Luyuan, I think the correct model is to keep separate L2 & L3 VPNs but allow selective leaking of info between them.
Yours irrespectively, John > -----Original Message----- > From: [email protected] [mailto:[email protected]] On Behalf Of > Luyuan Fang (lufang) > Sent: Thursday, September 27, 2012 3:26 PM > To: Bitar, Nabil N; Henderickx, Wim (Wim); NAPIERALA, MARIA H; Fedyk, > Donald (Don); [email protected] > Subject: Re: [nvo3] draft-drake-nvo3-evpn-control-plane > > Nabil, > > We talked this earlier this week while your mail was sent but "napping" > in the system somewhere. :-). > > I did not mean that interworking a Layer 2 service having access to an > IP routing service, that is done today... > I meant to say, e.g., today we don't establish a single VPN with some > sites being l3vpn and others being vpls. > > I think we are generally in agreement. > > - both L2 and L3 support are needed > - both L2 and L3 can be supported in the same network and on the same > device (it is done today) > - What we need to be more careful is wither we should mix different > sites with l2 and l3 into the same vpn. It could create complication > than its worth. Study/work need to be done if reality really calls for > the case. > > Luyuan > > > -----Original Message----- > > From: Bitar, Nabil N [mailto:[email protected]] > > Sent: Thursday, September 27, 2012 7:58 AM > > To: Luyuan Fang (lufang); Henderickx, Wim (Wim); Bitar, Nabil N; > > NAPIERALA, MARIA H; Fedyk, Donald (Don); [email protected] > > Subject: Re: [nvo3] draft-drake-nvo3-evpn-control-plane > > > > Do you mean by interworking a Layer2 service having access to an IP > > routing service as commonly done today? I wouldn't compare that to > > FR/ATM interworking. > > > > There are applications that require operation over Ethernet and have > > MAC awareness. There are also dependencies on the other end of the > > communication operations and capabilities. > > > > There are other applications, legacy or not, that are not IP aware > and > > will require Layer2 connectivity. Storage, depending on the storage > > networking technology, is an example and I think there was an email > > from Dave Black about that some time back. There are probably other > > apps, proprietary or commercial that rely on Ethernet only. I am > > raising that not because of E-VPN or not but the general notion being > > debated by some that we need to take a hard-line saying only IP > > service needs to be supported, as much as I would like that to be the > > case. > > > > While one can argue that if an application is not IP-based, it can be > > migrated to one that is or you can tunnel to the application > depending > > on the application or ..,, it seems to me it is a hardline to say > that > > an > > L2 > > service is not > > needed in the DC at the functional level of NVE and gateways as it > can > > be disruptive in certain cases or create hurdles. > > > > The net is that the DC fabric (underlay) can be IP only although for > > some Ethernet can still be a choice. The service overlaid on that can > > be IP or bridged Ethernet and that is a choice for people to do based > > on several constraints including applications they want to support. > > Today Ethernet and IP services are realities and need to be > addressed. > > IP will be always needed, no doubt. If one can live with IP only they > > would have the tool, if they need a mix of IP of Ethernet bridge > > services, they should also have the tools. Id people are only > > interested in IP services, they can only work on that, and if people > > have the need for the mix or want to work on the mix or or one or the > > other, they can also do that. > > > > Thanks, > > Nabil > > > > > > > > On 9/24/12 5:40 PM, "Luyuan Fang (lufang)" <[email protected]> wrote: > > > > >Wim, > > > > > >Agree. > > >I tried not to go into the mix case :-). Need to better understand > > >the real needs, its implication, and various (prefer simplified) > > >potential solutions. > > > > > >Mix could mean people deploy L2 and L3 separately in the shared > > >infrastructure, or it could mean inter-working if you are thinking > > some > > >sites are L2, some are L3 within one VPN, or inter-connecting LX DC > > with > > >LY VPN network... > > > > > >Technically, these can all be done. Practically, we need to ask > > operators > > >what are the objectives, how much complication they are willing to > > >get into, and the benefits, trade-offs. > > > > > >Do we see a lot of mixed case for L2/L3 VPNs in today's network VPN > > >deployment after all these years? If not so, why do DC operators > want > > to > > >make it more complex? > > > > > >In my past experience on the operator side, inter-working (e.g. > > FR/ATM, > > >ATM/Ethernet, MPLS/Ethernet...) were good on papers, but always too > > >complicated for operation, never that successful. > > > > > >I can see sometimes we are dealing with some existing and the new > > >environment, the mix may or may not be avoidable. > > >But I want to see if many operators really want to mix things, and > to > > >what level. > > > > > >Thanks, > > >Luyuan > > > > > >> -----Original Message----- > > >> From: Henderickx, Wim (Wim) [mailto:wim.henderickx@alcatel- > > lucent.com] > > >> Sent: Monday, September 24, 2012 11:09 PM > > >> To: Luyuan Fang (lufang); Bitar, Nabil N; NAPIERALA, MARIA H; > > >> Fedyk, Donald (Don); [email protected] > > >> Subject: RE: [nvo3] draft-drake-nvo3-evpn-control-plane > > >> > > >> Luyuan, > > >> > > >> While I understand there are customers for L3, there are equally > > >> customers for L2 as you said, but also for a mix when application > > >> tiering is required. > > >> We need to address all 3 use cases. > > >> > > >> Cheers, > > >> Wim > > >> > > >> -----Original Message----- > > >> From: [email protected] [mailto:[email protected]] On > > >> Behalf > > Of > > >> Luyuan Fang (lufang) > > >> Sent: maandag 24 september 2012 22:57 > > >> To: Bitar, Nabil N; NAPIERALA, MARIA H; Fedyk, Donald (Don); > > >> [email protected] > > >> Subject: Re: [nvo3] draft-drake-nvo3-evpn-control-plane > > >> > > >> Nabil, > > >> > > >> See in-line. > > >> > > >> > -----Original Message----- > > >> > From: Bitar, Nabil N [mailto:[email protected]] > > >> > Sent: Monday, September 24, 2012 9:45 PM > > >> > To: Luyuan Fang (lufang); NAPIERALA, MARIA H; Fedyk, Donald > > >> > (Don); [email protected] > > >> > Subject: Re: [nvo3] draft-drake-nvo3-evpn-control-plane > > >> > > > >> > Luyuan, > > >> > Well put. > > >> > > >> Thx. > > >> > > >> I am presuming that you are also saying that both need to > > >> > co-exist (E-VPN and RFC4364) and get interconnected in > > environments > > >> > that > > >> > need that. > > >> > > >> Yes. Interconnected with the matching environment is a good > > >> description. > > >> > > >> Personally, I see L3 (in general sense) is becoming the trend for > > >> scaling, the move from L2 to L3 happened already in some largest > > >> DCs deployed today. > > >> On the other hand, there are networks must support certain legacy > > >> L2 services, and some DC operators may be more familiar with L2 > > >> environment so prefer l2 solutions, or there is need to inter- > > connect > > >> to the matching environment as you mentioned. Besides, not > everyone > > >> needs the scale like FB, MS, Amazon... > > >> So both L2 and L3 need to be supported. > > >> > > >> >Is that so? Interconnection may happen in different ways to > allow > > >> >bridging when traffic is among endpoints on on same subnet > > and > > >> > routing when crossing subnets in the same vpn. > > >> > > >> Yes, particularly true as with today's typical l2 solutions. > > >> In all L3 case, there would be no bridging. > > >> > > >> > > > >> > Thanks, > > >> > Nabil > > >> > > > >> Thanks, > > >> Luyuan > > >> > > >> > > >> > On 9/24/12 3:12 PM, "Luyuan Fang (lufang)" <[email protected]> > > wrote: > > >> > > > >> > >Don, > > >> > > > > >> > >I'm ok with what you said people need both L2 and L3 > > capabilities... > > >> > but > > >> > >have trouble with > > >> > >> IP VPNs and EVPNs are well suited as one solution for > > >> > >> extending > > >> the > > >> > L2 > > >> > >>and L3 connectivity for large and physically disperse data > > centers. > > >> > > > > >> > >What do you mean by "one solution"? They are two solutions to > me. > > I > > >> > want > > >> > >to make sure that we are not redefining BGP L3VPN (RFC 4364, > aka > > >> > 2547). > > >> > > > > >> > >Though E-VPN is leveraging many fundamental building blocks of > > BGP > > >> L3 > > >> > >VPN, it is essentially developed for people who must support > > certain > > >> > >existing L2 services and prefer L2 solutions with E-VPN. If one > > >> wants > > >> > to > > >> > >have BGP L3 VPN solution only in the DC and inter-connecting DC > > to > > >> the > > >> > >existing network l3vpn, or inter-connecting DCs, they can use > > >> > >BGP > > >> > L3VPN > > >> > >as its original form (if practical), or extend it to make more > > >> > >DC friendly (e.g. draft-marques-l3vpn-end-system, as many > > >> > >pointed to > > in > > >> > >their mails). > > >> > > > > >> > >L3 VPN has huge deployment base, mostly in SP network space > over > > the > > >> > last > > >> > >14 years or so, and some recent development in DC space. I > don't > > >> > assume > > >> > >you are implying to ask operators to change their L3VPN from > > >> > >4364 > > >> > format > > >> > >into this so called "IP VPNs and EVPNs... as one solution", or > > ask > > >> > them > > >> > >to inter-work between existing L3VPN with this new "IP VPN and > > EVPN > > >> > ... > > >> > >as one solution" in DC, which would introduce complexity for > > nothing > > >> > if > > >> > >they simply need the L3VPN from network to DC. I hope this is > > >> > >not > > >> the > > >> > >case. > > >> > > > > >> > >My point is, leave BGP L3VPN and EVPN as two separate solutions > > as > > >> > they > > >> > >are. > > >> > > > > >> > >Thanks, > > >> > >Luyuan > > >> > > > > >> > >> -----Original Message----- > > >> > >> From: [email protected] [mailto:[email protected]] On > > >> Behalf > > >> > Of > > >> > >> NAPIERALA, MARIA H > > >> > >> Sent: Monday, September 24, 2012 8:01 PM > > >> > >> To: Fedyk, Donald (Don); [email protected] > > >> > >> Subject: Re: [nvo3] draft-drake-nvo3-evpn-control-plane > > >> > >> > > >> > >> Don, > > >> > >> > > >> > >> > The complexity comes from the date center environment, but > > >> > >> > is seems better to provide both L2 and L3 capabilities and > > let > > >> > >> > deployments choose the mix. > > >> > >> > > >> > >> I am afraid that once you mix those capabilities in one > > >> > implementation > > >> > >> there is no choice. As a result, inter-subnet IP forwarding > > which > > >> is > > >> > >> trivial in L3VPN (as is intra-subnet forwarding, btw) becomes > > all > > >> of > > >> > a > > >> > >> sudden complex under such construct. > > >> > >> > > >> > >> Maria > > >> > >> > > >> > >> > The nice property of BGP based IPVPN and EVPN is the > ability > > to > > >> > >> > partition the information such that the both L2 and L3 VPNs > > can > > >> > scale > > >> > >> > independently, each in context (for example VLANs, IP > VPNs). > > In > > >> > that > > >> > >> > sense IP VPNs and EVPNs are well suited as one solution for > > >> > extending > > >> > >> > the L2 and L3 connectivity for large and physically > disperse > > >> data > > >> > >> > centers. > > >> > >> > > > >> > >> > Don > > >> > >> > > > >> > >> > > > >> > >> > > > >> > >> > -----Original Message----- > > >> > >> > From: NAPIERALA, MARIA H [mailto:[email protected]] > > >> > >> > Sent: Monday, September 24, 2012 12:49 PM > > >> > >> > To: Fedyk, Donald (Don); [email protected] > > >> > >> > Subject: RE: [nvo3] draft-drake-nvo3-evpn-control-plane > > >> > >> > > > >> > >> > Don, > > >> > >> > > > >> > >> > > Perhaps I'm missing something but I thought EVPN was > built > > >> using > > >> > >> many > > >> > >> > > of the same building blocks as RFC4364 so that it could > be > > >> used > > >> > in > > >> > >> > > combination with EVPN. In other words IP VPN + EVPN. > > >> > >> > > > >> > >> > It needs to be explained why/what are the requirements that > > you > > >> > need > > >> > >> > both (IPVPN and EVPN) in the same solution because this is > > not a > > >> > >> > trivial complication. > > >> > >> > The complexity of the solution depends on the requirements. > > If > > >> > >> > majority of traffic in a (significant class of) data center > > is > > >> > inter- > > >> > >> > subnet, a solution should be optimized for such traffic > and, > > >> > hence, > > >> > >> > solving the forwarding of such traffic should be the > > >> > >> > starting > > >> > point. > > >> > >> > > > >> > >> > Maria > > >> > >> > > > >> > >> > > -----Original Message----- > > >> > >> > > From: [email protected] [mailto:nvo3- > [email protected]] > > On > > >> > >> Behalf > > >> > >> > Of > > >> > >> > > NAPIERALA, MARIA H > > >> > >> > > Sent: Monday, September 24, 2012 10:09 AM > > >> > >> > > To: [email protected] > > >> > >> > > Subject: Re: [nvo3] draft-drake-nvo3-evpn-control-plane > > >> > >> > > > > >> > >> > > I think we should try to clarify what problems or what > > >> > >> > > type > > of > > >> > data > > >> > >> > > centers specific solutions are addressing. > > >> > >> > > Specifically, EVPN can only address traffic bridged in > the > > >> same > > >> > >> VLAN. > > >> > >> > > In data centers where most traffic is inter-VLAN, i.e., > > >> packets > > >> > are > > >> > >> > > routed, the EVPN doesn't achieve much as an overall > > solution. > > >> > >> > > I tried to make this point on the webex during the nvo3 > > >> interim > > >> > >> > session > > >> > >> > > when draft-drake-nvo3-evpn-control-plane was discussed > but > > I > > >> am > > >> > not > > >> > >> > > sure if my message went through. > > >> > >> > > > > >> > >> > > Maria > > >> > >> > > > > >> > >> > > > -----Original Message----- > > >> > >> > > > From: [email protected] [mailto:nvo3- > > [email protected]] > > >> On > > >> > >> > Behalf > > >> > >> > > Of > > >> > >> > > > Thomas Nadeau > > >> > >> > > > Sent: Monday, September 17, 2012 11:55 AM > > >> > >> > > > To: [email protected] > > >> > >> > > > Subject: [nvo3] draft-drake-nvo3-evpn-control-plane > > >> > >> > > > > > >> > >> > > > > > >> > >> > > > A number of us just published this draft and wanted > > >> > >> > > > to > > >> > >> bring it > > >> > >> > > > to the NVO3 WG's attention. We will be > > >> presenting/discussing > > >> > >> this > > >> > >> > > > draft at the interim meeting this week as well, but > > please > > >> > >> discuss > > >> > >> > > here > > >> > >> > > > on the list as well. > > >> > >> > > > > > >> > >> > > > Thanks, > > >> > >> > > > > > >> > >> > > > Tom, John, et al > > >> > >> > > > > > >> > >> > > > > > >> > >> > > > A new version of I-D, draft-drake-nvo3-evpn-control- > > plane- > > >> > 00.txt > > >> > >> > > > has been successfully submitted by Thomas D. Nadeau and > > >> posted > > >> > to > > >> > >> > the > > >> > >> > > > IETF repository. > > >> > >> > > > > > >> > >> > > > Filename: draft-drake-nvo3-evpn-control-plane > > >> > >> > > > Revision: 00 > > >> > >> > > > Title: A Control Plane for Network > > Virtualized > > >> > >> Overlays > > >> > >> > > > Creation date: 2012-09-16 > > >> > >> > > > WG ID: Individual Submission > > >> > >> > > > Number of pages: 12 > > >> > >> > > > URL: http://www.ietf.org/internet- > > drafts/draft- > > >> > drake- > > >> > >> > > nvo3- > > >> > >> > > > evpn-control-plane-00.txt > > >> > >> > > > Status: http://datatracker.ietf.org/doc/draft- > > >> drake- > > >> > >> nvo3- > > >> > >> > > evpn- > > >> > >> > > > control-plane > > >> > >> > > > Htmlized: http://tools.ietf.org/html/draft- > drake- > > >> nvo3- > > >> > >> evpn- > > >> > >> > > > control-plane-00 > > >> > >> > > > > > >> > >> > > > > > >> > >> > > > Abstract: > > >> > >> > > > The purpose of this document is to describe how > > >> > Ethernet > > >> > >> > > Virtual > > >> > >> > > > Private Network (E-VPN) can be used as the > > >> > >> > > > control > > >> > plane > > >> > >> for > > >> > >> > > > Network Virtual Overlays. Currently this > > >> > >> > > > protocol > > is > > >> > >> > defined > > >> > >> > > to > > >> > >> > > > act as the control plane for Virtual Extensible > > Local > > >> > Area > > >> > >> > > > Network (VXLAN), Network Virtualization using > > Generic > > >> > >> > Routing > > >> > >> > > > Encapsulation (NVGRE), MPLS or VLANs while > > >> maintaining > > >> > >> their > > >> > >> > > > existing data plane encapsulations. The intent > is > > >> that > > >> > >> this > > >> > >> > > > protocol will be capable of extensions in the > > future > > >> to > > >> > >> > handle > > >> > >> > > > additinal data plane encapsulations and > functions > > as > > >> > >> needed. > > >> > >> > > > > > >> > >> > > > > > >> > >> > > > _______________________________________________ > > >> > >> > > > nvo3 mailing list > > >> > >> > > > [email protected] > > >> > >> > > > https://www.ietf.org/mailman/listinfo/nvo3 > > >> > >> > > _______________________________________________ > > >> > >> > > nvo3 mailing list > > >> > >> > > [email protected] > > >> > >> > > https://www.ietf.org/mailman/listinfo/nvo3 > > >> > >> _______________________________________________ > > >> > >> nvo3 mailing list > > >> > >> [email protected] > > >> > >> https://www.ietf.org/mailman/listinfo/nvo3 > > >> > >_______________________________________________ > > >> > >nvo3 mailing list > > >> > >[email protected] > > >> > >https://www.ietf.org/mailman/listinfo/nvo3 > > >> > > >> _______________________________________________ > > >> nvo3 mailing list > > >> [email protected] > > >> https://www.ietf.org/mailman/listinfo/nvo3 > > _______________________________________________ > nvo3 mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/nvo3 _______________________________________________ nvo3 mailing list [email protected] https://www.ietf.org/mailman/listinfo/nvo3
