Hi Aldrin,

I'm afraid this didn't help give me the answers to my questions – at least 
directly.

First, you discuss multiple VNIs on the same NVE connected to the same VN.  I 
did not see this illustrated in your diagram, so I didn't have questions about 
it.  From your description, you seem to be making an assumption that there is 
some kind of firewall policy associated with the VNI.  I don't see the benefit 
of applying firewall policies to VNIs.  It seems more straight forward to apply 
them to the VAPs.

Regarding the topic of my questions (one VNI connected to multiple VNs), I am 
not clear on the answers to my questions based on your example.  Based on your 
example, it seems like you are assuming that addresses cannot overlap between 
two VNs (or at least two that have been associated with the same VNI).  It also 
seems like you are assuming a VN doesn't necessarily represent a subnet (I'm 
thinking of an L2 VN), but perhaps more like a Closed User Group.  If a VN 
connects VNI connects to multiple VNs then it is a member of multiple CUGs.  
Did I interpret that correctly?

Thanks, Larry



From: Aldrin Isaac <[email protected]<mailto:[email protected]>>
Date: Saturday, July 7, 2012 8:08 AM
To: Cisco Employee <[email protected]<mailto:[email protected]>>
Cc: "LASSERRE, MARC (MARC)" 
<[email protected]<mailto:[email protected]>>, 
David Black <[email protected]<mailto:[email protected]>>, 
"[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>>, 
Lucy yong <[email protected]<mailto:[email protected]>>, Rekhter Yakov 
<[email protected]<mailto:[email protected]>>
Subject: Re: [nvo3] call for adoption: draft-lasserre-nvo3-framework-02

Hi Larry,

I view the VAP as just a virtualized host-facing network port, and the VNI as 
an instance of a forwarding table.


Wrt multiple VNI on a single NVE that are members of the same VN:

Let me try the following example.  Let's assume you have 10 TES on a 
hypervisor/NVE that need to be on the same VN.  If you need a certain behavior 
implemented at the forwarding table (say an L2VNI equivalent of a "VACL") for 5 
of those TES and another behavior for the other 5 TES then you can have two VNI 
on the same NVE that are members of the same VPN.

Another better example would be where the first 5 TES additionally need to be a 
part of another VN.


Wrt a single VNI being a member of more than one VN:

Consider a network overlay solution where at the center is a pub-sub system 
with VNI as clients of this system.  The VNI publish routes with one or more 
topic-IDs and also subscribe to one or more topic-IDs (and thereby receive 
routes that were published with those topic-IDs).  Let's assume each topic-ID 
can be considered a VN.  By publishing and subscribing with a topic-ID a VNI is 
effectively participating (becomes a member) in the topic (VN).

If a VNI is a member of (subscribes to) two VN (topic-IDs) it will receive 
routes from VNI that published routes with both VN (topic-IDs).  If a route is 
associated to both VN then the VNI (or the big brain in the sky) has to pick 
one based on some tie breaker.  However there are two cases (1) the route 
represents the same destination in which case it doesn't matter.  Also 
generally in the case of (1) the pub-sub system delivers to the VNI one route 
with two topic-ID on it (in case of BGP that would be two Route Targets).  Case 
(2) is where the route indeed represent different destinations -- this is a 
case of operator error.  The disambiguation will have to happen somewhere -- 
either in the network or in the host.

Furthermore, in L2VN a "VNI route" would probably be used for identifying where 
to send BUM, while unicast MAC routes would be used for forwarding known 
unicast.  In my illustration, the BUM traffic would be sent to all VNI 
represented by "VNI routes" in the ingress VNI regardless of how many VN the 
VNI is a member of.

I'm hoping this email will also address Dave's earlier email.

Best -- aldrin


On Jul 6, 2012, at 7:34 PM, Larry Kreeger (kreeger) wrote:

Hi Aldrin,

My interpretation of the model in the framework document is that a VNI is the 
intersection of a single VN with a single NVE, with the VAP determining a 
connection to a single VNI.  Your picture seems to show a single VAP connecting 
to a single VNI where two VNs intersect at the same VNI.  Given that, how would 
the VAP differentiate which VN to associate ingress packets with?  For example, 
if one of the VMs at the bottom sent an ARP to the L2VNI, which VN would the 
broadcast be sent to?  Since each VN is allowed to support overlapping 
addresses, how would a unicast frame sent by that VM on the VAP be delivered to 
the correct overlapping destination address in the two VNs?

Thanks, Larry

From: Aldrin Isaac <[email protected]<mailto:[email protected]>>
Date: Monday, July 2, 2012 7:29 PM
To: "LASSERRE, MARC (MARC)" 
<[email protected]<mailto:[email protected]>>, 
David Black <[email protected]<mailto:[email protected]>>
Cc: "[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>, Lucy yong 
<[email protected]<mailto:[email protected]>>, Aldrin Isaac 
<[email protected]<mailto:[email protected]>>
Subject: Re: [nvo3] call for adoption: draft-lasserre-nvo3-framework-02

(resending from my correct mailto email with minor edits)


Hi Marc/David,

I've attached a "proof-of-concept" design to express the points I have raised.  
Hopefully a picture is worth a thousand words.  It is a PDF file since I simply 
don't have the time to draw it as ascii art.

