diff options
Diffstat (limited to 'doc/rfc/rfc9135.txt')
-rw-r--r-- | doc/rfc/rfc9135.txt | 1718 |
1 files changed, 1718 insertions, 0 deletions
diff --git a/doc/rfc/rfc9135.txt b/doc/rfc/rfc9135.txt new file mode 100644 index 0000000..1e042f6 --- /dev/null +++ b/doc/rfc/rfc9135.txt @@ -0,0 +1,1718 @@ + + + + +Internet Engineering Task Force (IETF) A. Sajassi +Request for Comments: 9135 S. Salam +Category: Standards Track S. Thoria +ISSN: 2070-1721 Cisco Systems + J. Drake + Juniper + J. Rabadan + Nokia + October 2021 + + + Integrated Routing and Bridging in Ethernet VPN (EVPN) + +Abstract + + Ethernet VPN (EVPN) provides an extensible and flexible multihoming + VPN solution over an MPLS/IP network for intra-subnet connectivity + among Tenant Systems and end devices that can be physical or virtual. + However, there are scenarios for which there is a need for a dynamic + and efficient inter-subnet connectivity among these Tenant Systems + and end devices while maintaining the multihoming capabilities of + EVPN. This document describes an Integrated Routing and Bridging + (IRB) solution based on EVPN to address such requirements. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9135. + +Copyright Notice + + Copyright (c) 2021 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction + 2. Terminology + 2.1. Requirements Language + 3. EVPN PE Model for IRB Operation + 4. Symmetric and Asymmetric IRB + 4.1. IRB Interface and Its MAC and IP Addresses + 4.2. Operational Considerations + 5. Symmetric IRB Procedures + 5.1. Control Plane - Advertising PE + 5.2. Control Plane - Receiving PE + 5.3. Subnet Route Advertisement + 5.4. Data Plane - Ingress PE + 5.5. Data Plane - Egress PE + 6. Asymmetric IRB Procedures + 6.1. Control Plane - Advertising PE + 6.2. Control Plane - Receiving PE + 6.3. Data Plane - Ingress PE + 6.4. Data Plane - Egress PE + 7. Mobility Procedure + 7.1. Initiating a Gratuitous ARP upon a Move + 7.2. Sending Data Traffic without an ARP Request + 7.3. Silent Host + 8. BGP Encoding + 8.1. EVPN Router's MAC Extended Community + 9. Operational Models for Symmetric Inter-Subnet Forwarding + 9.1. IRB Forwarding on NVEs for Tenant Systems + 9.1.1. Control Plane Operation + 9.1.2. Data Plane Operation + 9.2. IRB Forwarding on NVEs for Subnets behind Tenant Systems + 9.2.1. Control Plane Operation + 9.2.2. Data Plane Operation + 10. Security Considerations + 11. IANA Considerations + 12. References + 12.1. Normative References + 12.2. Informative References + Acknowledgements + Authors' Addresses + +1. Introduction + + EVPN [RFC7432] provides an extensible and flexible multihoming VPN + solution over an MPLS/IP network for intra-subnet connectivity among + Tenant Systems (TSs) and end devices that can be physical or virtual, + where an IP subnet is represented by an EVPN instance (EVI) for a + VLAN-based service or by an (EVI, VLAN) association for a VLAN-aware + bundle service. However, there are scenarios for which there is a + need for a dynamic and efficient inter-subnet connectivity among + these Tenant Systems and end devices while maintaining the + multihoming capabilities of EVPN. This document describes an + Integrated Routing and Bridging (IRB) solution based on EVPN to + address such requirements. + + Inter-subnet communication is typically performed by centralized + Layer 3 (L3) gateway (GW) devices, which enforce all inter-subnet + communication policies and perform all inter-subnet forwarding. When + two TSs belonging to two different subnets connected to the same + Provider Edge (PE) wanted to communicate with each other, their + traffic needed to be backhauled from the PE all the way to the + centralized gateway where inter-subnet switching is performed and + then sent back to the PE. For today's large multi-tenant Data Center + (DC), this scheme is very inefficient and sometimes impractical. + + In order to overcome the drawback of the centralized L3 GW approach, + IRB functionality is needed on the PEs (also referred to as EVPN + Network Virtualization Edges (NVEs)) attached to TSs in order to + avoid inefficient forwarding of tenant traffic (i.e., avoid + backhauling and hair pinning). When a PE with IRB capability + receives tenant traffic over an Attachment Circuit (AC), it cannot + only locally bridge the tenant intra-subnet traffic but also locally + route the tenant inter-subnet traffic on a packet-by-packet basis, + thus meeting the requirements for both intra- and inter-subnet + forwarding and avoiding non-optimal traffic forwarding associated + with a centralized L3 GW approach. + + Some TSs run non-IP protocols in conjunction with their IP traffic. + Therefore, it is important to handle both kinds of traffic optimally + -- e.g., to bridge non-IP and intra-subnet traffic and to route + inter-subnet IP traffic. Therefore, the solution needs to meet the + following requirements: + + R1: The solution must provide each tenant with IP routing of its + inter-subnet traffic and Ethernet bridging of its intra-subnet + traffic and non-routable traffic, where non-routable traffic + refers to both non-IP traffic and IP traffic whose version differs + from the IP version configured in IP Virtual Routing and + Forwarding (IP-VRF). For example, if an IP-VRF in an NVE is + configured for IPv6 and that NVE receives IPv4 traffic on the + corresponding VLAN, then the IPv4 traffic is treated as non- + routable traffic. + + R2: The solution must allow IP routing of inter-subnet traffic to be + disabled on a per-VLAN basis on those PEs that are backhauling + that traffic to another PE for routing. + +2. Terminology + + AC: Attachment Circuit + + ARP: Address Resolution Protocol + + ARP Table: A logical view of a forwarding table on a PE that + maintains an IP to a MAC binding entry on an IP interface + for both IPv4 and IPv6. These entries are learned through + ARP/ND or through EVPN. + + BD: Broadcast Domain. As per [RFC7432], an EVI consists of a + single BD or multiple BDs. In the case of VLAN-bundle and + VLAN-based service models (see [RFC7432]), a BD is + equivalent to an EVI. In the case of a VLAN-aware bundle + service model, an EVI contains multiple BDs. Also, in this + document, "BD" and "subnet" are equivalent terms, and + wherever "subnet" is used, it means "IP subnet". + + BD Route Target: Refers to the broadcast-domain-assigned Route + Target [RFC4364]. In the case of a VLAN-aware bundle + service model, all the BD instances in the MAC-VRF share + the same Route Target. + + BT: Bridge Table. The instantiation of a BD in a MAC-VRF, as + per [RFC7432]. + + CE: Customer Edge + + DA: Destination Address + + Ethernet NVO Tunnel: Refers to Network Virtualization Overlay + tunnels with an Ethernet payload, as specified for VXLAN in + [RFC7348] and for NVGRE in [RFC7637]. + + EVI: EVPN Instance spanning NVE/PE devices that are + participating on that EVPN, as per [RFC7432]. + + EVPN: Ethernet VPN, as per [RFC7432]. + + IP NVO Tunnel: Refers to Network Virtualization Overlay tunnels with + IP payload (no MAC header in the payload) as specified for + Generic Protocol Extension (GPE) in [VXLAN-GPE]. + + IP-VRF: A Virtual Routing and Forwarding table for IP routes on an + NVE/PE. The IP routes could be populated by EVPN and IP- + VPN address families. An IP-VRF is also an instantiation + of a Layer 3 VPN in an NVE/PE. + + IRB: Integrated Routing and Bridging interface. It connects an + IP-VRF to a BD (or subnet). + + MAC: Media Access Control + + MAC-VRF: A Virtual Routing and Forwarding table for MAC addresses on + an NVE/PE, as per [RFC7432]. A MAC-VRF is also an + instantiation of an EVI in an NVE/PE. + + ND: Neighbor Discovery + + NVE: Network Virtualization Edge + + NVGRE: Network Virtualization Using Generic Routing Encapsulation, + as per [RFC7637]. + + NVO: Network Virtualization Overlay + + PE: Provider Edge + + RT-2: EVPN Route Type 2, i.e., MAC/IP Advertisement route, as + defined in [RFC7432]. + + RT-5: EVPN Route Type 5, i.e., IP Prefix route, as defined in + Section 3 of [RFC9136]. + + SA: Source Address + + TS: Tenant System + + VA: Virtual Appliance + + VNI: Virtual Network Identifier. As in [RFC8365], the term is + used as a representation of a 24-bit NVO instance + identifier, with the understanding that "VNI" will refer to + a VXLAN Network Identifier in VXLAN, or a Virtual Subnet + Identifier in NVGRE, etc., unless it is stated otherwise. + + VTEP: VXLAN Termination End Point, as per [RFC7348]. + + VXLAN: Virtual eXtensible Local Area Network, as per [RFC7348]. + + This document also assumes familiarity with the terminology of + [RFC7365], [RFC7432], and [RFC8365]. + +2.1. Requirements Language + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and + "OPTIONAL" in this document are to be interpreted as described in + BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all + capitals, as shown here. + +3. EVPN PE Model for IRB Operation + + Since this document discusses IRB operation in relationship to EVPN + MAC-VRF, IP-VRF, EVI, BD, bridge table, and IRB interfaces, it is + important to understand the relationship between these components. + Therefore, the PE model is illustrated below to a) describe these + components and b) illustrate the relationship among them. + + +-------------------------------------------------------------+ + | | + | +------------------+ IRB PE | + | Attachment | +------------------+ | + | Circuit(AC1) | | +----------+ | MPLS/NVO tnl + ----------------------*Bridge | | +----- + | | | |Table(BT1)| | +-----------+ / \ \ + | | | | *---------* |<--> |Eth| + | | | | VLAN x | |IRB1| | \ / / + | | | +----------+ | | | +----- + | | | ... | | IP-VRF1 | | + | | | +----------+ | | RD2/RT2 |MPLS/NVO tnl + | | | |Bridge | | | | +----- + | | | |Table(BT2)| |IRB2| | / \ \ + | | | | *---------* |<--> |IP | + ----------------------* VLAN y | | +-----------+ \ / / + | AC2 | | +----------+ | +----- + | | | MAC-VRF1 | | + | +-+ RD1/RT1 | | + | +------------------+ | + | | + | | + +-------------------------------------------------------------+ + + Figure 1: EVPN IRB PE Model + + A tenant needing IRB services on a PE requires an IP-VRF table along + with one or more MAC-VRF tables. An IP-VRF, as defined in [RFC4364], + is the instantiation of an IP-VPN instance in a PE. A MAC-VRF, as + defined in [RFC7432], is the instantiation of an EVI in a PE. A MAC- + VRF consists of one or more bridge tables, where each bridge table + corresponds to a VLAN (broadcast domain). If service interfaces for + an EVPN PE are configured in VLAN-based mode (i.e., Section 6.1 of + [RFC7432]), then there is only a single bridge table per MAC-VRF (per + EVI) -- i.e., there is only one tenant VLAN per EVI. However, if + service interfaces for an EVPN PE are configured in VLAN-aware bundle + mode (i.e., Section 6.3 of [RFC7432]), then there are several bridge + tables per MAC-VRF (per EVI) -- i.e., there are several tenant VLANs + per EVI. + + Each bridge table is connected to an IP-VRF via an L3 interface + called an "IRB interface". Since a single tenant subnet is typically + (and in this document) represented by a VLAN (and thus supported by a + single bridge table), for a given tenant, there are as many bridge + tables as there are subnets. Thus, there are also as many IRB + interfaces between the tenant IP-VRF and the associated bridge tables + as shown in the PE model above. + + IP-VRF is identified by its corresponding Route Target and Route + Distinguisher, and MAC-VRF is also identified by its corresponding + Route Target and Route Distinguisher. If operating in EVPN VLAN- + based mode, then a receiving PE that receives an EVPN route with a + MAC-VRF Route Target can identify the corresponding bridge table; + however, if operating in EVPN VLAN-aware bundle mode, then the + receiving PE needs both the MAC-VRF Route Target and VLAN ID in order + to identify the corresponding bridge table. + +4. Symmetric and Asymmetric IRB + + This document defines and describes two types of IRB solutions -- + namely, symmetric and asymmetric IRB. The description of symmetric + and asymmetric IRB procedures relating to data path operations and + tables in this document is a logical view of data path lookups and + related tables. Actual implementations, while following this logical + view, may not strictly adhere to it for performance trade-offs. + Specifically, + + * References to an ARP table in the context of asymmetric IRB is a + logical view of a forwarding table that maintains an IP-to-MAC + binding entry on a Layer 3 interface for both IPv4 and IPv6. + These entries are not subject to ARP or ND protocols. For IP-to- + MAC bindings learned via EVPN, an implementation may choose to + import these bindings directly to the respective forwarding table + (such as an adjacency/next-hop table) as opposed to importing them + to ARP or ND protocol tables. + + * References to a host IP lookup followed by a host MAC lookup in + the context of asymmetric IRB MAY be collapsed into a single IP + lookup in a hardware implementation. + + In symmetric IRB, as its name implies, the lookup operation is + symmetric at both the ingress and egress PEs -- i.e., both ingress + and egress PEs perform lookups on both MAC and IP addresses. The + ingress PE performs a MAC lookup followed by an IP lookup, and the + egress PE performs an IP lookup followed by a MAC lookup, as depicted + in the following figure. + + Ingress PE Egress PE + +-------------------+ +------------------+ + | | | | + | +-> IP-VRF ----|---->---|-----> IP-VRF -+ | + | | | | | | + | BT1 BT2 | | BT3 BT2 | + | | | | | | + | ^ | | v | + | | | | | | + +-------------------+ +------------------+ + ^ | + | | + TS1->-+ +->-TS2 + + Figure 2: Symmetric IRB + + In symmetric IRB, as shown in Figure 2, the inter-subnet forwarding + between two PEs is done between their associated IP-VRFs. Therefore, + the tunnel connecting these IP-VRFs can be either an IP-only tunnel + (e.g., in the case of MPLS or GPE encapsulation) or an Ethernet NVO + tunnel (e.g., in the case of VXLAN encapsulation). If it is an + Ethernet NVO tunnel, the TS1's IP packet is encapsulated in an + Ethernet header consisting of ingress and egress PE MAC addresses -- + i.e., there is no need for the ingress PE to use the destination + TS2's MAC address. Therefore, in symmetric IRB, there is no need for + the ingress PE to maintain ARP entries for the association of the + destination TS2's IP and MAC addresses in its ARP table. Each PE + participating in symmetric IRB only maintains ARP entries for locally + connected hosts and MAC-VRFs/BTs for only locally configured subnets. + + In asymmetric IRB, the lookup operation is asymmetric and the ingress + PE performs three lookups, whereas the egress PE performs a single + lookup -- i.e., the ingress PE performs a MAC lookup, followed by an + IP lookup, followed by a MAC lookup again. The egress PE performs + just a single MAC lookup as depicted in Figure 3 below. + + Ingress PE Egress PE + +-------------------+ +------------------+ + | | | | + | +-> IP-VRF -> | | IP-VRF | + | | | | | | + | BT1 BT2 | | BT3 BT2 | + | | | | | | | | + | | +--|--->----|--------------+ | | + | | | | v | + +-------------------+ +----------------|-+ + ^ | + | | + TS1->-+ +->-TS2 + + Figure 3: Asymmetric IRB + + In asymmetric IRB, as shown in Figure 3, the inter-subnet forwarding + between two PEs is done between their associated MAC-VRFs/BTs. + Therefore, the MPLS or NVO tunnel used for inter-subnet forwarding + MUST be of type Ethernet. Since only MAC lookup is performed at the + egress PE (e.g., no IP lookup), the TS1's IP packets need to be + encapsulated with the destination TS2's MAC address. In order for + the ingress PE to perform such encapsulation, it needs to maintain + TS2's IP and MAC address association in its ARP table. Furthermore, + it needs to maintain destination TS2's MAC address in the + corresponding bridge table even though it may not have any TSs of the + corresponding subnet locally attached. In other words, each PE + participating in asymmetric IRB MUST maintain ARP entries for remote + hosts (hosts connected to other PEs) as well as maintain MAC-VRFs/BTs + and IRB interfaces for ALL subnets in an IP-VRF, including subnets + that may not be locally attached. Therefore, careful consideration + of the PE scale aspects for its ARP table size, its IRB interfaces, + and the number and size of its bridge tables should be given for the + application of asymmetric IRB. + + It should be noted that whenever a PE performs a host IP lookup for a + packet that is routed, the IPv4 Time To Live (TTL) or IPv6 hop limit + for that packet is decremented by one, and if it reaches zero, the + packet is discarded. In the case of symmetric IRB, the TTL / hop + limit is decremented by both ingress and egress PEs (once by each), + whereas in the case of asymmetric IRB, the TTL / hop limit is + decremented only once by the ingress PE. + + The following sections define the control and data plane procedures + for symmetric and asymmetric IRB on ingress and egress PEs. The + following figure is used to describe these procedures, showing a + single IP-VRF and a number of BDs on each PE for a given tenant. + That is, an IP-VRF connects one or more EVIs, and each EVI contains + one MAC-VRF; each MAC VRF consists of one or more bridge tables, one + per BD; and a PE has an associated IRB interface for each BD. + + PE 1 +---------+ + +-------------+ | | + TS1-----| MACx| | | PE2 + (M1/IP1) |(BT1) | | | +-------------+ + TS5-----| \ | | MPLS/ | |MACy (BT3) |-----TS3 + (M5/IP5) |IPx/Mx \ | | VXLAN/ | | / | (M3/IP3) + | (IP-VRF1)|----| NVGRE |---|(IP-VRF1) | + | / | | | | \ | + TS2-----|(BT2) / | | | | (BT1) |-----TS4 + (M2/IP2) | | | | | | (M4/IP4) + +-------------+ | | +-------------+ + | | + +---------+ + + Figure 4: IRB Forwarding + +4.1. IRB Interface and Its MAC and IP Addresses + + To support inter-subnet forwarding on a PE, the PE acts as an IP + default gateway from the perspective of the attached Tenant Systems + where default gateway MAC and IP addresses are configured on each IRB + interface associated with its subnet and fall into one of the + following two options: + + 1. All the PEs for a given tenant subnet use the same anycast + default gateway IP and MAC addresses. On each PE, these default + gateway IP and MAC addresses correspond to the IRB interface + connecting the bridge table associated with the tenant's VLAN to + the corresponding tenant's IP-VRF. + + 2. Each PE for a given tenant subnet uses the same anycast default + gateway IP address but its own MAC address. These MAC addresses + are aliased to the same anycast default gateway IP address + through the use of the Default Gateway extended community as + specified in [RFC7432], which is carried in the EVPN MAC/IP + Advertisement routes. On each PE, this default gateway IP + address, along with its associated MAC addresses, correspond to + the IRB interface connecting the bridge table associated with the + tenant's VLAN to the corresponding tenant's IP-VRF. + + It is worth noting that if the applications that are running on the + TSs are employing or relying on any form of MAC security, then the + first option (i.e., using an anycast MAC address) should be used to + ensure that the applications receive traffic from the same IRB + interface MAC address to which they are sending. If the second + option is used, then the IRB interface MAC address MUST be the one + used in the initial ARP reply or ND Neighbor Advertisement (NA) for + that TS. + + Although both of these options are applicable to both symmetric and + asymmetric IRB, option 1 is recommended because of the ease of + anycast MAC address provisioning on not only the IRB interface + associated with a given subnet across all the PEs corresponding to + that VLAN but also on all IRB interfaces