Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

"Acee Lindem (acee)" <acee@cisco.com> Fri, 26 August 2022 16:35 UTC

Return-Path: <acee@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37019C14CF1C for <idr@ietfa.amsl.com>; Fri, 26 Aug 2022 09:35:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.604
X-Spam-Level:
X-Spam-Status: No, score=-4.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_SUMOF=5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=BQLPyC8F; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=N+BftLRm
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lMjlZJARBKuA for <idr@ietfa.amsl.com>; Fri, 26 Aug 2022 09:35:31 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 40A5FC14F741 for <idr@ietf.org>; Fri, 26 Aug 2022 09:35:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=67269; q=dns/txt; s=iport; t=1661531731; x=1662741331; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=OWrp15JfNVbUndKwyxSUjEXLIBDEY+OoOmvjqdWrvD0=; b=BQLPyC8FeSwssPD6F2GvfqsP+ystgomp6KoznOUxmIxKshPo+bQywFfV YLlviCfvSqyQMpPIRKP5SsXfk/0ixjII7D4xz/gHrL9aOH8wJRbCzxikY c4OhcYv+YcSef8/4vdV5MCMLY8Bh9PtJh4rKwanz9po77It7Afm/hwzsP E=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:XIS1JhGJVcNIW/F5ZYDXWp1GfiYY04WdBeZdwpYkircbdKOl8tyiO UHE/vxigRfPWpmT8PNLjefa8sWCEWwN6JqMqjYOJZpLURJWhcAfhQd1BsmDBAXyJ+LraCpvG sNEWRdl8ni3PFITFtz5YgjZo2a56ngZHRCsXTc=
IronPort-Data: A9a23:ul8SrKrc8W3jpDeYhQ5wnmR0fwBeBmI2ZRIvgKrLsJaIsI4StFCzt garIBnUPfiNN2Cge9x/b9nj9x5TvpXTz4dhTgM6qn9kEiIXpePIVI+TRqvS04x+DSFioGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILas1htZGEk1E0/NtTo5w7Rj2t4y34Dja++wk YqaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvY12O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQV8QhxjXxvw28 tp2u7y/ahUVGKfziutIBnG0EwkmVUFH0LbDJX76usuJwgibNXDt2P5pSkoxOOX0+M4uXjoIr qJecWtLN0vT7w616OrTpu1Ej88uIeHgPZgUvTdryjSx4fMOEMqfGfiVu4cItNs2rusXRtXfX uUIVSZMSE/tTDBIeUklLZ1ryY9EgVGmI2EH9zp5v5Ef+Gja1gFq+L7hItqTcduPLe1Uklywp 2/a8SL+GB5yHMOWzzWM83CxgMfThiL9V4IPHfu/7PEsi1v77nYUAhAMSXOhqOKrl034Xd9DQ 3H44QInqaw0sUesVNS4AluzoWWPuVgXXN84//AGBB+l0u3YzljAKi8+QQVPSNMFpvMQTwM42 Qrc9z/2PgBHvLqQQHOb076bqzKuJCQYRVPugwdZE2PpBPG+/ekOYgLzosVLS/Xs14Krcd3k6 3Xb8nZh1ux7Ydsjjf3TwLzRv967SnElpCYc4gHaWApJBSsmOdb8POREBbUnhMuswa6QSl2H+ XMDgcXbsaYFDIqGk2qGR+Bl8FCVCxStbW20bb1HRsRJG9GRF5iLJts4DNZWfx0BDyr8UWW1C HI/QCsIjHOpAFOkbLVsf6W6ANkwwK7rGLzND66KN4YTOMIqLVTfp0mCgHJ8OUiwwSDAdolia f+mnTqEUR729Iw+lmPtHrdBuVPV7nljmz27qW/HI+SPiOrCOyH9pUYtO1qVZedx97KfvAjQ6 L5i2ziilX1ivBnFSnCPq+Y7dAlSRVBiXMyeg5IMLIarfFE5cFzN/teMm9vNjaQ/wfQM/goJl 1ngMnJlJK3X3i2bc1nXNSs/AF4tNL4mxU8G0eUXFQ7A8xAejUyHtc/zq7NfkWEbydFe