The illustration tries to capture (1) multiple VN per VNI (and relatedly, 
single interface on TES) and (2) VNIF.  In this POC the L2-based subnet 
comprise of 3 VNs to force VMs to remain in their availability zone (DC) but 
allows them to communicate with other subnets or Internet via gateways in both 
DC (with preference for local DC).  This illustration could represent a single 
tenant of a cloud DC provider or infrastructure owned and operated by an 
enterprise.

The illustration also tries to capture a more mobile L3-based VN where routing 
information is in the form of host-routes with aggregation of those routes at 
the gateways.

Best -- aldrin




On Jun 26, 2012, at 11:51 PM, Aldrin Isaac wrote:

Hi Marc,

My comments inline,


On Jun 26, 2012, at 9:43 AM, LASSERRE, MARC (MARC) wrote:

Hi Aldrin,

See my comments below.

Thanks,
Marc

________________________________
From: Aldrin Isaac [mailto:[email protected]]
Sent: Tuesday, June 26, 2012 3:24 PM
To: LASSERRE, MARC (MARC)
Cc: Aldrin Isaac; [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>; Lucy yong
Subject: Re: [nvo3] call for adoption: draft-lasserre-nvo3-framework-02

Hi Marc,

Thanks for the clarifications.

Wrt my first question, should we assume that there isn't yet a consensus on 
whether a VNI can support more than one type of VN?
It does not preclude it. I'd like to hear how much interest there is to support 
this capability.

Actually I'm not convinced mixing types is good.  Needed to clarify where 
things stood today.


Regarding one-to-one mapping of VNI to VN, this implies that an end-station 
that needs to be a part of more than one VN will require a separate interface 
into each associated VNI.  This implies that the end-station will require a 
potentially complex routing table (depending on how aggregateable the address 
space within a VN is).  Unfortunately as an operator I don't find this an 
acceptable trade off.  Can we please address the issue of managing multiple 
interfaces and complex tables in end-systems? I believe the problem statement 
needs to capture this.
This is not any different than with existing VPN technologies. Supporting 
multiple interfaces to connect to different subnets and/or nvo3 domains does 
not make routing really complex.
Have you had specific problems with past technologies?

If you are referring to VRFs and the like, then I don't see host-facing VNI as 
equivalent.  For one, most PE connect to a CE which generally tend to be a 
router, not a host -- the difference here is network versus system 
administration.

Even in cases where the PE connects to an access subnet (as opposed to a CE 
router), there are scenarios where the subnet-connecting VRF is a member of 
multiple VPNs.  For example: a regional extranet DMZ subnet connected to a VRF 
which is both a member of a customer-facing regional hub-and-spoke VPN as well 
as an internal DMZ mesh.  The advantage of this approach is that the servers do 
not need to have an interface on a subnet connected to an internal DMZ VRF 
which is a member of the internal mesh VPN and yet another separate interface 
on a subnet connected to another DMZ VRF which is a member of the 
customer-facing regional hub-and-spoke VPN.  In addition, the servers would 
only need a default route as opposed to the complex management of static routes 
on the servers which can become quite challenging to manage at scale.

Even in a PE to CE-router scenario, there is also the concept of "shared VRF" 
model and "interface VRF" model.  In the shared VRF model multiple CE are 
connected to the same VRF and each VRF is connected to one VPN.  Here if a CE 
needs to be connected to another VPN you provision yet another interface to 
connect to the associated VRF on the PE, the CE and all the associated routing 
configuration.  OTOH, with the interface VRF model each VRF has only one CE 
connected (sometimes each interface of the CE gets it's own VRF on the PE).  In 
this model enabling an additional VPN for the CE only involves importing and 
exporting an additional RT pair at it's VRF.

In a DC/overlay setting, a particular scenario where multiple VN per VNI are 
involved would be a DMZ subnet with public addressing provided by the ISP.  The 
DMZ would need to support different CUGs with a common gateway/firewall to 
efficiently share the ISP assigned prefix.  In this scenario, it is very common 
that "private vlans" are used (informational RFC 5517).  This would need to be 
implemented with at least two VNs per VNI -- a hub-and-spoke VN with the 
gateway/firewall as the hub and multiple "community" VNs where each community 
VN represents a CUG wherein members need to communicate with one another.

Furthermore, in an enterprise setting it is generally expected that the network 
bears the network-related complexity.  I suppose in outfits where the same 
folks deal with both sides (network and host) this may not matter -- but my 
understanding is that these folks are a minority.



Best -- aldrin

On Tuesday, June 26, 2012, LASSERRE, MARC (MARC) wrote:
Hi Aldrin,

See my comments below.