associated with all the + tenant's subnets across all the PEs corresponding to all the VLANs + for that tenant. Furthermore, it simplifies the operation as there + is no need for Default Gateway extended community advertisement and + its associated MAC aliasing procedure. Yet another advantage is that + following host mobility, the host does not need to refresh the + default GW ARP/ND entry. + + If option 1 is used, an implementation MAY choose to auto-derive the + anycast MAC address. If auto-derivation is used, the anycast MAC + MUST be auto-derived out of the following ranges (which are defined + in [RFC5798]): + + * Anycast IPv4 IRB case: 00-00-5E-00-01-{VRID} + + * Anycast IPv6 IRB case: 00-00-5E-00-02-{VRID} + + Where the last octet is generated based on a configurable Virtual + Router ID (VRID) (range 1-255). If not explicitly configured, the + default value for the VRID octet is '1'. Auto-derivation of the + anycast MAC can only be used if there is certainty that the auto- + derived MAC does not collide with any customer MAC address. + + In addition to IP anycast addresses, IRB interfaces can be configured + with non-anycast IP addresses for the purpose of OAM (such as sending + a traceroute/ping to these interfaces) for both symmetric and + asymmetric IRB. These IP addresses need to be distributed as VPN + routes when PEs operate in symmetric IRB mode. However, they don't + need to be distributed if the PEs are operating in asymmetric IRB + mode as the non-anycast IP addresses are configured along with their + individual MACs, and they get distributed via the EVPN route type 2 + advertisement. + + For option 1 -- irrespective of whether only the anycast MAC address + or both anycast and non-anycast MAC addresses (where the latter one + is used for the purpose of OAM) are used on the same IRB -- when a TS + sends an ARP request or ND Neighbor Solicitation (NS) to the PE to + which it is attached, the request is sent for the anycast IP address + of the IRB interface associated with the TS's subnet. The reply will + use an anycast MAC address (in both the source MAC in the Ethernet + header and sender hardware address in the payload). For example, in + Figure 4, TS1 is configured with the anycast IPx address as its + default gateway IP address; thus, when it sends an ARP request for + IPx (anycast IP address of the IRB interface for BT1), the PE1 sends + an ARP reply with the MACx, which is the anycast MAC address of that + IRB interface. Traffic routed from IP-VRF1 to TS1 uses the anycast + MAC address as the source MAC address. + +4.2. Operational Considerations + + Symmetric and asymmetric IRB modes may coexist in the same network, + and an ingress PE that supports both forwarding modes for a given + tenant can interwork with egress PEs that support either IRB mode. + The egress PE will indicate the desired forwarding mode for a given + host based on the presence of the Label2 field and the IP-VRF Route + Target in the EVPN MAC/IP Advertisement route. If the Label2 field + of the received MAC/IP Advertisement route for host H1 is non-zero, + and one of its Route Targets identifies the IP-VRF, the ingress PE + will use symmetric IRB mode when forwarding packets destined to H1. + If the Label2 field is zero and the MAC/IP Advertisement route for H1 + does not carry any Route Target that identifies the IP-VRF, the + ingress PE will use asymmetric mode when forwarding traffic to H1. + + As an example that illustrates the previous statement, suppose PE1 + and PE2 need to forward packets from TS2 to TS4 in Figure 4. Since + both PEs are attached to the bridge table of the destination host, + symmetric and asymmetric IRB modes are both possible as long as the + ingress PE, PE1, supports both modes. The forwarding mode will + depend on the mode configured in the egress PE, PE2. That is: + + 1. If PE2 is configured for symmetric IRB mode, PE2 will advertise + TS4 MAC/IP addresses in a MAC/IP Advertisement route with a non- + zero Label2 field, e.g., Label2 = Lx, and a Route Target that + identifies IP-VRF1 in PE1. IP4 will be installed in PE1's IP- + VRF1; TS4's ARP and MAC information will also be installed in + PE1's IRB interface ARP table and BT1, respectively. When a + packet from TS2 destined to TS4 is looked up in PE1's IP-VRF + route table, a longest prefix match lookup will find IP4 in the + IP-VRF, and PE1 will forward using the symmetric IRB mode and + Label Lx. + + 2. However, if PE2 is configured for asymmetric IRB mode, PE2 will + advertise TS4 MAC/IP information in a MAC/IP Advertisement route + with a zero Label2 field and no Route Target identifying IP-VRF1. + In this case, PE2 will install TS4 information in its ARP table + and BT1. When a packet from TS2 to TS4 arrives at PE1, a longest + prefix match on IP-VRF1's route table will yield the local IRB + interface to BT1, where a subsequent ARP and bridge table lookup + will provide the information for an asymmetric forwarding mode to + PE2. + + Refer to [EVPN] for more information about interoperability between + symmetric and asymmetric forwarding modes. + + The choice between symmetric or asymmetric mode is based on the + operator's preference, and it is a trade-off between scale (which is + better in the symmetric IRB mode) and control plane simplicity + (asymmetric IRB mode simplifies the control plane). In cases where a + tenant has hosts for every subnet attached to all (or most of) the + PEs, the ARP and MAC entries need to be learned by all PEs anyway; + therefore, the asymmetric IRB mode simplifies the forwarding model + and saves space in the IP-VRF route table, since host routes are not + installed in the route table. However, if the tenant does not need + to stretch subnets (broadcast domains) to multiple PEs and inter- + subnet forwarding is needed, the symmetric IRB model will save ARP + and bridge table space in all the PEs (in comparison with the + asymmetric IRB model). + +5. Symmetric IRB Procedures + +5.1. Control Plane - Advertising PE + + When a PE (e.g., PE1 in Figure 4 above) learns the MAC and IP address + of a TS (e.g., via an ARP request or Neighbor Solicitation), it adds + the MAC address to the corresponding MAC-VRF/BT of that tenant's + subnet and adds the IP address to the IP-VRF for that tenant. + Furthermore, it adds this TS's MAC and IP address association to its + ARP table or Neighbor Discovery Protocol (NDP) cache. It then builds + an EVPN MAC/IP Advertisement route (type 2) as follows and advertises + it to other PEs participating in that tenant's VPN. + + * The Length field of the BGP EVPN Network Layer Reachability + Information (NLRI) for an EVPN MAC/IP Advertisement route MUST be + either 40 (if the IPv4 address is carried) or 52 (if the IPv6 + address is carried). + + * The Route Distinguisher (RD), Ethernet Segment Identifier, + Ethernet Tag ID, MAC Address Length, MAC Address, IP Address + Length, IP Address, and MPLS Label1 fields MUST be set per + [RFC7432] and [RFC8365]. + + * The MPLS Label2 field is set to either an MPLS label or a VNI + corresponding to the tenant's IP-VRF. In the case of an MPLS + label, this field is encoded as 3 octets, where the high-order 20 + bits contain the label value. + + Just as in [RFC7432], the RD, Ethernet Tag ID, MAC Address Length, + MAC Address, IP Address Length, and IP Address fields are part of the + route key used by BGP to compare routes. The rest of the fields are + not part of the route key. + + This route is advertised along with the following two extended + communities: + + 1. Encapsulation Extended Community + + 2. EVPN Router's MAC Extended Community + + This route is advertised with one or more Encapsulation Extended + Communities [RFC9012], one for each encapsulation type supported by + the advertising PE. If one or more encapsulation types require an + Ethernet frame, a single EVPN Router's MAC Extended Community + (Section 8.1) is also advertised. This extended community specifies + the MAC address to be used as the inner destination MAC address in an + Ethernet frame sent to the advertising PE. + + This route MUST be advertised with two Route Targets, one + corresponding to the MAC-VRF of the tenant's subnet and another + corresponding to the tenant's IP-VRF. + +5.2. Control Plane - Receiving PE + + When a PE (e.g., PE2 in Figure 4 above) receives this EVPN MAC/IP + Advertisement route, it performs the following: + + * The MAC-VRF Route Target and Ethernet Tag, if the latter is non- + zero, are used to identify the correct MAC-VRF and bridge table, + and if they are found, the MAC address is imported. The IP-VRF + Route Target is used to identify the correct IP-VRF, and if it is + found, the IP address is imported. + + If the MPLS Label2 field is non-zero, it means that this route is to + be used for symmetric IRB, and the MPLS label2 value is to be used + when sending a packet for this IP address to the advertising PE. + + If the receiving PE supports asymmetric IRB mode and receives this + route with both the MAC-VRF and IP-VRF Route Targets but the MAC/IP + Advertisement route does not include the MPLS Label2 field, then the + receiving PE installs the MAC address in the corresponding MAC-VRF + and the (IP, MAC) association in the ARP table for that tenant + (identified by the corresponding IP-VRF Route Target). + + If the receiving PE receives this route with both the MAC-VRF and IP- + VRF Route Targets, and if the receiving PE does not support either + asymmetric or symmetric IRB modes but has the corresponding MAC-VRF, + then it only imports the MAC address. + + If the receiving PE receives this route with both the MAC-VRF and IP- + VRF Route Targets and the MAC/IP Advertisement route includes the + MPLS Label2 field but the receiving PE only supports asymmetric IRB + mode, then the receiving PE MUST ignore the MPLS Label2 field and + install the MAC address in the corresponding MAC-VRF and (IP, MAC) + association