IronPort-HdrOrdr: A9a23:vIkO/asiAfm5CwWzjHvlUStp7skCw4Mji2hC6mlwRA09TyXGra 6TdaUguiMc1gx8ZJh5o6H9BEGBKUmskaKdkrNhQotKPTOW9FdASbsC0WKM+UyZJ8STzJ8+6U 4kSdkCNDSSNyk0sS+Z2njCLz9I+rDum8rE5Za8854ud3ARV0gK1XYfNu/vKDwOeOAwP+teKH Pz3LsjmxOQPVAsKuirDHgMWObO4/fRkoj9XBIADxk7rCGTkDKB8tfBYlal9yZbdwkK7aYp8G DDnQC8zL6kqeuHxhjV0HKWx4hKmeHm1sBICKW3+4kow3TX+0aVjbZaKv+/VQMO0aSSAZER4Z 3xSiIbTodOArXqDyaISFXWqk/dOX0VmgHfIBej8AreSIrCNWsH4w4rv/MDTvMfgHBQ5O2UmZ g7rF5w/fBsfGP9tTW46N7SWx5wkE2o5XIkjO4IlnRaFZATcblLsOUkjQho+bo7bWvHAbocYa FTJdCZ4OwTfUKRbnjfsGUqyNuwXm4rFhPDRkQZoMSa3zVfgXg8liIjtYEit2ZF8Ih4R4hP5u zCPKgtnLZSTtUOZaY4AOsaW8O4BmHEXBqJOmOPJlbsEr0BJhv22tTKyaRw4PvvdI0DzZM0lp iEWFREtXQqc0arEsGK1I0jyGG6fIx8Z0Wb9ihz3ekNhlSnfsuYDcSqciFbr/ed
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.93,265,1654560000"; d="scan'208,217";a="924257608"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 26 Aug 2022 16:35:29 +0000
Received: from mail.cisco.com (xfe-rtp-003.cisco.com [64.101.210.233]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 27QGZTCG014050 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 26 Aug 2022 16:35:29 GMT
Received: from xfe-rcd-005.cisco.com (173.37.227.253) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 26 Aug 2022 12:35:28 -0400
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-005.cisco.com (173.37.227.253) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Fri, 26 Aug 2022 11:35:28 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UpVyZnL9QosCKryQHCqS7siEX+7yVIn2hN+dPoroT1d9Ksos6lmOnotYz9ZupozluxQHPMnxKCWopKGkZaCpMjOoeXbONADZoNoOu8yh0fYsbuVDXof49AQW/jFLBliNaMH1J+a3bMKC8AMlK8uE2oRP8D9Pgtbl9SM0K7qlhE1NmSqAce7IT0Gp2rYIlqK/HG7DsyOQMHf4WXy2rTxDTkRDj11gJxf8Kn/AnEm7XWxk4I7Spf28c9+pRDzVe/Wae0dJAceaot+5IF1Z3DhPKwNx+l3zUw6w79ktvxm2BvHfmLLkQ5+W3AqNdf3UERFg8yocoWTiFL9eVbIQ+9HzgQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OWrp15JfNVbUndKwyxSUjEXLIBDEY+OoOmvjqdWrvD0=; b=eG95bxIi1UIQc308SUvgUqjPrJR396HqYE0sJ78E+4+T1F6kDLeHr4KKoBT8dGO1A0Ps5FAPhO8BBTXtgbnsai921K/zStNnEJ4D8HgXZT4R0M8d5w5y406h9OFkuZXMWV15AHJJASdCsZ36D2b8o3kLg5Jyq326WcglyNdJtKW8h89D9uEFR2p+yQ/rNUOCkn0ARNkIOjCwOVSQg24IRXlmCtdXAf8e62y6cWaG2+NmIuf+3OGvDMg5Fb/G3zfPC3uQ15+/M2I66ZXxQXCw94Q9iBjfJ00HL+DwtdY4krkU/K0K/4vfTUpsekTk1rbgMZGBwUz2XgmsgJ4D6zhw4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OWrp15JfNVbUndKwyxSUjEXLIBDEY+OoOmvjqdWrvD0=; b=N+BftLRm43LJSo3GCCcGyqr4p606xHuCCSftLxp6BcZTJOUdl/VvR6up6XuuAJM3Dj/MsrOdD13L/ibYUN5OZ+0hkW1I9E+jlYtiCxh40q6XNERhRm+YMiHvnjaUHQATreQHu83xYFK7tUN5X76Fcl501ZjayuGs0rfltrGi6eI=
Received: from BYAPR11MB2757.namprd11.prod.outlook.com (2603:10b6:a02:cb::16) by SA2PR11MB5195.namprd11.prod.outlook.com (2603:10b6:806:11a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5566.15; Fri, 26 Aug 2022 16:35:27 +0000
Received: from BYAPR11MB2757.namprd11.prod.outlook.com ([fe80::f8f7:58a3:192b:f927]) by BYAPR11MB2757.namprd11.prod.outlook.com ([fe80::f8f7:58a3:192b:f927%7]) with mapi id 15.20.5566.016; Fri, 26 Aug 2022 16:35:26 +0000
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Robert Raszuk <robert@raszuk.net>, Aijun Wang <wangaijun@tsinghua.org.cn>
CC: "idr@ietf. org" <idr@ietf.org>, Susan Hares <shares@ndzh.com>
Thread-Topic: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
