Re: [Idr] [Responses for the comments during the IETF108] New Version Notification for draft-wang-idr-rd-orf-01.txt

Gyan Mishra <hayabusagsm@gmail.com> Fri, 07 August 2020 21:32 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE2483A0B60 for <idr@ietfa.amsl.com>; Fri, 7 Aug 2020 14:32:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.987
X-Spam-Level:
X-Spam-Status: No, score=-1.987 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YGLpS1D3mLim for <idr@ietfa.amsl.com>; Fri, 7 Aug 2020 14:31:58 -0700 (PDT)
Received: from mail-vk1-xa2d.google.com (mail-vk1-xa2d.google.com [IPv6:2607:f8b0:4864:20::a2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F1313A0B5F for <idr@ietf.org>; Fri, 7 Aug 2020 14:31:58 -0700 (PDT)
Received: by mail-vk1-xa2d.google.com with SMTP id s81so670103vkb.3 for <idr@ietf.org>; Fri, 07 Aug 2020 14:31:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=cfM/1jlaYro21QDt2Rx6sFxGqJroJRCB1pHH51bvL+k=; b=dj3dLP5+7p0XN9wMGjOCdCSg4UjlMcSRuHWRt6KyBYhMVDfSOQS4rl1lvXGMU2wYLW s8n3i+dLKZt0wr3I/bRBbANmiOPbX7t9X1nYHAaRjwn0cfmGVNrIrUUyUpLG7j9BP7y8 fZWwn5NHwGUW1MJv/RcIBC/GED1dwzJUzG6g54c3gxvd9DYuGBtIBii6kyp+ocmNJH1U tV+d8p0LGF7Y4fUT++WEXaDoGp7pU3qquXZZeWK6O/iDyZFy0U+/y+gNl+yYYHJ84BNu RNELUOVmprpObroaPZ0S0kCMBS1hSJVHrby5LSkIFJ7L/ylcfGZcsy3rpltm0ED/F3OB ynZA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cfM/1jlaYro21QDt2Rx6sFxGqJroJRCB1pHH51bvL+k=; b=dxQ3CHdA+RISJ5tKRKPnGy4kSPmmP3FifUUZJYYkCPhL94bVje25VysHUX74J7JyzR 3L63iaG0mzrhsfvQ2vQoXASXKw92ybriFos1K9Sk9B6IeTkrD+68b3VOnlv1yt/lyhib VRgKPbWcgooYX94a3ASvzX/M1b5/06KXAHzjjRBi4rfl3wP+HolX1vmuBIa3kRJ0div6 RensAs6o8Ntdd8ICj/ITb6QlHxR8ALQ7jyA47o0ifkfbJ3WbNCcfKDddq9gHM0H7zsIm nosvoLV3EIsC+s+SLEcdHzZEgEOhj8sodCSUaWIgvE53FZv6mMCTgA4zDJV0zpS2uEgc Vwjw==
X-Gm-Message-State: AOAM5325IA1K6nE/kU43DW2n0HZxqq/unyoFLIIHX2hP6T3BOGOtO9WD se1v682+pZStCNvarbQYoL7frsKsr+1JFNsGy1e9MZrSzVw=
X-Google-Smtp-Source: ABdhPJzMryNM7ez2VOjxrJQJVAjlNbE9xAapwNQKXx3NiSfmEVKyb3GWmaNYr3IcR1ciIwcHcasjmC0Yrx7wNadFJeQ=
X-Received: by 2002:a1f:c745:: with SMTP id x66mr12657126vkf.82.1596835917144; Fri, 07 Aug 2020 14:31:57 -0700 (PDT)
MIME-Version: 1.0
References: <CABNhwV0upBRPwMmjV86ZOb1HObtugY5TQ5AdTt=tzv6mS=EzJg@mail.gmail.com> <2FFFEB16-DAAC-4E8A-AD24-7880A091F46E@tsinghua.org.cn> <CABNhwV0C9tmPre4KeRe+p5F2Wokjdb46M5UnC0LjRxwXue6ccw@mail.gmail.com> <CAOj+MME=-sC30LSEi9sdMZAwN-iWi-ATR7oT0n_4KeG5-o98ZQ@mail.gmail.com> <00ae01d66c58$de4da280$9ae8e780$@tsinghua.org.cn> <CAOj+MMH47cvi4YZCrgb_tDt6ttaL7M9_TS6fdFAX6GvFxs6LGA@mail.gmail.com> <DM5PR05MB3388C9D4EC80F129F67D6934C7490@DM5PR05MB3388.namprd05.prod.outlook.com>
In-Reply-To: <DM5PR05MB3388C9D4EC80F129F67D6934C7490@DM5PR05MB3388.namprd05.prod.outlook.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Fri, 07 Aug 2020 17:31:45 -0400
Message-ID: <CABNhwV0x2Nscniw0=pdUBinWmstv8MyyqKVy9evKnSNG2zeL6Q@mail.gmail.com>
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
Cc: Aijun Wang <wangaijun@tsinghua.org.cn>, Keyur Patel <keyur@arrcus.com>, Robert Raszuk <robert@raszuk.net>, idr <idr@ietf.org>, "wangw36@chinatelecom.cn" <wangw36@chinatelecom.cn>
Content-Type: multipart/alternative; boundary="0000000000009b27bb05ac50559f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/sR7Ym5rMwyiUEr75Z2AaZdK6VC0>
Subject: Re: [Idr] [Responses for the comments during the IETF108] New Version Notification for draft-wang-idr-rd-orf-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Aug 2020 21:32:03 -0000

