VID=100 to the interface directly to the
+ addressed node. This can be seen by looking at the unicast entries
+ (the first 6) shown in Figure 4.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 13]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ +-------+-------------------+------+-----------------+
+ | IN/IF | DESTINATION ADDR | BVID | OUT/IF(s) |
+ +-------+-------------------+------+-----------------+
+ U| if/** | 4455-6677-0001 | 0100 | {if/1 }
+ U| if/** | 4455-6677-0003 | 0100 | {if/2 }
+ U| if/** | 4455-6677-0004 | 0100 | {if/4 }
+ U| if/** | 4455-6677-0005 | 0100 | {if/3 }
+ U| if/** | 4455-6677-0006 | 0100 | {if/6 }
+ U| if/** | 4455-6677-0007 | 0100 | {if/5 }
+ M| if/01 | 7300-0100-0001 | 0100 | {if/2,if/3,if/5 }
+ M| if/02 | 7300-0300-0001 | 0100 | {if/1 }
+ M| if/03 | 7300-0500-0001 | 0100 | {if/1,if/5 }
+ M| if/05 | 7300-0700-0001 | 0100 | {if/1,if/3 }
+
+ Figure 4: SPBM Node :2 FDB Unicast (U) and Multicast (M)
+
+ Node :2's multicast is more complicated since it is a transit node
+ for the 4 members of I-SID=1; therefore, it requires 4 multicast FDB
+ entries depending on which member it is forwarding/replicating on
+ behalf of. For example, node :2 is on the shortest path between each
+ of nodes {:3, :5, :7} and :1. So it must replicate from node :1
+ I-SID 1 out on interfaces { if/2, if/3 and if/5 } (to reach nodes :3,
+ :5, and :7). It therefore creates a multicast DA with the SPSourceID
+ of node :1 together with I-SID=1, which it expects to receive over
+ interface/1 and will replicate out interfaces { if/2, if/3 and if/5
+ }. This can be seen in the first multicast entry in Figure 4.
+
+
+ Note that node :2 is not on the shortest path between nodes :3 and :5
+ nor between nodes :3 and :7; however, it still has to forward packets
+ to node :1 from node :3 for this I-SID, which results in the second
+ multicast forwarding entry in Figure 4. Likewise, for packets
+ originating at nodes :5 or :7, node :2 only has to replicate twice,
+ which results in the last two multicast forwarding entries in Figure
+ 4.
+
+6. SPBV Example
+
+ Using the same example network as Figure 2, we will look at the FDBs
+ produced for SPBV mode forwarding. Nodes :1, :5, :3, and :7 wish to
+ transmit and receive the same multicast MAC traffic using multicast
+ address 0300-0000-000f and at the same time require congruent and
+ symmetric unicast forwarding. In SPBV mode, the only encapsulation
+ is the C-TAG or S-TAG, and the MAC addresses SA and DA are reverse-
+ path learned, as in traditional bridging.
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 14]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ +----+ +----+
+ | :4 | 2 ------1 | :5 | <==> MMAC ..:f
+ +----+ +----+
+ 1 3 3 2
+ / \ / \
+ 1 4 3 2
+ +----+ +----+ +----+
+ MMAC<==> | :1 | 2----1 | :2 | 2------1 | :3 | <==> MMAC ..:f
+ ..:f +----+ +----+ +----+
+ 3 6 5 3
+ \ / \ /
+ 3 2 1 2
+ +----+ +----+
+ | :6 | 1-------3 | :7 | <==> MMAC ..:f
+ +----+ +----+
+
+ Figure 5: SPBV Example 7-Node Network
+
+ Assuming the same ECT-ALGORITHM (00-80-C2-01), which picks the equal
+ cost path with the lowest BridgeID, this ECT-ALGORITHM is assigned to
+ Base VID 100, and for each node the SPVID = Base VID + Node ID (i.e.,
+ 101, 102..107). When all links have the same cost, then the 1-hop
+ shortest paths are all direct, and the 2-hop shortest paths (which
+ are of course symmetric) are as previously given for Figure 2.
+
+ Node :1's SPT for this ECT-ALGORITHM is therefore (described as a
+ sequence of unidirectional paths):
+
+ { 1->4, 1->6, 1->2->3, 1->2->5, 1->2->7 }
+
+ The FDBs therefore must have entries for the SPVID reserved for
+ packets originating from node :1, which in this case is VID=101.
+
+ Node :2 therefore has an FDB that looks like Figure 6. In
+ particular, it takes packets from VID 101 on interface/01 and sends
+ to nodes :3, :5, and :7 via if/2, if/3, and if/5. It does not
+ replicate anywhere else because the other nodes (:4 and :6) are
+ reached by the SPT directly from node :1. The rest of the FDB
+ unicast entries follow a similar pattern; recall that the shortest
+ path between :4 and :6 is via node :1, which explains replication
+ onto only two interfaces from if/4 and if/6. Note that the
+ destination addresses are wild cards, and SVL exists between these
+ SPVIDs because they are all associated with Base VID = 100, which
+ defines the VLAN being bridged.
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 15]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ +-------+-------------------+------+-----------------+
+ | IN/IF | DESTINATION ADDR | VID | OUT/IF(s) |
+ +-------+-------------------+------+-----------------+
+ U| if/01 | ************** | 0101 | {if/2,if/3,if/5 }
+ U| if/02 | ************** | 0103 | {if/1,if/4,if/6 }
+ U| if/04 | ************** | 0104 | {if/2,if/5 }
+ U| if/03 | ************** | 0105 | {if/1,if/5,if/6 }
+ U| if/06 | ************** | 0106 | {if/2,if/3 }
+ U| if/05 | ************** | 0107 | {if/1,if/3,if/4 }
+
+ Figure 6: SPBV Node :2 FDB Unicast
+
+ Now, since nodes :5, :3, :7 and :1 are advertising membership in the
+ same multicast group address :f, Node 2 requires additional entries
+ to replicate just to these specific nodes for the given multicast
+ group address. These additional multicast entries are given below in
+ Figure 7.
