Re: [RTG-DIR] RTG-DIR Telechat review of draft-ietf-bess-dci-evpn-overlay

"Rabadan, Jorge (Nokia - US/Mountain View)" <> Tue, 20 February 2018 22:40 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 7689D126C3D; Tue, 20 Feb 2018 14:40:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.398
X-Spam-Status: No, score=-1.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URI_NOVOWEL=0.5, WEIRD_PORT=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id HhGMH3ddDhHO; Tue, 20 Feb 2018 14:40:54 -0800 (PST)
Received: from ( [IPv6:2a01:111:f400:fe08::705]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 8C514120724; Tue, 20 Feb 2018 14:40:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=t6Sc2F1oLsteUF3Bmm55FRTk5AWTQuZCqGu2/xeQw3s=; b=mBHU4z+FWJityGmZwAF0Yi8cbOBRmnJPEhJmtp0sx1uiedosU5NEL/3RLbgPlGQq+04eOvXYcK2UH3vJXSDicqm/0snhl1Z+amWycnhCFal/ssEVm38lyS3KfbvmwMfAmzpQpjeMRkY2lGah8TLcsQPfXnY5v1uXalFfsr6O9dQ=
Received: from ( by ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.527.6; Tue, 20 Feb 2018 22:40:50 +0000
Received: from ([fe80::d9ab:cde4:3b8e:4e8e]) by ([fe80::d9ab:cde4:3b8e:4e8e%3]) with mapi id 15.20.0527.012; Tue, 20 Feb 2018 22:40:50 +0000
From: "Rabadan, Jorge (Nokia - US/Mountain View)" <>
To: Alexander Vainshtein <>, "" <>, "" <>, "" <>, "" <>
Thread-Topic: RTG-DIR Telechat review of draft-ietf-bess-dci-evpn-overlay
Thread-Index: AdOkuGiEML+eLKrlQ5Ol4wTRIHoKtgF688yA
Date: Tue, 20 Feb 2018 22:40:50 +0000
Message-ID: <>
References: <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
user-agent: Microsoft-MacOutlook/10.a.0.180210
authentication-results: spf=none (sender IP is );
x-originating-ip: []
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR07MB1652; 7:mfBiUMmbgD4INF8Xh4GP9oAR8hPhEIe+feC1AYqOsgMid8CwoXWp6b55xISsW4/OgGZM6lQL09hJeHuEN5DcdX1GoAGKlIgtjWJ7LLe3sEhpR1HSkhwNeZHOlGyXdC+47ZD+3AFC6CuxK3MQLhtMjXggcCjgwD9+8qkbt0kt6Ipl85lI97IxgL5eQxZurm8J1YzAf1eDvkZmpFK5UTRuo1bmKoYw7A3CAFvgX3yUVDQlMI9eg1TQX6Q1pBWSru9t
x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR;
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10019020)(346002)(376002)(39380400002)(366004)(39860400002)(396003)(199004)(189003)(31014005)(252514010)(3280700002)(8676002)(14454004)(478600001)(2906002)(33656002)(2900100001)(8936002)(83716003)(99286004)(229853002)(6246003)(58126008)(5890100001)(36756003)(68736007)(110136005)(5250100002)(316002)(86362001)(6486002)(2201001)(2501003)(6436002)(6116002)(236005)(82746002)(790700001)(3846002)(76176011)(25786009)(53936002)(7736002)(81156014)(6512007)(5660300001)(26005)(2950100002)(186003)(59450400001)(53946003)(53546011)(6506007)(102836004)(105586002)(9326002)(106356001)(97736004)(66066001)(3660700001)(606006)(54896002)(6306002)(81166006)(579004)(390805004); DIR:OUT; SFP:1102; SCL:1; SRVR:AM4PR07MB1652;; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
x-ms-office365-filtering-correlation-id: d7f712a4-204b-49b1-19a5-08d578b2fdea
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603307)(7193020); SRVR:AM4PR07MB1652;
x-ms-traffictypediagnostic: AM4PR07MB1652:
x-microsoft-antispam-prvs: <>
x-exchange-antispam-report-test: UriScan:(28532068793085)(192374486261705)(138986009662008)(82608151540597)(85827821059158)(97927398514766)(788757137089)(95692535739014)(18271650672692)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(10201501046)(3231101)(11241501184)(806099)(944501161)(6055026)(6041288)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123562045)(20161123558120)(6072148)(201708071742011); SRVR:AM4PR07MB1652; BCL:0; PCL:0; RULEID:; SRVR:AM4PR07MB1652;
x-forefront-prvs: 05891FB07F
received-spf: None ( does not designate permitted sender hosts)
x-microsoft-antispam-message-info: uRv2dMUXd3/GPJpQPJkh8DoVugQcKW31JvaTvkbb9LKizC8qYhpT38gscB4SWb7+RiHvXupcA/lgqAV+xzSVzwcaxp6wYOyP9WD6s52HCLUCwdBIreAxaJIqK9gHRDJfPYczjGjaSgWUWWUHfXsaHdMXeuRS5K2DquccnPYTlcVvSpJJEg1uEP03sU8eMXMnyAPJVTEhNlTAFyEaJ/bxgw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_381B20740F2C4FED8F1B245B7196A80Anokiacom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: d7f712a4-204b-49b1-19a5-08d578b2fdea
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Feb 2018 22:40:50.1032 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR07MB1652
Archived-At: <>
Subject: Re: [RTG-DIR] RTG-DIR Telechat review of draft-ietf-bess-dci-evpn-overlay
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Routing Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 20 Feb 2018 22:40:58 -0000