Hi Authors

I agree with Roberts’s analysis as well.

As pointed out by Robert this feature appears to be a dangerous addition to
the BGP specification.  The concept or idea of wanting to drop routes for
select devices based on criteria that is not holistic.

BGP is a holistic routing protocol and by that I mean consistent and
ubiquitous propagation of NLRI’s throughout the domain.  The concept of
resource constrained nodes and creating a BGP knob for resource constrained
nodes is out of the scope of the BGP protocol.  The goal and primary
purpose of BGP is to provide “reachability” a by that I mean every router
in the domain has a consistent view of the topology soft state and
identical RIB.  This is not different then the goal of an IGP to provide
next hop reachability and a consistent view of the domain meaning IGP
database synchronization.  Vendors provide plenty of knobs to filer that
consistent view of the domain but those are very one off exception use
cases where that happens in both the IGP and EGP world.  In the IGP world
for example take OSPF or ISIS you can as a corner case filter the IGP RIB
that is on a router with an inbound prefix filter.  This is an exception to
the rule but it must be done carefully as since the LSDB is “synchronized”
every router interface on every device in the domain bust now require that
same filter implemented as the database is “synchronized” for the goal of
both IGP and EGP to provide a consistent identical view of the domain.
Similarly with EGP such as BGP iBGP intra domain filtering is not
recommended and is not built by design to so as the goal BGO is to provide
the same reachability.  You can match and manipulate BGP attributes but not
filter as it will break the goal and primary purpose of BGP in the intra
domain construct of a consistent identical view throughout the domain.

There is already control mechanisms built into BGP to prevent routing loops
and re-advertisements such as BGP originator-id and cluster-id and cluster
list path created for route-reflector-client originated routes to prevent
loops as well as RR side sidenon client to non client re-advertisement
controls.


>From an IP VPN framework perspective you have to understand that a PE has
RT filtering enabled by default which is the control mechanism.  Their is
absolutely no need for any additional resource constrained node knob to
drop NLRI in what seems to be a random inconsistent fashion.  What PE “RT
filtering” means and this is a very basic concept but and applied directly
to what you are proposing and is the grounds to stop development of the
draft.  So when an RR advertises prefixes to a PE and let’s say their are a
million RTs and let’s say the PE is configured to import RT=1 and so only
one RT.  So now what happens is the RR advertises 1M RTs and the PE per “RT
filtering” drops 999,999 RTs as the PE only has RT=1 defined.

