summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9062.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc9062.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc9062.txt')
-rw-r--r--doc/rfc/rfc9062.txt867
1 files changed, 867 insertions, 0 deletions
diff --git a/doc/rfc/rfc9062.txt b/doc/rfc/rfc9062.txt
new file mode 100644
index 0000000..fb74882
--- /dev/null
+++ b/doc/rfc/rfc9062.txt
@@ -0,0 +1,867 @@
+
+
+
+
+Internet Engineering Task Force (IETF) S. Salam
+Request for Comments: 9062 A. Sajassi
+Category: Informational Cisco
+ISSN: 2070-1721 S. Aldrin
+ Google
+ J. Drake
+ Juniper
+ D. Eastlake 3rd
+ Futurewei
+ June 2021
+
+
+ Framework and Requirements for Ethernet VPN (EVPN)
+ Operations, Administration, and Maintenance (OAM)
+
+Abstract
+
+ This document specifies the requirements and reference framework for
+ Ethernet VPN (EVPN) Operations, Administration, and Maintenance
+ (OAM). The requirements cover the OAM aspects of EVPN and Provider
+ Backbone Bridge EVPN (PBB-EVPN). The framework defines the layered
+ OAM model encompassing the EVPN service layer, network layer,
+ underlying Packet Switched Network (PSN) transport layer, and link
+ layer but focuses on the service and network layers.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are candidates for any level of Internet
+ Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9062.
+
+Copyright Notice
+
+ Copyright (c) 2021 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 1.1. Relationship to Other OAM Work
+ 1.2. Specification of Requirements
+ 1.3. Terminology
+ 2. EVPN OAM Framework
+ 2.1. OAM Layering
+ 2.2. EVPN Service OAM
+ 2.3. EVPN Network OAM
+ 2.4. Transport OAM for EVPN
+ 2.5. Link OAM
+ 2.6. OAM Interworking
+ 3. EVPN OAM Requirements
+ 3.1. Fault Management Requirements
+ 3.1.1. Proactive Fault Management Functions
+ 3.1.1.1. Fault Detection (Continuity Check)
+ 3.1.1.2. Defect Indication
+ 3.1.1.2.1. Forward Defect Indication (FDI)
+ 3.1.1.2.2. Reverse Defect Indication (RDI)
+ 3.1.2. On-Demand Fault Management Functions
+ 3.1.2.1. Connectivity Verification
+ 3.1.2.2. Fault Isolation
+ 3.2. Performance Management
+ 3.2.1. Packet Loss
+ 3.2.2. Packet Delay and Jitter
+ 4. Security Considerations
+ 5. IANA Considerations
+ 6. References
+ 6.1. Normative References
+ 6.2. Informative References
+ Acknowledgements
+ Authors' Addresses
+
+1. Introduction
+
+ This document specifies the requirements and defines a reference
+ framework for Ethernet VPN (EVPN) Operations, Administration, and
+ Maintenance (OAM) [RFC6291]. In this context, we use the term "EVPN
+ OAM" to loosely refer to the OAM functions required for and/or
+ applicable to [RFC7432] and [RFC7623].
+
+ EVPN is a Layer 2 VPN (L2VPN) solution for multipoint Ethernet
+ services with advanced multihoming capabilities that uses BGP for
+ distributing Customer/Client Media Access Control (C-MAC) address
+ reachability information over the core MPLS/IP network.
+
+ PBB-EVPN combines Provider Backbone Bridging (PBB) [IEEE-802.1Q] with
+ EVPN in order to reduce the number of BGP MAC advertisement routes;
+ provide client MAC address mobility using C-MAC [RFC7623] aggregation
+ and Backbone MAC (B-MAC) [RFC7623] sub-netting; confine the scope of
+ C-MAC learning to only active flows; offer per-site policies; and
+ avoid C-MAC address flushing on topology changes.
+
+ This document focuses on the fault management and performance
+ management aspects of EVPN OAM. It defines the layered OAM model
+ encompassing the EVPN service layer, network layer, underlying Packet
+ Switched Network (PSN) transport layer, and link layer but focuses on
+ the service and network layers.
+
+1.1. Relationship to Other OAM Work
+
+ This document leverages concepts and draws upon elements defined
+ and/or used in the following documents:
+
+ [RFC6136] specifies the requirements and a reference model for OAM as
+ it relates to L2VPN services, pseudowires, and associated Packet
+ Switched Network (PSN) tunnels. This document focuses on Virtual
+ Private LAN Service (VPLS) and Virtual Private Wire Service (VPWS)
+ solutions and services.
