Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

Haoweiguo <haoweiguo@huawei.com> Fri, 20 November 2015 08:59 UTC

Return-Path: <haoweiguo@huawei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22C8F1A904D for <bess@ietfa.amsl.com>; Fri, 20 Nov 2015 00:59:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.335
X-Spam-Level:
X-Spam-Status: No, score=-2.335 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OPCisAtZe5WM for <bess@ietfa.amsl.com>; Fri, 20 Nov 2015 00:59:47 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23B261A8F48 for <bess@ietf.org>; Fri, 20 Nov 2015 00:59:46 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml403-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CEJ31550; Fri, 20 Nov 2015 08:59:43 +0000 (GMT)
Received: from NKGEML401-HUB.china.huawei.com (10.98.56.32) by lhreml403-hub.china.huawei.com (10.201.5.217) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 20 Nov 2015 08:59:40 +0000
Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.12]) by nkgeml401-hub.china.huawei.com ([10.98.56.32]) with mapi id 14.03.0235.001; Fri, 20 Nov 2015 16:59:33 +0800
From: Haoweiguo <haoweiguo@huawei.com>
To: Diego Garcia del Rio <diego@nuagenetworks.net>, "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
Thread-Topic: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
Thread-Index: AQHRIcnnJGngb/4i3EuknzuoW5FiTp6jLgEB//+++gCAADHOAIABd8se
Date: Fri, 20 Nov 2015 08:59:33 +0000
Message-ID: <DD5FC8DE455C3348B94340C0AB5517334F8E9B30@nkgeml501-mbs.china.huawei.com>
References: <CACS9xV+FhSwLHmhAO42PTE3iOWEk4YgYm7uDC0B-faH0dOewPQ@mail.gmail.com> <19AB2A007F56DB4E8257F949A2FB9858A97DF65E@nkgeml512-mbx.china.huawei.com> <564DAA0B.7050707@orange.com> <E3852711-1729-41F5-BC5F-19639F56C97A@alcatel-lucent.com>, <CACS9xVLKt1cawex1h3h-GQ2SeJpN7HVEC8_RHLBZvJUZUk0aeQ@mail.gmail.com>
In-Reply-To: <CACS9xVLKt1cawex1h3h-GQ2SeJpN7HVEC8_RHLBZvJUZUk0aeQ@mail.gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.135.23.94]
Content-Type: multipart/alternative; boundary="_000_DD5FC8DE455C3348B94340C0AB5517334F8E9B30nkgeml501mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020202.564EE100.0020, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.2.12, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: ceb60f37a8fd0834926d760c5c14f917
Archived-At: <http://mailarchive.ietf.org/arch/msg/bess/Bzm81M_GIAfV-XvgzhyIB2QwfPM>
Cc: Thomas Morin <thomas.morin@orange.com>, "bess@ietf.org" <bess@ietf.org>
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2015 08:59:56 -0000

Hi Diego,

Thanks for your comments. Pls see inline with  [weiguo3].

Thanks,

weiguo

________________________________
From: BESS [bess-bounces@ietf.org] on behalf of Diego Garcia del Rio [diego@nuagenetworks.net]
Sent: Friday, November 20, 2015 2:00
To: Henderickx, Wim (Wim)
Cc: Thomas Morin; bess@ietf.org
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

Hi Weiguo,

If we're really talking about a public cloud operator where MOST of the endpoints would be software, interconnecting DC and WAN environments seems pretty blunt to be honest. You're going to be leaking every single /32 IP address of the virtual machines into the wide area and most carriers tend to avoid that kind of thing since its quite disrutptive in terms of scalability.
[weiguo3]: I just give an example for pure software based overlay network, i don't mean the option-c solution should be used in public cloud envionment or public cloud is the focus of the option-C. My meaning is that in pure software envionment, currently OVS can be modified for the UDP-port-variant VXLAN encapsulation. For hardware TOR, it relies on next generation chipset.


