Jorge,
Lots of thanks for a prompt response.

I tend to agree with your position.
Let's wait for a more detailed version of the draft.

Regards,
Sasha

Get Outlook for Android<https://aka.ms/AAb9ysg>

________________________________
From: Jorge Rabadan (Nokia) <jorge.raba...@nokia.com>
Sent: Wednesday, August 2, 2023 3:02:28 AM
To: Alexander Vainshtein <alexander.vainsht...@rbbn.com>
Cc: bess@ietf.org <bess@ietf.org>; Nitsan Dolev <nitsan.do...@rbbn.com>; 
draft-zzhang-bess-vpn-option-bc.auth...@ietf.org 
<draft-zzhang-bess-vpn-option-bc.auth...@ietf.org>
Subject: [EXTERNAL] Re: Comments on the VPN Inter-AS Option BC draft

Sasha,

Jeffrey would want to reply to those questions, the draft would need to be 
specific about the TEA use. Personally I don’t see any issues in using the TEA 
if properly specified in this draft.

Thx
Jorge

From: Alexander Vainshtein <alexander.vainsht...@rbbn.com>
Date: Tuesday, August 1, 2023 at 8:42 AM
To: Jorge Rabadan (Nokia) <jorge.raba...@nokia.com>
Cc: bess@ietf.org <bess@ietf.org>, Nitsan Dolev <nitsan.do...@rbbn.com>, 
draft-zzhang-bess-vpn-option-bc.auth...@ietf.org 
<draft-zzhang-bess-vpn-option-bc.auth...@ietf.org>
Subject: RE: Comments on the VPN Inter-AS Option BC draft

CAUTION: This is an external email. Please be very careful when clicking links 
or opening attachments. See the URL nok.it/ext for additional information.


Jorge,
I think that a more detailed definition of the TEA-based solution for inter-AS 
Option BC and EVPN is required.

According to RFC 9136, Encapsulation Extended Community can be attached to EVPN 
Ip Prefix routes in some cases.
And Section 4.1 of RFC 
9012<https://clicktime.symantec.com/15siFAn1RKeQBV28niQrX?h=Q05YbxJ5VmnNz13pCxBX5bAAu9TXh6SCpDGkNh0sS74=&u=https://www.rfc-editor.org/rfc/rfc9012.html%23section-4.1>
 says that the semantics of this extended community are the same as could be 
encoded in the “barebones Tunnel TLV”.

Are there valid scenarios in which Encapsulation Extended Community has to be 
attached to the EVPN IP Prefix route for the reasons defined in RFC 9136 the 
same route undergoes inter-AS Option BC handling based on the TEA, and, if yes, 
how these two usages can be clearly differentiated?

Regards, and lots of thanks in advance,
Sasha

From: Jorge Rabadan (Nokia) <jorge.raba...@nokia.com>
Sent: Monday, July 31, 2023 6:32 PM
To: Alexander Vainshtein <alexander.vainsht...@rbbn.com>; 
draft-zzhang-bess-vpn-option-bc.auth...@ietf.org
Cc: bess@ietf.org; Nitsan Dolev <nitsan.do...@rbbn.com>
Subject: [EXTERNAL] Re: Comments on the VPN Inter-AS Option BC draft

Hi everyone,

I mostly agree with Sasha’s points.
For completeness I’d like to add that, as I said on the mike, I believe a 
solution based on the TEA would be better (than based on multi-label NLRI). 
Reasons are:

-    RFC8277 was only defined for SAFIs 1 and 128, never for EVPN

-    EVPN route type 2 uses multiple labels in the NLRI already, so it would be 
simpler to use TEA.

Thanks.
Jorge

From: BESS <bess-boun...@ietf.org<mailto:bess-boun...@ietf.org>> on behalf of 
Alexander Vainshtein 
<alexander.vainsht...@rbbn.com<mailto:alexander.vainsht...@rbbn.com>>
Date: Sunday, July 30, 2023 at 12:33 AM
To: 
draft-zzhang-bess-vpn-option-bc.auth...@ietf.org<mailto:draft-zzhang-bess-vpn-option-bc.auth...@ietf.org>
 
<draft-zzhang-bess-vpn-option-bc.auth...@ietf.org<mailto:draft-zzhang-bess-vpn-option-bc.auth...@ietf.org>>
Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>, 
Nitsan Dolev <nitsan.do...@rbbn.com<mailto:nitsan.do...@rbbn.com>>
Subject: [bess] Comments on the VPN Inter-AS Option BC draft

CAUTION: This is an external email. Please be very careful when clicking links 
or opening attachments. See the URL nok.it/ext for additional information.