+
+ [RFC8029] defines mechanisms for detecting data plane failures in
+ MPLS Label Switched Paths (LSPs), including procedures to check the
+ correct operation of the data plane as well as mechanisms to verify
+ the data plane against the control plane.
+
+ [IEEE-802.1Q] specifies the Ethernet Connectivity Fault Management
+ (CFM) protocol, which defines the concepts of Maintenance Domains,
+ Maintenance Associations, Maintenance End Points, and Maintenance
+ Intermediate Points.
+
+ [Y.1731] extends Connectivity Fault Management in the following
+ areas: it defines fault notification and alarm suppression functions
+ for Ethernet and specifies mechanisms for Ethernet performance
+ management, including loss, delay, jitter, and throughput
+ measurement.
+
+1.2. Specification of Requirements
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+1.3. Terminology
+
+ This document uses the following terminology, much of which is
+ defined in [RFC6136]:
+
+ CE Customer Edge device; for example, a host, router, or
+ switch.
+
+ CFM Connectivity Fault Management [IEEE-802.1Q]
+
+ DF Designated Forwarder [RFC7432]
+
+ Down MEP A MEP that originates traffic away from and terminates
+ traffic towards the core of the device in whose port it
+ is logically located.
+
+ EVI An EVPN instance spanning the Provider Edge (PE) devices
+ participating in that EVPN [RFC7432].
+
+ L2VPN Layer 2 VPN
+
+ LOC Loss of continuity
+
+ MA Maintenance Association; a set of MEPs belonging to the
+ same Maintenance Domain (MD) established to verify the
+ integrity of a single service instance [IEEE-802.1Q].
+
+ MD Maintenance Domain; an OAM Domain that represents a
+ region over which OAM frames can operate unobstructed
+ [IEEE-802.1Q].
+
+ MEP Maintenance End Point; it is responsible for origination
+ and termination of OAM frames for a given MA. A MEP is
+ logically located in a device's port [IEEE-802.1Q].
+
+ MIP Maintenance Intermediate Point; it is located between
+ peer MEPs and can process and respond to certain OAM
+ frames but does not initiate them. A MIP is logically
+ located in a device's port [IEEE-802.1Q].
+
+ MP2P Multipoint to Point
+
+ NMS Network Management Station [RFC6632]
+
+ P Provider network interior (non-edge) node
+
+ P2MP Point to Multipoint
+
+ PBB Provider Backbone Bridge [RFC7623]
+
+ PE Provider Edge network device
+
+ Up MEP A MEP that originates traffic towards and terminates
+ traffic from the core of the device in whose port it is
+ logically located.
+
+ VPN Virtual Private Network
+
+2. EVPN OAM Framework
+
+2.1. OAM Layering
+
+ Multiple layers come into play for implementing an L2VPN service
+ using the EVPN family of solutions as listed below. The focus of
+ this document is the service and network layers.
+
+ * The service layer runs end to end between the sites or Ethernet
+ segments that are being interconnected by the EVPN solution.
+
+ * The network layer extends between the EVPN PE (Provider Edge)
+ nodes and is mostly transparent to the P (provider network
+ interior) nodes (except where flow entropy comes into play). It
+ leverages MPLS for service (i.e., EVI) multiplexing and split-
+ horizon functions.
+
+ * The transport layer is dictated by the networking technology of
+ the PSN. It may be based on either MPLS LSPs or IP.
+
+ * The link layer is dependent upon the physical technology used.
+ Ethernet is a popular choice for this layer, but other
+ alternatives are deployed (e.g., Packet over SONET (POS), Dense
+ Wavelength Division Multiplexing (DWDM), etc.).
+
+ This layering extends to the set of OAM protocols that are involved
+ in the ongoing maintenance and diagnostics of EVPN networks.
+ Figure 1 below depicts the OAM layering and shows which devices have
+ visibility into what OAM layer(s).
+
+ +---+ +---+
+ +--+ | | +---+ +---+ +---+ | | +--+
+ |CE|----|PE |----| P |----| P |----| P |----|PE |----|CE|
+ +--+ | | +---+ +---+ +---+ | | +--+
+ +---+ +---+
+
+ o-------o----------- Service OAM -----------o-------o
+
+ o----------- Network OAM -----------o
+
+ o--------o--------o--------o--------o Transport OAM
+
+ o----o o----o o----o o----o o----o o----o Link OAM
+
+ Figure 1: OAM Layering
+
+ Service OAM and Network OAM mechanisms only have visibility to the PE
+ nodes but not the P nodes. As such, they can be used to deduce
+ whether the fault is in the customer's own network, the local CE-PE
+ segment, the PE-PE segment, or the remote CE-PE segment(s). EVPN
+ Transport OAM mechanisms can be used for fault isolation between the
+ PEs and P nodes.
