Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-05
Tony Przygienda <tonysietf@gmail.com> Sat, 11 December 2021 12:07 UTC
Return-Path: <tonysietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF08D3A05A7 for <lsr@ietfa.amsl.com>; Sat, 11 Dec 2021 04:07:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2E4rJyE8c6fb for <lsr@ietfa.amsl.com>; Sat, 11 Dec 2021 04:07:31 -0800 (PST)
Received: from mail-il1-x129.google.com (mail-il1-x129.google.com [IPv6:2607:f8b0:4864:20::129]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 873063A059F for <lsr@ietf.org>; Sat, 11 Dec 2021 04:07:31 -0800 (PST)
Received: by mail-il1-x129.google.com with SMTP id j21so10781032ila.5 for <lsr@ietf.org>; Sat, 11 Dec 2021 04:07:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/Zf/OwzWqRA37iXvND4SnsXEkBEV4eUOGmt22Jku0WE=; b=fhHCNFX51+xsy7VTbWt/bpwyXnF9U4RWzPrxTJAdGTtltW8AGS+chOTM0r8pPwpBGU W8ZW1jiTf+5auvFDUqXcS7RAlgsDFhpPYBEsenwLNjaU1YJbgSOCCQ9J97s5aG0in4Qe ea7zHQuxMdNEWo2lKfI5dQ60WTbgFa4/2r6+/rQV+Pt5aGClZvGwsQMMHTB2Fq3K9l3G NJKBUDYpIEq1LRX5qqP5PmNLC2DZCicVs1rUR7pKeD124uxZ8cwaXYdH7iq1VHvFBTQ9 LqCncKLudpgyQ4iyTqCmHyDVtmI4uQ2HNwO+b3miXIE0TyeCci/JMVuGOpNjrYkpE4K1 s1lg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/Zf/OwzWqRA37iXvND4SnsXEkBEV4eUOGmt22Jku0WE=; b=ar+USUjmxM/IiTsFFP0+WhP6NRbcdLGduNJapnuIJzpWTEolD4gyN+UPew0MyU+19H PPTgz7YKHOYC7YWsPausebJKPJ3Q7PzL4GKTD9cJ2r6wqzQdWsSr6+MrDCFmTmZzD7Gc I//MAofCGzjMKTdt9dJIYnkqg8ZJqE7p6bHYaJycWsTwCgBNhd/BTAW+gj3FSFueBvuw DcRRfWWUopCY09eZK6lhWodJ+0HItv3gatPLExLBIneMRYTL+R0pJyMFSzKQ2Cgwdeih kDPVN5Hqtud8LP65EcNxtxShTji9/GMFUBqv1Kf9yF9CoWlJ2Hx/j0dAAeVDfnqIsfNB js2w==
X-Gm-Message-State: AOAM530xJfUZuyOtD8CgIBvfmAzuNFbabdeFXrEH6HdAIiS1j9m8Vx30 Gf76dUfHt2nc9gwmE9HKvnjySxJQbY3M/YATx5o=
X-Google-Smtp-Source: ABdhPJzJzYRnaYUQilS3g1Xj+cXtgxC3JffoPedrJt08JYWiTJkoXBSY7McVZrtqGLzv4humNtASEvZjH7/uYBCOfd0=
X-Received: by 2002:a05:6e02:1445:: with SMTP id p5mr24839232ilo.164.1639224449245; Sat, 11 Dec 2021 04:07:29 -0800 (PST)
MIME-Version: 1.0
References: <CA+wi2hNGXmmNOPN-XozN=FM==nvkjivM5Nx9kyWvdHk8Cu0F2Q@mail.gmail.com> <20B66900-5202-4A7C-A4D4-D1352D31D84D@tsinghua.org.cn>
In-Reply-To: <20B66900-5202-4A7C-A4D4-D1352D31D84D@tsinghua.org.cn>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Sat, 11 Dec 2021 13:06:52 +0100
Message-ID: <CA+wi2hNguHEyvwwPA4w7E1pb9jwx8OhYKA78rs00kmEspKvRoA@mail.gmail.com>
To: Aijun Wang <wangaijun@tsinghua.org.cn>
Cc: lsr <lsr@ietf.org>, "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, "Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="00000000000001277805d2ddaf34"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/FAo0aD2dK0tQYVYDoPEPC80yg-Q>
Subject: Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-05
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Dec 2021 12:07:36 -0000
let's be more precise beyond sensationalist headlines ... Though it's nice you found our documentation and based on that make first technical argument ;-) a) transitory loops during convergence/tunnel setup may exist, those also exist during normal ISIS convergence. Simple implementation techniques used in other contexts since many years exist like e.g. holding the router in overload until converged. That can be also easily implemented if e.g. a FR client has no FR tunnel established. A draft/spec is not an implementation description however so techniques deployed can be very different and starting to put that in will lead to overspecification. b) let's split the rest assuming full convergence scenario into tunnel; and no L1 tunnels case ib.) L1 tunnel case when all tunnels in place/converged is simple, it's identical really to any shortcut forwarding where the next hop is a tunnel, the packet just shows up magically @ the egress. this is AFAIS simpler option to understand and deploy correctly. If you harbor fears and doubts about the whole thing or looping potential, just use this. b.ii) no tunnel case is more delicate (but hotly desired by many [arguably sophisticated] customers hence the work). If the SPF is implemented correctly no routing loops exist when converged. This preconditions also correct leaking of L1 into L2 (hence the "all egress MUST be clients", it could work with a mix but the draft gets unnecessarily complex) and section 5.2 of the draft provides