+
+ +-------+-------------------+------+-----------------+
+ | IN/IF | DESTINATION ADDR | VID | OUT/IF(s) |
+ +-------+-------------------+------+-----------------+
+ M| if/01 | 0300-0000-000f | 0101 | {if/2,if/3,if/5 }
+ M| if/02 | 0300-0000-000f | 0103 | {if/1 }
+ M| if/03 | 0300-0000-000f | 0105 | {if/1,if/5 }
+ M| if/05 | 0300-0000-000f | 0107 | {if/1,if/3 }
+
+ Figure 7: SPBV Node :2 FDB Multicast (M)
+
+7. SPB Supported Adjacency types
+
+ IS-IS for SPB currently only supports peer-to-peer adjacencies.
+ Other link types are for future study. As a result, pseudonodes and
+ links to/from pseudonodes are not considered as part of the IS-IS SPF
+ computations and will be avoided if present in the physical topology.
+ Other NLPIDs MAY of course use them as per normal.
+
+ IS-IS for SPB Must use the IS-IS three-way handshake for IS-IS point-
+ to-point adjacencies described in RFC 5303.
+
+8. SPB IS-IS Adjacency Addressing
+
+ The default behavior of 802.1aq is to use the normal IS-IS Ethernet
+ multicast addresses for IS-IS.
+
+ There are however additional Ethernet multicast addresses that have
+ been assigned for 802.1aq for special use cases. These do not in any
+ way change the state machinery or packet formats of IS-IS but simply
+
+
+
+
+Fedyk, et al. Standards Track [Page 16]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ recommend and reserve different multicast addresses. Refer to
+ [802.1aq] for additional details.
+
+9. IS-IS Area Address and SYSID
+
+ A stand-alone implementation (supporting ONLY the single NLPID=0xC1)
+ of SPB Must use an IS-IS area address value of 0, and the SYSID Must
+ be the well-known MAC address of the SPB device.
+
+ Non-stand-alone implementations (supporting other NLPIDs) MUST use
+ the normal IS-IS rules for the establishment of a level 1 domain
+ (i.e., multiple area addresses are allowed only where immediate
+ adjacencies share a common area address). Level 2 operations of
+ course place no such restriction on adjacent area addresses.
+
+10. Level 1/2 Adjacency
+
+ SPBV and SPBM will operate within either an IS-IS level 1 or level 2.
+ As a result, the TLVs specified here MAY propagate in either level 1
+ or level 2 LSPs. IS-IS SPB implementations Must support level 1 and
+ May support level 2 operations. Hierarchical SPB is for further
+ study; therefore, these TLVs Should Not be leaked between level 1 and
+ level 2.
+
+11. Shortest Path Default Tie-Breaking
+
+ The default algorithm is ECT-Algorithm = 00-80-c2-01.
+
+ Two mechanisms are used to ensure symmetry and determinism in the
+ shortest path calculations.
+
+ The first mechanism addresses the problem when different ends (nodes)
+ of an adjacency advertise different values for the SPB-LINK-METRIC.
+ To solve this, SPB shortest path calculations Must use the maximum
+ value of the two nodes' advertised SPB-LINK-METRICs when accumulating
+ and minimizing the (sub)path costs.
+
+ The second mechanism addresses the problem when two equal sums of
+ link metrics (sub)paths are found. To solve this, the (sub)path with
+ the fewest hops between the fork/join points Must win the tie.
+ However, if both (sub)paths have the same number of hops between the
+ fork and join points, then the default tie-breaking Must pick the
+ path traversing the intermediate node with the lower BridgeID. The
+ BridgeID is an 8-byte quantity whose upper 2 bytes are the node's
+ BridgePriority and lower 6 bytes are the node's SYSID.
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 17]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ For example, consider the network in Figure 2 when a shortest path
+ computation is being done from node :1. Upon reaching node :7, two
+ competing sub-paths fork at node :1 and join at node :7, the first
+ via :2 and the second via :6. Assuming that all the nodes advertise
+ a Bridge Priority of 0, the default tie-breaking rule causes the path
+ traversing node :2 to be selected since it has a lower BridgeID
+ {0...:2} than node :6 {0...:6}. Note that the operator may cause the
+ tie-breaking logic to pick the alternate path by raising the Bridge
+ Priority of node :2 above that of node :6.
+
+ The above algorithm guarantees symmetric and deterministic results in
+ addition to having the critical property of transitivity (shortest
+ path is made up of sub-shortest paths).
+
+12. Shortest Path ECT
+
+ Standard ECT Algorithms initially have been proposed ranging from
+ 00-80-c2-01 to 00-80-c2-10.
+
+ To create diversity in routing, SPB defines 16 variations on the
+ above default tie-breaking algorithm; these have worldwide unique
+ designations 00-80-C2-01 through 00-80-C2-10. These designations
+ consist of the IEEE 802.1 OUI (Organizationally Unique Identifier)
+ value 00-80-C2 concatenated with indexes 0X01..0X10. These
+ individual algorithms are implemented by selecting the (sub)path with
+ the lowest value of:
+
+ XOR BYTE BY BYTE(ECT-MASK{ECT-ALGORITHM.index},BridgeID)
+
+ Where:
+
+ ECT-MASK{17} = { 0x00, 0x00, 0xFF, 0x88,
+ 0x77, 0x44, 0x33, 0xCC,
+ 0xBB, 0x22, 0x11, 0x66,
+ 0x55, 0xAA, 0x99, 0xDD,
+ 0xEE };
+
+ XOR BYTE BY BYTE - XORs BridgeID bytes with ECT-MASK
+
+ ECT-MASK{1}, since it XORs with all zeros, yields the default
+ algorithm described above (00-80-C2-01); while ECT-MASK{2}, since it
+ XORs with a mask of all ones, will invert the BridgeID, essentially
+ picking the path traversing the largest Bridge ID. The other ECT-
+ MASKs produce diverse alternatives. In all cases, the
+ BridgePriority, since it is the most significant part of the
+ BridgeID, permits overriding the SYSID as the selection criteria and
+ gives the operator a degree of control on the chosen ECT paths.
