[bess] Regarding the Next Hop Network Address coding for IPv4 VPN over IPv6 Core in RFC5549

Zhuangshunwan <zhuangshunwan@huawei.com> Sat, 22 June 2019 07:59 UTC

Return-Path: <zhuangshunwan@huawei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80F3312010C; Sat, 22 Jun 2019 00:59:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mg9l6QJHsApL; Sat, 22 Jun 2019 00:59:55 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F776120026; Sat, 22 Jun 2019 00:59:55 -0700 (PDT)
Received: from lhreml703-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 9E2ED32958959756507A; Sat, 22 Jun 2019 08:59:52 +0100 (IST)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml703-cah.china.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.408.0; Sat, 22 Jun 2019 08:59:52 +0100
Received: from NKGEML515-MBS.china.huawei.com ([169.254.5.134]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Sat, 22 Jun 2019 15:59:40 +0800
From: Zhuangshunwan <zhuangshunwan@huawei.com>
To: "bess@ietf.org" <bess@ietf.org>, "softwires@ietf.org" <softwires@ietf.org>
Thread-Topic: Regarding the Next Hop Network Address coding for IPv4 VPN over IPv6 Core in RFC5549
Thread-Index: AdUoywhLB5bsk43hQOStVculmHkjLw==
Date: Sat, 22 Jun 2019 07:59:39 +0000
Message-ID: <19AB2A007F56DB4E8257F949A2FB9858E5BDBB89@NKGEML515-MBS.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.130.202.166]
Content-Type: multipart/alternative; boundary="_000_19AB2A007F56DB4E8257F949A2FB9858E5BDBB89NKGEML515MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/LH2UeYZQxbm61Bj_JzztZqyU9JA>
Subject: [bess] Regarding the Next Hop Network Address coding for IPv4 VPN over IPv6 Core in RFC5549
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Jun 2019 07:59:58 -0000

Dear authors and WGs,

RFC5549 Section 6.2 says:

. 6.2.  IPv4 VPN over IPv6 Core
.
.    The extensions defined in this document may be used for support of
.    IPV4 VPNs over an IPv6 backbone.  In this application, PE routers
.    would advertise VPN-IPv4 NLRI in the MP_REACH_NLRI along with an IPv6
.    Next Hop.
.
.    The MP_REACH_NLRI is encoded with:
.
.    o  AFI = 1
.
.    o  SAFI = 128
.
.    o  Length of Next Hop Network Address = 16 (or 32)
.
.    o  Network Address of Next Hop = IPv6 address of Next Hop
.
.    o  NLRI = IPv4-VPN routes


Regarding IPv4-VPN routes, RFC4634 Section 4.3.2 says:

. 4.3.2.  Route Distribution Among PEs by BGP
[snip]
.    When a PE router distributes a VPN-IPv4 route via BGP, it uses its
.    own address as the "BGP next hop".  This address is encoded as a
.    VPN-IPv4 address with an RD of 0.  ([BGP-MP] requires that the next
.    hop address be in the same address family as the Network Layer
.    Reachability Information (NLRI).)  It also assigns and distributes an
.    MPLS label.  (Essentially, PE routers distribute not VPN-IPv4 routes,
.    but Labeled VPN-IPv4 routes.  Cf. [MPLS-BGP].)  When the PE processes
.    a received packet that has this label at the top of the stack, the PE
.    will pop the stack, and process the packet appropriately.
[snip]


Question:
RFC5549 defines "IPv4 VPN over IPv6 Core", When a PE router distributes a VPN-IPv4 route with an IPv6 Next-Hop via BGP, should the IPv6 Next-Hop be encoded as an VPN-IPv6 address with an RD of 0 ?


Thanks,
Shunwan