Hi Stantosh,

I don't agree with the requirements draft you mentioned. I don't think it is 
required or makes sense to run OAM for a VNI.

Thx
Shahram

-----Original Message-----
From: Santosh P K [mailto:[email protected]] 
Sent: Friday, June 26, 2015 12:20 AM
To: Shahram Davari; Gregory Mirsky; Vengada Prasad Govindan (venggovi); MALLIK 
MUDIGONDA (mmudigon)
Cc: [email protected]
Subject: RE: New Version Notification for draft-spallagatti-bfd-vxlan-00.txt

Hello Shahram,
    Thanks a lot for your comments. Indeed "VXLAN tunnel"  is confusing, what 
we are trying to do here is address the requirement from draft " 
https://tools.ietf.org/id/draft-ashwood-nvo3-operational-requirement-03.txt";. 
Here we have a requirement for running proactive OAM between NV edge to NV edge 
per VNI. This is an individual draft for now.

Thanks
Santosh P K 

> -----Original Message-----
> From: Shahram Davari [mailto:[email protected]]
> Sent: Thursday, June 25, 2015 8:18 PM
> To: Santosh P K; Gregory Mirsky; Vengada Prasad Govindan (venggovi);
> MALLIK MUDIGONDA (mmudigon)
> Cc: [email protected]
> Subject: RE: New Version Notification for draft-spallagatti-bfd-vxlan-00.txt
> 
> Hi Santosh,
> 
> I think you probably have misunderstood the use of OAM/BFD in general.
> VXLAN is not a networking layer, rather it is a service demultiplexer (service
> identifier). I think the misunderstanding might be from the name "VXLAN
> tunnel". Since VXLAN is not a tunnel. The tunnel is actually an IP tunnel that
> has VXLAN as service identifier.
> 
> A single IP tunnel can carry many VXLANs.  Not only doing BFD per VXLAN
> doesn't make sense, but it is also not scalable. My suggestion is do BFD for
> the IP tunnel and you can achieve what you want.
> 
> Thx
> Shahram
> 
> -----Original Message-----
> From: Rtg-bfd [mailto:[email protected]] On Behalf Of Santosh P K
> Sent: Monday, May 25, 2015 5:43 AM
> To: Gregory Mirsky; Vengada Prasad Govindan (venggovi); MALLIK
> MUDIGONDA (mmudigon)
> Cc: [email protected]
> Subject: RE: New Version Notification for draft-spallagatti-bfd-vxlan-00.txt
> 
> Greg,
>    Thanks a lot for your review comments. Please see my inline comments.
> 
> >you reference RFC 5880 but don't specify which of defined in BFD base
> document modes are in scope of this work. I assume that, like in RFC 5884, it
> is only Asynchronous mode and Section 7 excludes Echo BFD but Demand
> mode not mentioned. >Making >more explicit statement would be helpful.
> 
> Sure we can add text for Demand mode as well.
> 
> 
> >section 2:
> >I think that these three cases hardly apply to the proposed solution. In
> particular, BFD may very coarsely localize path failure as we should
> remember that path and remote peer failure are undistinguishable. Thus
> failure detected at one VM, with Tunnel >BFD session operational, cannot be
> interpreted as peer VM failure.
> 
> I am sorry I did not understand this, can you please elaborate more on this?
> 
> >section 3:
> >what ensures that reverse direction of the BFD session between IP1
> (ingress) and IP2 (egress) , i.e. egress transmits BFD control packets toward
> the ingress, uses the same tunnel traversed by BFD control packets sent
> from ingress toward the egress? >Perhaps use of BFD Reverse Path TLV and
> BFD Discriminator TLV may be one solution?
> 
> In case of IP if reverse path has multiple paths to a destination then taking 
> a
> particular path means IP header stacking? Correct me if I am wrong.
> 
> >Perhaps this section could be the right place to discuss and define behavior
> of the egress in terms of its role in BFD session:
> >packet encapsulation;
> >failure reporting;
> >path selection (discussed above).
> >And the issues of the encapsulation, reverse path selection are relevant for