+
+
+
+
+Fedyk, et al. Standards Track [Page 18]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ To support many other tie-breaking mechanisms in the future, two
+ opaque ECT TLVs are defined, which may be used to provide parameters
+ to ECT-ALGORITHMs outside of the currently defined space.
+
+ ECT-ALGORITHMs are mapped to VIDs, and then services can be assigned
+ to those VIDs. This permits a degree of traffic engineering since
+ service assignment to VID is consistent end to end through the
+ network.
+
+13. Hello (IIH) Protocol Extensions
+
+ IEEE 802.1aq can run in parallel with other network layer protocols
+ such as IPv4 and IPv6; therefore, failure of two SPB nodes to
+ establish an adjacency MUST NOT cause rejection of an adjacency for
+ the purposes of other network layer protocols.
+
+ IEEE 802.1aq has been assigned the NLPID value 0xC1 [RFC6328], which
+ MUST be used by Shortest Path Bridges (SPBs) to indicate their
+ ability to run 802.1aq. This is done by including this NLPID value
+ in the IS-IS IIH PDU Protocols Supported TLV (type 129). 802.1aq
+ frames MUST only flow on adjacencies that advertise this NLPID in
+ both directions of the IIH PDUs. 802.1aq computations MUST consider
+ an adjacency that has not advertised 0xC1 NLPID in both directions as
+ non-existent (infinite link metric) and MUST ignore any IIH SPB TLVs
+ they receive over such adjacencies.
+
+
+ IEEE 802.1aq augments the normal IIH PDU with three new TLVs, which
+ like all other SPB TLVs, travel within Multi-Topology [MT] TLVs,
+ therefore allowing multiple logical instances of SPB within a single
+ IS-IS protocol instance.
+
+ Since SPB can use many VIDs and Must agree on which VIDs are used for
+ which purposes, the IIH PDUs carry a digest of all the used VIDs (on
+ the NNIs) referred to as the SPB-MCID TLV, which uses a common and
+ compact encoding reused from 802.1Q.
+
+ SPB neighbors May support a mechanism to verify that the contents of
+ their topology databases are synchronized (for the purposes of loop
+ prevention). This is done by exchanging a digest of SPB topology
+ information (computed over all MT IDs) and taking specific actions on
+ forwarding entries when the digests indicate a mismatch in topology.
+ This digest is carried in the Optional SPB-Digest sub-TLV.
+
+ Finally, SPB needs to know which SPT Sets (defined by ECT-ALGORITHMs)
+ are being used by which VIDs, and this is carried in the Base VLAN
+ Identifiers (SPB-B-VID) sub-TLV.
+
+
+
+
+Fedyk, et al. Standards Track [Page 19]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+13.1. SPB-MCID Sub-TLV
+
+ This sub-TLV is added to an IIH PDU to indicate the digest for the
+ multiple spanning tree configuration a.k.a. MCID. This TLV is a
+ digest of local configuration of which VIDs are running which
+ protocols. (The information is not to the level of a specific
+ algorithm in the case of SPB.) This information Must be the same on
+ all bridges in the SPT Region controlled by an IS-IS instance. The
+ data used to generate the MCID is populated by configuration and is a
+ digest of the VIDs allocated to various protocols. Two MCIDs are
+ carried to allow non-disruptive transitions between configurations
+ when the changes are non-critical.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type=SPB-MCID | = 4
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MCID (51 Bytes) |
+ | ............... |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Aux MCID (51 Bytes) |
+ | ............... |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ o Type: sub-TLV type 4.
+
+ o Length: The size of the value defined below (102).
+
+ o MCID (51 bytes): The complete MCID defined in IEEE 802.1Q, which
+ identifies an SPT Region on the basis of matching assignments of
+ VIDs to control regimes (xSTP, SPBV, SPBM, etc.). Briefly, the
+ MCID consists of a 1-byte format selector, a 32-byte configuration
+ name, a 2-byte revision level, and finally a 16-byte signature of
+ type HMAC-MD5 over an array of 4096 elements that contain
+ identifiers of the use of the corresponding VID. Refer to Section
+ 13.8 of [802.1aq] for the exact format and procedure. Note that
+ the use of the VID does not include specification of a specific
+ SPB ECT-ALGORITHM; rather, it is coarser grain.
+
+ o Aux MCID (51 bytes): The complete MCID defined in IEEE 802.1Q,
+ which identifies an SPT Region. The aux MCID allows SPT Regions
+ to be migrated by the allocation of new VLAN to FDB Mappings
+ without interruption to existing traffic.
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 20]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ The SPB-MCID sub-TLV is carried within the MT-Port-Cap TLV [RFC6165]
+ with the MT ID value of 0, which in turn is carried in an IIH PDU.
+
+13.2. SPB-Digest Sub-TLV
+
+ This sub-TLV is Optionally added to an IIH PDU to indicate the
+ current SPB topology digest value. It is always carried in an
+ MT-Port-Cap TLV [RFC6165] with an MT ID value of 0. This information
+ should settle to be the same on all bridges in an unchanging
+ topology. Matching digests indicate (with extremely high
+ probability) that the topology view between two SPBs is synchronized;
+ this match (or lack of match) is used to control the updating of
+ forwarding information. The SPB Agreement Digest is computed based
+ on contributions derived from the current topologies of all SPB MT
+ instances and is designed to change when significant topology changes
+ occur within any SPB instance.
+
+ During the propagation of LSPs, the Agreement Digest may vary between
+ neighbors until the key topology information in the LSPs is common.
+ The digest is therefore a summarized means of determining agreement
+ between nodes on database commonality, and hence of inferring
+ agreement on the distance to all multicast roots. When present, it
+ is used for loop prevention as follows: for each shortest path tree
+ where it has been determined the distance to the root has changed,
+ "unsafe" multicast forwarding is blocked until the exchanged
+ Agreement Digests match, while "safe" multicast forwarding is allowed
+ to continue despite the disagreement in digests and hence topology
+ views. Section 28.2 of [802.1aq] defines in detail what constitutes
+ "safe" vs. "unsafe".