This issue caused unnecessary flood of RTs that soaks up operators
bandwidth that is not necessary that are going to be dropped anyway.

RTC to the rescue!!


RTC provides a elegant function to control advertisements from RR to PE and
is very robust and sensible in that it not dropping routes randomly or
because a few nodes have a resource constraint.  RTC has a well defined
purpose which is to cut down on a flood or RTs to a PE as described.

So the PE-RR peering had a RTC BGP MP reach AFI/SAFI defined on each peer
SAFI 132 enabled on each PE-RR peering  capability is established
send/receive state.  So now what happens is the PE does an ORF to the RR
stating that I only have RT=1 defined for import which is sent in a RTC
membership report to the RR.  The RR with RTC capability enabled now honors
what the PE has stated and only sends RT=1 and not 1M RTs.

Hooray for RTC saves the day = Job well done

This issue can be exacerbated with NNI inter-as when using option-b where
all VPN routes are propagated.  In this case we have default “RT filtering”
to the rescue to slow down the RT propagation to be done in a controlled
fashion.  So by default on the RR node does not have RT filtering enabled
by default and only PEs have that feature enabled by default. With Option-B
the inter-as link is PE-PE peering connecting the two SP domains together.
So looking deeper into option-b you can set “retain-route-target” which now
changes the default behavior and is required for the VPN routes to be
propagated.  In some cases between providers the RT does not match so a
RT-rewrite is required so in that case the rewrite policy become the RTC
like filtering mechanism.  In case where RT is the same between providers
we tie the “retain-route-target all” to a RT filter “RTC like” to only
accept RTs pertinent to the domain.

With inter-as option C we run BGP LU for labels unicast end loopback FEC
all leaked between domains via eBGP and IBGP LU for data plane forwarding
and the control plane function vpn peer that was on the PE-PE in option-b
is RR-RR eBGP vpnv4 vpnv6 SAFI 128.  Since the RR sits in the control plane
not the data plane “RT filtering” is not enabled by Default.  So for the
proper end to e f LSP data plane forwarding we have to set BGP
“next-hop-unchanged” so that the next hop attribute is now the ingress and
egress PEs between domains for the end to end LSP.  So now in this case all
the SAFI 128 RTs are propagated between domains.  You can apply explicit RT
filtering in this scenario but generally that is not done as opt-c used
mostly within same administrative domain or special agreement scenario
between SPs that work closely together or in M&A activity type scenarios.
So now we still have RTC SAFI 132 eatabled PE-RR within each domain so even
if you got a quadrillion RTs on the RR-RR peering and did not want to
filter there we have RTC back to the rescue and if you only have 1M RTs
defined for import on the PE within each domain,  now in a graceful
controlled fashion only 1M RTs are not advertised RR to PE within each
domain.

This same concept as IP VPN is an “overlay” it applies to SR both SR-MPLS
and SRv6 as well.

>From an BGP architecture and designer perspective when building a “SP core”
in that standard framework where you have separation of control plane and
data plane where the RRs are dedicated control plane function and don’t sit
in the data plane where the PEs RRC clients sit at the edge sit in the data
plane for ingress to egress LSP to FEC to be built.

So in a nutshell, a combination of default RT filtering on PEs, and
controlled RT advertisements via ORF RT membership via RTC we have complete
control of SAFI 128 advertisements for resource constrained nodes as it
stands today and there is absolutely no need for this draft to be
considered with IDR.

I did not mention the per VRF maximum prefix knobs to control how big each
VPN gets at a micro level so we have that control mechanism as well.  In
general most providers have this set as a rule of thumb per VRF maximum
which is sized accordingly to the lowest resource constrained node within
an operators network and is publish as the SLA customer agreement contract
as part of the VPN service offering.

