Re: [bess] draft-saumvinayak-bess-all-df-bum : All PEs as DF: Distributed firewall-gateways across Overlay fabrics

"Dikshit, Saumya" <saumya.dikshit@hpe.com> Wed, 09 February 2022 08:12 UTC

Return-Path: <prvs=00392b4e5a=saumya.dikshit@hpe.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC0693A12C3 for <bess@ietfa.amsl.com>; Wed, 9 Feb 2022 00:12:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.67
X-Spam-Level:
X-Spam-Status: No, score=-2.67 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qa89IRPgKfF8 for <bess@ietfa.amsl.com>; Wed, 9 Feb 2022 00:11:52 -0800 (PST)
Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFB723A12C1 for <bess@ietf.org>; Wed, 9 Feb 2022 00:11:51 -0800 (PST)
Received: from pps.filterd (m0150244.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 2195WH9C006670 for <bess@ietf.org>; Wed, 9 Feb 2022 08:11:50 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pps0720; bh=x9mpBYb/QfbAfLaIAhIwGbGDr97wP+b33GYG/uX+DQI=; b=SXykldIn6zavvOuoQnXQaoQ9fPqGIRY6mjuZcUlPgETubYUylAh32FaQzWa0Huf5eyQ1 9tjKlvYhG7/vI9p39FaJ+lMzcJD8DiROcffof0cRtK/cis1ZQNPsKsmSe9/Z0smyLn+3 AufHuDsir+yDB2LDxPSK8gqmwTTfvt2256U0A7WPPCKOjNY3RbTWAk+jflPhd5dTJmSf EuAnSssKnoLuiTNhqZLCwYd6RCE4EYVw19MUH5TASZlRuTadYTgCnd+pWGrrB7PME4Rk g1D05ZBizXp1d2pwRqIRshxCCqVLHNuQI8KtwziJQSgBah7etieehhXkjwbARGI7bkdd Hw==
Received: from g4t3426.houston.hpe.com (g4t3426.houston.hpe.com [15.241.140.75]) by mx0b-002e3701.pphosted.com (PPS) with ESMTPS id 3e3vwfdry4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <bess@ietf.org>; Wed, 09 Feb 2022 08:11:49 +0000
Received: from G2W6310.americas.hpqcorp.net (g2w6310.austin.hp.com [16.197.64.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3426.houston.hpe.com (Postfix) with ESMTPS id 152C74F for <bess@ietf.org>; Wed, 9 Feb 2022 08:11:49 +0000 (UTC)
Received: from G9W8456.americas.hpqcorp.net (2002:10d8:a15f::10d8:a15f) by G2W6310.americas.hpqcorp.net (2002:10c5:4034::10c5:4034) with Microsoft SMTP Server (TLS) id 15.0.1497.23; Wed, 9 Feb 2022 08:11:48 +0000
Received: from NAM04-DM6-obe.outbound.protection.outlook.com (15.241.52.11) by G9W8456.americas.hpqcorp.net (16.216.161.95) with Microsoft SMTP Server (TLS) id 15.0.1497.23 via Frontend Transport; Wed, 9 Feb 2022 08:11:48 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aIDN/SDlsvQOfDxP6WyX8y3D77c7I/gnqUWDclpMc2zR8e3zjiZrTk9WDVwt9n1tPDsduxRCxDcBT7eqPu4r3/u+EJ25UH2EQErf2tmE2AcxOIRxVJ8zVi6WI4OcNH4OPiwzytetba8NOhI9vtWq2gGAp1wcoyDDw6zAK+MyhBHmdsqUViBmBIiJvUu7efzNs+6j3+vHhEb1UX8SX647maD/HRnDR1i6wwzJthY8DI05OOVmZh8ej0kKO7qV06lvc2vQN7EPvFr77UYj520S+2pUr1q4Yn73ujxqv0//d0/DX0XQ80mFs0StrCRJL+XFg02cRH+V+J8k1ffrNAQfJg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y4TBOUtIIb6E+Dd6cBxmcfU3OudZ4sA3pEheESaQlQ0=; b=jISo8QiGZdyrPX66Hryr5xlVHzWKgW27q13plnOXftxYEmx9MPmkT5ykOpNye/8MmZYHUFrIqVgbb9AmCJf/WXK1G3a36y5zE2jV7Hlttk2/pstfmEofW6oqi4po0NREkwqf7ataU4TkfKHlYyTmuPL5X9mvHq5yPP0K2DPx0nvNo1tSWOV41bJDd0zirLRMIcM5GCURRfSTQlEuMGTV50oFt7TXkFlWLKeVg2XRn0PI/YKNAzMFW0eIKB0Gli6ptiDAn7vYmKkIwyRJEOq4g/7mvvfcg0zCAffPQksCc/BI+5D7bqqELKOmcTyGcgFwEZ7NHLmjEJ1iMz21l2/VmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