in the ARP table for that tenant (identified by the + corresponding IP-VRF Route Target). + +5.3. Subnet Route Advertisement + + In the case of symmetric IRB, a Layer 3 subnet and IRB interface + corresponding to a MAC-VRF/BT are required to be provisioned at a PE + only if that PE has locally attached hosts in that subnet. In order + to enable inter-subnet routing across PEs in a deployment where not + all subnets are provisioned at all PEs participating in an EVPN IRB + instance, PEs MUST advertise local subnet routes as EVPN RT-5. These + subnet routes are required for bootstrapping host (IP, MAC) learning + using gleaning procedures initiated by an inter-subnet data packet. + + That is, if a given host's (IP, MAC) association is unknown, and an + ingress PE needs to send a packet to that host, then that ingress PE + needs to know which egress PEs are attached to the subnet in which + the host resides in order to send the packet to one of those PEs, + causing the PE receiving the packet to probe for that host. For + example, consider a subnet A that is locally attached to PE1 and + subnet B that is locally attached to PE2 and PE3. Host A in subnet + A, which is attached to PE1, initiates a data packet destined to host + B in subnet B, which is attached to PE3. If host B's (IP, MAC) has + not yet been learned via either a gratuitous ARP OR a prior gleaning + procedure, a new gleaning procedure MUST be triggered for host B's + (IP, MAC) to be learned and advertised across the EVPN network. + Since host B's subnet is not local to PE1, an IP lookup for host B at + PE1 will not trigger this gleaning procedure for host B's (IP, MAC). + Therefore, PE1 MUST learn subnet B's prefix route via EVPN RT-5 + advertised from PE2 and PE3, so it can route the packet to one of the + PEs that have subnet B locally attached. Once the packet is received + at PE2 OR PE3, and the route lookup yields a glean result, an ARP + request is triggered and flooded across the Layer 2 overlay. This + ARP request would be received and replied to by host B, resulting in + host B (IP, MAC) learning at PE3 and its advertisement across the + EVPN network. Packets from host A to host B can now be routed + directly from PE1 to PE3. Advertisement of local subnet EVPN RT-5 + for an IP-VRF MAY typically be achieved via provisioning-connected + route redistribution to BGP. + +5.4. Data Plane - Ingress PE + + When an Ethernet frame is received by an ingress PE (e.g., PE1 in + Figure 4 above), the PE uses the AC ID (e.g., VLAN ID) to identify + the associated MAC-VRF/BT, and it performs a lookup on the + destination MAC address. If the MAC address corresponds to its IRB + interface MAC address, the ingress PE deduces that the packet must be + inter-subnet routed. Hence, the ingress PE performs an IP lookup in + the associated IP-VRF table. The lookup identifies the BGP next hop + of the egress PE along with the tunnel/encapsulation type and the + associated MPLS/VNI values. The ingress PE also decrements the TTL / + hop limit for that packet by one, and if it reaches zero, the ingress + PE discards the packet. + + If the tunnel type is that of an MPLS or IP-only NVO tunnel, then the + TS's IP packet is sent over the tunnel without any Ethernet header. + However, if the tunnel type is that of an Ethernet NVO tunnel, then + an Ethernet header needs to be added to the TS's IP packet. The + source MAC address of this inner Ethernet header is set to the + ingress PE's router MAC address, and the destination MAC address of + this inner Ethernet header is set to the egress PE's router MAC + address learned via the EVPN Router's MAC Extended Community attached + to the route. The MPLS VPN label is set to the received label2 in + the route. In the case of the Ethernet NVO tunnel type, the VNI may + be set one of two ways: + + downstream mode: The VNI is set to the received label2 in the route, + which is downstream assigned. + + global mode: The VNI is set to the received label2 in the route, + which is assigned domain-wide. This VNI value from the received + label2 MUST be the same as the locally configured VNI for the IP- + VRF as all PEs in the NVO MUST be configured with the same IP-VRF + VNI for this mode of operation. If the received label2 value does + not match the locally configured VNI value, the route MUST NOT be + used, and an error message SHOULD be logged. + + PEs may be configured to operate in one of these two modes depending + on the administrative domain boundaries across PEs participating in + the NVO and the PE's capability to support downstream VNI mode. + + In the case of NVO tunnel encapsulation, the outer source and + destination IP addresses are set to the ingress and egress PE BGP + next-hop IP addresses, respectively. + +5.5. Data Plane - Egress PE + + When the tenant's MPLS or NVO encapsulated packet is received over an + MPLS or NVO tunnel by the egress PE, the egress PE removes the NVO + tunnel encapsulation and uses the VPN MPLS label (for MPLS + encapsulation) or VNI (for NVO encapsulation) to identify the IP-VRF + in which IP lookup needs to be performed. If the VPN MPLS label or + VNI identifies a MAC-VRF instead of an IP-VRF, then the procedures in + Section 6.4 for asymmetric IRB are executed. + + The lookup in the IP-VRF identifies a local adjacency to the IRB + interface associated with the egress subnet's MAC-VRF/BT. The egress + PE also decrements the TTL / hop limit for that packet by one, and if + it reaches zero, the egress PE discards the packet. + + The egress PE gets the destination TS's MAC address for that TS's IP + address from its ARP table or NDP cache. It encapsulates the packet + with that destination MAC address and a source MAC address + corresponding to that IRB interface and sends the packet to its + destination subnet MAC-VRF/BT. + + The destination MAC address lookup in the MAC-VRF/BT results in the + local adjacency (e.g., local interface) over which the Ethernet frame + is sent. + +6. Asymmetric IRB Procedures + +6.1. Control Plane - Advertising PE + + When a PE (e.g., PE1 in Figure 4 above) learns the MAC and IP address + of an attached TS (e.g., via an ARP request or ND Neighbor + Solicitation), it populates its MAC-VRF/BT, IP-VRF, and ARP table or + NDP cache just as in the case for symmetric IRB. It then builds an + EVPN MAC/IP Advertisement route (type 2) as follows and advertises it + to other PEs participating in that tenant's VPN. + + * The Length field of the BGP EVPN NLRI for an EVPN MAC/IP + Advertisement route MUST be either 37 (if an IPv4 address is + carried) or 49 (if an IPv6 address is carried). + + * The RD, Ethernet Segment Identifier, Ethernet Tag ID, MAC Address + Length, MAC Address, IP Address Length, IP Address, and MPLS + Label1 fields MUST be set per [RFC7432] and [RFC8365]. + + * The MPLS Label2 field MUST NOT be included in this route. + + Just as in [RFC7432], the RD, Ethernet Tag ID, MAC Address Length, + MAC Address, IP Address Length, and IP Address fields are part of the + route key used by BGP to compare routes. The rest of the fields are + not part of the route key. + + This route is advertised along with the following extended community: + + * Tunnel Type Extended Community + + For asymmetric IRB mode, the EVPN Router's MAC Extended Community is + not needed because forwarding is performed using destination TS's MAC + address, which is carried in this EVPN route type 2 advertisement. + + This route MUST always be advertised with the MAC-VRF Route Target. + It MAY also be advertised with a second Route Target corresponding to + the IP-VRF. + +6.2. Control Plane - Receiving PE + + When a PE (e.g., PE2 in Figure 4 above) receives this EVPN MAC/IP + Advertisement route, it performs the following: + + * Using the MAC-VRF Route Target, it identifies the corresponding + MAC-VRF and imports the MAC address into it. For asymmetric IRB + mode, it is assumed that all PEs participating in a tenant's VPN + are configured with all subnets (i.e., all VLANs) and + corresponding MAC-VRFs/BTs even if there are no locally attached + TSs for some of these subnets. This is because the ingress PE + needs to do forwarding based on the destination TS's MAC address + and perform NVO tunnel encapsulation as the property of a lookup + in the MAC-VRF/BT. + + * If only the MAC-VRF Route Target is used, then the receiving PE + uses the MAC-VRF Route Target to identify the corresponding IP-VRF + -- i.e., many MAC-VRF Route Targets map to the same IP-VRF for a + given tenant. In this case, MAC-VRF may be used by the receiving + PE to identify the corresponding IP-VRF via the IRB interface + associated with the subnet MAC-VRF/BT. In this case, the MAC-VRF + Route Target may be used by the receiving PE to identify the + corresponding IP-VRF. + + * Using the MAC-VRF Route Target, the receiving PE identifies the + corresponding ARP table or NDP cache for the tenant, and it adds + an entry to the ARP table or NDP cache for the TS's MAC and IP + address association. It should be noted that the tenant's ARP + table or NDP cache at the receiving PE is identified by all the + MAC-VRF Route Targets for that tenant. + + * If the IP-VRF Route Target is included, it may be used to import + the route to IP-VRF. If the IP-VRF Route Target is not included, + MAC-VRF is used to derive the corresponding IP-VRF for import, as + explained in the prior section. In both cases, an IP-VRF route is + installed with the TS MAC binding included in the received route. + + If the receiving PE receives the MAC/IP Advertisement route with the + MPLS Label2 field but the receiving PE only supports asymmetric IRB + mode, then the receiving PE MUST ignore the MPLS Label2 field and + install the MAC address in the corresponding MAC-VRF and (IP, MAC) + association in the ARP table or NDP cache for that tenant (with the + IRB interface identified by the MAC-VRF). + +6.3. Data Plane - Ingress