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type=SPB-Digest| = 5
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-----+-+---+---+
+ | Res |V| A | D | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Agreement Digest (Length - 1) |
+ | ............... |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ o Type: sub-TLV type 5.
+
+ o Length: The size of the value.
+
+ o V bit: Agreed digest valid bit. See Section 28.2 of [802.1aq].
+
+
+
+Fedyk, et al. Standards Track [Page 21]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ o A (2 bits): The Agreement Number 0-3, which aligns with the BPDU's
+ Agreement Number concept [802.1aq]. When the Agreement Digest for
+ this node changes, this number is incremented. The node then
+ checks for Agreement Digest match (as below). The new local
+ Agreement Number and the updated local Discarded Agreement Number
+ are then transmitted with the new Agreement Digest to the node's
+ neighbors in the Hello PDU. Once an Agreement Number has been
+ sent, it is considered outstanding until a matching or more recent
+ Discarded Agreement Number is received from the neighbor.
+
+ o D (2 bits): The Discarded Agreement Number 0-3, which aligns with
+ BPDU's Agreement Number concept. When an Agreement Digest is
+ received from a neighbor, this number is set to the received
+ Agreement Number to signify that this node has received this new
+ agreement and discarded any previous ones. The node then checks
+ whether the local and received Agreement Digests match. If they
+ do, this node then sets:
+
+ the local Discarded Agreement Number = received Agreement Number +
+ 1
+
+ If the Agreement Digests match, AND received Discarded Agreement
+ Number ==
+ local Agreement Number + N (N = 0 || 1)
+
+ then the node has a topology matched to its neighbor.
+
+ Whenever the local Discarded Agreement Number relating to a
+ neighbor changes, the local Agreement Digest, Agreement Number,
+ and Discarded Agreement Number are transmitted.
+
+ o Agreement Digest. This digest is used to determine when SPB is
+ synchronized between neighbors for all SPB instances. The
+ Agreement Digest is a hash computed over the set of all SPB
+ adjacencies in all SPB instances. In other words, the digest
+ includes all VIDs and all adjacencies for all MT instances of SPB
+ (but not other network layer protocols). This reflects the fact
+ that all SPB nodes in a region Must have identical VID allocations
+ (see Section 13.1), and so all SPB instances will contain the same
+ set of nodes. The exact procedure for computing the Agreement
+ Digest and its size are defined in Section 28.2 of [802.1aq].
+
+ The SPB-Digest sub-TLV is carried within the MT-Port-Cap TLV
+ [RFC6165] (with the MT ID value 0), which in turn is carried in an
+ IIH PDU.
+
+ When supported, this sub-TLV MUST be carried on every IIH between SPB
+ neighbors, not just when a Digest changes.
+
+
+
+Fedyk, et al. Standards Track [Page 22]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ When one peer supports this TLV and the other does not, loop
+ prevention by Agreement Digest Must Not be done by either side.
+
+13.3. SPB Base VLAN Identifiers (SPB-B-VID) Sub-TLV
+
+ This sub-TLV is added to an IIH PDU to indicate the mappings between
+ ECT algorithms and Base VIDs (and by implication the VID(s) used on
+ the forwarding path for each SPT Set for a VLAN identified by a Base
+ VID) that are in use. Under stable operational conditions, this
+ information should be the same on all bridges in the topology
+ identified by the MT-Port-Cap TLV [RFC6165] it is being carried
+ within.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type= SPB-B-VID| = 68
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-----------------------------------------------+
+ | ECT-VID Tuple (1) (6 bytes) |
+ +---------------------------------+-----------------------------+
+ | ... | ECT-VID Tuple(2) (6 bytes) |
+ +---------------------------------+-----------------------------+
+ | ..... |
+ +---------------------------------------------------------------+
+ | ..... |
+ | ..... |
+ +---------------------------------------------------------------+
+
+ o Type: sub-TLV type 6.
+
+ o Length: The size of the value is ECT-VID Tuples*6 bytes. Each
+ 6-byte part of the ECT-VID tuple is formatted as follows:
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | ECT-ALGORITHM (32 bits) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Base VID (12 bits) |U|M|RES|
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ o ECT-ALGORITHM (4 bytes): The ECT-ALGORITHM is advertised when the
+ bridge supports a given ECT-ALGORITHM (by OUI/Index) on a given
+ Base VID. There are 17 predefined IEEE algorithms for SPB with
+ index values 0X00..0X10 occupying the low 8 bits and the IEEE
+ OUI=00-80-C2 occupying the top 24 bits of the ECT-ALGORITHM.
+
+
+
+Fedyk, et al. Standards Track [Page 23]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ o Base VID (12 bits): The Base VID that is associated with the SPT
+ Set.
+
+ o Use-Flag (1 bit): The Use-Flag is set if this bridge, or any
+ bridge in the LSDB, is currently using this ECT-ALGORITHM and Base
+ VID. Remote usage is discovered by inspection of the U bit in the
+ SPB-Inst sub-TLV of other SPB bridges (see Section 14.1)
+
+ o M bit (1 bit): The M bit indicates if this Base VID operates in
+ SPBM (M = 1) or SPBV (M = 0) mode.
+
+ The SPB-B-VID sub-TLV is carried within the MT-Port-Cap TLV
+ [RFC6165], which in turn is carried in an IIH PDU.
+
+14. Node Information Extensions
+
+ All SPB nodal information extensions travel within a new multi-
+ topology capability TLV MT-Capability (type 144).
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type = MT-CAP | = 144
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |O R R R| MT ID | (2 bytes)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ (sub-TLVs ... )
+
+ The format of this TLV is identical in its first 2 bytes to all
+ current MT TLVs and carries the MT ID as defined in [MT].
+
+ The O (overload) bit carried in bit 16 has the same semantics as
+ specified in [MT], but in the context of SPB adjacencies only.
+
+ There can be multiple MT-Capability TLVs present, depending on the
+ amount of information that needs to be carried.