> S-BFD scenario as well (I think that Prasad's suggestion to split into two
> documents, BFD and S-BFD, is quite reasonable).
> 
> If all the above point has different methods for BFD and S-BFD then of course
> we should spilt the draft in to two.
> 
> >section 6.1:
> >considering 5884clarification work, can multiple BFD session operate
> between IP1 and IP2 over the same tunnel?
> 
> I do not see a case where we need multiple BFD session between IP pair
> when BFD session terminates at VTEP itself.
> 
> 
> Thanks
> Santosh P K
> 
> 
> 
> -----Original Message-----
> From: Rtg-bfd [mailto:[email protected]] On Behalf Of Vengada
> Prasad Govindan (venggovi)
> Sent: Friday, May 08, 2015 12:39 AM
> To: Santosh P K; MALLIK MUDIGONDA (mmudigon)
> Cc: [email protected]
> Subject: RE: New Version Notification for draft-spallagatti-bfd-vxlan-00.txt
> 
> Hello Santosh/ Authors,
> Thanks for your prompt considerations of the comments submitted in this
> thread. I request you to consider the following points for discussion:
> 1) Fig 3 of draft-ashwood-nvo3-oam-requirements provides the context for
> OAM layering in NVO3. Though, an individual draft at the moment, I submit
> that we consider this for providing more context to the discussion here.
> 2) Per my understanding of your proposal, the intent is to use BFD for OAM
> at the NV edge layer. Please let me know if this understanding is incorrect.
> 3) The clarifications requested earlier this thread concern about the inner IP
> address (SIP in particular) of the BFD packet . Would they be used from the
> overlay IP address space (belonging to the tenant). If this is the case, what
> would the difference between a BFD session using the tenant IP (at the NV
> edge), a particular VNI, and that of a service layer OAM session that can be
> run using single-hop BFD (RFC 5880).
> In other words, how can the OAM (BFD in this case) operating at the NV Edge
> layer operate without using IP from the Tenant layer if the packet is required
> to be VxLAN encapsulated?
> Thanks
> Prasad
> 
> -----Original Message-----
> From: Santosh P K [mailto:[email protected]]
> Sent: Wednesday, May 06, 2015 3:03 PM
> To: MALLIK MUDIGONDA (mmudigon)
> Cc: Vengada Prasad Govindan (venggovi); [email protected]
> Subject: RE: New Version Notification for draft-spallagatti-bfd-vxlan-00.txt
> 
> Mallik,
>    Thanks for your review comments.
> 
> 
> >1. It is not clear if this draft is addressing both VM to VM and VTEP to VTEP
> verification through BFD. I assume it is both.
> 
> Draft is applicable only for VTEP to VTEP, for VM to VM (if VM is L3 aware)
> BFD as per RFC 5880/5881 should work as it is. VM's will not be aware of any
> tunnel. Draft talks about tunnel verification which terminates at VTEP's.
> 
> >2. If the VMs are Layer 2 only, then what is the inner IP address
> >(especially source IP)? I understand that outer IP is going to carry the 
> >VTEPs
> addresses.
> 
> As mentioned in the draft it would be outgoing interface IP sending VTEP.
> 
> >3. Why is the inner IP destination address 127/8 or 0:0:0:0:0:FFFF:7F00/104?
> I understand that it is to avoid the packet being routed but, how can an IP
> packet addressed to a particular VTEP be consumed by any other node in the
> network and then route the inner >payload?
> 
> The same argument holds true for MPLS as well right? The motivation for
> using the address range 127/8 is the same as described in Section 2.1 of
> RFC4379.
> 
> >4. The service node's use case is not very clear. Mat be you can add a little
> bit of details here.
> 
> Yes, we can do that.
> 
> >5. I understand that VTEP knows that the packet is to be terminated at the
> VTEP based on TTL being 1. What about the case of VM to VM BFD? What
> should be the TTL value here?   Is it 255 or something different? It is
> hardcoded to "1" in the draft.