the necessary implementation on SPF to prevent loops in every case. However, as the documentation you found says it is easier to ensure that L1 metrics when deployed are shorter than L2 metrics so the L1->L2 route always takes preference towards the egress and not rely on the correct SPF preferece outside metric comparison. As footnote: redistributing prefixes in ISIS is always delicate, nothing new here, L1->L2->L1 was originally forbidden and only works with the RFC and lots of tightly kept pref rules. With enough inventive re-distribution on a system around the RFC and fiddiling via policy with redistributed route properties you can loop up normal ISIS as well BTW. c) ECMP, yes, as our doc says it's not looping but it can be changed when using b.ii) unless whole network is forklifted to flood reflection and e.g. omits ECMP computed over FR adjacencies which again, is an implementation technique that is optional complexity since FR adjacencies are not forwarding (one could make them taht and stuff would still work but then we would have all kind of restrictions on tunnels like e.g. XoUDP to ECMP inside L1 and ultimately shove e'thing though FRs, most customers think that doing L2 hot potato forwarding out the area is actually far preferred IME). And no, you will never achieve the same "globally optimal" routing through the whole topology in L2 when abstracting some L1 things except when you advertise a full mesh of links reflecting all ingress-egress metrics in L2 being basically L1 shortest path (or assume that all ingress/egress connections have infinite/same metric, it's called a chassis or more precisely a switching fabric then ;-). Beside scaling very poorly as the draft explains this can also cause a single link failing in L1 to cause a havoc of advertisements in L2 and if you are experienced in operational matters this is the last things you desire. In more abstract control theory terms you are building with such a solution a negatively stable system of control loops or in simpler terms an invisible big blast radius. Good for fighter planes, very bad for networking if you experienced those effects. hope that's enough details, none of this is BTW pure speculation but output of implemenation and extensive testing. --- tony On Sat, Dec 11, 2021 at 8:48 AM Aijun Wang <wangaijun@tsinghua.org.cn> wrote: > Please refer to “Routing Loops” section that described in your company’s > documents: > > https://www.juniper.net/documentation/en_US/junos/topics/concept/understanding-isis-flood-reflectors.html#jd0e162 > > This is just the simplest transit scenario. I am worrying for its further > applications. > > The overall routing path for L2 topologies that connected by several L1 is > not determined by one L2 SPF algorithm, how can you assure no loop occur? > > Is it nightmare or mess for the operator to run its network in such > challenges situations? > > Aijun Wang > China Telecom > > On Dec 11, 2021, at 02:02, Tony Przygienda <tonysietf@gmail.com> wrote: > > > What you describe is not technical reality when you're dealing with SPF in > L2 ... You seem to be deeply confused (but honestly, I have a hard time to > even figure out what kind of assumptions you're making about all kind of > things in all those threads about IGPs these days and on what but personal > preferences all those claims of "better" things are based) by the simple > fact that there is only a single connected L2 area ever in ISIS, if you > partition L2 you do not run ISIS within its viable envelope anymore, with > or without extensions. And L2 SPF will never loop and flood reflector draft > does not change the path taken in L2 so by first order logic you won't > loop. That is BTW one of the reasons why you will want to deploy multiple > flood reflectors per L1 (to not partition L2). > > As Acee pointed out, unlike OSPF (discounting alternate ABR behavior) L2 > could in ISIS from day one use L1 to "traverse across" (if you squint a bit > ;-) in a sense and those drafts just improve the behavior so we are not > even architecturally changing the topological properties of the protocol > (whatever that means without delving deeply into graph theory definitions > ;-) > > -- tony > > On Fri, Dec 10, 2021 at 1:40 AM Aijun Wang <wangaijun@tsinghua.org.cn> > wrote: > >> Hi, Acee: >> >> No, I think the WG participations would like to enjoy the interested and >> correct direction topics. >> One technical considerations is the following: if IGP evolved into this >> direction, then the following connections loop diagram is also possible: >> L2-L1-L2-L1-L2-L1-…..