Thread-Index: AQHYuT1VYOyS0ioYxEiz7Wvrd5xBUa3BEuoAgAAIKwCAAAMRgA==
Date: Fri, 26 Aug 2022 16:35:26 +0000
Message-ID: <058C2BBD-C660-4232-863E-A37AF9887BEB@cisco.com>
References: <CAEfhRryApBwrDo2ov6AvAANiys7BKM1u+prJ6oBOAt+V--Yy6g@mail.gmail.com> <6F281A06-F8CA-4870-B344-E6F726374FFF@tsinghua.org.cn> <CAOj+MMEGBOt9ucwceGPYZwm6YJnt0qb15_3NPzfUQM2PS0TjTg@mail.gmail.com>
In-Reply-To: <CAOj+MMEGBOt9ucwceGPYZwm6YJnt0qb15_3NPzfUQM2PS0TjTg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.64.22081401
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7466ac6e-2188-4794-3742-08da8780fb4f
x-ms-traffictypediagnostic: SA2PR11MB5195:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: kNHI+WHNG0NNQn75hlgD+LPjJz3wk4rczNIyNMCHnnoqTFSRykDegRfRfneTwjODGDYsOeyCmMlwttsKVnxAxwxtOxc+zNkOFLpGw2HJPGjs1JSFtu44YL+iv/DouF8IJjN3pxfoE6ymP6FuumqRca8OWxDURRCfkmFwiIZjKfoSsWxndWQuG86C7X7gj0mfKCVDxkVrhcLn/7JsT5oT0YOtlobEG50sqs1gTpSE9XuEHrOWK+ME9g8EqHlKYU88DX4vVypmRBHY+ZNbTYyL5mFxwt4aZLJB+AYOuJyxo7xgb24I5fm2D9AmcPRlIqDsbJEJxyJr5g5XXKPc9FNmmh+6uuvXK6fGRBDfev4KI0ryoYZg6LPl3S6Gf+d9w9qKXh7LCN37QpFN148ieRkYTmjsFENYmtzPJ0NO6zbUzC6YYMQ6YEdSv+Nt6rQw6LQcavv/kRIOyUaE/mlLgwHFNAJuurlUMzxyslMcbVBqZfZi/uMX0EwU/dPwWtmCfOFhekQu1xt1k4zx0YpvxhwVpm8fNrocXngTcbWnVNalZSkJQWTFC0CqozxpgpwHWCSZGlh0DZxrjmMv5RBb9auuoxVAQRVg881+sS+8UyjQeR1sgDfaoJ+MulDTP0vWTyO8yRUZ0TOMEpjJBrx41lz6vTYPHd5SaieaEzk2YM8ulkQoMiURyHv8eT5p60uYPgNFEhgOc5dxZCq0DogqqWM/WeMcNUu1GkoFpHMcZadiNwlhd9kmkvivAbN+x/DHX5ew88qmkcbX6uncyMxkq64fuOIz5cftDSjiDfo8qefyDBEQ8BSKnSVdm54dAgWz/mkFW45pTt7KHbU8k67VSsoQzOIfad99bUDVUvTNHqKfPIJ38qS05oM7E7gnzCsdZZzTw0a5x2xNi6gU09S1l3/0Tw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2757.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(396003)(346002)(366004)(376002)(39860400002)(136003)(66556008)(30864003)(8676002)(966005)(4326008)(6486002)(64756008)(66446008)(66476007)(91956017)(66946007)(76116006)(6506007)(478600001)(2616005)(53546011)(33656002)(2906002)(6512007)(26005)(8936002)(166002)(41300700001)(5660300002)(122000001)(86362001)(38100700002)(38070700005)(186003)(66574015)(316002)(54906003)(71200400001)(110136005)(83380400001)(36756003)(48020200002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_058C2BBDC6604232863EA37AF9887BEBciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2757.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7466ac6e-2188-4794-3742-08da8780fb4f
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Aug 2022 16:35:26.7714 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 4oOO6jG0gHpgDrRdVYjRvwAJQ8/cnEfXP54j16N1itfSRwrJQt5Ib09I4uijH6FU
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR11MB5195
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 64.101.210.233, xfe-rtp-003.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/7aJi_Tim6x2sS2TS6r1DEVVSfb4>
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Aug 2022 16:35:35 -0000