Kind Regards

Gyan

On Fri, Aug 7, 2020 at 8:35 AM John E Drake <jdrake=
40juniper.net@dmarc.ietf.org> wrote:

> Hi,
>
>
>
> I agree with Robert’s analysis.  There is no need to define an external
> mechanism to deal with an internal node issue.
>
>
>
> Yours Irrespectively,
>
>
>
> John
>
>
>
>
>
> Juniper Business Use Only
>
> *From:* Idr <idr-bounces@ietf.org> *On Behalf Of * Robert Raszuk
> *Sent:* Friday, August 7, 2020 3:45 AM
> *To:* Aijun Wang <wangaijun@tsinghua.org.cn>
> *Cc:* Keyur Patel <keyur@arrcus.com>; wangw36@chinatelecom.cn; idr <
> idr@ietf.org>
> *Subject:* Re: [Idr] [Responses for the comments during the IETF108] New
> Version Notification for draft-wang-idr-rd-orf-01.txt
>
>
>
> *[External Email. Be cautious of content]*
>
>
>
>
>
>  > Using RD-ORF can control the VPN routes limits within each VRF.
>
>
>
> If you really want to create such inconsistency within any VPN you can ask
> your vendor for a knob to locally drop on inbound received routes with
> specific RD. That also can be fully automated by setting the auto trigger
> threshold on a per VRF.
>
>
>
> The inbound drop is a very low cost operation so will be of no CPU issue.
>
>
>
> You will then be able to use such *local* knob as an additional safety
> fuse.
>
>
>
> There is however no need to propagate this anywhere nor to pass it from RR
> to upstream PEs. Such knob can exist on RRs as well if you even further
> want to completely break your user's happiness.
>
>
>
> I see no need and I stay by original position that this proposed protocol
> extension is a bad one and I do not support it to proceed any further nor
> to be adopted as an IDR WG document.
>
>
>
> Kind regards,
>
> Robert
>
>
>
>
>
> On Fri, Aug 7, 2020 at 3:20 AM Aijun Wang <wangaijun@tsinghua.org.cn>
> wrote:
>
> Hi, Robert and Gyan:
>
>
>
> The problem is similar as that for “BGP Maximum-Prefix” and should be
> control plane related issue.
>
> No matter what’s the capabilities of the router, there is always the roof
> for its performance.
>
> And in large network deployment, there still exist the possibility that
> one or some PEs are misconfigured/attacked etc.
>
> We should not only control the PE behavior at network edge(for example,
> using BGP Maximum-Prefix feature), but also need to consider the risk
> within the network.
>
>
>
> RTC is one kind of method to control the routes propagation within the
> network, but it is not enough.
>
> RTC can filter the VRF routes it doesn’t want to, but it can’t suppress
> the VPN routes it wants.  Using RD-ORF can control the VPN routes limits
> within each VRF.
>
>
>
>
>
> Best Regards
>
>
>
> Aijun Wang
>
> China Telecom
>
>
>
> *From:* Robert Raszuk [mailto:robert@raszuk.net]
> *Sent:* Friday, August 7, 2020 7:05 AM
> *To:* Aijun Wang <wangaijun@tsinghua.org.cn>; wangw36@chinatelecom.cn
> *Cc:* Keyur Patel <keyur@arrcus.com>; idr <idr@ietf.org>; Gyan Mishra <
> hayabusagsm@gmail.com>
> *Subject:* Re: [Idr] [Responses for the comments during the IETF108] New
> Version Notification for draft-wang-idr-rd-orf-01.txt
>
>
>
> Folks,
>
>
>
> I think we need to step back and first understand what is the problem.
>
>
>
> Statements "overload of the PE" .. "overwhelmed PE" etc ... are really not
> helpful. Neither are sufficient to justify this work based on the statement
> "we need more then one solution" etc ....
>
>
>
> What exactly is being considered a problem here ?
>
>
>