+
+ Figure 2 below shows an example network where Ethernet domains are
+ interconnected via EVPN using MPLS, and it shows the OAM mechanisms
+ that are applicable at each layer. The details of the layers are
+ described in the sections below.
+
+ +---+ +---+
+ +--+ | | +---+ +---+ +---+ | | +--+
+ |CE|----|PE |----| P |----| P |----| P |----|PE |----|CE|
+ +--+ | | +---+ +---+ +---+ | | +--+
+ +---+ +---+
+
+ o----o---------- CFM (Service OAM) ----------o----o
+
+ o-------- EVPN Network OAM ---------o
+
+ o--------o--------o--------o--------o MPLS OAM
+
+ o----o o----o o----o o----o o----o o----o 802.3 OAM
+ [IEEE-802.3]
+
+ Figure 2: EVPN OAM Example
+
+2.2. EVPN Service OAM
+
+ The EVPN Service OAM protocol depends on what service-layer
+ technology is being interconnected by the EVPN solution. In the case
+ of [RFC7432] and [RFC7623], the service layer is Ethernet; hence, the
+ corresponding Service OAM protocol is Ethernet CFM [IEEE-802.1Q].
+
+ EVPN Service OAM is visible to the CEs and EVPN PEs but not to the P
+ nodes. This is because the PEs operate at the Ethernet MAC layer in
+ [RFC7432] and [RFC7623], whereas the P nodes do not.
+
+ The EVPN PE MUST support MIP functions in the applicable Service OAM
+ protocol (for example, Ethernet CFM). The EVPN PE SHOULD support MEP
+ functions in the applicable Service OAM protocol. This includes both
+ Up and Down MEP functions.
+
+ As shown in Figure 3, the MIP and MEP functions being referred to are
+ logically located within the device's port operating at the customer
+ level. (There could be MEPs/MIPs within PE ports facing the provider
+ network, but they would not be relevant to EVPN Service OAM as the
+ traffic passing through them will be encapsulated/tunneled, so any
+ customer-level OAM messages will just be treated as data.) Down MEP
+ functions are away from the core of the device while Up MEP functions
+ are towards the core of the device (towards the PE forwarding
+ mechanism in the case of a PE). OAM messages between the PE Up MEPs
+ shown are a type of EVPN Network OAM, while such messages between the
+ CEs or from a PE to its local CE or to the remote CE are Service
+ OAMs.
+
+ +-------+ +----------------+ +----------------+ +-------+
+ |+-----+| |+--------------+| |+--------------+| |+-----+|
+ || CE || || PE || ... || PE || || CE ||
+ |+--+--+| |+---+--------+-+| |+-+--------+---+| |+--+--+|
+ | | | | | | | | | | | | | |
+ |+--+--+| |+---+-----+ . | | . +-----+---+| |+--+--+|
+ || MEP || || | Up ^| . | ... | . | Up ^| || || MEP ||
+ ||DownV|| ||MIP|MEP | . | | . |MEP |MIP|| ||DownV||
+ |+--+--+| || |DownV| . | | . |DownV| || |+--+--+|
+ | | | |+---+-----+ | | | | +-----+---+| | | |
+ +---|---+ +----|--------|--+ +--|--------|----+ +---|---+
+ | | | | | |
+ +------------+ +--- ... ---+ +------------+
+
+ Figure 3: CFM Details
+
+ The EVPN PE MUST, by default, learn the MAC address of locally
+ attached CE MEPs by snooping on CFM frames and advertising them to
+ remote PEs as a MAC/IP Advertisement route. Some means to limit the
+ number of MAC addresses that a PE will learn SHOULD be implemented.
+
+ The EVPN PE SHOULD advertise any MEP/MIP local to the PE as a MAC/IP
+ Advertisement route. Since these are not subject to mobility, they
+ SHOULD be advertised with the static (sticky) bit set (see
+ Section 15.2 of [RFC7432]).
+
+2.3. EVPN Network OAM
+
+ EVPN Network OAM is visible to the PE nodes only. This OAM layer is
+ analogous to Virtual Circuit Connectivity Verification (VCCV)
+ [RFC5085] in the case of VPLS/VPWS. It provides mechanisms to check
+ the correct operation of the data plane as well as a mechanism to
+ verify the data plane against the control plane. This includes the
+ ability to perform fault detection and diagnostics on:
+
+ * the MP2P tunnels used for the transport of unicast traffic between
+ PEs. EVPN allows for three different models of unicast label
+ assignment: label per EVI, label per <ESI, Ethernet Tag>, and
+ label per MAC address. In all three models, the label is bound to
+ an EVPN Unicast Forwarding Equivalence Class (FEC). EVPN Network
+ OAM MUST provide mechanisms to check the operation of the data
+ plane and verify that operation against the control plane view.