Received: from SJ0PR84MB1992.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:a03:436::20) by MW4PR84MB2259.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:303:1b6::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4975.11; Wed, 9 Feb 2022 08:11:46 +0000
Received: from SJ0PR84MB1992.NAMPRD84.PROD.OUTLOOK.COM ([fe80::d52:b626:b7d3:b06]) by SJ0PR84MB1992.NAMPRD84.PROD.OUTLOOK.COM ([fe80::d52:b626:b7d3:b06%6]) with mapi id 15.20.4975.011; Wed, 9 Feb 2022 08:11:46 +0000
From: "Dikshit, Saumya" <saumya.dikshit@hpe.com>
To: "Dikshit, Saumya" <saumya.dikshit@hpe.com>, "bess@ietf.org" <bess@ietf.org>
Thread-Topic: draft-saumvinayak-bess-all-df-bum : All PEs as DF: Distributed firewall-gateways across Overlay fabrics
Thread-Index: AdgOhCJnvr6fcYmQToaoYw1C+8sFDQPCFHPQ
Date: Wed, 09 Feb 2022 08:11:46 +0000
Message-ID: <SJ0PR84MB1992FB25FB7CE702912AF016942E9@SJ0PR84MB1992.NAMPRD84.PROD.OUTLOOK.COM>
References: <SJ0PR84MB1992D82F14CAF0F3B89E52D4945B9@SJ0PR84MB1992.NAMPRD84.PROD.OUTLOOK.COM>
In-Reply-To: <SJ0PR84MB1992D82F14CAF0F3B89E52D4945B9@SJ0PR84MB1992.NAMPRD84.PROD.OUTLOOK.COM>
Accept-Language: en-IN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a796a73b-9edb-44ab-d267-08d9eba3d0e6
x-ms-traffictypediagnostic: MW4PR84MB2259:EE_
x-microsoft-antispam-prvs: <MW4PR84MB225944ED5EAF63FF839C5D54942E9@MW4PR84MB2259.NAMPRD84.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:4502;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR84MB1992.NAMPRD84.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230001)(366004)(186003)(122000001)(38100700002)(26005)(110136005)(55236004)(8936002)(30864003)(76116006)(316002)(38070700005)(5660300002)(86362001)(2906002)(82960400001)(64756008)(8676002)(66476007)(66946007)(66446008)(66556008)(9326002)(166002)(9686003)(52536014)(53546011)(83380400001)(66574015)(508600001)(966005)(71200400001)(7696005)(6506007)(33656002)(55016003)(559001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_SJ0PR84MB1992FB25FB7CE702912AF016942E9SJ0PR84MB1992NAMP_"
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR84MB1992.NAMPRD84.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: a796a73b-9edb-44ab-d267-08d9eba3d0e6
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Feb 2022 08:11:46.5669 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: teSHqv4LfQsQZLj2NyVo+IvbkAJ4jl4DPLznBd9A1NJQnXVeI8g3Dml6wgNbrhBhK6nxZaeTTnPb1r3WQlSEIw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR84MB2259
X-OriginatorOrg: hpe.com
X-Proofpoint-GUID: n2Wl63SpNEMOy-Py5EXu4lEo_omx6ka3
X-Proofpoint-ORIG-GUID: n2Wl63SpNEMOy-Py5EXu4lEo_omx6ka3
X-Proofpoint-UnRewURL: 22 URL's were un-rewritten
MIME-Version: 1.0
X-HPE-SCL: -1
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-02-09_04,2022-02-09_01,2021-12-02_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 malwarescore=0 adultscore=0 clxscore=1011 mlxscore=0 impostorscore=0 bulkscore=0 spamscore=0 priorityscore=1501 mlxlogscore=999 phishscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202090055
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/1JFK5-moscCQwNragwVKYE9BOJ0>
Subject: Re: [bess] draft-saumvinayak-bess-all-df-bum : All PEs as DF: Distributed firewall-gateways across Overlay fabrics
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Feb 2022 08:12:05 -0000