Hi Sasha,

Thank you very much for your thorough review.
Revision 09 (posted) addresses all your comments.
Please see in-line for more details.


From: Alexander Vainshtein <>;
Date: Wednesday, February 14, 2018 at 10:02 AM
To: ""; <>;
Cc: ""; <>;, ""; <>;, ""; <>;
Subject: RTG-DIR Telechat review of draft-ietf-bess-dci-evpn-overlay
Resent-From: <>;
Resent-To: <>;, <>;, <>;, <>;, <>;, <>;, <>;, <>;, <>;, <>;, <>;
Resent-Date: Wednesday, February 14, 2018 at 10:02 AM


I have been selected as the Routing Directorate reviewer for this draft. The Routing Directorate seeks to review all routing or routing-related drafts as they pass through IETF last call and IESG review, and sometimes on special request. The purpose of the review is to provide assistance to the Routing ADs. For more information about the Routing Directorate, please see ​

Although these comments are primarily for the use of the Routing ADs, it would be helpful if you could consider them along with any other IETF Last Call comments that you receive, and strive to resolve them through discussion or by updating the draft.
Document: draft-ietf-bess-dci-evpn-overlay-08
Reviewer: Alexander (“Sasha”) Vainshtein
Review Date: 14-Feb-18
IETF LC End Date: 09-Feb-18
Intended Status: Standards Track


I have some minor concerns about this document that I think should be resolved before publication.

The document is well written, but understanding of both the EVPN technology (RFC 7432) and network virtualization basics are mandatory prerequisites for the readers. My personal expertise in both these areas is limited, and this may affect the quality of the review.

From my POV this draft complements the EVPN Overlay<> draft (already approved by the IESG for publication as an RFC): it  discusses interaction between the EVPN Overlay within the DC with some options that implement L2 connectivity in the WAN that provides the infrastructure for the DC interconnect.

I have identified two groups of specifications in the draft:

-          Specifications in the first group explain how the mechanisms already defined in other specifications (mainly in RFCF 7432) should be used to provide DCI Interconnect that uses EVPN as the overlay within the DC. One example can be found in Section 3.5.2 that recommends usage of ARP/ND Proxy cache in the DC Gateways to prevent flooding of ARP/ND messages within the DC, many other examples can be added

-          Specifications in the second group define new behavior. One example is the proposed (in Section 3.5.1) usage of the Unknown MAC Route (UMR) to prevent overwhelming the NVEs with the need to learn zillions of MAC addresses in the remote DCs.