+
+ * the MP2P tunnels used for aliasing unicast traffic destined to a
+ multihomed Ethernet segment. The three label assignment models,
+ discussed above, apply here as well. In all three models, the
+ label is bound to an EVPN Aliasing FEC. EVPN Network OAM MUST
+ provide mechanisms to check the operation of the data plane and
+ verify that operation against the control plane view.
+
+ * the multicast tunnels (either MP2P or P2MP) used for the transport
+ of broadcast, unknown unicast, and multicast traffic between PEs.
+ In the case of ingress replication, a label is allocated per EVI
+ or per <EVI, Ethernet Tag> and is bound to an EVPN Multicast FEC.
+ In the case of Label Switched Multicast (LSM) and, more
+ specifically, aggregate inclusive trees, again, a label may be
+ allocated per EVI or per <EVI, Ethernet Tag> and is bound to the
+ tunnel FEC.
+
+ * the correct operation of the Ethernet Segment Identifier (ESI)
+ split-horizon filtering function. In EVPN, a label is allocated
+ per multihomed Ethernet segment for the purpose of performing the
+ access split-horizon enforcement. The label is bound to an EVPN
+ Ethernet segment.
+
+ * the correct operation of the Designated Forwarder (DF) [RFC7432]
+ filtering function. EVPN Network OAM MUST provide mechanisms to
+ check the operation of the data plane and verify that operation
+ against the control plane view for the DF filtering function.
+
+ EVPN Network OAM mechanisms MUST provide in-band monitoring
+ capabilities. It is desirable, to the extent practical, for OAM test
+ messages to share fate with data messages. Details of how to achieve
+ this are beyond the scope of this document.
+
+ EVPN Network OAM SHOULD provide both proactive and on-demand
+ mechanisms of monitoring the data plane operation and data plane
+ conformance to the state of the control plane.
+
+2.4. Transport OAM for EVPN
+
+ The Transport OAM protocol depends on the nature of the underlying
+ transport technology in the PSN. MPLS OAM mechanisms [RFC8029]
+ [RFC6425] as well as ICMP [RFC0792] and ICMPv6 [RFC4443] are
+ applicable, depending on whether the PSN employs MPLS or IP
+ transport, respectively. Furthermore, Bidirectional Forwarding
+ Detection (BFD) mechanisms per [RFC5880], [RFC5881], [RFC5883], and
+ [RFC5884] apply. Also, the BFD mechanisms pertaining to MPLS-TP LSPs
+ per [RFC6428] are applicable.
+
+2.5. Link OAM
+
+ Link OAM depends on the data-link technology being used between the
+ PE and P nodes. For example, if Ethernet links are employed, then
+ Ethernet Link OAM ([IEEE-802.3], Clause 57) may be used.
+
+2.6. OAM Interworking
+
+ When interworking two networking domains, such as actual Ethernet and
+ EVPN to provide an end-to-end emulated service, there is a need to
+ identify the failure domain and location, even when a PE supports
+ both the Service OAM mechanisms and the EVPN Network OAM mechanisms.
+ In addition, scalability constraints may not allow the running of
+ proactive monitoring, such as Ethernet Continuity Check Messages
+ (CCMs) [IEEE-802.1Q], at a PE to detect the failure of an EVI across
+ the EVPN domain. Thus, the mapping of alarms generated upon failure
+ detection in one domain (e.g., actual Ethernet or EVPN network
+ domain) to the other domain is needed. There are also cases where a
+ PE may not be able to process Service OAM messages received from a
+ remote PE over the PSN even when such messages are defined, as in the
+ Ethernet case, thereby necessitating support for fault notification
+ message mapping between the EVPN Network domain and the Service
+ domain.
+
+ OAM interworking is not limited, though, to scenarios involving
+ disparate network domains. It is possible to perform OAM
+ interworking across different layers in the same network domain. In
+ general, alarms generated within an OAM layer, as a result of
+ proactive fault detection mechanisms, may be injected into its
+ client-layer OAM mechanisms. This allows the client-layer OAM to
+ trigger event-driven (i.e., asynchronous) fault notifications. For
+ example, alarms generated by the Link OAM mechanisms may be injected
+ into the Transport OAM layer, and alarms generated by the Transport
+ OAM mechanism may be injected into the Network OAM mechanism, and so
+ on.
+
+ EVPN OAM MUST support interworking between the Network OAM and
+ Service OAM mechanisms. EVPN OAM MAY support interworking among
+ other OAM layers.