Hello Members,
I think this document should be part of the Bess WG as it attends to specific and unattended use-case.

Thanks
Saumya.

From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Dikshit, Saumya
Sent: Friday, January 21, 2022 10:34 AM
To: bess@ietf.org
Subject: [bess] draft-saumvinayak-bess-all-df-bum : All PEs as DF: Distributed firewall-gateways across Overlay fabrics

[changing the subject line]

Hello Bess Members, Chairs,

We have covered a use-case which is not handled by any of the existing standard documents in bess.
The details of use-case are also discussed in the email chain below.

Kindly provide you inputs or feedback on the proposed changes in the draft https://datatracker.ietf.org/doc/draft-saumvinayak-bess-all-df-bum/<https://datatracker.ietf.org/doc/draft-saumvinayak-bess-all-df-bum/>

Thanks
Saumya.

From: Dikshit, Saumya
Sent: Tuesday, September 28, 2021 12:46 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>; Joshi, Vinayak <vinayak.joshi@hpe.com<mailto:vinayak.joshi@hpe.com>>; Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc

Hi Jorge and Bess member

Can you please go provide your inputs on the use-case and solution described in https://datatracker.ietf.org/doc/draft-saumvinayak-bess-all-df-bum/<https://datatracker.ietf.org/doc/draft-saumvinayak-bess-all-df-bum/>

Thanks
Saumya.

From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Dikshit, Saumya
Sent: Wednesday, September 15, 2021 4:44 PM
To: Joshi, Vinayak <vinayak.joshi@hpe.com<mailto:vinayak.joshi@hpe.com>>; Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc

Hi Jorge and Members of Bess WG,

Please let us know your views on https://datatracker.ietf.org/doc/draft-saumvinayak-bess-all-df-bum/<https://datatracker.ietf.org/doc/draft-saumvinayak-bess-all-df-bum/>.
We have described the use-case this draft intends to solve, leveraging the existing TLVs.
Please include this as wg draft.

Thanks
Saumya.

From: Dikshit, Saumya
Sent: Friday, September 3, 2021 5:53 PM
To: Joshi, Vinayak <vinayak.joshi@hpe.com<mailto:vinayak.joshi@hpe.com>>; Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc

Hi Jorge and others in Bess WG,

We have come out with a new draft to which proposes a DF-election-mode where in all the PEs intend to play the DF-role.
Please go through the document and provide your comments: https://datatracker.ietf.org/doc/draft-saumvinayak-bess-all-df-bum/<https://datatracker.ietf.org/doc/draft-saumvinayak-bess-all-df-bum/>

Thanks
Saumya.