Furthermore, wim's proposal does NOT imply changes on the east-west traffic patterns. Those would remain on vxlan or whatever new encapsulation we manage to come up with at NVO3.
[weiguo3]: Yes, i understood wim's proposal that is east-west bound encap uses VXLAN and north-south bound encap uses MPLSoGRE. However, some DC operators don't use this pattern, they use VXLAN encapsulation for both north-south bound and east-west bound traffic.


Model C interconnect presuposes a high trust relationship between both parties, and if the cloud and WAN are operated by the same company, that is valid.
[weiguo3]: Yes, i agree.
Finally, as wim also mentions, the issue of the globally allocated VNIDs is quite an issue. This affects the existing TORs since now all the WAN PEs would have to organize themselves not to ever allocate overlapping labels (then converted to VNIDs) since the DC gear today cannot handle using the same VNID on different "services".
[weiguo3]: In data center, normally globally unique VN ID mechanism is used for management simplicity. In the option-c solution, similarly, MPLS VPN Label and VN ID also is recommended to be globally managed through SDN solution.

Again, you dismiss the top of racks, but I don't think we can propose a standard that just simply ignores a good chunk of the DC space.
[weiguo3]: Currently if the UDP-port-variant VXLAN encap solution is deployed, the top of racks need to be dismissed, the hardware capability status quo on the TOR switch  is limited. In the future, if there are some chipsets support the encapsulation, it can also be used on TORs. In summay, TOR dismissing is only for current deployment, that's not for the future.

And at the same time, all the DC edge routers where we propose to implement these complex mapping have larger and larger scaling tables with route capacities in the order of millions of prefixes these days. And while model A has the burden of provisioning the DC edge with the VRF instance, the fact it can do prefix lookups means it doesnt need to leak every single /32 to the wide area and instead expose the aggregates.
[weiguo3]: This is the common issue for Option-C. Just as you said, it is very suitable for a high trustworthy and security envionment, such as cloud data center and WAN PE belongs to same company.


Best Regards,




On Thu, Nov 19, 2015 at 7:02 AM, Henderickx, Wim (Wim) <wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>> wrote:
Thomas, thx for the time summarising this and great summary.




On 19/11/15 02:52, "BESS on behalf of Thomas Morin" <bess-bounces@ietf.org<mailto:bess-bounces@ietf.org> on behalf of thomas.morin@orange.com<mailto:thomas.morin@orange.com>> wrote:

>I don't believe the discussion can be usefully summarized in terms of
>"fatal flaws".
>Let me try to summarize my understanding of the thing discussed in this
>thread.
>
>The solution in the draft has an impact on ASBR hardware due to the new
>kind of stitching required (as well summarized by Diego). Whether this
>is a big issue or not depends on the vendor. The solution in the draft,
>for the NVE part, would be implementable in software quite easily. But,
>because of the limitations in the widespread ToR chipsets for VXLAN (and
>their lack of support for MPLS/(GRE or UDP)), its multiple-UDP-port
>variant would be harder to implement in ToRs or at least not without a
>performance hit (people who know that better, feel free to correct).

WH> some HW cannot do this at all, so lets dismiss this idea.

>The multiple-loopback approach has operational drawbacks, but whether or
>not these are killer issues may depend on the targeted scale (in terms
>of number of NVEs) and may depend on other factors (operator practices,
>ability to automate ASBR configs).

WH> ok now we have not discussed the constraints some HW vendors have with respect to global VNIDs. To make this work all VNID/Labels need to be globally unique. Hmmmmm

>
>The alternative approach, put forward by Wim, consist in using existing
>Option-C with a variant of the 3-label variant relying on an
>MPLS/MPLS/UDP-or-GRE encap (instead of the 3-label MPLS stack).  This
>approach would not necessitate new standardized procedures, would
>require less changes on ASBRs. However it is not supported today by
>vswitches or ToRs (unless the bottom MPLS label is passed to the VM,
>which I think would restrict the application to a subset of the
>scenarios for which Option C is interesting). Having it supported in
>vswitches may be a simple matter of writing the software, but ToR
>support seems to require evolution in chipsets ; whether such a support
>is likely to appear hasn't been discussed in the thread.
>
>All in all, it seems there is no solution to cover an Option C scenario
>with today's generation ToRs, and the question for tomorrow's generation
>ToRs hasn't been really discussed.
>
>Based on the above, I would think the question boils down to whether it
>is desirable to specify an Option C variant usable with vswitches as
>they are today and possibly usable with a performance hit with today's
>ToRs chipsets, at the expense of a required evolution on ASBRs.  The
>alternative requiring some evolution on vswitches and waiting for future
>ToRs chipsets.