+
+3. EVPN OAM Requirements
+
+ This section discusses the EVPN OAM requirements pertaining to fault
+ management and performance management.
+
+3.1. Fault Management Requirements
+
+3.1.1. Proactive Fault Management Functions
+
+ The network operator configures proactive fault management functions
+ to run periodically. Certain actions (for example, protection
+ switchover or alarm indication signaling) can be associated with
+ specific events, such as entering or clearing fault states.
+
+3.1.1.1. Fault Detection (Continuity Check)
+
+ Proactive fault detection is performed by periodically monitoring the
+ reachability between service end points, i.e., MEPs in a given MA,
+ through the exchange of CCMs [IEEE-802.1Q]. The reachability between
+ any two arbitrary MEPs may be monitored for:
+
+ * in-band, per-flow monitoring. This enables per-flow monitoring
+ between MEPs. EVPN Network OAM MUST support fault detection with
+ per-user flow granularity. EVPN Service OAM MAY support fault
+ detection with per-user flow granularity.
+
+ * a representative path. This enables a liveness check of the nodes
+ hosting the MEPs, assuming that the loss of continuity (LOC) to
+ the MEP is interpreted as a failure of the hosting node. This,
+ however, does not conclusively indicate liveness of the path(s)
+ taken by user data traffic. This enables node failure detection
+ but not path failure detection through the use of a test flow.
+ EVPN Network OAM and Service OAM MUST support fault detection
+ using test flows.
+
+ * all paths. For MPLS/IP networks with ECMP, the monitoring of all
+ unicast paths between MEPs (on non-adjacent nodes) may not be
+ possible since the per-hop ECMP hashing behavior may yield
+ situations where it is impossible for a MEP to pick flow entropy
+ characteristics that result in exercising the exhaustive set of
+ ECMP paths. The monitoring of all ECMP paths between MEPs (on
+ non-adjacent nodes) is not a requirement for EVPN OAM.
+
+ The fact that MPLS/IP networks do not enforce congruency between
+ unicast and multicast paths means that the proactive fault detection
+ mechanisms for EVPN networks MUST provide procedures to monitor the
+ unicast paths independently of the multicast paths. This applies to
+ EVPN Service OAM and Network OAM.
+
+3.1.1.2. Defect Indication
+
+ Defect indications can be categorized into two types: forward and
+ reverse, as described below. EVPN Service OAM MUST support at least
+ one of these types of event-driven defect indications upon the
+ detection of a connectivity defect.
+
+3.1.1.2.1. Forward Defect Indication (FDI)
+
+ FDI is used to signal a failure that is detected by a lower-layer OAM
+ mechanism. A server MEP (i.e., an actual or virtual MEP) transmits a
+ forward defect indication in a direction away from the direction of
+ the failure (refer to Figure 4 below).
+
+ Failure
+ |
+ +-----+ +-----+ V +-----+ +-----+
+ | A |------| B |--XXX--| C |------| D |
+ +-----+ +-----+ +-----+ +-----+
+
+ <===========| |============>
+ Forward Forward
+ Defect Defect
+ Indication Indication
+
+ Figure 4: Forward Defect Indication
+
+ Forward defect indication may be used for alarm suppression and/or
+ for the purpose of interworking with other layer OAM protocols.
+ Alarm suppression is useful when a transport-level or network-level
+ fault translates to multiple service- or flow-level faults. In such
+ a scenario, it is enough to alert a network management station (NMS)
+ of the single transport-level or network-level fault in lieu of
+ flooding that NMS with a multitude of Service or Flow granularity
+ alarms. EVPN PEs SHOULD support forward defect indication in the
+ Service OAM mechanisms.
+
+3.1.1.2.2. Reverse Defect Indication (RDI)
+
+ RDI is used to signal that the advertising MEP has detected a LOC
+ defect. RDI is transmitted in the direction of the failure (refer to
+ Figure 5).
+
+ Failure
+ |
+ +-----+ +-----+ V +-----+ +-----+
+ | A |------| B |--XXX--| C |------| D |
+ +-----+ +-----+ +-----+ +-----+
+
+ |===========> <============|
+ Reverse Reverse
+ Defect Defect
+ Indication Indication
+
+ Figure 5: Reverse Defect Indication
+
+ RDI allows single-sided management, where the network operator can
+ examine the state of a single MEP and deduce the overall health of a
+ monitored service. EVPN PEs SHOULD support reverse defect indication
+ in the Service OAM mechanisms. This includes both the ability to
+ signal a LOC defect to a remote MEP as well as the ability to
+ recognize RDI from a remote MEP. Note that, in a multipoint MA, RDI
+ is not a useful indicator of unidirectional fault. This is because
+ RDI carries no indication of the affected MEP(s) with which the
+ sender had detected a LOC defect.