PE + + When an Ethernet frame is received by an ingress PE (e.g., PE1 in + Figure 4 above), the PE uses the AC ID (e.g., VLAN ID) to identify + the associated MAC-VRF/BT, and it performs a lookup on the + destination MAC address. If the MAC address corresponds to its IRB + interface MAC address, the ingress PE deduces that the packet must be + inter-subnet routed. Hence, the ingress PE performs an IP lookup in + the associated IP-VRF table. The lookup identifies a local adjacency + to the IRB interface associated with the egress subnet's MAC-VRF/ + bridge table. The ingress PE also decrements the TTL / hop limit for + that packet by one, and if it reaches zero, the ingress PE discards + the packet. + + The ingress PE gets the destination TS's MAC address for that TS's IP + address from its ARP table or NDP cache. It encapsulates the packet + with that destination MAC address and a source MAC address + corresponding to that IRB interface and sends the packet to its + destination subnet MAC-VRF/BT. + + The destination MAC address lookup in the MAC-VRF/BT results in a BGP + next-hop address of the egress PE along with label1 (L2 VPN MPLS + label or VNI). The ingress PE encapsulates the packet using the + Ethernet NVO tunnel of the choice (e.g., VXLAN or NVGRE) and sends + the packet to the egress PE. Because the packet forwarding is + between the ingress PE's MAC-VRF/BT and the egress PE's MAC-VRF/ + bridge table, the packet encapsulation procedures follow that of + [RFC7432] for MPLS and [RFC8365] for VXLAN encapsulations. + +6.4. Data Plane - Egress PE + + When a tenant's Ethernet frame is received over an NVO tunnel by the + egress PE, the egress PE removes the NVO tunnel encapsulation and + uses the VPN MPLS label (for MPLS encapsulation) or VNI (for NVO + encapsulation) to identify the MAC-VRF/BT in which the MAC lookup + needs to be performed. + + The MAC lookup results in a local adjacency (e.g., local interface) + over which the packet needs to get sent. + + Note that the forwarding behavior on the egress PE is the same as the + EVPN intra-subnet forwarding described in [RFC7432] for MPLS and + [RFC8365] for NVO networks. In other words, all the packet + processing associated with the inter-subnet forwarding semantics is + confined to the ingress PE for asymmetric IRB mode. + + It should also be noted that [RFC7432] provides a different level of + granularity for the EVPN label. Besides identifying the bridge + domain table, it can be used to identify the egress interface or a + destination MAC address on that interface. If an EVPN label is used + for an egress interface or individual MAC address identification, + then no MAC lookup is needed in the egress PE for MPLS encapsulation, + and the packet can be directly forwarded to the egress interface just + based on the EVPN label lookup. + +7. Mobility Procedure + + When a TS moves from one NVE (aka source NVE) to another NVE (aka + target NVE), it is important that the MAC Mobility procedures be + properly executed and the corresponding MAC-VRF and IP-VRF tables on + all participating NVEs be updated. [RFC7432] describes the MAC + Mobility procedures for L2-only services for both single-homed TS and + multihomed TS. This section describes the incremental procedures and + BGP Extended Communities needed to handle the MAC Mobility for IRB. + In order to place the emphasis on the differences between L2-only and + IRB use cases, the incremental procedure is described for a single- + homed TS with the expectation that the additional steps needed for a + multihomed TS can be extended per Section 15 of [RFC7432]. This + section describes mobility procedures for both symmetric and + asymmetric IRB. Although the language used in this section is for + IPv4 ARP, it equally applies to IPv6 ND. + + When a TS moves from a source NVE to a target NVE, it can behave in + one of the following three ways: + + 1. TS initiates an ARP request upon a move to the target NVE. + + 2. TS sends a data packet without first initiating an ARP request to + the target NVE. + + 3. TS is a silent host and neither initiates an ARP request nor + sends any packets. + + Depending on the expected TS's behavior, an NVE needs to handle at + least the first option and should be able to handle the second and + third options. The following subsections describe the procedures for + each scenario where it is assumed that the MAC and IP addresses of a + TS have a one-to-one relationship (i.e., there is one IP address per + MAC address and vice versa). The procedures for host mobility + detection in the presence of a many-to-one relationship is outside + the scope of this document, and it is covered in [EXTENDED-MOBILITY]. + The "many-to-one relationship" refers to many host IP addresses + corresponding to a single host MAC address or many host MAC addresses + corresponding to a single IP address. It should be noted that in the + case of IPv6, a link-local IP address does not count in a many-to-one + relationship because that address is confined to a single Ethernet + segment, and it is not used for host mobility (i.e., by definition, + host mobility is between two different Ethernet segments). + Therefore, when an IPv6 host is configured with both a Global Unicast + address (or a Unique Local address) and a link-local address, for the + purpose of host mobility, it is considered with a single IP address. + +7.1. Initiating a Gratuitous ARP upon a Move + + In this scenario, when a TS moves from a source NVE to a target NVE, + the TS initiates a gratuitous ARP upon the move to the target NVE. + + The target NVE, upon receiving this ARP message, updates its MAC-VRF, + IP-VRF, and ARP table with the host MAC, IP, and local adjacency + information (e.g., local interface). + + Since this NVE has previously learned the same MAC and IP addresses + from the source NVE, it recognizes that there has been a MAC move, + and it initiates MAC Mobility procedures per [RFC7432] by advertising + an EVPN MAC/IP Advertisement route with both the MAC and IP addresses + filled in (per Sections 5.1 and 6.1) along with the MAC Mobility + extended community, with the sequence number incremented by one. The + target NVE also exercises the MAC duplication detection procedure in + Section 15.1 of [RFC7432]. + + The source NVE, upon receiving this MAC/IP Advertisement route, + realizes that the MAC has moved to the target NVE. It updates its + MAC-VRF and IP-VRF table accordingly with the adjacency information + of the target NVE. In the case of the asymmetric IRB, the source NVE + also updates its ARP table with the received adjacency information, + and in the case of the symmetric IRB, the source NVE removes the + entry associated with the received (IP, MAC) from its local ARP + table. It then withdraws its EVPN MAC/IP Advertisement route. + Furthermore, it sends an ARP probe locally to ensure that the MAC is + gone. If an ARP response is received, the source NVE updates its ARP + entry for that (IP, MAC) and re-advertises an EVPN MAC/IP + Advertisement route for that (IP, MAC) along with the MAC Mobility + extended community, with the sequence number incremented by one. The + source NVE also exercises the MAC duplication detection procedure in + Section 15.1 of [RFC7432]. + + All other remote NVE devices, upon receiving the MAC/IP Advertisement + route with the MAC Mobility extended community, compare the sequence + number in this advertisement with the one previously received. If + the new sequence number is greater than the old one, then they update + the MAC/IP addresses of the TS in their corresponding MAC-VRF and IP- + VRF tables to point to the target NVE. Furthermore, upon receiving + the MAC/IP withdraw for the TS from the source NVE, these remote PEs + perform the cleanups for their BGP tables. + +7.2. Sending Data Traffic without an ARP Request + + In this scenario, when a TS moves from a source NVE to a target NVE, + the TS starts sending data traffic without first initiating an ARP + request. + + The target NVE, upon receiving the first data packet, learns the MAC + address of the TS in the data plane and updates its MAC-VRF table + with the MAC address and the local adjacency information (e.g., local + interface) accordingly. The target NVE realizes that there has been + a MAC move because the same MAC address has been learned remotely + from the source NVE. + + If EVPN-IRB NVEs are configured to advertise MAC-only routes in + addition to MAC-and-IP EVPN routes, then the following steps are + taken: + + * The target NVE, upon learning this MAC address in the data plane, + updates this MAC address entry in the corresponding MAC-VRF with + the local adjacency information (e.g., local interface). It also + recognizes that this MAC has moved and initiates MAC Mobility + procedures per [RFC7432] by advertising an EVPN MAC/IP + Advertisement route with only the MAC address filled in along with + the MAC Mobility extended community, with the sequence number + incremented by one. + + * The source NVE, upon receiving this MAC/IP Advertisement route, + realizes that the MAC has moved to the new NVE. It updates its + MAC-VRF table with the adjacency information for that MAC address + to point to the target NVE and withdraws its EVPN MAC/IP + Advertisement route that has only the MAC address (if it has + advertised such a route previously). Furthermore, it searches for + the corresponding MAC-IP entry and sends an ARP probe for this + (IP, MAC) pair. The ARP request message is sent both locally to + all attached TSs in that subnet as well as to other NVEs + participating in that subnet, including the target NVE. Note that + the PE needs to maintain a correlation between MAC and MAC-IP + route entries in the MAC-VRF to accomplish this. + + * The target NVE passes the ARP request to its locally attached TSs, + and when it receives the ARP response, it updates its IP-VRF and + ARP table with