draft-ietf-bess-evpn-usage-08.txt   draft-ietf-bess-evpn-usage-09.txt 
skipping to change at page 1, line 14 skipping to change at page 1, line 14
Internet Draft S. Palislamovic Internet Draft S. Palislamovic
W. Henderickx W. Henderickx
Intended status: Informational Nokia Intended status: Informational Nokia
A. Sajassi A. Sajassi
Cisco Cisco
J. Uttaro J. Uttaro
AT&T AT&T
Expires: August 20, 2018 February 16, 2018 Expires: August 28, 2018 February 24, 2018
Usage and applicability of BGP MPLS based Ethernet VPN Usage and applicability of BGP MPLS based Ethernet VPN
draft-ietf-bess-evpn-usage-08 draft-ietf-bess-evpn-usage-09
Abstract Abstract
This document discusses the usage and applicability of BGP MPLS based This document discusses the usage and applicability of BGP MPLS based
Ethernet VPN (EVPN) in a simple and fairly common deployment Ethernet VPN (EVPN) in a simple and fairly common deployment
scenario. The different EVPN procedures are explained on the example scenario. The different EVPN procedures are explained on the example
scenario, analyzing the benefits and trade-offs of each option. This scenario, analyzing the benefits and trade-offs of each option. This
document is intended to provide a simplified guide for the deployment document is intended to provide a simplified guide for the deployment
of EVPN networks. of EVPN networks.
skipping to change at page 1, line 49 skipping to change at page 1, line 49
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on August 20, 2018. This Internet-Draft will expire on August 28, 2018.
Copyright Notice Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 25, line 26 skipping to change at page 25, line 26
FIB and advertise this MAC address to all other BGP speakers via EVPN FIB and advertise this MAC address to all other BGP speakers via EVPN
NLRI. Therefore, we can assume that any active MAC address is NLRI. Therefore, we can assume that any active MAC address is
propagated and learnt through the entire EVI. Given that MAC propagated and learnt through the entire EVI. Given that MAC
addresses become pre-populated - once nodes are alive on the network addresses become pre-populated - once nodes are alive on the network
- there is no need to flood any unknown unicast towards the remote - there is no need to flood any unknown unicast towards the remote
PEs. If the owner of a given destination MAC is active, the BGP route PEs. If the owner of a given destination MAC is active, the BGP route
will be present in the local RIB and FIB, assuming that the BGP will be present in the local RIB and FIB, assuming that the BGP
import policies are successfully applied; otherwise, the owner of import policies are successfully applied; otherwise, the owner of
such destination MAC is not present on the network. such destination MAC is not present on the network.
It is worth noting that unless: a) control or management plane It is worth noting that unknown unicast flooding must not be
learning is performed through the entire EVI or b) all the EVI- suppressed, unless (at least) one of the following two statements are
attached devices signal their presence when they come up (GARPs or given: a) control or management plane learning is performed
similar), unknown unicast flooding must be enabled. throughout the entire EVI for all the MACs or b) all the EVI-attached
devices signal their presence when they come up (GARPs or similar).
9.1.4. Optimization of Inter-subnet forwarding 9.1.4. Optimization of Inter-subnet forwarding
In a scenario in which both L2 and L3 services are needed over the In a scenario in which both L2 and L3 services are needed over the
same physical topology, some interaction between EVPN and IP-VPN is same physical topology, some interaction between EVPN and IP-VPN is
required. A common way of stitching the two service planes is through required. A common way of stitching the two service planes is through
the use of an IRB interface, which allows for traffic to be either the use of an IRB interface, which allows for traffic to be either
routed or bridged depending on its destination MAC address. If the routed or bridged depending on its destination MAC address. If the
destination MAC address is the one of the IRB interface, traffic destination MAC address is the one of the IRB interface, traffic
needs to be passed through a routing module and potentially be either needs to be passed through a routing module and potentially be either
 End of changes. 4 change blocks. 
7 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.46. The latest version is available from http://tools.ietf.org/tools/rfcdiff/