| < draft-ietf-l2vpn-vpls-inter-domain-redundancy-05.txt | draft-ietf-l2vpn-vpls-inter-domain-redundancy-07.txt > | |||
|---|---|---|---|---|
| Networking Working Group Z. Liu | Networking Working Group Z. Liu | |||
| Internet-Draft China Telecom | Internet-Draft China Telecom | |||
| Intended status: Standards Track L. Jin | Intended status: Standards Track L. Jin | |||
| Expires: October 12, 2014 | Expires: November 17, 2014 | |||
| R. Chen | R. Chen | |||
| ZTE Corporation | ZTE Corporation | |||
| D. Cai | D. Cai | |||
| S. Salam | S. Salam | |||
| Cisco | Cisco | |||
| April 10, 2014 | May 16, 2014 | |||
| Redundancy provisioning for VPLS Inter-domain | Redundancy Mechanism for Inter-domain VPLS Service | |||
| draft-ietf-l2vpn-vpls-inter-domain-redundancy-05 | draft-ietf-l2vpn-vpls-inter-domain-redundancy-07 | |||
| Abstract | Abstract | |||
| In many existing Virtual Private LAN Service (VPLS) deployments based | In many existing Virtual Private LAN Service (VPLS) inter-domain | |||
| on RFC 4762, inter-domain connectivity has been deployed without node | deployments (based on RFC 4762), pseudowire (PW) connectivity offers | |||
| redundancy, or with node redundancy in a single domain. This | no Provider Edge (PE) node redundancy, or offers PE node redundancy | |||
| document describes a solution for inter-domain VPLS based on RFC 4762 | only with a single domain. This deployment approach incurs a high | |||
| with node and link redundancy in both domains. | risk of service interruption, since at least one domain will not | |||
| offer PE node redundancy. This document describes an inter-domain | ||||
| VPLS solution that provides PE node redundancy across domains. | ||||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on October 12, 2014. | This Internet-Draft will expire on November 17, 2014. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2014 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 23 ¶ | skipping to change at page 2, line 25 ¶ | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Conventions used in this document . . . . . . . . . . . . . . 3 | 2. Conventions used in this document . . . . . . . . . . . . . . 3 | |||
| 3. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 3. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 4. Network Use Case . . . . . . . . . . . . . . . . . . . . . . . 4 | 4. Network Use Case . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 5. PW redundancy application procedure for inter-domain | 5. PW redundancy application procedure for inter-domain | |||
| redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . 6 | redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 5.1. ICCP switchover condition . . . . . . . . . . . . . . . . 6 | 5.1. ICCP switchover condition . . . . . . . . . . . . . . . . 6 | |||
| 5.1.1. Inter-domain PW failure . . . . . . . . . . . . . . . 6 | 5.1.1. Inter-domain PW failure . . . . . . . . . . . . . . . 6 | |||
| 5.1.2. PE node isolation . . . . . . . . . . . . . . . . . . 6 | 5.1.2. PE node isolation . . . . . . . . . . . . . . . . . . 6 | |||
| 5.1.3. PE node failure . . . . . . . . . . . . . . . . . . . 6 | 5.1.3. PE node failure . . . . . . . . . . . . . . . . . . . 6 | |||
| 5.2. Inter-domain redundancy with two-PWs . . . . . . . . . . . 6 | 5.2. Inter-domain redundancy with two-PWs . . . . . . . . . . . 7 | |||
| 5.3. Inter-domain redundancy with four-PWs . . . . . . . . . . 7 | 5.3. Inter-domain redundancy with four-PWs . . . . . . . . . . 7 | |||
| 6. Management Considerations . . . . . . . . . . . . . . . . . . 8 | 6. Management Considerations . . . . . . . . . . . . . . . . . . 9 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 9 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 9 | |||
| 8. IANA Consideration . . . . . . . . . . . . . . . . . . . . . . 9 | 8. IANA Consideration . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 9 | 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 9 | 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 11.1. Normative references . . . . . . . . . . . . . . . . . . . 10 | 11.1. Normative references . . . . . . . . . . . . . . . . . . . 10 | |||
| 11.2. Informative references . . . . . . . . . . . . . . . . . . 10 | 11.2. Informative references . . . . . . . . . . . . . . . . . . 10 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 1. Introduction | 1. Introduction | |||
| In many existing Virtual Private LAN Service (VPLS) deployments based | In many existing Virtual Private LAN Service (VPLS) deployments based | |||
| on [RFC4762], inter-domain connectivity has been deployed without | on [RFC4762], pseudowire (PW) connectivity offers no Provider Edge | |||
| node redundancy, or with node redundancy in a single domain. This | (PE) node redundancy, or offers PE node redundancy only with a single | |||
| document is to provide a service protection mechanism for inter- | domain. This deployment approach incurs a high risk of service | |||
| domain VPLS based on [RFC4762]. The protection mechanism will | interruption, since at least one domain will not offer PE node | |||
| provide edge node redundancy and link redundancy in both domains. | redundancy. This document describes an inter-domain VPLS solution | |||
| The domain in this document refers to autonomous system (AS), or | that provides PE node redundancy across domains. The redundancy | |||
| other administrative domains. | mechanism will provide PE node redundancy and link redundancy in both | |||
| domains. The PE throughout the document refers to a routing and | ||||
| bridging capable PE defined in [RFC4762] section 10. The domain in | ||||
| this document refers to autonomous system (AS), or other | ||||
| administrative domains. | ||||
| The solution relies on the use of ICCP [I-D.ietf-pwe3-iccp] to | The solution relies on the use of Inter-Chassis Communication | |||