WH> I vote for a an evolution of switches/TORs that have proper support for this.
I hope some HW vendors of TOR chips shime in, but I am told the MPLS solution is possible in the next generation chips they are working on.

The other options requires baggage forever on the ASBR elements that does not bring value and it is better to avoid this and build an architecture which is future proof and more cost effective. My 2 cents
>
>-Thomas
>
>
>Zhuangshunwan  :
>>
>> Hi Diego,
>>
>> Thanks for your comments. Pls see inline with [Vincent].
>>
>> Vincent
>>
>> *发件人:*BESS [mailto:bess-bounces@ietf.org<mailto:bess-bounces@ietf.org>] *代表 *Diego Garcia del Rio
>> *发送时间:*2015年11月18日14:25
>> *收件人:*bess@ietf.org<mailto:bess@ietf.org>
>> *主题:*Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
>>
>> Some comments from my side,
>> I think the draft makes quite a few assumptions on specific
>> implementation details that are way too general to be considered
>> widely available.
>> Most of the TOR devices today already pay a double-pass penalty when
>> doing routing of traffic in/out of vxlan-type tunnels. Only the newest
>> generation can route into tunnels without additional passes. And are
>> definitively limited in being able to arbitrary select UDP ports on a
>> per tunnel basis. In fact, most are even limited at using more than
>> one VNID per "service" of sorts.
>> [Vincent]: Yes, the new generation BCM chipset has already supported
>> VXLAN routing without additional passes. For OVS/TOR, VXLAN
>> encapsulation is more popular than MPLSoGRE/UDP, and has better
>> performance.
>> The IP-addressed based implementation which would, I assume, imply
>> assigning one or more CIDRs to a loopback interface on the ASBR-d is
>> also quite arbitrary and does not seem like a technically "clean"
>> solution. (besides burning tons of IPs). As a side-note, most PE-grade
>> routers i've worked with were quite limited in terms of IP addresses
>> used for tunnel termination and it wasn't that just a simple pool can
>> be used.
>> [Vincent]: I think the larger VTEP IP address range on ASBR-d has no
>> limitations. For the hardware on ASBR-d, it has capability to
>> terminate multiple VXLAN tunnels with arbitrary destination VTEP IP
>> addresses.
>> Wim's mentions on cases where the Application itself, hosted in a
>> datacenter, would be part of the option-C interconnect, was dismissed
>> without much discussion so far, while, if we look in detail at the
>> type of users which will even consider a complex topology like model-C
>> its most likely users and operators very familiar with MPLS VPNs in
>> the WAN. Those type of operators will most likely be very interested
>> in deploying MPLS or WAN-grade applications (i.e., virtual-routers or
>> other VNFs) in the DC and thus its highly likely that the interconnect
>> would not terminate at the NVE itself but rather the TS (the virtual
>> machine).
>> Also, the use of UDP ports at random would imply quite complex logic
>> on the ASBR-d IMHO. Im not saying its impossible, but since the
>> received packet now not only has to be received on a random (though
>> locally chosen) UDP port and this information preserved in the
>> pipeline to be able to do the double-tunnel-stitching, it sounds quite
>> complex. I am sure someone in the list will mention this has already
>> been implemented somewhere, and I won't argue with that. And let's not
>> even bring into account what this would do to any DC middlebox that
>> now has to look at vxlan over almost any random port. We have to go
>> back to the "is it a 4 or is it a 6 in byte x" heuristics to try to
>> guess whether the packet is vxlan or just something entirely different
>> running over IP.
>> [Vincent]: Using NP or multi-core CPU hardware technology, it can be
>> implemented although deeper packet inspection is needed to perform UDP
>> port and MPLS stitching.
>> In general I feel the proposed solution seems to be fitting of a
>> specific use-case which is not really detailed in the draft and does
>> not describe   a solution that would "elegantly" solve the issues at
>> hand. It just feels like we're using any available bit-space to stuff
>> data into places that do not necesarily belong.