From: Joshi, Vinayak
Sent: Monday, August 23, 2021 5:22 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>; Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc

+1 for standard compliance on the control plane to indicate [All Active + All DF].
However, I think local bias is still needed to prevent some scenarios

E.g.:
1)  Host1 sends out ARP request for the Firewall.
2)  It reaches VTEP-1 over VxLAN from Vtep_Host1. Two options at Vtep_1

a)      Proprietary Option:  VTEP 2 does not forward it over the VxLAN DCI tunnel to Vtep2. I.e. VTEP 1 has to match the ARP for Firewall.

b)       Vtep_1 sends it over VTEP 2 on VxLAN DCI. VTEP 2's local bias procedure prevents it from getting into Firewall_2.  This makes it easier to implement on Vtep_2. This is because Vtep_1 need not selectively block BUM over the VxLAN tunnel (ARP from Host1 to resolve Host2's IP has to be forwarded by Vtep_1 to Vtep_2).

Regards,
Vinayak



From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Dikshit, Saumya
Sent: Thursday, August 19, 2021 11:39 PM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: Re: [bess] Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc


>>>> If you still want to control the unicast and BUM flows to one FW or the other depending on the leaf, you can still do it but that's implementation specific since it relies on the route selection in vtep_host1 and vtep_host2.
+1 on the implementation part. It's good to have few proprietary solutions in place.
On another note, the best way forward could be the standards-support/enabler for EVPN control-plane;
like an option to allow more than one PEs (in active-active) to process the BUM (arp request) traffic.

Thanks
Saumya.

From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 9:40 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc

I think you are saying that the FW can fail but it's interface to the leaf is oper-up. I don't think the network can do anything to prevent traffic to that interface then.

And of course, in your new diagram local bias does not play. As I said, local bias works in the previous diagram.
Those new leaf nodes will do aliasing to the remote all-active ES.

If you still want to control the unicast and BUM flows to one FW or the other depending on the leaf, you can still do it but that's implementation specific since it relies on the route selection in vtep_host1 and vtep_host2.

Thx
Jorge


From: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>
Date: Thursday, August 19, 2021 at 8:49 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>, draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org> <draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>>, draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org> <draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>>
Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc
>>> the static mac is configured associated to an interface and conditionally active based on the oper-status of the interface
Ack on that and that's pretty organic (tying it to the interface/AC state).
But it may not solve the case where other hosts (other than firewall) are behind the interface/AC (which is live and kicking).
Need to track firewall state and trigger an administrative delete of the static-MAC.


>>>
As I mentioned I should have added first_hop vtep/PE for Host1/2 as well,
to reflect that reachability to firewall from the host(s) is across the Overlay (EVPN fabric).

I have redone the topology to show host1 and host2 behind first hop vteps "Vtep_host1" and "Vtep_host2" respectively.
In this updated topology local-bias will not come into play, as traffic from host1/2 to firewall arrives over the evpn-fabric.
.

    SITE-1                 |                         SITE-2
------------------------------------------------------
      Host1                                          Host2
          \                                              /
Vtep_host1                              Vtep_host2
         |                                                   |
         |       [ EVPN-fabric ]                |
         |                                                   |
     Vtep1  == ==WAN======  Vtep2
       /                                                     \
Firewall _1                              Firewall_2
  (MAC_F)                                  (MAC_F)



From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 9:04 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc

About this:

>>>> the local static MAC disappears
As I have observed in few implementations that static MACs are admin-configured (other than control-plane published with sticky-bit).
So will need a admin intervention to clean them up.


In the implementations I know, the static mac is configured associated to an interface and conditionally active based on the oper-status of the interface. So no admin intervention. IMHO it does not make much sense to keep a static mac installed if the associated attachment circuit is down.

Thanks.
Jorge

From: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>
Date: Thursday, August 19, 2021 at 8:28 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>, draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org> <draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>>, draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org> <draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>>
Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc
Thanks Again Rabadan and apology for the confusion.

As I mentioned I should have added first_hop vtep/PE for Host1/2 as well,
to reflect that reachability to firewall from the host(s) is across the Overlay (EVPN fabric).

I have redone the topology to show host1 and host2 behind first hop vteps "Vtep_host1" and "Vtep_host2" respectively.
In this updated topology local-bias will not come into play, as traffic from host1/2 to firewall arrives over the evpn-fabric.
.