+
+3.1.2. On-Demand Fault Management Functions
+
+ On-demand fault management functions are initiated manually by the
+ network operator and continue for a bounded time period. These
+ functions enable the operator to run diagnostics to investigate a
+ defect condition.
+
+3.1.2.1. Connectivity Verification
+
+ EVPN Network OAM MUST support on-demand connectivity verification
+ mechanisms for unicast and multicast destinations. The connectivity
+ verification mechanisms SHOULD provide a means for specifying and
+ carrying the following in the messages:
+
+ * variable-length payload/padding to test connectivity problems
+ related to the Maximum Transmission Unit (MTU).
+
+ * test frame formats as defined in Appendix C of [RFC2544] to detect
+ potential packet corruption.
+
+ EVPN Network OAM MUST support connectivity verification at per-flow
+ granularity. This includes both user flows (to test a specific path
+ between PEs) as well as test flows (to test a representative path
+ between PEs).
+
+ EVPN Service OAM MUST support connectivity verification on test flows
+ and MAY support connectivity verification on user flows.
+
+ For multicast connectivity verification, EVPN Network OAM MUST
+ support reporting on:
+
+ * the DF filtering status of a specific port(s) or all the ports in
+ a given bridge domain.
+
+ * the split-horizon filtering status of a specific port(s) or all
+ the ports in a given bridge domain.
+
+3.1.2.2. Fault Isolation
+
+ EVPN OAM MUST support an on-demand fault localization function. This
+ involves the capability to narrow down the locality of a fault to a
+ particular port, link, or node. The characteristic of forward/
+ reverse path asymmetry in MPLS/IP makes fault isolation a direction-
+ sensitive operation. That is, given two PEs A and B, localization of
+ continuity failures between them requires running fault-isolation
+ procedures from PE A to PE B as well as from PE B to PE A.
+
+ EVPN Service OAM mechanisms only have visibility to the PEs but not
+ the MPLS or IP P nodes. As such, they can be used to deduce whether
+ the fault is in the customer's own network, the local CE-PE segment,
+ or a remote CE-PE segment(s). EVPN Network and Transport OAM
+ mechanisms can be used for fault isolation between the PEs and P
+ nodes.
+
+3.2. Performance Management
+
+ Performance management functions can be performed both proactively
+ and on demand. Proactive management involves a recurring function,
+ where the performance management probes are run continuously without
+ a trigger. We cover both proactive and on-demand functions in this
+ section.
+
+3.2.1. Packet Loss
+
+ EVPN Network OAM SHOULD provide mechanisms for measuring packet loss
+ for a given service -- for example, [RFC7680] and [RFC6673].
+
+ Given that EVPN provides inherent support for multipoint-to-
+ multipoint connectivity, packet loss cannot be accurately measured by
+ means of counting user data packets. This is because user packets
+ can be delivered to more PEs or more ports than are necessary (e.g.,
+ due to broadcast, unpruned multicast, or unknown unicast flooding).
+ As such, a statistical means of approximating the packet loss rate is
+ required. This can be achieved by sending "synthetic" OAM packets
+ that are counted only by those ports (MEPs) that are required to
+ receive them. This provides a statistical approximation of the
+ number of data frames lost, even with multipoint-to-multipoint
+ connectivity.
+
+3.2.2. Packet Delay and Jitter
+
+ EVPN Service OAM SHOULD support measurement of one-way and two-way
+ packet delay and delay variation (jitter) across the EVPN network.
+ Measurement of one-way delay requires clock synchronization between
+ the probe source and target devices. Mechanisms for clock
+ synchronization are outside the scope of this document. Note that
+ Service OAM performance management mechanisms defined in [Y.1731] can
+ be used. See also [RFC7679], [RFC2681], and [RFC3393].
+
+ EVPN Network OAM MAY support measurement of one-way and two-way
+ packet delay and delay variation (jitter) across the EVPN network.
+
+4. Security Considerations
+
+ EVPN OAM MUST prevent OAM packets from leaking outside of the EVPN
+ network or outside their corresponding Maintenance Domain. This can
+ be done for CFM, for example, by having MEPs implement a filtering
+ function based on the Maintenance Level associated with received OAM
+ packets.
+
+ EVPN OAM SHOULD provide mechanisms for implementation and optional
+ use to:
+
+ * prevent denial-of-service attacks caused by exploitation of the
+ OAM message channel (for example, by forging messages to exceed a
+ Maintenance End Point's capacity to maintain state).
+
+ * authenticate communicating end points (for example, MEPs and
+ MIPs).