>> Yes, MPLS encapsulations on virtual switches are not yet fully
>> available, and there can be some performance penalty on the TORs, but
>> the solutions are much cleaner from a control and data plane point of
>> view. Maybe I'm too utopic.
>> [Vincent]: I think pure VXLAN solution has its scenario, it's general
>> rather than specific. We can't require all OVS/NVEs support VXLAN +
>> MPLSoGRE at the same time.
>> Best regards,
>> Diego
>> ---------------------------------------------------------------------------------
>> Hi,
>> The problem we are trying to solve is to reduce data center
>> GW/ASBR-d's forwarding table size, the motivation is same as
>> traditional MPLS VPN option-C. Currently, the most common practise on
>> ASBR-d is to terminate VXLAN encapsulation, look up local routing
>> table, and then perform MPLS encapsulation to the WAN network. ASBR-d
>> needs to maintain all VM's MAC/IP. In Option-C method, only transport
>> layer information needed to be maintained at GW/ASBR-d, the
>> scalability will be greatly enhanced. Traditonal Option-C is only for
>> MPLS VPN network interworking, because VXLAN is becoming pervasive in
>> data center,  the solution in this draft was proposed for the
>> heterogeneous network interworking.
>> The advantage of this solution is that only VXLAN encapsulation is
>> required for OVS/TOR. Unlike Wim's solution, east-west bound traffic
>> uses VXLAN encap, while north-south bound traffic uses MPLSoGRE/UDP encap.
>> There are two solutions in this draft:
>> 1. Using VXLAN tunnel destination IP for stitching at ASBR-d.
>> No data plane modification requirements on OVS or TOR switches, only
>> hardware changes on ASBR-d. ASBR-d normally is router, it has
>> capability to realize the hardware changes. It will consume many IP
>> addresses and the IP pool for allocation needs to be configured on
>> ASBR-d beforehand.
>> 2. Using VXLAN destination UDP port for stitching at ASBR-d.
>> Compared with solution 1, less IP address will be consumed for
>> allocation. If UDP port range is too large, we can combine with
>> solution 1 and 2.
>> In this solution, both data plane modification changes are needed at
>> OVS/TOR and ASBR-d. ASBR-d also has capability to realize the hardware
>> changes. For OVS, it also can realize the data plane changes. For TOR
>> switch, it normally can't realize this function.  This solution mainly
>> focuses on pure software based overlay network, it has more
>> scalability. In public cloud data center, software based overlay
>> network is the majority case.
>> Whether using solution 1 or 2 depends on the operators real envionment.
>> So I think our solution has no flaws, it works fine.
>> Thanks,
>> weiguo
>> ________________________________
>> From: BESS [bess-bounces@ietf.org<mailto:bess-bounces@ietf.org> <mailto:bess-bounces@ietf.org<mailto:bess-bounces@ietf.org>>] on
>> behalf of John E Drake [jdrake@juniper.net<mailto:jdrake@juniper.net> <mailto:jdrake@juniper.net<mailto:jdrake@juniper.net>>]
>> Sent: Wednesday, November 18, 2015 2:49
>> To: Henderickx, Wim (Wim); EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com>
>> <mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>>; BESS
>> Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
>> Hi,
>> I think Wim has conclusively demonstrated that this draft has fatal
>> flaws and I don’t support it.  I also agree with his suggestion that
>> we first figure out what problem we are trying to solve before solving it.
>> Yours Irrespectively,
>> John
>> From: BESS [mailto:bess-bounces@ietf.org<mailto:bess-bounces@ietf.org>
>> <mailto:bess-bounces@ietf.org<mailto:bess-bounces@ietf.org>>] On Behalf Of Henderickx, Wim (Wim)
>> Sent: Tuesday, November 17, 2015 12:49 PM
>> To: EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com> <mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>>; BESS
>> Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
>> ― Snip ―
>> No, the spec as it is can be implemented in its VXLAN variant with
>> existing vswitches (e.g. OVS allows to choose the VXLAN destination
>> port, ditto for the linux kernel stack).
>> (ToR is certainly another story, most of them not having a flexible