Thanks,
Marc

> -----Original Message-----
> From: Aldrin Isaac [mailto:[email protected]<x-msg://5430/>]
> Sent: Monday, June 25, 2012 8:23 PM
> To: LASSERRE, MARC (MARC)
> Cc: Lucy yong; [email protected]<x-msg://5430/>; 
> [email protected]<x-msg://5430/>
> Subject: Re: [nvo3] call for adoption:
> draft-lasserre-nvo3-framework-02
>
> Hi Marc,
>
> Looking for more clarity on the following...
>
> Should we assume that a VNI can only support L2VNs (VNI =
> L2VNI) or L3VNs (VNI = L3VNI) but not both?
>
> draft-mity-nvo3-use-cases describes a "virtual network
> instance interconnecting interface" (VNIF) to interconnect
> VNI of different type.  An example of a VNIF would be an IRB
> (integrated routing and bridging) interface that is common on
> "L3 switches".  Is this something that draft-lasserre captures?

While the current draft focuses on L2VNs and L3VNs as distinct services, no 
assumptions have been made about the ability to support IRB.
A couple of sentences could be added to highlight this possibility.

>
> Are there any restriction to the topology of a VN or topology
> created using a set of VNs.  I.e. can (1) a VNI be a member
> of multiple VN and (2) can a VN be either hub-and-spoke or
> full-mesh?  Does draft-lasserre support (1) and (2)?

A VN is represented by a VNI created within NVEs that participate in this VN. 
Hence there is a one-to-one mapping between a VN and VNI.

Hub-and-spoke is discussed briefly in this draft. More details are provided in 
draft-bl-nvo3-dataplane-requirements.

>
> Best -- aldrin
>
>
> On Jun 25, 2012, at 1:14 PM, <[email protected]> wrote:
>
> > Extracting a couple of items for additional comment:
> >
> >> 2) section 2.3, why call it NVE service type? Should we call it VN
> >> (or VNI) service type? One NVE may terminate both L2 VNI
> and L3 VNI.
> >> NVE is equivalent to PE in L2VPN/L3VPN. We did not have
> service type
> >> for PE and had service type for VPN.
> >>
> >> [ml] Like with L2 and L3 PEs, there are L2 and L3 NVEs.
> >> [[LY]] Should we consider this as VN service type? I
> understand the
> >> description but have trouble with the title of NVE service type.
> >
> > I think VN service type makes sense, as an NVE could conceivably
> > support both
> > L2 and L3 services for the same end system.  OTOH, mixing L2 and L3
> > service types on the same VN requires that the
> encapsulation indicate
> > the service type (for correct decap processing), and that
> would also be useful to note.
> >
> >> 7) It is important to state that the major difference
> between other
> >> overlay network technology and NVO3 is that
> >>   the client edges of the NVO3 network are individual virtualized
> >> hosts and not network sites.
> >>
> >> [ml] NVO3 can cope with both virtualized and non-virtualized hosts.
> >> [[LY]] Yeah, that is more precise. The point is that the
> client edge
> >> is not network sites like CEs in a VPN.
> >
> > Actually the NVE can be in a network node.  See Figure 3 and the
> > discussion of "traditional physical server" in the last
> paragraph on
> > p.10, including the statement that the NVE can be in the
> ToR.  FWIW,
> > the Storage Systems example in that paragraph is fine, although one
> > can envision storage systems that contain NVEs.
> >
> > Thanks,
> > --David
> >
> >> -----Original Message-----
> >> From: [email protected] [mailto:[email protected]]
> On Behalf
> >> Of Lucy yong
> >> Sent: Monday, June 25, 2012 11:52 AM
> >> To: LASSERRE, MARC (MARC); Benson Schliesser; [email protected]
> >> Cc: Bocci, Matthew (Matthew)
> >> Subject: Re: [nvo3] call for adoption:
> >> draft-lasserre-nvo3-framework-02
> >>
> >> Marc,
> >>
> >> Please see inline below with [[LY]].
> >>
> >> Lucy
> >>
> >> -----Original Message-----
> >> From: LASSERRE, MARC (MARC)
> [mailto:[email protected]]
> >> Sent: Monday, June 25, 2012 9:23 AM
> >> To: Lucy yong; Benson Schliesser; [email protected]
> >> Cc: Bocci, Matthew (Matthew)
> >> Subject: RE: [nvo3] call for adoption:
> >> draft-lasserre-nvo3-framework-02
> >>
> >> Hi Lucy,
> >>
> >> Thanks for your comments.
> >> See my comments below prefixed with [ml].
> >>
> >> Marc
> >>
> >> -----Original Message-----
> >> From: Lucy yong [mailto:[email protected]]
> >> Sent: Saturday, June 23, 2012 1:11 AM
> >> To: LASSERRE, MARC (MARC); Benson Schliesser; [email protected]
> >> Cc: Bocci, Matthew (Matthew)
> >> Subject: RE: [nvo3] call for adoption:
> >> draft-lasserre-nvo3-framework-02
> >>
> >> Marc,
> >>
> >> Here are some comments on this draft:
> >>
> >> 1) The VN (or VNI?) in the doc. is an overlay network that is
> >> transported over the tunnels. These tunnels are provided by the



_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to