All,

I agree with Robert on abandoning the proposal – this draft adds new semantics to the RD and unneeded complexity for a problem that is already solved.

Thanks,
Acee

From: Idr <idr-bounces@ietf.org> on behalf of Robert Raszuk <robert@raszuk.net>
Date: Friday, August 26, 2022 at 8:25 AM
To: Aijun Wang <wangaijun@tsinghua.org.cn>
Cc: IDR List <idr@ietf.org>, Susan Hares <shares@ndzh.com>
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

Aijun,

Indeed this is going in circles ... So let me repeat one more time for those who came recently to this discussion.

When you are offering a LxVPN service (or even ISP Internet Transit) you sign with your customer Service Agreement when he declares the number of routes he will be sending to you.

It is clear that you better use platforms which can accommodate that service level agreement to construct the connectivity.

And the way you control/policing this is by PE-CE ingress prefix limit.

For Inter-AS again you are not to blindly accept everything, but you tightly control what is being injected into your network.

If you think what is in place today to control what is accepted to the network is not sufficient I think everyone will welcome new suggestions.

But you can not take everyone who comes in then just drop them in the middle of the flight ...

This proposal should be abandoned.

Kind regards,
Robert


On Fri, Aug 26, 2022 at 1:55 PM Aijun Wang <wangaijun@tsinghua.org.cn<mailto:wangaijun@tsinghua.org.cn>> wrote:
Hi, Igor:

What you quoted has stated the VRF Limit mechanism is not enough to alleviate the receiving router from parsing the overflowed BGP updates.
We need to push back theses overflowed routes via the VPN Prefixes ORFF mechanism, which needs the quota to judge which VPN routes breaks its threshold.
Wish the above explanation can help you get the key motivation of this draft.
Aijun Wang
China Telecom


On Aug 26, 2022, at 19:05, Igor Malyushkin <gmalyushkin@gmail.com<mailto:gmalyushkin@gmail.com>> wrote:
Hi Wei,

Thanks for your comments.