>> enough VXLAN dataplane nor support for any MPLS-over-IP.)
>> WH> and how many ports simultaneously would they support? For this to
>> work every tenant needs a different VXLAN UDP destination port/receive
>> port.
>> There might be SW elements that could do some of this, but IETF
>> defines solutions which should be implemented across the board
>> HW/SW/etc. Even if some SW switches can do this, the proposal will
>> impose so many issues in HW/data-plane engines that I cannot be behind
>> this solution.
>> To make this work generically we will have to make changes anyhow.
>> Given this, we better do it in the right way and guide the industry to
>> a solution which does not imply those complexities. Otherwise we will
>> stick with these specials forever with all consequences (bugs, etc).
>> - snip -
>> From: "thomas.morin@orange.com<mailto:thomas.morin@orange.com>
>> <mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>><mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>
>> <mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>>>" <thomas.morin@orange.com<mailto:thomas.morin@orange.com>
>> <mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>><mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>
>> <mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>>>>
>> Organization: Orange
>> Date: Tuesday 17 November 2015 at 01:37
>> To: Wim Henderickx <wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>
>> <mailto:wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>><mailto:wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>
>> <mailto:wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>>>>, BESS <bess@ietf.org<mailto:bess@ietf.org>
>> <mailto:bess@ietf.org<mailto:bess@ietf.org>><mailto:bess@ietf.org<mailto:bess@ietf.org> <mailto:bess@ietf.org<mailto:bess@ietf.org>>>>
>> Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
>> Hi Wim, WG,
>> 2015-11-16, Henderickx, Wim (Wim):
>> 2015-11-13, Henderickx, Wim (Wim):
>> Thomas, we can discuss forever and someone need to describe
>> requirements, but the current proposal I cannot agree to for the
>> reasons explained.
>> TM> Well, although discussing forever is certainly not the goal, the
>> reasons for rejecting a proposal need to be thoroughly understood.
>> WH> my point is what is the real driver for supporting a plain VXLAN
>> data-plane here, the use cases I have seen in this txt is always where
>> an application behind a NVE/TOR is demanding option c, but none of the
>> NVE/TOR elements.
>> My understanding is that the applications  are contexts where overlays
>> are present is when workloads (VMs or baremetal) need to be
>> interconnected with VPNs. In these contexts, there can be reasons to
>> want Option C to reduce the state on ASBRs.
>> In these context, its not the workload (VM or baremetal) that would
>> typically handle VRFs, but really the vswitch or ToR.
>> WH2> can it not be all cases: TOR/vswitch/Application. I would make
>> the solution flexible to support all of these not?
>> 2015-11-13, Henderickx, Wim (Wim):
>> TM> The right trade-off to make may in fact depend on whether you prefer:
>> (a) a new dataplane stitching behavior on DC ASBRs (the behavior
>> specified in this draft)
>> or (b) an evolution of the encaps on the vswitches and ToRs to support
>> MPLS/MPLS/(UDP or GRE)
>> WH> b depends on the use case
>> I don't get what you mean by "b depends on the use case".
>> WH> see my above comment. If the real use case is an application
>> behind NVE/TOR requiring model C, than all the discussion on impact on
>> NVE/TOR is void. As such I want to have a discussion on the real
>> driver/requirement for option c interworking with an IP based Fabric.
>> Although I can agree than detailing requirements can always help, I
>> don't think one can assume a certain application to dismiss the proposal.
>> WH> for me the proposal is not acceptable for the reasons explained:
>> too much impact on the data-planes
>> I wrote the above based on the idea that the encap used in
>> MPLS/MPLS/(UDP or GRE), which hence has to be supported on the ToRs
>> and vswitches.
>> Another possibility would be service-label/middle-label/Ethernet
>> assuming an L2 adjacency between vswitches/ToRs and ASBRs, but this