Hi,
A few comments on the VPN Inter-AS Option BC 
draft<https://clicktime.symantec.com/15t5pPA4bD5KNabJWqiFE?h=yWp3H1PJEe4zH4c3i4dF5n7lEMli2TmtihCz3ZwOO0k=&u=https://datatracker.ietf.org/doc/html/draft-zzhang-bess-vpn-option-bc-00>
 that has been presented at the BESS WG session in SF last Thursday.

I think that the draft presents an elegant and much needed solution for real 
problem.
I fully agree with the statement in the draft that “Option BC” combines the 
advantages and mitigates the disadvantages of both classic “Option B” and 
“classic” Option C.
I also think that “Option BC” provides a viable alternative to both emerging 
solutions for intent-driven service mapping  (BGP Classful Transport 
Planes<https://clicktime.symantec.com/15t5eimVfyi8YgwTRiuwz?h=hMCtCJ0CFBdHAlMw_J1sPfLPSwJtIKOIe1RPi3WAlq8=&u=https://datatracker.ietf.org/doc/html/draft-ietf-idr-bgp-ct-12>
 and BGP Color-Aware 
Routing<https://clicktime.symantec.com/15t5ZtaDDN2Y8k7XtAWoN?h=iLtYqX5EuXFTvu91ipk88eTZimbi9nAXijmyuMHZ9RE=&u=https://datatracker.ietf.org/doc/html/draft-ietf-idr-bgp-car-02>),
  because it is possible to set up intent=aware inter-AS/inter-domain tunnels 
for “colored” services based on the color of the original service routes.

At the same time, I think that:

1.       As mentioned during the session, Inter-AS Option B for EVPN has its 
own issues (documented in the EVPN Inter-Domain Option B 
draft<https://clicktime.symantec.com/15t5jYxn8bPixdmNyHK6c?h=Wqmp2FHrWkw75uGs4NJ_SawETnrpSdBEZz6r9HSuBrQ=&u=https://datatracker.ietf.org/doc/html/draft-rabadan-bess-evpn-inter-domain-opt-b-01>),
 and these issues fully apply to “Option BC”

2.       The draft defines two possible solutions, one based on the Tunnel 
Encapsulation Attribute (TEA, RFC 
9012<https://clicktime.symantec.com/15t5z3YdWSSWCUF9bxWYU?h=Eo8x2bOQorNn4An26KlhQGMaow4EDWU6fwDgx-LKhZg=&u=https://datatracker.ietf.org/doc/html/rfc9012>)
 and the other based on ability to carry multiple labels in the NLRI of 
“labeled” routes as defined in RFC 
8277<https://clicktime.symantec.com/15t5uDMM3pkunXRE4Q7Pr?h=X5O-7WPStfY9Ws3f_gOPo314zCnRjXQrJAId3fyJJSc=&u=https://datatracker.ietf.org/doc/html/rfc8277>:

a.       My guess (FWIW) is that these solutions are not interoperable and, 
therefore, ability to support each of these options should be advertised using 
appropriate Capability Codes

b.       In the TEA-based solution the draft mentions “Composite Tunnel”, but 
there is no mention of composite tunnels in RFC 9012.  From my POV:

                                                                                
                                                       i.      Specific tunnel 
type (one of the types defined in the IANA Tunnel Types 
registry<https://clicktime.symantec.com/15t64sjuy486cR559Wuh6?h=dV-HpTGRjieAGayybwXeM9RPxaokaMJmf7LVxKZVsl8=&u=https://www.iana.org/assignments/bgp-tunnel-encapsulation/bgp-tunnel-encapsulation.xhtml>)
 should be specified, or a request for allocating a new tunnel type should be 
added to the next revision of the document

                                                                                
                                                     ii.      I wonder if MPLS 
Encapsulation Tunnel type and the Label Stack Sub-TLV can be used in the 
TEA-based solution. My guess is that this would require an update to RFC 
8365<https://clicktime.symantec.com/15t69hwCRfoh2Mtzh5Jqi?h=ncsX_KRsobTP9rvyLPeSchKXu21eb5KVtZz0rSqgqhA=&u=https://www.rfc-editor.org/rfc/rfc8365.html>

Hopefully these issues will be addressed in the next revision of the draft.

My 2c,
Sasha



Disclaimer

This e-mail together with any attachments may contain information of Ribbon 
Communications Inc. and its Affiliates that is confidential and/or proprietary 
for the sole use of the intended recipient. Any review, disclosure, reliance or 
distribution by others or forwarding without express permission is strictly 
prohibited. If you are not the intended recipient, please notify the sender 
immediately and then delete all copies, including any attachments.

_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org/mailman/listinfo/bess

Reply via email to