It seems we are going around the same point again and again. I understand what quota gives us, but I don't think that it is necessary (or mandatory) and that it should be a core feature of your solution. Neither draft-wang-idr-vpn-routes-control-analysis nor draft-wang-idr-vpn-prefix-orf gives us a good motivation for that (please point me to it if I'm wrong).
Let me quote draft-wang-idr-vpn-prefix-orf:

5) Configure the Maximum Prefix for each VRF on edge nodes

 When a VRF overflows, it stops the import of routes and log the extra

   VPN routes into its RIB.  However, PEs still need to parse the BGP

   updates.  These processes will cost CPU cycles and further burden the

   overflowing PE.
It does not matter for what reason a VRF`s prefix limit has been overflowed (at least I don't see any discussion in the documents about it). All we need in this case is to stop receiving routes into this VRF whatever the source of them. Maybe it is possible to describe two options in your draft? One is based on the VRF prefix limit solely and another is for its slicing by source PEs (as you see it). The first is mandatory.


пт, 26 авг. 2022 г. в 04:27, Wei Wang <weiwang94@foxmail.com<mailto:weiwang94@foxmail.com>>:
Hi Igor,
    We think the quota value should be set based on the resouce limit of the receiver device and the number of route sources(PEs) within the same VPN. The aim of the quota is to ensure the resouce is shared/used properly among the sources.
    The quota value usually be set much higher than PE-CE limit. It will certainly have enough margin to accomodate the possible future expansion and need no shrink when one or some the PEs are taken out of the VPN.

Best Regards,
Wei
------------------ Original ------------------
From: "Igor Malyushkin" <gmalyushkin@gmail.com<mailto:gmalyushkin@gmail.com>>;
Date: Thu, Aug 25, 2022 05:30 PM
To: "Aijun Wang"<wangaijun@tsinghua.org.cn<mailto:wangaijun@tsinghua.org.cn>>;
Cc: "Robert Raszuk"<robert@raszuk.net<mailto:robert@raszuk.net>>;"Wanghaibo (Rainsword)"<rainsword.wang=40huawei.com@dmarc.ietf.org<mailto:40huawei.com@dmarc.ietf.org>>;"Susan Hares"<shares@ndzh.com<mailto:shares@ndzh.com>>;"idr@ietf. org"<idr@ietf.org<mailto:idr@ietf.org>>;
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

Hi Aijun,

Thanks for the comments, please see the inline below.

чт, 25 авг. 2022 г. в 08:30, Aijun Wang <wangaijun@tsinghua.org.cn<mailto:wangaijun@tsinghua.org.cn>>:
Hi, Igor:

The setting of quota value is the matter of management issue, and should be decoupled from the control plane.
[IM] From my point of you in your specification, this is the only option.
If you select to let the source PEs advertise such value, it is possible that they change it along with their overflow VPN routes.
[IM] Well, if the limit between a source and destination PEs should be linked as you are suggesting, increasing some value for one VRF cannot be made without of review other VRFs among a common VPN. No matter if the limit is set manually on a destination PE or dynamically synced from a source. A network design should be consistent.
And from the POV of the receiver PE, before you setting the prefix limit under each VRF, you should have the well estimated quota/value from each PE or each VRF.
[IM] That is where we do not agree with each other. From my perspective, if we are talking about local PE protection then setting a limit under a VRF is a matter of the number of all VRFs under the PE and some memory limits of the PE. And the VRF limit, in this case, does not be the same as the sum of all incoming routes, it can be slightly bigger. If we see warnings (say, we've just exceeded 80%) we are considering increasing this value (if the memory limit allows it) or updating the hardware. Your suggestion requires reviewing the limits for all VRFs every time we add or remove a VRF-PE pair (not to mention configuring of these limits). And at the end of the day, you actually reach the same local memory limit. I want to remember that the solution you are suggesting actually does not depend on how we set the prefix limit for the VRF. When it is reached we just signal to stop sending.
As stated before, in most of the situation, the per <PE> or per <RD, PE> quota will be the same value, the operator will not let the design of its network too complex to operate, but the standard should provide the finer control capabilities.
 [IM] I believe the standard should provide finer control for a reason. Let's imagine that without these quotas the solution will not work, but it will.
 This is same as the usage of RD within the network. There is no scenario that the operator to allocate different RDs for one VPN on the same PE. What we often do is that we allocate different RDs for the same VPN on different PEs. Then RD is the right value to distinguish the VPNs on one PE.
 [IM] All I wanted is to point to the authors that from the parent standards POV an RD is not a unique ID for a VRF (under a single PE). Some scenarios may emerge in the future.