As part of preparation of this review I have discussed my comments with the authors who have been most responsive and cooperative -  so much so that they have addressed some of my earlier comments in the latest (-08) version of the draft. As a consequence, I had to remove the already addressed comments from the final version of my review, and to ask the authors not to post a new version before posting of the review.  I would like to express my gratitude to the authors and, especially, to Jorge for excellent cooperation.

Major Issues: None found.

Minor Issues:

1.       From my POV this draft should be marked as updating RFC 7432 in its metadata. The update should refer to several aspects including at least the following:

a.       Use of Ethernet PWs (see Figure 1 in the draft) as an Ethernet Segment. RFC 7432 defines Ethernet Segment as a set of Ethernet links that connect a customer sit to one or more PEs.

b.       Use of the Unknown MAC Route (UMR). RFC 7432 only says that a PE may flood unicast frames with unknown destination MAC to all other PEs but does not have to do that, with the decision being a matter of local policy;  it neither defines any mechanisms that advertise a specific PE and a specific Ethernet Segment attached to this PE as the “default next Hop” for all unknown destination MAC addresses, nor prevents usage of such mechanisms.
[JORGE] I marked it as updating RFC7432 and explained why in section 2.

2.       Definitions of VLAN-based and VLAN bundle-based Ethernet Segments in RFC 7432 do not cover the case of PW hand-off between the WAN and DC GW in the Decoupled model. While this looks like a straightforward extension, it should be clarified in the draft IMO.
[JORGE] I added the following at the end of section 3.3:

   If a PW-based handoff is used, the GW's AC (or point of attachment to
   the EVPN Instance) uses a combination of a PW label and VLAN IDs, as
   opposed to only VLAN IDs as in [RFC7432]. Therefore the [RFC7432]
   mapping definitions of VLAN-based, VLAN-bundle or VLAN-aware bundle
   service interfaces are updated in this document to include the PW
   label as follows:
   o VLAN-Based Service Interface: the AC mapping to the MAC-VRF is
     given by a unique combination of (PW label, optional inner VLAN
     ID). In this context "optional VLAN ID" means a unique combination
     of S/C-TAG or no tag at all. In case of no-tag, the point of
     attachment to the MAC-VRF is strictly based on the PW label and the
     service interface may be referred to as PW-Based Service Interface.
     The rest of the VLAN-Based service characteristics are as per
   o VLAN-Bundle Service Interface: the AC mapping to the MAC-VRF is
     given by a unique combination of (PW label, VLAN ID range),
     where VLAN ID range represents the S/C-TAG values included in a
     range. The rest of the VLAN-Bundle service characteristics are as
     per [RFC7432].
   o VLAN-Aware Bundle Service Interface: the AC mapping to the Bridge
     Table is given by a unique combination of (PW VC label, VLAN ID).
     In this service interface, there are multiple Bridge Tables per
     MAC-VRF, and each point of attachment to a Bridge Table has a
     different (PW label, VLAN ID) combination. The rest of the VLAN-
     Aware Bundle service characteristics are as per [RFC7432].

3.       The UMR and its encoding (defined in Section 3.5 of this draft) already have been defined in RFC 7543<https://ilptlppjir01:8443/secure/Dashboard.jspa>. I suggest to remove the UMR definition from the text and to replace it with a Normative reference to RFC 7543. At the same time RFC 7543 and this draft seem to use the UMR differently, and these differences should also be clarified in the draft.
[JORGE] Done:


   The solution specified in this document uses the 'Unknown MAC Route'
   (UMR) which is advertised into a given DC by each of the DC's GWs.
   This route is defined in [RFC7543] and is a regular EVPN MAC/IP
   Advertisement route in which the MAC Address Length is set to 48, the
   MAC address is set to 0, and the ESI field is set to the DC GW's I-

   It is worth noting that the UMR usage in [RFC7543] and the UMR usage
   in this document are different. In the former, a Virtual Spoke (V-
   spoke) does not necessarily learn all the MAC addresses pertaining to
   hosts in other V-spokes of the same network. The communication
   between two V-spokes is done through the DMG, until the V-spokes
   learn each other's MAC addresses. In this document, two leaf switches
   in the same DC are recommended to learn each other's MAC addresses
   for the same EVI. The leaf to leaf communication is always direct and
   does not go through the GW.