    SITE-1                 |                         SITE-2
------------------------------------------------------
      Host1                                          Host2
          \                                              /
Vtep_host1                              Vtep_host2
         |                                                   |
         |       [ EVPN-fabric ]                |
         |                                                   |
     Vtep1  == ==WAN======  Vtep2
       /                                                     \
Firewall _1                              Firewall_2
  (MAC_F)                                  (MAC_F)

>>>> the local static MAC disappears
As I have observed in few implementations that static MACs are admin-configured (other than control-plane published with sticky-bit).
So will need a admin intervention to clean them up.

Thanks
Saumya.

From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 8:35 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc

For the first case, again, for the local hosts, local bias makes sure the ARP requests go only to the local FW, i.e. host-1 ARP Requests goes to FW-1 only, irrespective of the DF state.

For the second case, I don't understand. When the local FW goes down, the local static MAC disappears and the one from the EVPN route should be installed.

Thx
Jorge

From: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>
Date: Thursday, August 19, 2021 at 7:56 AM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>, draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org> <draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>>, draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org> <draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>>
Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>
Subject: RE: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc
Thanks a lot for a prompt reply Jorge.

Well I missed drawing the Host(s) behind the remote Vtep (PE) assuming that it will not make any difference (except aliasing as you mentioned).

>>>> FW1 and FW2 can be attached to the same all-active ES
How to handle the broadcast packets like ARP request for the firewaill credentials ? ARP request (MAC_F) should to sent to the local vtep, which should act as a DF.
The hairpinning of ARP request to remote DF (over WAN), should be avoided. That's the reason it would be good to have two DFs for the {ESI, Bridge-domain} in this scenario.

>>>> In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route with the static bit, hence again you will have the behavior you want
The static-mac approach has an issue, when the local firewall goes down, there is no organic way to prefer/plumb the MAC_F published by remote vtep.

Thanks
Saumya.

From: Rabadan, Jorge (Nokia - US/Mountain View) [mailto:jorge.rabadan@nokia.com]
Sent: Thursday, August 19, 2021 7:47 PM
To: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>; draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>; draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: Re: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc

Hi Saumya,

To be clear, your query has nothing to do with the two documents you refer to. In fact I don't see any issue related to multihoming.
Given that in your example host-1 and FW-1 are directly connected to the same leaf, and host-2 and FW-2 are connected to the same leaf too, I can see your use-case resolved in two ways:

a) FW1 and FW2 can be attached to the same all-active ES, I assume local-bias behavior as in RFC8365 (seems you are using VXLAN as data plane). Host-1 will send unicast and BUM to FW-1. Host-2 will send unicast and BUM to FW-2. In case of failure, the behavior will be as per your description. Note that a third leaf with a local host will do aliasing to both, but since it seems you only have directly connected leaf nodes, you are fine.

b) instead of attaching FW-1 and FW-2 to the same ES, EVPN allows 'static' MACs that are advertised with the sticky bit set. You can configure MAC F as static in the two leaf nodes. There is no mobility procedures for static MACs, hence forwarding comes down to the local selection on each node. In the implementations that I know, the local static MAC will be preferred over the EVPN MAC/IP route with the static bit, hence again you will have the behavior you want.. and again, only in your example with two directly connected leaf nodes.

My 2 cents.
Thx
Jorge


From: Dikshit, Saumya <saumya.dikshit@hpe.com<mailto:saumya.dikshit@hpe.com>>
Date: Thursday, August 19, 2021 at 4:51 AM
To: draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org> <draft-ietf-bess-evpn-fast-df-recovery@ietf.org<mailto:draft-ietf-bess-evpn-fast-df-recovery@ietf.org>>, draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org> <draft-ietf-bess-evpn-df-election-framework@ietf.org<mailto:draft-ietf-bess-evpn-df-election-framework@ietf.org>>
Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>
Subject: Query to authors of draft-ietf-bess-evpn-fast-df-recovery and rfc
Hello Authors of https://datatracker.ietf.org/doc/rfc8584/<https://datatracker.ietf.org/doc/rfc8584/> and https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery<https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery>

I have a query regarding the following use-case which I could not find supported with existing DF-election procedures.

