Re: [Bgp-autoconf] Discussion about BGP autoconf requirements in DC

"Dongjie (Jimmy)" <jie.dong@huawei.com> Mon, 10 February 2020 15:43 UTC

Return-Path: <jie.dong@huawei.com>
X-Original-To: bgp-autoconf@ietfa.amsl.com
Delivered-To: bgp-autoconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B50501202A0 for <bgp-autoconf@ietfa.amsl.com>; Mon, 10 Feb 2020 07:43:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wUB-ZPCsTS_M for <bgp-autoconf@ietfa.amsl.com>; Mon, 10 Feb 2020 07:43:44 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C15961202DD for <bgp-autoconf@ietf.org>; Mon, 10 Feb 2020 07:43:43 -0800 (PST)
Received: from lhreml704-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id EC9AD80445412DB160D4 for <bgp-autoconf@ietf.org>; Mon, 10 Feb 2020 15:43:41 +0000 (GMT)
Received: from nkgeml703-chm.china.huawei.com (10.98.57.159) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 10 Feb 2020 15:43:41 +0000
Received: from nkgeml701-chm.china.huawei.com (10.98.57.156) by nkgeml703-chm.china.huawei.com (10.98.57.159) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Mon, 10 Feb 2020 23:43:38 +0800
Received: from nkgeml701-chm.china.huawei.com ([10.98.57.156]) by nkgeml701-chm.china.huawei.com ([10.98.57.156]) with mapi id 15.01.1713.004; Mon, 10 Feb 2020 23:43:38 +0800
From: "Dongjie (Jimmy)" <jie.dong@huawei.com>
To: Robert Raszuk <robert@raszuk.net>, Randy Bush <randy@psg.com>
CC: "bgp-autoconf@ietf.org" <bgp-autoconf@ietf.org>
Thread-Topic: [Bgp-autoconf] Discussion about BGP autoconf requirements in DC
Thread-Index: AdXdoUXCj6AoAVwuSs2cA3dZ7wwGNAAJJ0AAAAEDRwAAkkqS0A==
Date: Mon, 10 Feb 2020 15:43:38 +0000
Message-ID: <7fc1a61ce6894b8ca1bbae08702380aa@huawei.com>
References: <89bb996682564b99af57133a76b8dc6b@huawei.com> <m2a75u3tcx.wl-randy@psg.com> <CAOj+MMH7ERDbHt6jy1guLUg-ncqbVhv5GaYTd2Hb4a6R82sd7w@mail.gmail.com>
In-Reply-To: <CAOj+MMH7ERDbHt6jy1guLUg-ncqbVhv5GaYTd2Hb4a6R82sd7w@mail.gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.45.167.2]
Content-Type: multipart/alternative; boundary="_000_7fc1a61ce6894b8ca1bbae08702380aahuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/bgp-autoconf/ukQp5AxRvRPVwoNLk56zePZtHEA>
Subject: Re: [Bgp-autoconf] Discussion about BGP autoconf requirements in DC
X-BeenThere: bgp-autoconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP autoconfiguration design team discussion list <bgp-autoconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bgp-autoconf>, <mailto:bgp-autoconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bgp-autoconf/>
List-Post: <mailto:bgp-autoconf@ietf.org>
List-Help: <mailto:bgp-autoconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bgp-autoconf>, <mailto:bgp-autoconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Feb 2020 15:43:47 -0000

Hi Robert and Randy,

Please see some comments inline:

From: Robert Raszuk [mailto:robert@raszuk.net]
Sent: Saturday, February 8, 2020 7:19 AM
To: Randy Bush <randy@psg.com>
Cc: Dongjie (Jimmy) <jie.dong@huawei.com>; bgp-autoconf@ietf.org
Subject: Re: [Bgp-autoconf] Discussion about BGP autoconf requirements in DC

Hi Randy & Dongjie,

Before we dive into bits and pieces is the assumption that auto discovered stuff is ephemeral and disappears upon reboot or is to stay for a while in the box ?

[Jie] IMO we don’t have assumption about this, and it depends on the type of information discovered.

How about marking peers as upstream vs downstream? See we may wan to apply different peer templates up vs down say different prefix limits as example - example to compute vs spine from a given TOR.

[Jie] Another possible example is to determine whether to advertise an default route or the full table to the peer.

>  - signal your ip address (which will tell me v4 or v6) and, as
>   it is the 21st century, assump MPBGP

Do you want to try all possible AFI/SAFIs in capabilities ?

[Jie] Perhaps we need to be clear whether the signaled addresses are used for underlay BGP peering?

> - signal your asn.  if it is the same as mine, it's iBGP so
>   no need to think about multi-hop etc

if it is not the same then you guess if this is multihop, disable connected-check or p2p ?

[Jie] The signaled ASN may be used by the peer for validation of the peering relationship. One question is do we also  cover iBGP P2P in the DC underlay scenario?

> - signal how many hops i need to get to your listener

How would I ever know that apriori ? BTSH in autodiscovery case is a little bit tricky :).

[Jie] Is this about multi-hop iBGP? If so, is it what we need to consider for the DC scenario?

> - signal the authentication

You mean type ? Well I would put those into pre-cfg template instead.
> EBGP using connected-interface address
> EBGP using loopback address
> ECMP

ECMP is not property of the session. It is internal thing to given end. I don't think we need to autodiscover it.

[Jie] ECMP is a useful feature when loopback is used for the session. Such configuration may be generated automatically based on the autodiscovery.

> Validation of allowed peers

Sure but again this is local policy.

[Jie] It requires the information for validation (e.g. ASN, peer address range) to be signaled to the peer.

> Liveness detection

You mean BFD on/off + BFD flavor ? Or something else ?

[Jie] The liveness can be based on both the autodiscovery mechanism itself and BFD. For the latter the capability and parameters of BFD could be signaled.

> Supported address family for session setup: IPv4, IPv6

+1

> Authentication

as commented above

Thx,
r.

PS. I really do not know how far we want to go here but there is few things which ORF can help us with too.

[Jie] My understanding is the design team should provide a minimal set of mandatory requirement and a relatively short list of optional requirements. If some information could be obtained via existing BGP mechanism, then its priority in BGP autoconf should be low. While I’m a little curious what information above can be provided by ORF?

Best regards,
Jie