4.       The draft presents two DC Interconnect models (shown in Figure 1 and Figure 2 respectively): Decoupled Interconnect and Integrated Interconnect. These diagrams create an impression that the same model must be used in all the interconnected DCs – but this impression is wrong. Actually (clarified that with the authors) the model is a local issue between a specific DC GW and WAN, so that the same interconnect can use the Decoupled model in the GWs of some DCs and Integrated model in the GWs of other DCs.
[JORGE] added this in the introduction:

   The specified procedures are local to the redundant GWs connecting a
   DC to the WAN. The document does not preclude any combination across
   different DCs for the same tenant. For instance, a "Decoupled"
   solution can be used in GW1 and GW2 (for DC1) and an "Integrated"
   solution can be used in GW3 and GW4 (for DC2).

5.       The EVPN Overlay draft defines two modes for implementing DC Interconnect: using DC GWs and using ASBRs. Both models (Decoupled and Integrated Interconnect) discussed in this draft are actually sub-models of the model of DC Interconnect that uses GWs. The draft actually mentions that, but quite late - in the Security Considerations section where I, for one, would not be looking for this kind of information at all. I would suggest moving this clarification to the Introduction section and only keeping the text that deals with the security benefits of the GW-based model in Section 5. (Aside: The draft has successfully passed the SecDir review, so I hope that such a change would not cause any issues.)
[JORGE] done.

6.       In Section 4.2 the draft discusses Integrated DC interconnect that uses VPLS in WAN. It refers to RFC 4761, RFC 4762 and RFC 6074 for the definition of VPLS and says (in section 4.2.1) that “different route-targets for the DC and for the WAN are usually required.” Since BGP in general and RTs specifically are not relevant for VPLS based on RFC 4762, the corresponding exception should be added to the text.
[JORGE] added.
Note that different route-targets for the DC and for the WAN are normally required (unless [RFC4762] is used in the WAN, in which case no WAN route-target is needed).

7.       In section 4.2.1 the draft also says that “the GWs will be provisioned with I-ESI” where I-ESI stands for the Interconnect Ethernet Segment Identifier. But this is all about the Integrated Interconnect – so what represents  the Interconnect Ethernet Segment (to be identified by I-ESI) in this model?
[JORGE] added:
The I-ES in this case will represent the group of PWs to the WAN PEs and GWs.

8.       Both Section 4.2.1 and Section 4.4.6 mention a local Attachment Circuit (AC) on the DC GW (in the latter case – as one of the advantages of the DC Interconnect solution that uses EVPN-MPLS in the WAN). But such ACs are not shown in the diagram depicting the Integrated model. Some clarifying text would be helpful. In particular, it would be nice to explain why local ACs are considered as benefits of the Integrated DC Interconnect solution that uses EVPN-MPLS in the WAN if they are also possible in the Integrated DC Interconnect solution that uses VPLS (at least as implied by them being mentioned in section 4.2.1).
[JORGE] I clarified section 4.4.6 and mentioned that the figures don’t show supported ACs.

9.       Section 4.6 discussed the Integrated DC Interconnect solution that uses EVPN-VXLAN in the WAN. Other encapsulations (e.g., MPLS in GRE) are not discussed. It would be nice if the authors could clarify the reasons for including one encapsulation and excluding all others.
[JORGE] Done.


I did not check the draft for typos. I would only like to mention that the draft mentions (in several places) “existing Technical Specifications” as if they were Royalty - looks a bit exaggerated to me.

[JORGE] ok, I changed it to simply specifications in some cases, or lower case “technical specifications”.


Office: +972-39266302
Cell:      +972-549266302


This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.