Scenario:
All PE (Vtep1 and Vtep2 in below example) routers attached to same ES and both act as DF.

This is a typical case of distributed firewall (active/active) across fabrics (sites),
Where in, the preferred firewall is the one local to the site, whereas, upon failure,
packets need to be redirected (over WAN, via DCI/VPN) towards the remote site firewall.
The firewall-device is connected to it's first-hop vtep over the same bridge-domain and same ESI.
All in all, it's an emulated multi-homing scenario.

This is scenario of distributed firewall devices host same MAC credentials.

Simplistic example :
There are two sites, SITE-1 and SITE-2 in the below diagram.
Traffic (including BUM) generated by Host1 (in SITE-1) (for a bridge-domain)
 should run through site-local firewall instance (firewall_1) preferably.
Only in case of local-outage, the traffic should be send across over WAN to the remote firewall (firewall_2).
Same should apply to traffic generated by Host2 (in SITE-2), wherein,
it should preferably run through the local firewall (firewall_2) and over a failure should go over the WAN towards firewall_1.

Vtep1/2 learn the firewall MAC (MAC_F) as local learning and also from the remote Vtep2/1.
But since both the learnings are over the same ESI, it should not lead to MAC move.
Cometh the local firewall failure, Vteps (1 or 2) should start redirecting the traffic to remote SITE.

Any ARP request (BUM traffic) for firewall credentials landing at either Vtep1 or Vtep2 should be flooded to network towards the local firewall.

    SITE-1                 |                         SITE-2
------------------------------------------------------
      Host1               |                        Host2
         |                     |                          |
     Vtep1  == ==WAN======  Vtep2
       |                       |                           |
Firewall _1           |                   Firewall_2
  (MAC_F)                                  (MAC_F)

Please let me know if there is a way out (with out) using existing standards.

Thanks
Saumya.

-----Original Message-----
From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>
Sent: Tuesday, July 6, 2021 8:31 PM
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
Cc: bess@ietf.org<mailto:bess@ietf.org>
Subject: [bess] I-D Action: draft-ietf-bess-evpn-fast-df-recovery-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the BGP Enabled ServiceS WG of the IETF.

        Title           : Fast Recovery for EVPN DF Election
        Authors         : Patrice Brissette
                          Ali Sajassi
                          Luc Andre Burdet
                          John Drake
                          Jorge Rabadan
        Filename        : draft-ietf-bess-evpn-fast-df-recovery-02.txt
        Pages           : 11
        Date            : 2021-07-06

Abstract:
   Ethernet Virtual Private Network (EVPN) solution provides Designated
   Forwarder election procedures for multi-homing Ethernet Segments.
   These procedures have been enhanced further by applying Highest
   Random Weight (HRW) Algorithm for Designated Forwarded election in
   order to avoid unnecessary DF status changes upon a failure.  This
   draft improves these procedures by providing a fast Designated
   Forwarder (DF) election upon recovery of the failed link or node
   associated with the multi-homing Ethernet Segment.  The solution is
   independent of number of EVIs associated with that Ethernet Segment
   and it is performed via a simple signaling between the recovered PE
   and each PEs in the multi-homing group.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/<https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-fast-df-recovery/>

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery-02<https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-fast-df-recovery-02>

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-bess-evpn-fast-df-recovery-02<https://www.ietf.org/rfcdiff?url2=draft-ietf-bess-evpn-fast-df-recovery-02>


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/<ftp://ftp.ietf.org/internet-drafts/>


_______________________________________________
BESS mailing list
BESS@ietf.org<mailto:BESS@ietf.org>
https://www.ietf.org/mailman/listinfo/bess<https://www.ietf.org/mailman/listinfo/bess>