+
+14.1. SPB Instance (SPB-Inst) Sub-TLV
+
+ The SPB-Inst sub-TLV gives the SPSourceID for this node/topology
+ instance. This is the 20-bit value that is used in the formation of
+ multicast DAs for frames originating from this node/instance. The
+ SPSourceID occupies the upper 20 bits of the multicast DA together
+ with 4 other bits (see the SPBM 802.1ah multicast DA address format
+ section). This sub-TLV MUST be carried within the MT-Capability TLV
+ in the fragment ZERO LSP. If there is an additional SPB instance, it
+
+
+
+Fedyk, et al. Standards Track [Page 24]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ MUST be declared under a separate MT-Capability TLV and also carried
+ in the fragment ZERO LSP.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type = SPB-Inst| = 1
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | CIST Root Identifier (4 bytes) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | CIST Root Identifier (cont) (4 bytes) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | CIST External Root Path Cost (4 bytes) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Bridge Priority | (2 bytes)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |R R R R R R R R R R R|V| SPSourceID |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Num of Trees | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | VLAN-ID (1) Tuples (8 bytes) |
+ | ........................... |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ ...........................
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | VLAN-ID (N) Tuples (8 bytes) |
+ | ........................... |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ where VLAN-ID tuples have the format as:
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |U|M|A| Res |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | ECT-ALGORITHM (32 bits) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Base VID (12 bits) | SPVID (12 bits) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ o Type: sub-TLV type 1.
+
+ o Length: Total number of bytes contained in the value field.
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 25]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ o CIST Root Identifier (64 bits): The CIST Root Identifier is for
+ SPB interworking with Rapid STP (RSTP) and Multiple STP (MSTP) at
+ SPT Region boundaries. This is an imported value from a spanning
+ tree.
+
+ o CIST External Root Path Cost (32 bits): The CIST External Root
+ Path Cost is the cost to root, derived from the spanning tree
+ algorithm.
+
+ o Bridge Priority (16 bits): Bridge priority is the 16 bits that
+ together with the 6 bytes of the System ID form the Bridge
+ Identifier. This allows SPB to build a compatible spanning tree
+ using link state by combining the Bridge Priority and the System
+ ID to form the 8-byte Bridge Identifier. The 8-byte Bridge
+ Identifier is also the input to the 16 predefined ECT tie-breaker
+ algorithms.
+
+ o V bit (1 bit): The V bit (SPBM) indicates this SPSourceID is auto-
+ allocated (Section 27.11 of [802.1aq]). If the V bit is clear,
+ the SPSourceID has been configured and Must be unique. Allocation
+ of SPSourceID is defined in IEEE [802.1aq]. Bridges running SPBM
+ will allocate an SPSourceID if they are not configured with an
+ explicit SPSourceID. The V bit allows neighbor bridges to
+ determine if the auto-allocation was enabled. In the rare chance
+ of a collision of SPsourceID allocation, the bridge with the
+ highest priority Bridge Identifier will win conflicts. The lower
+ priority bridge will be re-allocated; or, if the lower priority
+ bridge is configured, it will not be allowed to join the SPT
+ Region.
+
+ o SPSourceID: a 20-bit value used to construct multicast DAs as
+ described below for multicast frames originating from the origin
+ (SPB node) of the Link State Packet (LSP) that contains this TLV.
+ More details are in IEEE [802.1aq].
+
+ o Number of Trees (8 bits): The Number of Trees is set to the number
+ of {ECT-ALGORITHM, Base VID plus flags} tuples that follow. Each
+ ECT-ALGORITHM has a Base VID, an SPVID, and flags described below.
+ This Must contain at least the one ECT-ALGORITHM (00-80-C2-01).
+
+ Each VID Tuple consists of:
+
+ o U bit (1 bit): The U bit is set if this bridge is currently using
+ this ECT-ALGORITHM for I-SIDs it sources or sinks. This is a
+ strictly local indication; the semantics differ from the Use-Flag
+ found in the Hello, which will set the Use-Flag if it sees other
+ nodal U bits are set OR it sources or sinks itself.
+
+
+
+
+Fedyk, et al. Standards Track [Page 26]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ o M bit (1 bit): The M bit indicates if this is SPBM or SPBV mode.
+ When cleared, the mode is SPBV; when set, the mode is SPBM.
+
+ o A bit (1 bit): The A bit (SPB), when set, declares this is an
+ SPVID with auto-allocation. The VID allocation logic details are
+ in IEEE [802.1aq]. Since SPVIDs are allocated from a small pool
+ of 12-bit resources, the chances of collision are high. To
+ minimize collisions during auto-allocation, LSPs are initially
+ advertised with the originating bridge setting the SPVID to 0.
+ Only after learning the other bridges' SPVID allocations does this
+ bridge re-advertise this sub-TLV with a non-zero SPVID. This will
+ minimize but not eliminate the chance of a clash. In the event of
+ a clash, the highest Bridge Identifier is used to select the
+ winner, while the loser(s) with lower Bridge Identifier(s) Must
+ withdraw their SPVID allocation(s) and select an alternative
+ candidate for another trial. SPVID May also be configured. When
+ the A bit is set to not specify auto-allocation and the SPVID is
+ set to 0, this SPBV bridge is used for transit only within the SPB
+ region. If a port is configured with the Base VID as a neighbor
+ using RSTP or MSTP, the bridge will act as an ingress filter for
+ that VID.
+
+ o ECT-ALGORITHM (4 bytes): ECT-ALGORITHM is advertised when the
+ bridge supports a given ECT-ALGORITHM (by OUI/Index) on a given
+ VID. This declaration Must match the declaration in the Hello PDU
+ originating from the same bridge. The ECT-ALGORITHM and Base VID
+ Must match what is generated in the IIHs of the same node. The
+ ECT-ALGORITHM, Base VID tuples can come in any order, however.
+ There are currently 17 worldwide unique 802.1aq defined ECT-
+ ALGORITHMs given by values 00-80-C2-00 through 00-80-C2-10.
+
+ o Base VID (12 bits): The Base VID that associated the SPT Set via
+ the ECT-ALGORITHM.