-L2(back to the origin) >> Then, will we introduce the “AS number” to avoid loop, and various “Path >> Attributes” to influence the path selection within the IGP? >> >> There is a rush to adopt this draft, we should not rush again to >> accomplish its WG last call. >> >> >> Aijun Wang >> China Telecom >> >> On Dec 9, 2021, at 10:07, Acee Lindem (acee) <acee= >> 40cisco.com@dmarc.ietf.org> wrote: >> >> >> >> Hi Aijun, >> >> >> >> At least I’ve had several discussions with authors on the draft and >> you’ll note my comments on the list. The lack of further discussion on the >> list is a general problem in LSR. It seems many WG participants only want >> to discuss the draft that they have authored and it is hard to get comment >> without forcing the issue without an adoption or last call. I’m expecting >> at least one more review on the draft. Technical comments on the draft >> would be appreciated. >> >> >> >> Thanks, >> Acee >> >> >> >> *From: *Aijun Wang <wangaijun@tsinghua.org.cn> >> *Date: *Wednesday, December 8, 2021 at 11:15 AM >> *To: *Acee Lindem <acee@cisco.com> >> *Cc: *"Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, "lsr@ietf.org" < >> lsr@ietf.org> >> *Subject: *Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" >> -draft-ietf-lsr-isis-flood-reflection-05 >> >> >> >> Hi, Acee: >> >> >> >> I found there is no any technical discussion on the list for the >> mentioned draft after its adoption(from 2020-7-6), even before its adoption. >> >> There is only one presentation for its update at the IETF 111 meeting(1 >> pages, 5 minutes) and after it’s presentation at IETF 112, the WG Last Call >> is issued. >> >> >> >> From the authors’ statement, there is only the author’s affiliation >> implemented it, no interoperability problems can be found. >> >> >> >> From the discussion in these days, it is doubtful for IGP to evolve into >> this direction as behaved by BGP. >> >> >> >> From the POV of the operator, we will not consider such strange design to >> scale the IS-IS. >> >> >> >> From the documents itself, there are unsolved problems (for example in >> section 7) which can only be solved by “sending alarm and declare >> misconfiguration). >> >> >> >> Then, why it is ready to WG Last Call? >> >> >> >> >> >> Aijun Wang >> >> China Telecom >> >> >> >> On Dec 8, 2021, at 06:28, Acee Lindem (acee) <acee= >> 40cisco.com@dmarc.ietf.org> wrote: >> >> Hi Les, >> >> >> >> *From: *"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> >> *Date: *Tuesday, December 7, 2021 at 5:10 PM >> *To: *"Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, Acee >> Lindem <acee@cisco.com>, "lsr@ietf.org" <lsr@ietf.org> >> *Subject: *RE: [Lsr] WG Last Call fo "IS-IS Flood Reflection" >> -draft-ietf-lsr-isis-flood-reflection-05 >> >> >> >> Let me try to respond to Acee/Tony/Tony in one email. >> >> >> >> Acee – I don’t like any of the proposals. I believe they are all abusing >> the protocols to some degree. >> >> >> >> That’s fine if you have technical concerns with the individual drafts. >> The problem space discussion is a moot point since the WG has already >> adopted these documents. >> >> >> >> Thanks, >> >> Acee >> >> >> >> I fully believe that the authors are clever enough to figure out how to >> make this work – but that doesn’t mean any of them are desirable. >> >> So if I have to “vote” – I vote “no”. >> >> >> >> Tony Li – >> >> >> >> Area Proxy Introduction says in part: >> >> >> >> “Following the current rules of IS-IS, all spine routers would >> >> necessarily be part of the Level 2 topology, plus all links between a >> >> Level 2 leaf and the spines. In the limit, where all leaves need to >> >> support Level 2, it implies that the entire L3LS topology becomes >> >> part of Level 2. This is seriously problematic as it more than >> >> doubles the LSDB held in the L3LS topology and eliminates any >> >> benefits of the hierarchy.” >> >> >> >> Flood Reflection says: >> >> >> >> “In such scenarios, an >> >> alternative approach is to consider multiple L2 flooding domains >> >> connected together via L1 flooding domains. In other words, L2 >> >> flooding domains are connected by "L1/L2 lanes" through the L1 areas >> >> to form a single L2 backbone again. Unfortunately, in its simplest >> >> implementation, this requires the inclusion of most, or all, of the >> >> transit L1 routers as L1/L2 to allow traffic to flow along optimal >> >> paths through such transit areas. Consequently, this approach fails >> >> to reduce the number of L2 routers involved, so it fails to increase >> >> the scalability of the L2 backbone.” >> >> >> >> >> >> These problem statements seem fundamentally similar to me. >> >> >> >> No question the two drafts define very different solutions – but the >> problem statements seem quite similar to me. >> >> >> >> Tony P – I would argue that a “20K perspective” is useful when deciding >> whether the overall approach is a good one. >> >> >> >> And in response to Tony Li’s statement: “…the IETF is at its best when >> it is documenting de facto standards” >> >> >> >> 1) I fully believe that our customers understand their requirements(sic) >> better than we (vendors) do. But that does not mean that they understand >> what is the best solution better than we do. >> >> When a customer comes to me and says “Can you do this?” my first response >> is usually “Please fully describe your requirements independent of the >> solution.” >> >> >> >> 2)Not clear to me that there is an existing “de facto standard” here – >> which is reinforced by the fact that we have so many different solutions >> proposed. >> >> >> >> Les >> >> >> >> >> >> >> >> *From:* Acee Lindem (acee) <acee=40cisco.com@dmarc.ietf.org> >> *Sent:* Tuesday, December 7, 2021 10:31 AM >> *To:* Les Ginsberg (ginsberg) <ginsberg@cisco.com>; Acee Lindem (acee) < >> acee@cisco.com>; lsr@ietf.org >> *Subject:* Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" >> -draft-ietf-lsr-isis-flood-reflection-05 >> >> >> >> Hi Les, >> >> >> >> *From: *Lsr <lsr-bounces@ietf.org> on behalf of "Les Ginsberg >> (ginsberg)" <ginsberg=40cisco.com@dmarc.ietf.org> >> *Date: *Tuesday, December 7, 2021 at 1:17 PM >> *To: *"Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, " >> lsr@ietf.org" <lsr@ietf.org> >> *Subject: *Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" >> -draft-ietf-lsr-isis-flood-reflection-05 >> >> >> >> When I look at this request, I see it in a larger context. >> >> >> >> There are two drafts which attempt to address the same problem in very >> different ways: >> >> >> >> https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-flood-reflection/ >> >> >> >> and >> >> >> >> https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-area-proxy/ >> >> >> >> Both of them discuss in their respective introductions the motivation – >> which is to address scaling issues in deployment scenarios where the >> existing IS-IS hierarchy is being asked to “stand on its head” i.e., >> interconnection between different L1 areas is not to be achieved by >> utilizing an L2 backbone – rather it is the L1 areas themselves which are >> required to be used for interconnection of sites (e.g., two datacenters) >> and the scaling properties of the existing protocol hierarchy when used in >> this way are not attractive. >> >> >> >> I find no technical basis on which to choose between the two proposed >> solutions – so in my mind a last call for “Flood-Reflection” presupposes a >> last call for “Area Proxy” – and therein lies my angst. >> >> The end result will be that multiple incompatible solutions to the same >> problem will be defined. It will then be left to customers to try to >> determine which of the solutions seems best to them – which in turn will >> put the onus on vendors to support both solutions (depending on the set of >> customers each vendor supports). >> >> This – to me – represents an utter failure of the standards process. We >> are reduced to a set of constituencies which never find common ground – the >> end result being sub-optimal for the industry as a whole. >> >> >> >> It seems to me that the proper role of the WG is to address the big >> questions first: >> >> >> >> 1)Is this a problem which needs to be solved by link-state protocols? >> >> We certainly have folks who are clever enough to define solutions – the >> two drafts are a proof of that. >> >> But whether this is a wise use of the IGPs I think has never been fully >> discussed/answered. >> >> Relevant to this point is past experience with virtual links in OSPF – >> use of which was problematic and which has largely fallen out of use. >> >> Also, many datacenters use BGP (w or w/o IGP) and therefore have other >> ways to address such issues. >> >> Although I am familiar with the “one protocol is simpler” argument, >> whether that justifies altering the IGPs in any of the proposed ways is >> still an important question to discuss. >> >> >> >> Given the discussions of these solutions over the last two years in LSR, >> I don’t think we need to rehash this – especially on the experimental >> track. >> >> >> >> 2)If link state protocols do need to solve this problem, what is the >> preferred way to do that? >> >> This requires meaningful dialogue and a willingness to engage on complex >> technical issues. >> >> >> >> The alternative is to do what we seem to be doing – allowing multiple >> solutions to move forward largely without comment. In which case I see no >> basis on which to object – anyone who can demonstrate a deployment case >> should then be allowed to move a draft forward – and there are then no >> standardized solutions. >> >> (The Experimental Track status for these drafts reflects that reality.) >> >> >> >> Are you saying you don’t want any experimental solutions unless we have >> one standardized solution that everybody agrees on? Please review this one >> as part of WG last call. >> >> >> >> Thanks, >> >> Acee >> >> >> >> Les >> >> >> >> P.S. (Aside: There is a third draft offering a solution in this space >> https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-ttz/ - but as that >> draft continues to promote its primary usage as a means of more easily >> changing area boundaries (merging/splitting) I have not discussed it here. >> However, if the authors of that draft claim it as a solution to the same >> problem space claimed by Area Proxy/Flood Reflection then the WG would have >> no basis but to also progress it – which would result in three solutions >> being advanced.) >> >> >> >> >> >> >> >> *From:* Lsr <lsr-bounces@ietf.org> *On Behalf Of *Acee Lindem (acee) >> *Sent:* Monday, November 22, 2021 11:47 AM >> *To:* lsr@ietf.org >> *Subject:* [Lsr] WG Last Call fo "IS-IS Flood Reflection" >> -draft-ietf-lsr-isis-flood-reflection-05 >> >> >> >> This begins the WG Last for draft-ietf-lsr-isis-flood-reflection-05. >> Please post your support or objection to this list by 12:00 AM UTC on Dec 14th >> , 2021. Also please post your comments on the draft. I’m allowing as >> extra week as I like to get some additional reviews – although my comments >> have been addressed. >> >> >> >> Thanks, >> Acee >> >> >> >> _______________________________________________ >> Lsr mailing list >> Lsr@ietf.org >> https://www.ietf.org/mailman/listinfo/lsr >> >> _______________________________________________ >> Lsr mailing list >> Lsr@ietf.org >> https://www.ietf.org/mailman/listinfo/lsr >> > _______________________________________________ > Lsr mailing list > Lsr@ietf.org > https://www.ietf.org/mailman/listinfo/lsr > >
- [Lsr] WG Last Call fo "IS-IS Flood Reflection" -d… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Jeff Tantsura
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Parag Kaneriya
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… zhang.zheng
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Lee, Yiu
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Chris Bowers
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Les Ginsberg (ginsberg)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Li
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Les Ginsberg (ginsberg)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Li
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Li
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Christian Hopps
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Jeff Tantsura
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Gyan Mishra
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Les Ginsberg (ginsberg)