> 1. Running out of RAM in control plane ?
>
> 2. Running out of CPU in control plane ?
>
> 3. Not being able to import VPNv4 routes to a VRFs due to not enough
> control plane memory ?
>
> 4. Not being able to import VPNv4 routes to a VRFs due to not enough data
> plane memory ?
>
>
>
> And please do not say "all of the above" as it will also not much
> productive.
>
>
>
> While stating the above please indicate which vendors have been tested and
> do not meet feature wise sufficient protection.
>
>
>
> Many thx,
>
> R.
>
>
>
>
>
>
>
> On Fri, Aug 7, 2020 at 12:50 AM Gyan Mishra <hayabusagsm@gmail.com> wrote:
>
>
>
>
>
> On Thu, Aug 6, 2020 at 7:29 AM Aijun Wang <wangaijun@tsinghua.org.cn>
> wrote:
>
> Hi, Gyan and Robert:
>
>
>
> Maximum Prefix Limit is one method to control the routes between PE and
> CE, but we should not depend only on it.
>
>
>
>    You can use maximum prefix along with an inbound filter prefix list or
> as path or community match for whatever style routing control desired.
>
>
>
> From a PE standpoint you have not explained why using the per VRF prefix
> limit to limit the size of the per VRF rib.  Please explain why that does
> not solve the problem.
>
>
>
> RD-ORF can limit the influence scope of misbehavior PE as small as
> possible.
>
>
>
>     I don’t think you want to use RD-ORF as that would drop all routes
> from a PE and RTC does the job well only advertising RTs imported on the
> PE.  I think it would be rare if ever that anyone would ever filter on RD.
>
>
>
> RT-ORF can suppress the routes from unwanted VRFs, but can’t suppress the
> overflow routes in VRF that it is interested.
>
>
>
>
>
>
>
> More details responses are inline below.
>
> Aijun Wang
>
> China Telecom
>
>
>
> On Aug 6, 2020, at 18:02, Gyan Mishra <hayabusagsm@gmail.com> wrote:
>
> 
>
>
>
> Hi Robert
>
>
>
> I am in agreement as you stated that most service providers from my
> experience use the per VRF prefix limit to protect resources.  Problem
> solved as you said 20+ years ago.
>
>
>
> That is a general rule of thumb for any service providers to perform due
> diligence on their PE memory resource carving per VRF and set it
> appropriately based on platform and total number of VRFs to account for.
>
>
>
> Problem solved on the SP end.
>
>
>
> On the customer end, they can also use the maximum prefix peer command as
> well to prevent flood of routes in case of unwanted advertisements from
> unintentional VRF leaking by providers.
>
>
>
> Kind Regards
>
>
>
> Gyan
>
>
>
>
>
> On Thu, Aug 6, 2020 at 5:49 AM Robert Raszuk <robert@raszuk.net> wrote:
>
> Hi Gyan,
>
>
>
> Thank you for your comments - all very valid observations.
>
>
>
> Just to perhaps clarify one thing ... Problem authors are attempting to
> address - the way I understand it - is that given resource may be suffering
> from actually legitimate VPN routes hence to use RTC indeed a lot of
> additional RTs would have to be applied.
>
>
>
> But I do not understand why authors fail to recognize that solution for
> their problem has been invented and implemented over 20 years ago already.
> The solution is to control on a per *ingress* VRF basis number of VPN
> routes customer is authorized to inject into his VPN with eBGP PE-CE prefix
> limit.
>
>
>
> [WAJ] we have mentioned prefix limit solutions in the draft and analysis
> its applicability scope.
>
>
>
> Most SPs offering L3VPNs use prefix limit successfully to protect their