+
+ o SPVID (12 bits): The SPVID is the Shortest Path VID assigned for
+ the Base VID to this node when using SPBV mode. It is not defined
+ for SPBM mode and Must be 0 for SPBM mode B-VIDs.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 27]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+14.1.1. SPB Instance Opaque ECT-ALGORITHM (SPB-I-OALG) Sub-TLV
+
+ There are multiple ECT algorithms defined for SPB; however, for the
+ future, additional algorithms may be defined including but not
+ limited to ECMP- or hash-based behaviors and (*,G) multicast trees.
+ These algorithms will use this Optional TLV to define new algorithm
+ parametric data. For tie-breaking parameters, there are two broad
+ classes of algorithm, one that uses nodal data to break ties and one
+ that uses link data to break ties. This sub-TLV is used to associate
+ opaque tie-breaking data with a node. This sub-TLV, when present,
+ MUST be carried within the MT-Capability TLV (along with a valid SPB-
+ Inst sub-TLV). Multiple copies of this sub-TLV MAY be carried for
+ different ECT-ALGORITHMs relating to this node.
+
+ There are of course many other uses of this opaque data that have yet
+ to be defined.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type=SPB-I-OALG| = 2
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Opaque ECT-ALGORITHM (4 bytes) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Opaque ECT Information (variable) |
+ | ....................... |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ o Type: sub-TLV type 2.
+
+ o Length: Total number of bytes contained in the value field.
+
+ o ECT-ALGORITHM: ECT-ALGORITHM is advertised when the bridge
+ supports a given ECT-ALGORITHM (by OUI/Index) on a given VID.
+
+ o ECT Information: ECT-ALGORITHM Information of variable length
+ which SHOULD be in sub-TLV format with an IANA numbering space
+ where appropriate.
+
+
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 28]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+15. Adjacency Information Extensions
+
+15.1. SPB Link Metric (SPB-Metric) Sub-TLV
+
+ The SPB-Metric sub-TLV (type 29) occurs within the Multi-Topology
+ Intermediate System Neighbor (MT-ISN) TLV (type 222) or within the
+ Extended IS Reachability TLV (type 22). If this sub-TLV is not
+ present for an IS-IS adjacency, then that adjacency Must not carry
+ SPB traffic for the given topology instance.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type=SPB-Metric| = 29
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | SPB-LINK-METRIC | (3 bytes)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Num of Ports | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Port Identifier | ( 2 bytes)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ o Type: sub-TLV type 29.
+
+ o Length: Total number of bytes contained in the value field.
+
+ o SPB-LINK-METRIC: the administrative cost or weight of using this
+ link as a 24-bit unsigned number. This metric applies to the use
+ of this link for SPB traffic only. Smaller numbers indicate lower
+ weights and are more likely to carry SPB traffic. Only one metric
+ is allowed per SPB instance per link. If multiple metrics are
+ required, multiple SPB instances Must be used, either within IS-IS
+ or within several independent IS-IS instances. If this metric is
+ different at each end of a link, the maximum of the two values
+ Must be used in all SPB calculations for the weight of this link.
+ The maximum SPB-LINK-METRIC value 2^24 - 1 has a special
+ significance; this value indicates that although the IS-IS
+ adjacency has formed, incompatible values have been detected in
+ parameters configured within SPB itself (for example, different
+ regions), and the link Must Not be used for carrying SPB traffic.
+ Full details are found in [802.1aq].
+
+ o Num of Ports: the number of ports associated with this link.
+
+ o Port Identifier: the standard IEEE port identifier used to build a
+ spanning tree associated with this link.
+
+
+
+Fedyk, et al. Standards Track [Page 29]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+15.1.1. SPB Adjacency Opaque ECT-ALGORITHM (SPB-A-OALG) Sub-TLV
+
+ There are multiple ECT algorithms defined for SPB; however, for the
+ future, additional algorithms may be defined. The SPB-A-OALG sub-TLV
+ occurs within the Multi-Topology Intermediate System TLV (type 222)
+ or the Extended IS Reachability TLV (type 22). Multiple copies of
+ this sub-TLV MAY be carried for different ECT-ALGORITHMs related to
+ this adjacency.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type=SPB-A-OALG| = 30
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Opaque ECT Algorithm (4 bytes) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Opaque ECT Information (variable) |
+ | ......................... |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ o Type: sub-TLV type 30.
+
+ o Length: Total number of bytes contained in the value field.
+
+ o ECT-ALGORITHM: ECT-ALGORITHM is advertised when the bridge
+ supports a given ECT-ALGORITHM (by OUI/Index) on a given VID.
+
+ o ECT Information: ECT-ALGORITHM Information of variable length in
+ sub-TLV format using new IANA type values as appropriate.
+
+16. Service Information Extensions
+
+16.1. SPBM Service Identifier and Unicast Address (SPBM-SI) Sub-TLV
+
+ The SPBM-SI sub-TLV (type 3) is used to introduce service group
+ membership on the originating node and/or to advertise an additional
+ B-MAC unicast address present on, or reachable by the node.
+
+
+
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 30]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ |Type = SPBM-SI | = 3
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | B-MAC ADDRESS |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | B-MAC ADDRESS (6 bytes) | Res. | Base VID (12 bits) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |T|R| Reserved | I-SID #1 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |T|R| Reserved | I-SID #2 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ .................
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |T|R| Reserved | I-SID #n |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ o Type: sub-TLV type 3.
+
+ o Length: Total number of bytes contained in the value field.
+
+ o B-MAC ADDRESS: a unicast address of this node. It may be the
+ single nodal address, or it may address a port or any other level
+ of granularity relative to the node. In the case where the node
+ only has one B-MAC address, this Should be the same as the SYSID
+ of the node. To add multiple B-MACs this TLV MUST be repeated per
+ additional B-MAC.
+
+ o Base VID (12 bits): The Base VID associated with the B-BMAC allows
+ the linkage to the ECT-ALGORITHM and SPT Set defined in the SPB-
+ Inst sub-TLV.