the host (IP, MAC) information. It also sends an + EVPN MAC/IP Advertisement route with both the MAC and IP addresses + filled in along with the MAC Mobility extended community, with the + sequence number set to the same value as the one for the MAC-only + Advertisement route it sent previously. + + * When the source NVE receives the EVPN MAC/IP Advertisement route, + it updates its IP-VRF table with the new adjacency information + (pointing to the target NVE). In the case of the asymmetric IRB, + the source NVE also updates its ARP table with the received + adjacency information, and in the case of the symmetric IRB, the + source NVE removes the entry associated with the received (IP, + MAC) from its local ARP table. Furthermore, it withdraws its + previously advertised EVPN MAC/IP route with both the MAC and IP + address fields filled in. + + * All other remote NVE devices, upon receiving the MAC/IP + Advertisement route with the MAC Mobility extended community, + compare the sequence number in this advertisement with the one + previously received. If the new sequence number is greater than + the old one, then they update the MAC/IP addresses of the TS in + their corresponding MAC-VRF, IP-VRF, and ARP tables (in the case + of asymmetric IRB) to point to the new NVE. Furthermore, upon + receiving the MAC/IP withdraw for the TS from the old NVE, these + remote PEs perform the cleanups for their BGP tables. + + If an EVPN-IRB NVE is configured not to advertise MAC-only routes, + then upon receiving the first data packet, it learns the MAC address + of the TS and updates the MAC entry in the corresponding MAC-VRF + table with the local adjacency information (e.g., local interface). + It also realizes that there has been a MAC move because the same MAC + address has been learned remotely from the source NVE. It uses the + local MAC route to find the corresponding local MAC-IP route and + sends a unicast ARP request to the host. When receiving an ARP + response, it follows the procedure outlined in Section 7.1. In the + prior case, where MAC-only routes are also advertised, this procedure + of triggering a unicast ARP probe at the target PE MAY also be used + in addition to the source PE broadcast ARP probing procedure + described earlier for better convergence. + +7.3. Silent Host + + In this scenario, when a TS moves from a source NVE to a target NVE, + the TS is silent, and it neither initiates an ARP request nor sends + any data traffic. Therefore, neither the target nor the source NVEs + are aware of the MAC move. + + On the source NVE, an age-out timer (for the silent host that has + moved) is used to trigger an ARP probe. This age-out timer can be + either an ARP timer or a MAC age-out timer, and this is an + implementation choice. The ARP request gets sent both locally to all + the attached TSs on that subnet as well as to all the remote NVEs + (including the target NVE) participating in that subnet. The source + NVE also withdraws the EVPN MAC/IP Advertisement route with only the + MAC address (if it has previously advertised such a route). + + The target NVE passes the ARP request to its locally attached TSs, + and when it receives the ARP response, it updates its MAC-VRF, IP- + VRF, and ARP table with the host (IP, MAC) and local adjacency + information (e.g., local interface). It also sends an EVPN MAC/IP + Advertisement route with both the MAC and IP address fields filled in + along with the MAC Mobility extended community, with the sequence + number incremented by one. + + When the source NVE receives the EVPN MAC/IP Advertisement route, it + updates its IP-VRF table with the new adjacency information (pointing + to the target NVE). In the case of the asymmetric IRB, the source + NVE also updates its ARP table with the received adjacency + information, and in the case of the symmetric IRB, the source NVE + removes the entry associated with the received (IP, MAC) from its + local ARP table. Furthermore, it withdraws its previously advertised + EVPN MAC/IP route with both the MAC and IP address fields filled in. + + All other remote NVE devices, upon receiving the MAC/IP Advertisement + route with the MAC Mobility extended community, compare the sequence + number in this advertisement with the one previously received. If + the new sequence number is greater than the old one, then they update + the MAC/IP addresses of the TS in their corresponding MAC-VRF, IP- + VRF, and ARP (in the case of asymmetric IRB) tables to point to the + new NVE. Furthermore, upon receiving the MAC/IP withdraw for the TS + from the old NVE, these remote PEs perform the cleanups for their BGP + tables. + +8. BGP Encoding + + This document defines one new BGP Extended Community for EVPN. + +8.1. EVPN Router's MAC Extended Community + + A new EVPN BGP Extended Community called "EVPN Router's MAC" is + introduced here. This new extended community is a transitive + extended community with a Type field of 0x06 (EVPN) and a Sub-Type + field of 0x03. It may be advertised along with the Encapsulation + Extended Community defined in Section 4.1 of [RFC9012]. + + The EVPN Router's MAC Extended Community is encoded as an 8-octet + value as follows: + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type=0x06 | Sub-Type=0x03 | EVPN Router's MAC | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | EVPN Router's MAC Cont'd | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 5: EVPN Router's MAC Extended Community + + This extended community is used to carry the PE's MAC address for + symmetric IRB scenarios, and it is sent with EVPN RT-2. The + advertising PE SHALL only attach a single EVPN Router's MAC Extended + Community to a route. In case the receiving PE receives more than + one EVPN Router's MAC Extended Community with a route, it SHALL + process the first one in the list and not store and propagate the + others. + +9. Operational Models for Symmetric Inter-Subnet Forwarding + + The following sections describe two main symmetric IRB forwarding + scenarios (within a DC -- i.e., intra-DC) along with the + corresponding procedures. In the following scenarios, without loss + of generality, it is assumed that a given tenant is represented by a + single IP-VPN instance. Therefore, on a given PE, a tenant is + represented by a single IP-VRF table and one or more MAC-VRF tables. + +9.1. IRB Forwarding on NVEs for Tenant Systems + + This section covers the symmetric IRB procedures for the scenario + where each TS is attached to one or more NVEs, and its host IP and + MAC addresses are learned by the attached NVEs and are distributed to + all other NVEs that are interested in participating in both intra- + subnet and inter-subnet communications with that TS. + + In this scenario, without loss of generality, it is assumed that NVEs + operate in VLAN-based service interface mode with one bridge table(s) + per MAC-VRF. Thus, for a given tenant, an NVE has one MAC-VRF for + each tenant subnet (e.g., each VLAN) that is configured for extension + via VXLAN or NVGRE encapsulation. In the case of VLAN-aware + bundling, each MAC-VRF consists of multiple bridge tables (e.g., one + bridge table per VLAN). The MAC-VRFs on an NVE for a given tenant + are associated with an IP-VRF corresponding to that tenant (or IP-VPN + instance) via their IRB interfaces. + + Since VXLAN and NVGRE encapsulations require an inner Ethernet header + (inner MAC SA/DA) and since a TS MAC address cannot be used for + inter-subnet traffic, the ingress NVE's MAC address is used as an + inner MAC SA. The NVE's MAC address is the device MAC address, and + it is common across all MAC-VRFs and IP-VRFs. This MAC address is + advertised using the new EVPN Router's MAC Extended Community + (Section 8.1). + + Figure 6 below illustrates this scenario, where a given tenant (e.g., + an IP-VPN instance) has three subnets represented by MAC-VRF1, MAC- + VRF2, and MAC-VRF3 across two NVEs. There are five TSs that are + associated with these three MAC-VRFs -- i.e., TS1, TS4, and TS5 are + on the same subnet (e.g., the same MAC-VRF/VLAN). TS1 and TS5 are + associated with MAC-VRF1 on NVE1, while TS4 is associated with MAC- + VRF1 on NVE2. TS2 is associated with MAC-VRF2 on NVE1, and TS3 is + associated with MAC-VRF3 on NVE2. MAC-VRF1 and MAC-VRF2 on NVE1 are, + in turn, associated with IP-VRF1 on NVE1, and MAC-VRF1 and MAC-VRF3 + on NVE2 are associated with IP-VRF1 on NVE2. When TS1, TS5, and TS4 + exchange traffic with each other, only the L2 forwarding (bridging) + part of the IRB solution is exercised because all these TSs belong to + the same subnet. However, when TS1 wants to exchange traffic with + TS2 or TS3, which belong to different subnets, both the bridging and + routing parts of the IRB solution are exercised. The following + subsections describe the control and data plane operations for this + IRB scenario in detail. + + NVE1 +---------+ + +-------------+ | | + TS1-----| MACx| | | NVE2 + (M1/IP1) |(MAC- | | | +-------------+ + TS5-----| VRF1)\ | | MPLS/ | |MACy (MAC- |-----TS3 + (M5/IP5) | \ | | VXLAN/ | | / VRF3) | (M3/IP3) + | (IP-VRF1)|----| NVGRE |---|(IP-VRF1) | + | / | | | | \ | + TS2-----|(MAC- / | | | | (MAC- |-----TS4 + (M2/IP2) | VRF2) | | | | VRF1) | (M4/IP4) + +-------------+ | | +-------------+ + | | + +---------+ + + Figure 6: IRB Forwarding on NVEs for Tenant Systems + +9.1.1. Control Plane Operation + + Each NVE advertises a MAC/IP Advertisement route (i.e., route type 2) + for each of its TSs with the following field set: + + * RD and Ethernet Segment Identifier (ESI) per [RFC7432] + + * Ethernet Tag = 0 (assuming VLAN-based service) + + * MAC Address Length = 48 + + * MAC Address = Mi (where i = 1, 2, 3, 4, or 5) in Figure 6, above + + * IP Address Length = 32 or 128 + + * IP Address = IPi (where i = 1, 2, 3, 4, or 5) in Figure 6, above + + * Label1 = MPLS label or VNI corresponding to MAC-VRF + + * Label2 = MPLS label or