draft-ietf-bess-evpn-pref-df-03.txt   draft-ietf-bess-evpn-pref-df-04.txt 
skipping to change at page 1, line 16 skipping to change at page 1, line 16
S. Boutros T. Przygienda S. Boutros T. Przygienda
VMWare W. Lin VMWare W. Lin
J. Drake J. Drake
Juniper Networks Juniper Networks
A. Sajassi A. Sajassi
S. Mohanty S. Mohanty
Cisco Systems Cisco Systems
Expires: June 24, 2019 December 21, 2018 Expires: December 27, 2019 June 25, 2019
Preference-based EVPN DF Election Preference-based EVPN DF Election
draft-ietf-bess-evpn-pref-df-03 draft-ietf-bess-evpn-pref-df-04
Abstract Abstract
The Designated Forwarder (DF) in Ethernet Virtual Private Networks The Designated Forwarder (DF) in Ethernet Virtual Private Networks
(EVPN) is defined as the PE responsible for sending Broadcast, (EVPN) is defined as the PE responsible for sending Broadcast,
Unknown unicast and Broadcast traffic (BUM) to a multi-homed Unknown unicast and Broadcast traffic (BUM) to a multi-homed
device/network in the case of an all-active multi-homing Ethernet device/network in the case of an all-active multi-homing Ethernet
Segment (ES), or BUM and unicast in the case of single-active multi- Segment (ES), or BUM and unicast in the case of single-active multi-
homing. homing.
skipping to change at page 2, line 23 skipping to change at page 2, line 23
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on June 24, 2018. This Internet-Draft will expire on December 27, 2019.
Copyright Notice Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
skipping to change at page 13, line 4 skipping to change at page 13, line 4
This document does not modify the use of the P and B bits in the This document does not modify the use of the P and B bits in the
Ethernet A-D per EVI routes [RFC8214] advertised by the PEs in the ES Ethernet A-D per EVI routes [RFC8214] advertised by the PEs in the ES
after running the DF Election, irrespective of the revertive or non- after running the DF Election, irrespective of the revertive or non-
revertive behavior in the PE. revertive behavior in the PE.
5. Security Considerations 5. Security Considerations
This document describes a DF Election Algorithm that provides This document describes a DF Election Algorithm that provides
absolute control (by configuration) over what PE is the DF for a absolute control (by configuration) over what PE is the DF for a
given Ethernet Tag. While this control is desired in many situations, given Ethernet Tag. While this control is desired in many situations,
an malicious user that gets access to the configuration of a PE in a malicious user that gets access to the configuration of a PE in the
the ES may change the behavior of the network. In other DF Algs such ES may change the behavior of the network. In other DF Algs such as
as HRW, the DF Election is more automated and cannot be determined by HRW, the DF Election is more automated and cannot be determined by
configuration. configuration.
The non-revertive capability described in this document may be seen The non-revertive capability described in this document may be seen
as a security improvement over the regular EVPN revertive DF as a security improvement over the regular EVPN revertive DF
Election: an intentional link (or node) "flapping" on a PE will only Election: an intentional link (or node) "flapping" on a PE will only
cause service disruption once, when the PE goes to NDF state. cause service disruption once, when the PE goes to NDF state.
6. IANA Considerations 6. IANA Considerations
This document solicits the allocation of the following values: This document solicits the allocation of the following values:
skipping to change at page 14, line 41 skipping to change at page 14, line 41
10. Authors' Addresses 10. Authors' Addresses
Jorge Rabadan Jorge Rabadan
Nokia Nokia
777 E. Middlefield Road 777 E. Middlefield Road
Mountain View, CA 94043 USA Mountain View, CA 94043 USA
Email: jorge.rabadan@nokia.com Email: jorge.rabadan@nokia.com
Senthil Sathappan Senthil Sathappan
Alcatel-Lucent Nokia
Email: senthil.sathappan@nokia.com Email: senthil.sathappan@nokia.com
Tony Przygienda Tony Przygienda
Juniper Networks, Inc. Juniper Networks, Inc.
Email: prz@juniper.net Email: prz@juniper.net
John Drake John Drake
Juniper Networks, Inc. Juniper Networks, Inc.
Email: jdrake@juniper.net Email: jdrake@juniper.net
Wen Lin Wen Lin
 End of changes. 6 change blocks. 
8 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/