+
+ o I-SID #1 .. #n: 24-bit service group membership identifiers. If
+ two nodes have an I-SID in common, intermediate nodes on the
+ unique shortest path between them will create forwarding state for
+ the related B-MAC addresses and will also construct multicast
+ forwarding state using the I-SID and the node's SPSourceID to
+ construct a multicast DA as described in IEEE 802.1aq LSB. Each
+ I-SID has a Transmit (T) and Receive (R) bit that indicates if the
+ membership is as a transmitter, a receiver, or both (with both
+ bits set). In the case where the Transmit (T) and Receive (R)
+ bits are both zero, the I-SID instance is ignored for the purposes
+ of distributed multicast computation, but the unicast B-MAC
+ address Must be processed and installed at nodes providing transit
+ to that address. If more I-SIDs are associated with a particular
+
+
+
+Fedyk, et al. Standards Track [Page 31]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ B-MAC than can fit in a single sub-TLV, this sub-TLV can be
+ repeated with the same B-MAC but with different I-SID values.
+
+ o Note: When the T bit is not set, an SPB May still multicast to all
+ the other receiving members of this I-SID (those advertising with
+ their R bits set), by configuring edge replication and serial
+ unicast to each member locally.
+
+ The SPBM-SI sub-TLV, when present, MUST be carried within the
+ MT-Capability TLV and can occur multiple times in any LSP fragment.
+
+16.2. SPBV MAC Address (SPBV-ADDR) Sub-TLV
+
+ The SPBV-ADDR sub-TLV is IS-IS sub-TLV type 4. It Should be used for
+ advertisement of Group MAC addresses in SPBV mode. Unicast MAC
+ addresses will normally be distributed by reverse-path learning, but
+ carrying them in this TLV is not precluded. It has the following
+ format:
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ | Type=SPBV-ADDR| = 4 (1 byte)
+ +-+-+-+-+-+-+-+-+
+ | Length | (1 byte)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |R|R| SR| SPVID | (2 bytes)
+ +-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+
+ |T|R| Reserved | MAC 1 Address | (1+6 bytes)
+ +-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+
+ ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+
+ |T|R| Reserved | MAC N Address | (1+6 bytes)
+ +-+-+-+-+-+-+-+-+-+-+-+-+...+-+-+-+-+-+-+-+-+-+-+-+
+
+ o Type: sub-TLV type 4.
+
+ o Length: Total number of bytes contained in the value field. The
+ number of MAC address associated with the SPVID is computed by
+ (Length - 2)/7.
+
+ o SR bits (2 bits): The SR bits are the service requirement
+ parameter from MMRP. The service requirement parameters have the
+ value 0 (Forward all Groups) and 1 (Forward All Unregistered
+ Groups) defined. However, this attribute May also be missing. So
+ the SR bits are defined as 0 not declared, 1 Forward all Groups,
+ and 2 Forward All Unregistered Groups. The two 'R' reserved bits
+
+
+
+
+Fedyk, et al. Standards Track [Page 32]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ immediately preceding these SR bits Shall be set to zero when
+ originating this sub-TLV and Shall be ignored on receipt.
+
+ o SPVID (12 bits): The SPVID and by association Base VID and the
+ ECT-ALGORITHM and SPT Set that the MAC addresses defined below
+ will use. If the SPVID is not allocated the SPVID Value is 0.
+ Note that if the ECT-ALGORITHM in use is spanning tree algorithm
+ this value Must be populated with the Base VID and the MAC Must be
+ populated.
+
+ o T bit (1 bit): This is the Transmit allowed bit for a following
+ group MAC address. This is an indication that the Group MAC
+ address in the context of the SPVID of the bridge advertising this
+ Group MAC Must be installed in the FDB of transit bridges, when
+ the bridge computing the trees is on the corresponding ECT-
+ ALGORITHM shortest path between the bridge advertising this MAC
+ with the T bit set and any receiver of this Group MAC address. A
+ bridge that does not advertise this bit set for a MAC address Must
+ Not cause multicast forwarding state to be installed on other
+ transit bridges in the network for traffic originating from that
+ bridge.
+
+ o R bit (1 bit): This is the Receive allowed bit for the following
+ MAC address. This is an indication that MAC addresses as the
+ receiver Must be populated and installed when the bridge computing
+ the trees lies on the corresponding shortest path for this ECT-
+ ALGORITHM between this receiver and any transmitter to this MAC
+ address. An entry that does not have this bit set for a Group MAC
+ address is prevented from receiving on this Group MAC address
+ because transit bridges Must Not install multicast forwarding
+ state towards it in their FDBs.
+
+ o MAC Address (48 bits): The MAC address declares this bridge as
+ part of the multicast interest for this destination MAC address.
+ Multicast trees can be efficiently constructed for destination by
+ populating FDB entries for the subset of the shortest path tree
+ that connects the bridges supporting the MAC address. This
+ replaces the function of MMRP for SPTs. The T and R bits above
+ have meaning as specified above.
+
+ The SPBV-ADDR sub-TLV, when present, MUST be carried within the
+ MT-Capability TLV and can occur multiple times in any LSP fragment.
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 33]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+17. Security Considerations
+
+ This document adds no additional security risks to IS-IS, nor does it
+ provide any additional security for IS-IS when used in a configured
+ environment or a single-operator domain such as a data center.
+
+ However, this protocol may be used in a zero-configuration
+ environment. Zero configuration may apply to the automatic detection
+ and formation of an IS-IS adjacency (forming an NNI port). Likewise,
+ zero configuration may apply to the automatic detection of VLAN-
+ tagged traffic and the formation of a UNI port, with resultant I-SID
+ advertisements.
+
+ If zero configuration methods are used to autoconfigure NNIs or UNIs,
+ there are intrinsic security concerns that should be mitigated with
+ authentication procedures for the above cases. Such procedures are
+ beyond the scope of this document and are yet to be defined.
+
+ In addition, this protocol can create significant amounts of
+ multicast state when an I-SID is advertised with the T bit set.
+ Extra care should be taken to ensure that this cannot be used in a
+ denial-of-service attack [RFC4732] in a zero-configuration
+ environment.