+
+5. IANA Considerations
+
+ This document has no IANA actions.
+
+6. References
+
+6.1. Normative References
+
+ [RFC0792] Postel, J., "Internet Control Message Protocol", STD 5,
+ RFC 792, DOI 10.17487/RFC0792, September 1981,
+ <https://www.rfc-editor.org/info/rfc792>.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC4443] Conta, A., Deering, S., and M. Gupta, Ed., "Internet
+ Control Message Protocol (ICMPv6) for the Internet
+ Protocol Version 6 (IPv6) Specification", STD 89,
+ RFC 4443, DOI 10.17487/RFC4443, March 2006,
+ <https://www.rfc-editor.org/info/rfc4443>.
+
+ [RFC5880] Katz, D. and D. Ward, "Bidirectional Forwarding Detection
+ (BFD)", RFC 5880, DOI 10.17487/RFC5880, June 2010,
+ <https://www.rfc-editor.org/info/rfc5880>.
+
+ [RFC5881] Katz, D. and D. Ward, "Bidirectional Forwarding Detection
+ (BFD) for IPv4 and IPv6 (Single Hop)", RFC 5881,
+ DOI 10.17487/RFC5881, June 2010,
+ <https://www.rfc-editor.org/info/rfc5881>.
+
+ [RFC5883] Katz, D. and D. Ward, "Bidirectional Forwarding Detection
+ (BFD) for Multihop Paths", RFC 5883, DOI 10.17487/RFC5883,
+ June 2010, <https://www.rfc-editor.org/info/rfc5883>.
+
+ [RFC5884] Aggarwal, R., Kompella, K., Nadeau, T., and G. Swallow,
+ "Bidirectional Forwarding Detection (BFD) for MPLS Label
+ Switched Paths (LSPs)", RFC 5884, DOI 10.17487/RFC5884,
+ June 2010, <https://www.rfc-editor.org/info/rfc5884>.
+
+ [RFC6291] Andersson, L., van Helvoort, H., Bonica, R., Romascanu,
+ D., and S. Mansfield, "Guidelines for the Use of the "OAM"
+ Acronym in the IETF", BCP 161, RFC 6291,
+ DOI 10.17487/RFC6291, June 2011,
+ <https://www.rfc-editor.org/info/rfc6291>.
+
+ [RFC6425] Saxena, S., Ed., Swallow, G., Ali, Z., Farrel, A.,
+ Yasukawa, S., and T. Nadeau, "Detecting Data-Plane
+ Failures in Point-to-Multipoint MPLS - Extensions to LSP
+ Ping", RFC 6425, DOI 10.17487/RFC6425, November 2011,
+ <https://www.rfc-editor.org/info/rfc6425>.
+
+ [RFC6428] Allan, D., Ed., Swallow, G., Ed., and J. Drake, Ed.,
+ "Proactive Connectivity Verification, Continuity Check,
+ and Remote Defect Indication for the MPLS Transport
+ Profile", RFC 6428, DOI 10.17487/RFC6428, November 2011,
+ <https://www.rfc-editor.org/info/rfc6428>.
+
+ [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A.,
+ Uttaro, J., Drake, J., and W. Henderickx, "BGP MPLS-Based
+ Ethernet VPN", RFC 7432, DOI 10.17487/RFC7432, February
+ 2015, <https://www.rfc-editor.org/info/rfc7432>.
+
+ [RFC7623] Sajassi, A., Ed., Salam, S., Bitar, N., Isaac, A., and W.
+ Henderickx, "Provider Backbone Bridging Combined with
+ Ethernet VPN (PBB-EVPN)", RFC 7623, DOI 10.17487/RFC7623,
+ September 2015, <https://www.rfc-editor.org/info/rfc7623>.
+
+ [RFC8029] Kompella, K., Swallow, G., Pignataro, C., Ed., Kumar, N.,
+ Aldrin, S., and M. Chen, "Detecting Multiprotocol Label
+ Switched (MPLS) Data-Plane Failures", RFC 8029,
+ DOI 10.17487/RFC8029, March 2017,
+ <https://www.rfc-editor.org/info/rfc8029>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+6.2. Informative References
+
+ [IEEE-802.1Q]
+ IEEE, "IEEE Standard for Local and metropolitan area
+ networks--Bridges and Bridged Networks", IEEE Std 802.1Q-
+ 2014, DOI 10.1109/IEEESTD.2014.6991462, December 2014,
+ <https://doi.org/10.1109/IEEESTD.2014.6991462>.