> shared resources for vast majority of customers and deployments. For VPN
> customers with unpredictable amount of routing CSC model should be used
> instead.
>
>
>
> By all means filtering and dropping accepted into SP network VPN route
> should not take place.
>
>
>
> Thx,
> R.
>
>
>
>
>
>
>
>
>
>
>
> On Thu, Aug 6, 2020 at 11:41 AM Gyan Mishra <hayabusagsm@gmail.com> wrote:
>
> Hi Aijun
>
>
>
> I agree with Robert that you cannot filter by RD or you would drop all the
> routes and filtering must be done by RT.  Also the issue with RT ORF filter
> is as Robert mentioned that you may have the same prefix with two different
> RTs which is common unique by RD and so the ORF would drop the prefixes.
>
>
>
> [WAJ] Such situation can only happen at the extraVPN scenarios which
> should be designed carefully——one must keep the prefixes in these VRFs
> not overlap. But if the prefixes in these VRFs are not overlap, why do we
> need to separate them in different VRFs?
>
> In conclusion, this is just corner case and should be avoided in design.
>
>
>
>
>
>
>
> I am not sure I understand what problem you are trying to solve that is
> not already solved by RTC membership so that only RTs imported by the PE
> are what is advertised by the RR.  That is most effective way of cutting
> down the RT flooding that occurs in the RR to PE advertisement.  RT
> filtering is enabled by Default on all PEs and only if the RT is imported
> on the PE are the RTs accepted into the vpn rib. That works pretty well in
> cutting down RT advertisements by the RR.
>
>
>
> As Robert mentioned each VRF has a maximum prefix which is defined on the
> PE RIBs per VRF and in general on most current or even hardware within the
> last 10 years is a minimum 1M prefixes per VRF is pretty standard with most
> vendors and platforms.  The vpn rib limit is much much higher on the higher
> end platforms.
>
>
>
> You draft talks about inter-as issues solved with RT-ORF.  So when PE-PE
> inter-as option B by default all RTs are dropped due to default RT
> filtering and only RTs that are accepted are those RTS that are explicitly
> being imported on the PE ASBR.  There is an option for retain route-target
> all that disabled the default RT filtering so that all VPN routes can be
> accepted on the inter-as option B link.  However a RT filter can still be
> applied to the retian-route-target all so that only pertinent RTs are
> accepted inter domain.  That seems to work pretty well.
>
>
>
> As far as inter-as option C, the PE-PE ASBRs do not maintain the VPN RIB.
> BGP LU is enabled on the inter-as link for end to end LSP by importing the
> loopback between ASs for the end to end LSPto be built.   The RRs between
> the SPs have eBGP VPN IPv4 VPN IPV6 peer with next hop unchanged so the
> data plane gets built between the PEs.  The RR by default does not have RT
> filtering enabled by default as does the PE, so is able to reflect all the
> vpn routes learned to all PEs within each AS.  In the inter-as scenario as
> well RTC works very well with the RT membership to cut down on RR to PE vpn
> route advertisements.
>
>
>
> Kind Regards
>
>
>
> Gyan
>
>
>
> On Wed, Aug 5, 2020 at 12:49 PM Aijun Wang <wangaijun@tsinghua.org.cn>
> wrote:
>
> Hi, Robert:
>
>
>
> Aijun Wang
>
> China Telecom
>
>
>
> On Aug 6, 2020, at 00:14, Robert Raszuk <robert@raszuk.net> wrote:
>
> 
>
>
>
> [WAJ] The VPN routes imported in these VRFs can’t use the same RD, or