+
+18. IANA Considerations
+
+ Note that the NLPID value 0xC1 [RFC6328] used in the IIH PDUs has
+ already been assigned by IANA for the purpose of 802.1aq; therefore,
+ no further action is required for this code point.
+
+ Since 802.1aq operates within the IS-IS Multi-Topology framework,
+ every sub-TLV MUST occur in the context of the proper MT TLV (with
+ the exception of the SPB-Metric sub-TLV, which MAY travel in TLV 22
+ where its MT ID is unspecified but implied to be 0). IANA has
+ allocated sub-TLVs for three Multi-Topology TLVs per 802.1aq. These
+ are the MT-Port-Cap TLV [RFC6165] used in the IIH, the MT-Capability
+ TLV (new) used within the LSP, and finally the MT-ISN TLV [MT] used
+ to contain adjacency information within the LSP.
+
+ This document creates the following TLVs and sub-TLVs within the IIH
+ and LSP PDUs MT TLVs as described below. The '*' indicates new IANA
+ assignments (per this document). Other entries are shown to provide
+ context only.
+
+ The MT-Capability TLV is the only TLV that required a new sub-
+ registry. Type value 144 has been assigned, with a starting sub-TLV
+ value of 1, and managed by Expert Review.
+
+
+
+
+Fedyk, et al. Standards Track [Page 34]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+ +-----+----+-----------------+--------+------+-------------+
+ | PDU |TLV | SUB-TLV | TYPE | TYPE | #OCCURRENCE |
+ +-----+----+-----------------+--------+------+-------------+
+ IIH
+ MT-Port-Cap 143
+ * SPB-MCID 4 1
+ * SPB-Digest 5 >=0
+ * SPB-B-VID 6 1
+
+ LSP
+ * MT-Capability 144 >=1
+ * SPB-Inst 1 1
+ * SPB-I-OALG 2 >=0
+ * SPBM-SI 3 >=0
+ * SPBV-ADDR 4 >=0
+
+ MT-ISN 222
+ or Extended IS Reachability 22
+ * SPB-Metric 29 1
+ * SPB-A-OALG 30 >=0
+
+19. References
+
+19.1. Normative References
+
+ [802.1aq] "Standard for Local and Metropolitan Area Networks:
+ Virtual Bridges and Virtual Bridged Local Area Networks -
+ Amendment 9: Shortest Path Bridging", IEEE P802.1aq, Draft
+ 4.6, 2012.
+
+ [IS-IS] ISO/IEC 10589:2002, Second Edition, "Intermediate System
+ to Intermediate System Intra-Domain Routing Exchange
+ Protocol for use in Conjunction with the Protocol for
+ Providing the Connectionless-mode Network Service (ISO
+ 8473)", 2002.
+
+ [MT] Przygienda, T., Shen, N., and N. Sheth, "M-ISIS: Multi
+ Topology (MT) Routing in Intermediate System to
+ Intermediate Systems (IS-ISs)", RFC 5120, February 2008.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC6165] Banerjee, A. and D. Ward, "Extensions to IS-IS for Layer-2
+ Systems", RFC 6165, April 2011.
+
+ [RFC6328] Eastlake 3rd, D., "IANA Considerations for Network Layer
+ Protocol Identifiers", BCP 164, RFC 6328, July 2011.
+
+
+
+Fedyk, et al. Standards Track [Page 35]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+19.2. Informative References
+
+ [802.1ag] "Standard for Local and Metropolitan Area Networks /
+ Virtual Bridged Local Area Networks / Amendment 5:
+ Connectivity Fault Management", IEEE STD 802.1ag, 2007.
+
+ [MMRP] "Standard for Local and Metropolitan Area Networks Virtual
+ Bridged Local Area Networks - Amendment 07: Multiple
+ Registration Protocol", IEEE STD 802.1ak, 2007.
+
+ [PB] "Standard for Local and Metropolitan Area Networks /
+ Virtual Bridged Local Area Networks / Amendment 4:
+ Provider Bridges", IEEE STD 802.1ad, 2005.
+
+ [PBB] "Standard for Local and Metropolitan Area Networks /
+ Virtual Bridged Local Area Networks / Amendment 7:
+ Provider Backbone Bridges", IEEE STD 802.1ah, 2008.
+
+ [RFC4732] Handley, M., Ed., Rescorla, E., Ed., and IAB, "Internet
+ Denial-of-Service Considerations", RFC 4732, December
+ 2006.
+
+ [Y.1731] ITU-T, "OAM Functions and Mechanisms for Ethernet based
+ networks", ITU-T Y.1731, 2006.
+
+20. Acknowledgments
+
+ The authors would like to thank Ayan Banerjee, Mick Seaman, Janos
+ Farkas, Les Ginsberg, Stewart Bryant , Donald Eastlake, Matthew Bocci
+ and Mike Shand for contributions and/or detailed review.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 36]
+
+RFC 6329 IS-IS Support of IEEE 802.1aq April 2012
+
+
+Authors' Addresses
+
+ Don Fedyk (editor)
+ Alcatel-Lucent
+ Groton, MA 01450
+ USA
+ EMail: Donald.Fedyk@alcatel-lucent.com
+
+ Peter Ashwood-Smith (editor)
+ Huawei Technologies Canada Ltd.
+ 303 Terry Fox Drive, Suite 400
+ Kanata, Ontario, K2K 3J1
+ CANADA
+ EMail: Peter.AshwoodSmith@huawei.com
+
+ Dave Allan
+ Ericsson
+ 300 Holger Way
+ San Jose, CA 95134
+ USA
+ EMail: david.i.allan@ericsson.com
+
+ Nigel Bragg
+ Ciena Limited
+ Ciena House
+ 43-51 Worship Street
+ London EC2A 2DX
+ UK
+ EMail: nbragg@ciena.com
+
+ Paul Unbehagen
+ Avaya
+ 8742 Lucent Boulevard
+ Highlands Ranch, CO 80129
+ USA
+ EMail: unbehagen@avaya.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fedyk, et al. Standards Track [Page 37]
+