+
+ [IEEE-802.3]
+ IEEE, "IEEE Standard for Ethernet", IEEE Std 802.3-2018,
+ DOI 10.1109/IEEESTD.2018.8457469, August 2018,
+ <https://doi.org/10.1109/IEEESTD.2018.8457469>.
+
+ [RFC2544] Bradner, S. and J. McQuaid, "Benchmarking Methodology for
+ Network Interconnect Devices", RFC 2544,
+ DOI 10.17487/RFC2544, March 1999,
+ <https://www.rfc-editor.org/info/rfc2544>.
+
+ [RFC2681] Almes, G., Kalidindi, S., and M. Zekauskas, "A Round-trip
+ Delay Metric for IPPM", RFC 2681, DOI 10.17487/RFC2681,
+ September 1999, <https://www.rfc-editor.org/info/rfc2681>.
+
+ [RFC3393] Demichelis, C. and P. Chimento, "IP Packet Delay Variation
+ Metric for IP Performance Metrics (IPPM)", RFC 3393,
+ DOI 10.17487/RFC3393, November 2002,
+ <https://www.rfc-editor.org/info/rfc3393>.
+
+ [RFC5085] Nadeau, T., Ed. and C. Pignataro, Ed., "Pseudowire Virtual
+ Circuit Connectivity Verification (VCCV): A Control
+ Channel for Pseudowires", RFC 5085, DOI 10.17487/RFC5085,
+ December 2007, <https://www.rfc-editor.org/info/rfc5085>.
+
+ [RFC6136] Sajassi, A., Ed. and D. Mohan, Ed., "Layer 2 Virtual
+ Private Network (L2VPN) Operations, Administration, and
+ Maintenance (OAM) Requirements and Framework", RFC 6136,
+ DOI 10.17487/RFC6136, March 2011,
+ <https://www.rfc-editor.org/info/rfc6136>.
+
+ [RFC6632] Ersue, M., Ed. and B. Claise, "An Overview of the IETF
+ Network Management Standards", RFC 6632,
+ DOI 10.17487/RFC6632, June 2012,
+ <https://www.rfc-editor.org/info/rfc6632>.
+
+ [RFC6673] Morton, A., "Round-Trip Packet Loss Metrics", RFC 6673,
+ DOI 10.17487/RFC6673, August 2012,
+ <https://www.rfc-editor.org/info/rfc6673>.
+
+ [RFC7679] Almes, G., Kalidindi, S., Zekauskas, M., and A. Morton,
+ Ed., "A One-Way Delay Metric for IP Performance Metrics
+ (IPPM)", STD 81, RFC 7679, DOI 10.17487/RFC7679, January
+ 2016, <https://www.rfc-editor.org/info/rfc7679>.
+
+ [RFC7680] Almes, G., Kalidindi, S., Zekauskas, M., and A. Morton,
+ Ed., "A One-Way Loss Metric for IP Performance Metrics
+ (IPPM)", STD 82, RFC 7680, DOI 10.17487/RFC7680, January
+ 2016, <https://www.rfc-editor.org/info/rfc7680>.
+
+ [Y.1731] ITU-T, "Operation, administration and maintenance (OAM)
+ functions and mechanisms for Ethernet-based networks",
+ ITU-T Recommendation G.8013/Y.1731, August 2015.
+
+Acknowledgements
+
+ The authors would like to thank the following for their review of
+ this work and their valuable comments: David Black, Martin Duke, Xiao
+ Min, Gregory Mirsky, Zaheduzzaman Sarker, Dave Schinazi, John
+ Scudder, Melinda Shore, Robert Wilton, Alexander Vainshtein, Stig
+ Venaas, and Éric Vyncke.
+
+Authors' Addresses
+
+ Samer Salam
+ Cisco
+ The Atrium Building, Floor 3
+ Weygand St.
+ Beirut
+ Lebanon
+
+ Email: ssalam@cisco.com
+
+
+ Ali Sajassi
+ Cisco
+ 170 West Tasman Drive
+ San Jose, CA 95134
+ United States of America
+
+ Email: sajassi@cisco.com
+
+
+ Sam Aldrin
+ Google, Inc.
+ 1600 Amphitheatre Parkway
+ Mountain View, CA 94043
+ United States of America
+
+ Email: aldrin.ietf@gmail.com
+
+
+ John E. Drake
+ Juniper Networks
+ 1194 N. Mathilda Ave.
+ Sunnyvale, CA 94089
+ United States of America
+
+ Email: jdrake@juniper.net
+
+
+ Donald E. Eastlake 3rd
+ Futurewei Technologies
+ 2386 Panoramic Circle
+ Apopka, FL 32703
+ United States of America
+
+ Phone: +1-508-333-2270
+ Email: d3e3e3@gmail.com