Best Regards

Aijun Wang
China Telecom

From: idr-bounces@ietf.org<mailto:idr-bounces@ietf.org> <idr-bounces@ietf.org<mailto:idr-bounces@ietf.org>> On Behalf Of Igor Malyushkin
Sent: Thursday, August 25, 2022 3:14 AM
To: Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>
Cc: Wanghaibo (Rainsword) <rainsword.wang=40huawei.com@dmarc.ietf.org<mailto:40huawei.com@dmarc.ietf.org>>; Susan Hares <shares@ndzh.com<mailto:shares@ndzh.com>>; idr@ietf.org<mailto:idr@ietf.org>
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

For sure it is design-depended. If every VRF has its own RT it will work. But I think if we have a mechanism that allows us to attach several RTs to a route we are in a trouble. Guys are just typing to cover this case.

If we talk in general about a whole solution I also think that the way with the new AFI/SAFI is much better. I also don't understand the benefits behind quotas per VRF-PE pair, but if it is really worth the time I expect to see the propagation of these quotas from source PEs instead of a manual configuration. I think it can be easily introduced into a solution with the new AFI/SAFI.

ср, 24 авг. 2022 г. в 21:05, Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>:
Igor,

RT can uniquely distinguish src vrf. It is simply a matter of proper configuration. No ned protocol extension is required.

Thx,
R.

On Wed, Aug 24, 2022 at 9:03 PM Igor Malyushkin <gmalyushkin@gmail.com<mailto:gmalyushkin@gmail.com>> wrote:
Hi Haibo,

2) It is unpractical to set the quota value for <RT>, or <RT, PE> under VRF, because RT can't uniquely distinguish one VRF on one PE.
What if a VRF has several RDs for its routes? RFC4364 and RFC4659 don't restrict this behavior and even more, it explicitly describes it. So, RD also can't uniquely distinguish one VRF. Looks like we need a different marker for all routes belonging to the same source VRF. Say, VPN ID community or something like that.


ср, 24 авг. 2022 г. в 18:26, Wanghaibo (Rainsword) <rainsword.wang=40huawei.com@dmarc.ietf.org<mailto:40huawei.com@dmarc.ietf.org>>:
Hi Sue and WG,

I support this adoption.
This draft proposes the mechanism to control the overflow of VPN routes within one VRF from influencing other VPNs on the same device automatically.

The updated contents have accommodated the suggestions and addressed the comments raised within the WG discussions. Some additional concerns can be addressed after the adoption.

I am not aware of any undisclosed IPR to this draft.

To make the actual progress of this draft, we should avoid to discuss the solved points back and forth. For example, RTC mechanism is not suitable for the scenarios that described in this adoption draft, because:
1) RTC has no any automatic detection mechanism to determine which RT should be withdrawn now.
2) It is unpractical to set the quota value for <RT>, or <RT, PE> under VRF, because RT can't uniquely distinguish one VRF on one PE.
3) It is dangerous to propagate the RT based filter rule unconditionally in the intra-domain or inter-domain wide, as that done in current RTC mechanism.

The conclusion, RTC is not the right direction to accomplish the goal.

Regards,
Haibo

From: Idr [mailto:idr-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, August 16, 2022 11:56 PM
To: idr@ietf.org<mailto:idr@ietf.org>
Subject: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

This begins a 2 week WG Adoption call for draft-wang-idr-vpn-prefix-orf-03.txt
https://datatracker.ietf.org/doc/draft-wang-idr-vpn-prefix-orf/

The authors believe that they have addressed the concerns raised in
the previous 2 WG adoption calls.

The WG should consider if:

1) The revised text answers the previous concerns regarding
the scope of this draft?

2) Does the revised text provide a useful function for
networks?

3) Are there any additional concerns regarding the new text?

Each of the authors should send an IPR statement for
this version of the draft.

The adoption call was moved to 8/29 to 8/30 to allow questions
to be asked at the IDR interim meeting on 8/29/2022 (10am – 12pm EDT).

Cheers, Sue Hares
_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr
_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr
_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr