Re: [RTG-DIR] rtgdir Last Call Review of draft-ietf-opsawg-l2nm-10

mohamed.boucadair@orange.com Mon, 15 November 2021 14:59 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F9A63A0D7B; Mon, 15 Nov 2021 06:59:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sPQGo1zYlzsC; Mon, 15 Nov 2021 06:59:12 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 949613A0D50; Mon, 15 Nov 2021 06:59:11 -0800 (PST)
Received: from opfedar06.francetelecom.fr (unknown [xx.xx.xx.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar22.francetelecom.fr (ESMTP service) with ESMTPS id 4HtC5B05cXz2yQK; Mon, 15 Nov 2021 15:59:10 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1636988350; bh=p6uD9dlkbK0QVbrxrJl1Qtpzjkg++2UFUZgGvhq8KYM=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=wWkUOcD7PDIfcEuEfX0GttfThWhdL3WO9OjfCAhM7zslsWn01mw13MzRA42by0A8t 7TnXCz+dCyoPTGH5S/7KfcOfgBoGr7lvCyT7k4idXeFgPag/J6bZIBACr3D2JP9HWA 2mCdWWtaj8VtPJROYqFpBAWVmz7euhkYChPUjGXN7nRsAUApuTe2ydSXnGXpz/RdSP VAFhdwVc+EEqYXyixqhV5Z9C0yT1ov5/swNYXwiQ/Pfkeg38jc6RX7eqtCAjS88Dma BgNJiZtyWVGYTJjaQCIDbyX3iZXEKybYDIUOIQ4MtlJGwcttroKqSDPXoQtKs3DB9X DHbl2RBNC6v3g==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfedar06.francetelecom.fr (ESMTP service) with ESMTPS id 4HtC595mF4z3wbH; Mon, 15 Nov 2021 15:59:09 +0100 (CET)
From: mohamed.boucadair@orange.com
To: "Shah, Himanshu" <hshah=40ciena.com@dmarc.ietf.org>, "rtg-dir@ietf.org" <rtg-dir@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-opsawg-l2nm.all@ietf.org" <draft-ietf-opsawg-l2nm.all@ietf.org>
CC: "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: rtgdir Last Call Review of draft-ietf-opsawg-l2nm-10
Thread-Index: AQHX1z+RLRDGgznynUK6pJQTBz/Tg6wEMYEQ
Content-Class:
Date: Mon, 15 Nov 2021 14:59:08 +0000
Message-ID: <19443_1636988349_619275BD_19443_214_1_787AE7BB302AE849A7480A190F8B9330354519A3@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <MN2PR04MB59811BAA072F74084E0F64FAAF949@MN2PR04MB5981.namprd04.prod.outlook.com>
In-Reply-To: <MN2PR04MB59811BAA072F74084E0F64FAAF949@MN2PR04MB5981.namprd04.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2021-11-15T07:11:49Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=71415b76-ac04-4923-a4d0-a284853776d5; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.114.13.247]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B9330354519A3OPEXCAUBMA2corp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-dir/A5bR8d7DVPUI8jFdyC1SGiKILoY>
Subject: Re: [RTG-DIR] rtgdir Last Call Review of draft-ietf-opsawg-l2nm-10
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Nov 2021 14:59:23 -0000

Hi Himanshu,

Many thanks for the review.

Please see inline.

Cheers,
Med

De : last-call <last-call-bounces@ietf.org> De la part de Shah, Himanshu
Envoyé : vendredi 12 novembre 2021 00:33
À : rtg-dir@ietf.org; last-call@ietf.org; draft-ietf-opsawg-l2nm.all@ietf.org
Cc : Joe Clarke (jclarke) <jclarke@cisco.com>; zhenghaomian@huawei.com; LucAndré Burdet <laburdet.ietf@gmail.com>
Objet : [Last-Call] rtgdir Last Call Review of draft-ietf-opsawg-l2nm-10


Hello,

I have been selected as the Routing Directorate reviewer for this draft. The Routing Directorate seeks to review all routing or routing-related drafts as they pass through IETF last call and IESG review, and sometimes on special request. The purpose of the review is to provide assistance to the Routing ADs. For more information about the Routing Directorate, please see ​http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir<http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir>

Although these comments are primarily for the use of the Routing ADs, it would be helpful if you could consider them along with any other IETF Last Call comments that you receive, and strive to resolve them through discussion or by updating the draft.

Document: draft-ietf-opsawg-l2nm-10.txt
Reviewer: Himanshu Shah

Review Date: 11/11/2021

IETF LC End Date: not known
Intended Status: Standards Track



Summary:



Firstly, the review request was made for revision -06- of this document, but the latest revision is -10-.

So I took the liberty to review the latest version. The document is quite comprehensive with lots of details.

I was able to consult with some of the colleagues within my company to get network management perspective.

The review comments reflect the experiences of participants in this field. I believe this would be more

helpful to the authors.

[Med] Thanks.



The document is good candidate for publication, but the comments provided should be considered and addressed

before the publication.



Comments:



Note that I am not following the provided guidelines on the issue categories (Like major/minor). I leave that

upto AD and/or authors on what level of attention they would like to provide.



Overall:

-   Resiliency/Protection aspects of the requirements/modelling need more elaboration from the access/core/service perspective.



[Med] We have in the document a fair discussion about protection matters at the access part (including multihoming, EVPN) + dedicated appendices. The resilience at the core can be handled by providing some preference of the underly transport or invoke the draft-ietf-teas-te-service-mapping-yang-09.html#name-l2nm:


module: ietf-l2nm-te-service-mapping
  augment /l2vpn-ntw:l2vpn-ntw/l2vpn-ntw:vpn-services
            /l2vpn-ntw:vpn-service:
    +--rw te-service-mapping!
       +--rw te-mapping
          +--rw map-type?                  identityref
          +--rw te-policy
          |  +--rw color?               uint32
          |  +--rw protection-type?     identityref
          |  +--rw availability-type?   Identityref

We will add a clarification about this.



o   For example – PW protection

-   Topology types may need more clarity on what is the desired end result.

o   For example – Custom or Tree topologies – what are the forwarding rules at the VPN access points.

o   Is hierarchical VPLS (H-VPLS) a consideration and how is it expressed in the model?

[Med] A basic h-vpls configuration is supported. This can be done by t-ldp-pw-type to hvpls. Some dedicated data nodes can then be used when that type is used.



-   PW characteristics should be more abstract – seems more detailed in the document while still not covering

o   Protected?

o   MS-PW?

[Med] We don’t have explicit parameters to indicate this. Will think about this further. Thanks.



-   Service Status need more elaboration. Our experience has been challenging in this area and desire more details on

its usage/semantics (e2e service, vpn-node, vpn-access, etc).



[Med] Not sure which elaboration is needed, but will double check the text and update as appropriate.



Specifics (using -10- draft)

(Do note this is best effort comments – document is too long and not entire document is scanned with fine toothcomb) –



(page 14 – last but one paragraph)

  'bfd-profile-identifier':  A Bidirectional Forwarding Detection (BFD)

      profile refers to a set of BFD [RFC5880] policies that can be

      invoked when building a VPN service.



Himanshu> Should this be a OAM-profile to accommodate OAM other than BFD?

For instance, 802.1ag, Y.1731, etc.



[Med] We are not using a generic OAM profile here because we are trying to ease the mapping with the service model (RFC 8466), which defines a bd-profile. Note also that we are importing this from the vpn-common I-D, which is used for both L3 and L2 VPNs.



(page 17 – last para)



   'vpn-service-topology':  Indicates the network topology for the

      service: hub-spoke, any-to-any, or custom.



Himanshu> What about H-VPLS? Does that type of construct fall in to "custom"

[Med] hub-spoke will be OK for H-VPLS.



Himanshu> In Custom topology, how are forwarding rules specified??

[Med] I guess this is covered by this text from the vpn-common I-D, where “custom” is defined:



“The VPN topology is controlled by the import/export policies.”



Himanshu> What about resiliency, for example, primary/backup PW

[Med] This can be handled by means of, e.g., pw-priority. Please note that we can’t be exhaustive as we are already have a very long document. Augmentations can be added in the future to zoom on specific functionalities to the base module.



(page 18)

      l2tp-signaling':  The L2NM uses L2TP-signaled Pseudowires as

         described in [RFC6074].



Himanshu> What about static PWs? Multi-segment PWs?

[Med] Already clarified above.



(page 18)

   'underlay-transport':  Describes the preference for the transport

      technology to carry the traffic of the VPN service.  This

      preference is especially useful in networks with multiple domains

      and Network-to-Network Interface (NNI) types.  The underlay

      transport can be expressed as an abstract transport instance

      (e.g., an identifier of a VPN+ instance, a virtual network

      identifier, or a network slice name) or as an ordered list of the

      actual protocols to be enabled in the network.



      A rich set of protocol identifiers that can be used to refer to an

      underlay transport (or how such an underlay is set up) are defined

      in [I-D.ietf-opsawg-vpn-common].



Himanshu> Not clear how ordered list of transport work for VPN

Spanning multiple domain and how it is pinned for each domain..

[Med] This can be handled/passed by domain-specific controllers, for example. More advanced service mapping policies are discussed in draft-ietf-teas-te-service-mapping-yang-09#section-6.3.2.



(page 23)

         'protection-type':  It defines the protection type



Himanshu> Not sure what protection-type means for MAC-loop-prevention

[Med] This identifies the loop prevent type (e.g., shut, trap, etc.). “prevention-type” would be more appropriate but we are using the same name as in the L2SM (RFC8466) to ease the mapping with the service model. Updated the description to: “It defines the loop prevention type (e.g., shut).”



(page 33)

   The VPN network access is comprised of:



   'id':  Includes an identifier of the VPN network access.



Himanshu> Should there be a "name" field as well - keeping with same pattern of identification (id, name, description)

[Med] We could … but we didn’t as we are trying to keep a similar structure for both L3NM and L2NM.



(page 33)

   'port-id':  Indicates the port on which the VPN network access is

      bound.

Himanshu> Text above says - interface-id and not port-id.

[Med] Fixed. Thanks.



 Irrespective, does interface-id refer to

or include "attachment-circuit"



[Med] Yes.



(page 34)

   'status':  Indicates the administrative and operational status of the

      service.

Himanshu> Perhaps refers to status of the access-point and not global VPN service, right?



[Med] I confirm. Fixed.



Thanks,
Himanshu


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.