> 
> VM's will use normal Async BFD so will use TTL 255.
> 
> >6. Since we are using a destination UDP port of 3784, shouldn't the TTL
> >be 255 to be consistent with the RFC 5880?
> 
> Section 7 of RFC 5884 also mentions use of IP TTL set to 1 whereas UDP port
> number set to 3784.
> 
> 
> Thanks
> Santosh P K
> 
> 
> 
> From: "Vengada Prasad Govindan (venggovi)" <[email protected]>
> Date: Wednesday, 6 May 2015 9:39 am
> To: Santosh P K <[email protected]>, "[email protected]" <rtg-
> [email protected]>
> Subject: RE: New Version Notification for draft-spallagatti-bfd-vxlan-00.txt
> 
> Hello Santosh/ Authors,
> Thanks for sharing the document, please find a few thoughts below.
> 1. The current document talks about both BFD and S-BFD - would it be
> beneficial to make separate documents for BFD and SBFD to maintain
> consistency with the current set of documents.
> 2. Motivation: It would be nice to state the requirements or motivation that
> this draft addresses, i.e. what problems does this draft address that cannot
> be solved using the existing BFD/ SBFD protocol treating the VxLAN as a
> tunnel/ underlay transport transparent to BFD. I would submit that BFD over
> VxLAN not be treated along the same lines of BFD over MPLS or BFD for PW
> (VCCV) given the differences in the nature of the transport between MPLS
> and VxLAN.
> 3. Inner Ethernet header: The document does not address the contents of
> the Inner Ethernet header (present after the VxLAN header). This needs to
> be specified.
> 4. Destination IP: The document mandates that this needs to be 127/8. What
> disadvantages do you observe if the DIP were to be the IP of the destination
> VTEP? When using 127/8 as the DIP. one problem is that there is no indication
> of the intended DIP of the BFD session by using 127/8. What if the node at
> which the VxLAN tunnel is (prematurely) terminated happens to support
> BFD? It may be better to use the IP address of the Destination VTEP as the
> DIP.
> 5. Inner TTL: For the same reasons discussed in (2), why does the document
> mandate this to be set to 1?
> 6. It may be beneficial to run a spell-checker to fix typos in the document.
> I request the authors/ WG to comment on the above aspects.
> Thanks
> Prasad
> 
> 
> -----Original Message-----
> From: Rtg-bfd [mailto:[email protected]] On Behalf Of Santosh P K
> Sent: Monday, May 04, 2015 10:55 PM
> To: [email protected]
> Subject: FW: New Version Notification for draft-spallagatti-bfd-vxlan-00.txt
> 
> Hello All,
>     A new BFD for VXLAN draft has been submitted. Please do review and get
> back to us with any comments/feedback.
> 
> Thanks
> Santosh P K
> 
> -----Original Message-----
> From: [email protected] [mailto:[email protected]]
> Sent: Monday, May 04, 2015 9:29 PM
> To: Basil Saji; Santosh P K; Sudarsan Paragiri Mohan; Santosh P K; Basil Saji;
> Sudarsan Paragiri Mohan
> Subject: New Version Notification for
> draft-spallagatti-bfd-vxlan-00.txt
> A new version of I-D, draft-spallagatti-bfd-vxlan-00.txt
> has been successfully submitted by Santosh Pallagatti and posted to the IETF
> repository.
> Name: draft-spallagatti-bfd-vxlan
> Revision: 00
> Title: BFD for VXLAN
> Document date: 2015-05-04
> Group: Individual Submission
> Pages: 9
> URL:            
> https://www.ietf.org/internet-drafts/draft-spallagatti-bfd-vxlan-
> 00.txt
> Status:         https://datatracker.ietf.org/doc/draft-spallagatti-bfd-vxlan/
> Htmlized:       https://tools.ietf.org/html/draft-spallagatti-bfd-vxlan-00
> Abstract:
>     This document describes use of Bidirectional Forwarding Detection
>     (BFD) protocol for VXLAN . Comments on this draft should be directed
>     to [email protected].
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> The IETF Secretariat
> 
> 
> 

Reply via email to