>> certainly does not match your typical DC architecture. Or perhaps had
>> you something else in mind ?
>> WH> see above. The draft right now also requires changes in existing
>> TOR/NVE so for me all this discussion/debate is void.
>> No, the spec as it is can be implemented in its VXLAN variant with
>> existing vswitches (e.g. OVS allows to choose the VXLAN destination
>> port, ditto for the linux kernel stack).
>> (ToR is certainly another story, most of them not having a flexible
>> enough VXLAN dataplane nor support for any MPLS-over-IP.)
>> WH> and how many ports simultaneously would they support?
>> WH> and depending on implementation you don’t need to change any of
>> the TOR/vswitches.
>> Does this mean that for some implementations you may not need to
>> change any of the TOR/vswitches, but that for some others you may ?
>> WH> any proposal on the table requires changes, so for me this is not
>> a valid discussion
>> See above, the proposal in the draft does not necessarily need changes
>> in vswitches.
>> Let me take a practical example : while I can quite easily see how to
>> implement the procedures in draft-hao-bess-inter-nvo3-vpn-optionc
>> based on current vswitch implementations of VXLAN, the lack of
>> MPLS/MPLS/(UDP, GRE) support in commonplace vswitches seems to me as
>> making that alternate solution you suggest harder to implement.
>> WH> I would disagree to this. Tell me which switch/TOR handles
>> multiple UDP ports for VXLAN ?
>> I mentioned _v_switches, and many do support a variable destination
>> port for VXLAN, which is sufficient to implement what the draft proposes.
>> -Thomas
>> From: Thomas Morin <thomas.morin@orange.com<mailto:thomas.morin@orange.com>
>> <mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>><mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>
>> <mailto:thomas.morin@orange.com<mailto:thomas.morin@orange.com>>>>
>> Organization: Orange
>> Date: Friday 13 November 2015 at 09:57
>> To: Wim Henderickx <wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>
>> <mailto:wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>><mailto:wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>
>> <mailto:wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>>>>
>> Cc: "bess@ietf.org<mailto:bess@ietf.org> <mailto:bess@ietf.org<mailto:bess@ietf.org>><mailto:bess@ietf.org<mailto:bess@ietf.org>
>> <mailto:bess@ietf.org<mailto:bess@ietf.org>>>" <bess@ietf.org<mailto:bess@ietf.org>
>> <mailto:bess@ietf.org<mailto:bess@ietf.org>><mailto:bess@ietf.org<mailto:bess@ietf.org> <mailto:bess@ietf.org<mailto:bess@ietf.org>>>>
>> Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
>> Hi Wim,
>> I agree on the analysis that this proposal is restricted to
>> implementations that supports the chosen encap with non-IANA ports
>> (which may be hard to achieve for instance on hardware
>> implementations, as you suggest), or to context where managing
>> multiple IPs would be operationally viable.
>> However, it does not seem obvious to me how the alternative you
>> propose [relying on 3-label option C with an MPLS/MPLS/(UDP|GRE)
>> encap] addresses the issue of whether the encap behavior is supported
>> or not (e.g. your typical ToR chipset possibly may not support this
>> kind of encap,  and even software-based switches may not be ready to
>> support that today).
>> My take is that having different options to adapt to various
>> implementations constraints we may have would have value.
>> (+ one question below on VXLAN...)
>> -Thomas
>> 2015-11-12, Henderickx, Wim (Wim):
>> On VXLAN/NVGRE, do you challenge the fact that they would be used with
>> a dummy MAC address that would be replaced by the right MAC by a
>> sender based on an ARP request when needed ?
>> Is the above the issue you had in mind about VXLAN and NVGRE ?
>> WH> yes
>> I you don't mind me asking : why do you challenge that ?
>>
>
>_______________________________________________
>BESS mailing list
>BESS@ietf.org<mailto:BESS@ietf.org>
>https://www.ietf.org/mailman/listinfo/bess
_______________________________________________
BESS mailing list
BESS@ietf.org<mailto:BESS@ietf.org>
https://www.ietf.org/mailman/listinfo/bess