VNI corresponding to IP-VRF + + Each NVE advertises an EVPN RT-2 route with two Route Targets (one + corresponding to its MAC-VRF and the other corresponding to its IP- + VRF). Furthermore, the EVPN RT-2 is advertised with two BGP Extended + Communities. The first BGP Extended Community identifies the tunnel + type, and it is called "Encapsulation Extended Community" as defined + in [RFC9012], and the second BGP Extended Community includes the MAC + address of the NVE (e.g., MACx for NVE1 or MACy for NVE2) as defined + in Section 8.1. The EVPN Router's MAC Extended Community MUST be + added when the Ethernet NVO tunnel is used. If the IP NVO tunnel + type is used, then there is no need to send this second Extended + Community. It should be noted that the IP NVO tunnel type is only + applicable to symmetric IRB procedures. + + Upon receiving this advertisement, the receiving NVE performs the + following: + + * It uses Route Targets corresponding to its MAC-VRF and IP-VRF for + identifying these tables and subsequently importing the MAC and IP + addresses into them, respectively. + + * It imports the MAC address from the MAC/IP Advertisement route + into the MAC-VRF with the BGP next-hop address as the underlay + tunnel destination address (e.g., VTEP DA for VXLAN encapsulation) + and label1 as the VNI for VXLAN encapsulation or an EVPN label for + MPLS encapsulation. + + * If the route carries the new EVPN Router's MAC Extended Community + and if the receiving NVE uses an Ethernet NVO tunnel, then the + receiving NVE imports the IP address into IP-VRF with NVE's MAC + address (from the new EVPN Router's MAC Extended Community) as the + inner MAC DA, the BGP next-hop address as the underlay tunnel + destination address, the VTEP DA for VXLAN encapsulation, and + label2 as the IP-VPN VNI for VXLAN encapsulation. + + * If the receiving NVE uses MPLS encapsulation, then the receiving + NVE imports the IP address into IP-VRF with the BGP next-hop + address as the underlay tunnel destination address and label2 as + the IP-VPN label for MPLS encapsulation. + + If the receiving NVE receives an EVPN RT-2 with only label1 and only + a single Route Target corresponding to IP-VRF; an EVPN RT-2 with only + a single Route Target corresponding to MAC-VRF but with both label1 + and label2; or an EVPN RT-2 with a MAC address length of zero, then + it MUST use the treat-as-withdraw approach [RFC7606] and SHOULD log + an error message. + +9.1.2. Data Plane Operation + + The following description of the data plane operation describes just + the logical functions, and the actual implementation may differ. + Let's consider the data plane operation when TS1 in subnet-1 (MAC- + VRF1) on NVE1 wants to send traffic to TS3 in subnet-3 (MAC-VRF3) on + NVE2. + + * NVE1 receives a packet with the MAC DA corresponding to the MAC- + VRF1 IRB interface on NVE1 (the interface between MAC-VRF1 and IP- + VRF1) and the VLAN tag corresponding to MAC-VRF1. + + * Upon receiving the packet, the NVE1 uses the VLAN tag to identify + the MAC-VRF1. It then looks up the MAC DA and forwards the frame + to its IRB interface. + + * The Ethernet header of the packet is stripped, and the packet is + fed to the IP-VRF, where an IP lookup is performed on the + destination IP address. NVE1 also decrements the TTL / hop limit + for that packet by one, and if it reaches zero, NVE1 discards the + packet. This lookup yields the outgoing NVO tunnel and the + required encapsulation. If the encapsulation is for the Ethernet + NVO tunnel, then it includes the egress NVE's MAC address as the + inner MAC DA, the egress NVE's IP address (e.g., BGP next-hop + address) as the VTEP DA, and the VPN-ID as the VNI. The inner MAC + SA and VTEP SA are set to NVE's MAC and IP addresses, + respectively. If it is an MPLS encapsulation, then the + corresponding EVPN and LSP labels are added to the packet. The + packet is then forwarded to the egress NVE. + + * If the egress NVE receives a packet from the Ethernet NVO tunnel + (e.g., it is VXLAN encapsulated), then it removes the Ethernet + header. Since the inner MAC DA is the egress NVE's MAC address, + the egress NVE knows that it needs to perform an IP lookup. It + uses the VNI to identify the IP-VRF table. If the packet is MPLS + encapsulated, then the EVPN label lookup identifies the IP-VRF + table. Next, an IP lookup is performed for the destination TS + (TS3), which results in an access-facing IRB interface over which + the packet is sent. Before sending the packet over this + interface, the ARP table is consulted to get the destination TS's + MAC address. NVE2 also decrements the TTL / hop limit for that + packet by one, and if it reaches zero, NVE2 discards the packet. + + * The IP packet is encapsulated with an Ethernet header, with the + MAC SA set to that of the IRB interface MAC address (i.e., the IRB + interface between MAC-VRF3 and IP-VRF1 on NVE2) and the MAC DA set + to that of the destination TS (TS3) MAC address. The packet is + sent to the corresponding MAC-VRF (i.e., MAC-VRF3) and, after a + lookup of MAC DA, is forwarded to the destination TS (TS3) over + the corresponding interface. + + In this symmetric IRB scenario, inter-subnet traffic between NVEs + will always use the IP-VRF VNI/MPLS label. For instance, traffic + from TS2 to TS4 will be encapsulated by NVE1 using NVE2's IP-VRF VNI/ + MPLS label, as long as TS4's host IP is present in NVE1's IP-VRF. + +9.2. IRB Forwarding on NVEs for Subnets behind Tenant Systems + + This section covers the symmetric IRB procedures for the scenario + where some TSs support one or more subnets and these TSs are + associated with one or more NVEs. Therefore, besides the + advertisement of MAC/IP addresses for each TS, which can be + multihomed with All-Active redundancy mode, the associated NVE needs + to also advertise the subnets statically configured on each TS. + + The main difference between this solution and the previous one is the + additional advertisement corresponding to each subnet. These subnet + advertisements are accomplished using the EVPN IP Prefix route + defined in [RFC9136]. These subnet prefixes are advertised with the + IP address of their associated TS (which is in an overlay address + space) as their next hop. The receiving NVEs perform recursive route + resolution to resolve the subnet prefix with its advertising NVE so + that they know which NVE to forward the packets to when they are + destined for that subnet prefix. + + The advantage of this recursive route resolution is that when a TS + moves from one NVE to another, there is no need to re-advertise any + of the subnet prefixes for that TS. All that is needed is to + advertise the IP/MAC addresses associated with the TS itself and + exercise the MAC Mobility procedures for that TS. The recursive + route resolution automatically takes care of the updates for the + subnet prefixes of that TS. + + Figure 7 illustrates this scenario where a given tenant (e.g., an IP- + VPN service) has three subnets represented by MAC-VRF1, MAC-VRF2, and + MAC-VRF3 across two NVEs. There are four TSs associated with these + three MAC-VRFs -- i.e., TS1 is connected to MAC-VRF1 on NVE1, TS2 is + connected to MAC-VRF2 on NVE1, TS3 is connected to MAC-VRF3 on NVE2, + and TS4 is connected to MAC-VRF1 on NVE2. TS1 has two subnet + prefixes (SN1 and SN2), and TS3 has a single subnet prefix (SN3). + The MAC-VRFs on each NVE are associated with their corresponding IP- + VRF using their IRB interfaces. When TS4 and TS1 exchange intra- + subnet traffic, only the L2 forwarding (bridging) part of the IRB + solution is used (i.e., the traffic only goes through their MAC- + VRFs); however, when TS3 wants to forward traffic to SN1 or SN2 + sitting behind TS1 (inter-subnet traffic), then both the bridging and + routing parts of the IRB solution are exercised (i.e., the traffic + goes through the corresponding MAC-VRFs and IP-VRFs). If TS4, for + example, wants to reach SN1, it uses its default route and sends the + packet to the MAC address associated with the IRB interface on NVE2; + NVE2 then performs an IP lookup in its IP-VRF and finds an entry for + SN1. The following subsections describe the control and data plane + operations for this IRB scenario in detail. + + NVE1 +----------+ + SN1--+ +-------------+ | | + |--TS1-----|(MAC- \ | | | + SN2--+ M1/IP1 | VRF1) \ | | | + | (IP-VRF)|---| | + | / | | | + TS2-----|(MAC- / | | MPLS/ | + M2/IP2 | VRF2) | | VXLAN/ | + +-------------+ | NVGRE | + +-------------+ | | + SN3--+--TS3-----|(MAC-\ | | | + M3/IP3 | VRF3)\ | | | + | (IP-VRF)|---| | + | / | | | + TS4-----|(MAC- / | | | + M4/IP4 | VRF1) | | | + +-------------+ +----------+ + NVE2 + + Figure 7: IRB Forwarding on NVEs for Subnets behind TSs + + Note that in Figure 7, above, SN1 and SN2 are configured on NVE1, + which then advertises each in an IP Prefix route. Similarly, SN3 is + configured on NVE2, which then advertises it in an IP Prefix route. + +9.2.1. Control Plane Operation + + Each NVE advertises a route type 5 (EVPN RT-5, IP Prefix route + defined in [RFC9136]) for each of its subnet prefixes with the IP + address of its TS as the next hop (Gateway Address field) as follows: + + * RD associated with the IP-VRF + + * ESI = 0 + + * Ethernet Tag = 0 + + * IP Prefix Length = 0 to 32 or 0 to 128 + + * IP Prefix = SNi + + * Gateway Address = IPi (IP address of TS) + + * MPLS Label = 0 + + This EVPN RT-5 is advertised with one or more Route Targets + associated with the IP-VRF from which the route is originated. + + Each NVE also advertises an EVPN RT-2 (MAC/IP Advertisement route) + along with its associated Route Targets and Extended Communities for + each of its TSs exactly as described in Section 9.1.1. + + Upon receiving the EVPN RT-5 advertisement, the receiving NVE + performs the following: + + * It uses the Route Target to identify the corresponding IP-VRF. + + * It imports the IP prefix