> else, the VPN prefixes in different VRFs will collision on RR.
>
>
>
> Nothing will "collide" on RRs.
>
>
>
> NLRI = RD+Prefix  not just the RD.
>
>
>
> [WAJ] The prefix part can be overlap in different VRF. If the RD is same,
> RD+Prefix will also be overlap.
>
> We must make sure different VRF use different RD to make the VPN prefixes
> unique within the domain.
>
>
>
> So you may have completely different prefixes sourced by the same VRF
> going to completely different VRFs on same or different PEs.
>
>
>
>
>
> [WAJ] This situation is for extraVPN communication, and should be designed
> carefully to avoid the address collision..
>
> If the address space in different VRF need to be considered in such
> manner, putting them in one VRF may be more straightforward.
>
>
>
> Kind regards,
> R.
>
>
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr
> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/idr__;!!NEt6yMaO-gk!SSHG20ZmwUSGrSuTtfa4JNe7b713829oIhwBxGXTcW3O1752RosOFtA-a4DS9kU$>
>
> --
>
>
> <https://urldefense.com/v3/__http:/www.verizon.com/__;!!NEt6yMaO-gk!SSHG20ZmwUSGrSuTtfa4JNe7b713829oIhwBxGXTcW3O1752RosOFtA-4CH5VmU$>
>
> <https://www.google.com/maps/search/13101+Columbia+Pike+%0D%0A+Silver%0D%0A+Spring,+MD?entry=gmail&source=g>
>
> *Gyan Mishra*
>
> *Network Solutions Architect *
>
>
>
> *M 301 502-1347 13101 Columbia Pike
> <https://urldefense.com/v3/__https:/www.google.com/maps/search/13101*Columbia*Pike**BSilver*Spring,*MD?entry=gmail&source=g__;KyvCoCsrKw!!NEt6yMaO-gk!SSHG20ZmwUSGrSuTtfa4JNe7b713829oIhwBxGXTcW3O1752RosOFtA-TvDTsPA$>
> *Silver Spring, MD
> <https://urldefense.com/v3/__https:/www.google.com/maps/search/13101*Columbia*Pike**BSilver*Spring,*MD?entry=gmail&source=g__;KyvCoCsrKw!!NEt6yMaO-gk!SSHG20ZmwUSGrSuTtfa4JNe7b713829oIhwBxGXTcW3O1752RosOFtA-TvDTsPA$>
>
>
>
> --
>
>
> <https://urldefense.com/v3/__http:/www.verizon.com/__;!!NEt6yMaO-gk!SSHG20ZmwUSGrSuTtfa4JNe7b713829oIhwBxGXTcW3O1752RosOFtA-4CH5VmU$>
>
>
> <https://www.google.com/maps/search/13101+Columbia+Pike+%0D%0A+Silver%0D%0A+Spring,+MD?entry=gmail&source=g>*Gyan
> Mishra*
>
> *Network Solutions Architect *
>
>
>
> *M 301 502-1347 13101 Columbia Pike
> <https://urldefense.com/v3/__https:/www.google.com/maps/search/13101*Columbia*Pike*Silver*Spring,*MD?entry=gmail&source=g__;KysrKys!!NEt6yMaO-gk!SSHG20ZmwUSGrSuTtfa4JNe7b713829oIhwBxGXTcW3O1752RosOFtA-4bIdg-w$>
> *Silver Spring, MD
> <https://urldefense.com/v3/__https:/www.google.com/maps/search/13101*Columbia*Pike*Silver*Spring,*MD?entry=gmail&source=g__;KysrKys!!NEt6yMaO-gk!SSHG20ZmwUSGrSuTtfa4JNe7b713829oIhwBxGXTcW3O1752RosOFtA-4bIdg-w$>
>
>
>
> --
>
>
> <https://urldefense.com/v3/__http:/www.verizon.com/__;!!NEt6yMaO-gk!SSHG20ZmwUSGrSuTtfa4JNe7b713829oIhwBxGXTcW3O1752RosOFtA-4CH5VmU$>
>
> *Gyan Mishra*
>
> <https://www.google.com/maps/search/13101+Columbia+Pike+%0D%0A+Silver+Spring,+MD?entry=gmail&source=g>
>
> *Network Solutions Architect *
>
>
>
> *M 301 502-1347 13101 Columbia Pike
> <https://www.google.com/maps/search/13101+Columbia+Pike+%0D%0A+Silver%0D%0A+Spring,+MD?entry=gmail&source=g>
> *Silver Spring, MD
> <https://www.google.com/maps/search/13101+Columbia+Pike+%0D%0A+Silver+Spring,+MD?entry=gmail&source=g>
>
>
>
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr
>
-- 

<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *



*M 301 502-134713101 Columbia Pike *Silver Spring, MD