into its corresponding IP-VRF configured + with an import RT that is one of the RTs being carried by the EVPN + RT-5 route, along with the IP address of the associated TS as its + next hop. + + When receiving the EVPN RT-2 advertisement, the receiving NVE imports + the MAC/IP addresses of the TS into the corresponding MAC-VRF and IP- + VRF per Section 9.1.1. When both routes exist, recursive route + resolution is performed to resolve the IP prefix (received in EVPN + RT-5) to its corresponding NVE's IP address (e.g., its BGP next hop). + The BGP next hop will be used as the underlay tunnel destination + address (e.g., VTEP DA for VXLAN encapsulation), and the EVPN + Router's MAC will be used as the inner MAC for VXLAN encapsulation. + +9.2.2. Data Plane Operation + + The following description of the data plane operation describes just + the logical functions, and the actual implementation may differ. + Let's consider the data plane operation when a host in SN1 behind TS1 + wants to send traffic to a host in SN3 behind TS3. + + * TS1 sends a packet with MAC DA corresponding to the MAC-VRF1 IRB + interface of NVE1 and a VLAN tag corresponding to MAC-VRF1. + + * Upon receiving the packet, the ingress NVE1 uses the VLAN tag to + identify the MAC-VRF1. It then looks up the MAC DA and forwards + the frame to its IRB interface as in Section 9.1.1. + + * The Ethernet header of the packet is stripped, and the packet is + fed to the IP-VRF, where an IP lookup is performed on the + destination address. This lookup yields the fields needed for + VXLAN encapsulation with NVE2's MAC address as the inner MAC DA, + NVE2's IP address as the VTEP DA, and the VNI. The MAC SA is set + to NVE1's MAC address, and the VTEP SA is set to NVE1's IP + address. NVE1 also decrements the TTL / hop limit for that packet + by one, and if it reaches zero, NVE1 discards the packet. + + * The packet is then encapsulated with the proper header based on + the above info and is forwarded to the egress NVE (NVE2). + + * On the egress NVE (NVE2), assuming the packet is VXLAN + encapsulated, the VXLAN and the inner Ethernet headers are + removed, and the resultant IP packet is fed to the IP-VRF + associated with that VNI. + + * Next, a lookup is performed based on the IP DA (which is in SN3) + in the associated IP-VRF of NVE2. The IP lookup yields the + access-facing IRB interface over which the packet needs to be + sent. Before sending the packet over this interface, the ARP + table is consulted to get the destination TS (TS3) MAC address. + NVE2 also decrements the TTL / hop limit for that packet by one, + and if it reaches zero, NVE2 discards the packet. + + * The IP packet is encapsulated with an Ethernet header with the MAC + SA set to that of the access-facing IRB interface of the egress + NVE (NVE2), and the MAC DA is set to that of the destination TS + (TS3) MAC address. The packet is sent to the corresponding MAC- + VRF3 and, after a lookup of MAC DA, is forwarded to the + destination TS (TS3) over the corresponding interface. + +10. Security Considerations + + The security considerations for Layer 2 forwarding in this document + follow those of [RFC7432] for MPLS encapsulation and those of + [RFC8365] for VXLAN or NVGRE encapsulations. This section describes + additional considerations. + + This document describes a set of procedures for inter-subnet + forwarding of tenant traffic across PEs (or NVEs). These procedures + include both Layer 2 forwarding and Layer 3 routing on a packet-by- + packet basis. The security consideration for Layer 3 routing in this + document follows that of [RFC4365], with the exception of the + application of routing protocols between CEs and PEs. Contrary to + [RFC4364], this document does not describe route distribution + techniques between CEs and PEs but rather considers the CEs as TSs or + VAs that do not run dynamic routing protocols. This can be + considered a security advantage, since dynamic routing protocols can + be blocked on the NVE/PE ACs, not allowing the tenant to interact + with the infrastructure's dynamic routing protocols. + + The VPN scheme described in this document does not provide the + quartet of security properties mentioned in [RFC4365] + (confidentiality protection, source authentication, integrity + protection, and replay protection). If these are desired, they must + be provided by mechanisms that are outside the scope of the VPN + mechanisms. + + In this document, the EVPN RT-5 is used for certain scenarios. This + route uses an Overlay Index that requires a recursive resolution to a + different EVPN route (an EVPN RT-2). Because of this, it is worth + noting that any action that ends up filtering or modifying the EVPN + RT-2 route used to convey the Overlay Indexes will modify the + resolution of the EVPN RT-5 and therefore the forwarding of packets + to the remote subnet. + +11. IANA Considerations + + IANA has allocated Sub-Type value 0x03 in the "EVPN Extended + Community Sub-Types" registry as follows: + + +================+======================================+===========+ + | Sub-Type Value | Name | Reference | + +================+======================================+===========+ + | 0x03 | EVPN Router's MAC | RFC 9135 | + | | Extended Community | | + +----------------+--------------------------------------+-----------+ + + Table 1 + + This document has been listed as an additional reference for the MAC/ + IP Advertisement route in the "EVPN Route Types" registry. + +12. References + +12.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, + DOI 10.17487/RFC2119, March 1997, + <https://www.rfc-editor.org/info/rfc2119>. + + [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private + Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February + 2006, <https://www.rfc-editor.org/info/rfc4364>. + + [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A., + Uttaro, J., Drake, J., and W. Henderickx, "BGP MPLS-Based + Ethernet VPN", RFC 7432, DOI 10.17487/RFC7432, February + 2015, <https://www.rfc-editor.org/info/rfc7432>. + + [RFC7606] Chen, E., Ed., Scudder, J., Ed., Mohapatra, P., and K. + Patel, "Revised Error Handling for BGP UPDATE Messages", + RFC 7606, DOI 10.17487/RFC7606, August 2015, + <https://www.rfc-editor.org/info/rfc7606>. + + [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC + 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, + May 2017, <https://www.rfc-editor.org/info/rfc8174>. + + [RFC8365] Sajassi, A., Ed., Drake, J., Ed., Bitar, N., Shekhar, R., + Uttaro, J., and W. Henderickx, "A Network Virtualization + Overlay Solution Using Ethernet VPN (EVPN)", RFC 8365, + DOI 10.17487/RFC8365, March 2018, + <https://www.rfc-editor.org/info/rfc8365>. + + [RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, + "The BGP Tunnel Encapsulation Attribute", RFC 9012, + DOI 10.17487/RFC9012, April 2021, + <https://www.rfc-editor.org/info/rfc9012>. + + [RFC9136] Rabadan, J., Ed., Henderickx, W., Drake, J., Lin, W., and + A. Sajassi, "IP Prefix Advertisement in Ethernet VPN + (EVPN)", RFC 9136, DOI 10.17487/RFC9136, October 2021, + <https://www.rfc-editor.org/info/rfc9136>. + +12.2. Informative References + + [EVPN] Krattiger, L., Ed., Sajassi, A., Ed., Thoria, S., Rabadan, + J., and J. Drake, "EVPN Interoperability Modes", Work in + Progress, Internet-Draft, draft-ietf-bess-evpn-modes- + interop-00, 26 May 2021, + <https://datatracker.ietf.org/doc/html/draft-ietf-bess- + evpn-modes-interop-00>. + + [EXTENDED-MOBILITY] + Malhotra, N., Ed., Sajassi, A., Pattekar, A., Rabadan, J., + Lingala, A., and J. Drake, "Extended Mobility Procedures + for EVPN-IRB", Work in Progress, Internet-Draft, draft- + ietf-bess-evpn-irb-extended-mobility-07, 2 October 2021, + <https://datatracker.ietf.org/doc/html/draft-ietf-bess- + evpn-irb-extended-mobility-07>. + + [RFC4365] Rosen, E., "Applicability Statement for BGP/MPLS IP + Virtual Private Networks (VPNs)", RFC 4365, + DOI 10.17487/RFC4365, February 2006, + <https://www.rfc-editor.org/info/rfc4365>. + + [RFC5798] Nadas, S., Ed., "Virtual Router Redundancy Protocol (VRRP) + Version 3 for IPv4 and IPv6", RFC 5798, + DOI 10.17487/RFC5798, March 2010, + <https://www.rfc-editor.org/info/rfc5798>. + + [RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, + L., Sridhar, T., Bursell, M., and C. Wright, "Virtual + eXtensible Local Area Network (VXLAN): A Framework for + Overlaying Virtualized Layer 2 Networks over Layer 3 + Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014, + <https://www.rfc-editor.org/info/rfc7348>. + + [RFC7365] Lasserre, M., Balus, F., Morin, T., Bitar, N., and Y. + Rekhter, "Framework for Data Center (DC) Network + Virtualization", RFC 7365, DOI 10.17487/RFC7365, October + 2014, <https://www.rfc-editor.org/info/rfc7365>. + + [RFC7637] Garg, P., Ed. and Y. Wang, Ed., "NVGRE: Network + Virtualization Using Generic Routing Encapsulation", + RFC 7637, DOI 10.17487/RFC7637, September 2015, + <https://www.rfc-editor.org/info/rfc7637>. + + [VXLAN-GPE] + Maino, F., Ed., Kreeger, L., Ed., and U. Elzur, Ed., + "Generic Protocol Extension for VXLAN (VXLAN-GPE)", Work + in Progress, Internet-Draft, draft-ietf-nvo3-vxlan-gpe-12, + 22 September 2021, <https://datatracker.ietf.org/doc/html/ + draft-ietf-nvo3-vxlan-gpe-12>. + +Acknowledgements + + The authors would like to thank Sami Boutros, Jeffrey Zhang, + Krzysztof Szarkowicz, Lukas Krattiger and Neeraj Malhotra for their + valuable comments. The authors would also like to thank Linda + Dunbar, Florin Balus, Yakov Rekhter, Wim Henderickx, Lucy Yong, and + Dennis Cai for their feedback and contributions. + +Authors' Addresses + + Ali Sajassi + Cisco Systems + + Email: sajassi@cisco.com + + + Samer Salam + Cisco Systems + + Email: ssalam@cisco.com + + + Samir Thoria + Cisco Systems + + Email: sthoria@cisco.com + + + John E Drake + Juniper + + Email: jdrake@juniper.net + + + Jorge Rabadan + Nokia + + Email: jorge.rabadan@nokia.com |