| coordinate between redundant edge nodes, and use of Pseudowire (PW) | Protocol (ICCP) [I-D.ietf-pwe3-iccp] to coordinate between the two | |||
| Preferential Forwarding Status Bit [RFC6870] to negotiate the PW | redundant edge nodes, and use of PW Preferential Forwarding Status | |||
| status. There is no change to any protocol message formats and no | Bit [RFC6870] to negotiate the PW status. There is no change to any | |||
| new protocol options introduced. This solution is a description of | protocol message formats and no new protocol options are introduced. | |||
| reusing existing protocol building blocks to achieve the desired | This solution is a description of reusing existing protocol building | |||
| function, but also defines implementation behaviour necessary for the | blocks to achieve the desired function, but also defines | |||
| function to work. | implementation behavior necessary for the function to work. | |||
| 2. Conventions used in this document | 2. Conventions used in this document | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| 3. Motivation | 3. Motivation | |||
| Inter-AS VPLS offerings are widely deployed in service provider | Inter-AS VPLS offerings are widely deployed in service provider | |||
| networks today. Typically, the ASBRs and associated physical links | networks today. Typically, the Autonomous System Border Router | |||
| that connect the domains carry a multitude of services. As such, it | (ASBR) and associated physical links that connect the domains carry a | |||
| is important to provide link and node redundancy, to ensure service | multitude of services. As such, it is important to provide PE node | |||
| high availability and meet end customer service level | and link redundancy, to ensure service high availability and meet the | |||
| agreements(SLAs). | end customer service level agreements (SLAs). | |||
| Several current deployments of inter-AS VPLS are implemented like | Several current deployments of inter-AS VPLS are implemented like | |||
| Inter-AS option A in [RFC4364] section 10, where VLANs are used to | inter-AS option A in [RFC4364] section 10, where Virtual Local Area | |||
| hand-off the services between two domains. In these deployments, | Network (VLAN) is used to hand-off the services between two domains. | |||
| link/node redundancy is achieved using MC-LAG (Multi-Chassis Link | In these deployments, PE node/link redundancy is achieved using | |||
| Aggregation) and [I-D.ietf-pwe3-iccp]. This, however, places two | Multi-Chassis Link Aggregation (MC-LAG) and ICCP | |||
| restrictions on the interconnection: the two domains must be | [I-D.ietf-pwe3-iccp]. This, however, places two restrictions on the | |||
| interconnected using Ethernet links, and the links must be | interconnection: the two domains must be interconnected using | |||
| homogeneous, i.e. of the same speed, in order to be aggregated. | Ethernet links, and the links must be homogeneous, i.e. of the same | |||
| These two conditions cannot always be guaranteed in live deployments. | speed, in order to be aggregated. These two conditions can not | |||
| For instance, there are many scenarios where the interconnect between | always be guaranteed in live deployments. For instance, there are | |||
| the domains uses Packet over Sonet/SDH (POS), thereby ruling out the | many scenarios where the interconnection between the domains uses | |||
| applicability of MC-LAG as a redundancy mechanism. As such, from a | Packet over Synchronous Optical Networking (SONET) / Synchronous | |||
| technical point of view, it is desirable to use PWs to interconnect | Digital Hierarchy (SDH), thereby ruling out the applicability of MC- | |||
| the VPLS domains, and to offer resiliency using PW redundancy | LAG as a redundancy mechanism. As such, from a technical point of | |||
| mechanisms. | view, it is desirable to use PWs to interconnect the VPLS domains, | |||
| and to offer resiliency using PW redundancy mechanisms. | ||||
| MP-BGP can be used for VPLS inter-domain protection, as described in | Multiprotocol Border Gateway Protocol (MP-BGP) can be used for VPLS | |||
| [RFC6074], using either option B or option C inter-AS models. | inter-domain protection, as described in [RFC6074], using either | |||
| However, with this solution, the protection time relies on BGP | option B or option C inter-AS models. However, with this solution, | |||
| control plane convergence. In certain deployments, with tight SLA | the protection time relies on BGP control plane convergence. In | |||
| requirements on availability, this mechanism may not provide the | certain deployments, with tight SLA requirements on availability, | |||
| desired failover time characteristics. Furthermore, in certain | this mechanism may not provide the desired failover time | |||
| situations MP-BGP is not deployed for VPLS. The redundancy solution | characteristics. Furthermore, in certain situations MP-BGP is not | |||
| described in this document reuses ICCP [I-D.ietf-pwe3-iccp] and PW | deployed for VPLS. The redundancy solution described in this | |||
| redundancy [RFC6718] to provide fast convergence. | document reuses ICCP [I-D.ietf-pwe3-iccp] and PW redundancy [RFC6718] | |||
| to provide fast convergence. | ||||
| Furthermore, in the case where Label Switched Multicast is not used | Furthermore, in the case where Label Switched Multicast is not used | |||
| for VPLS multicast [RFC7117], the solution described here provides a | for VPLS multicast [RFC7117], the solution described here provides a | |||
| better behavior compared to inter-AS option B: with option B, each | better behavior compared to inter-AS option B: with option B, each PE | |||
| Provider Edge (PE) must perform ingress replication to all other PEs | must perform ingress replication to all other PEs in its local as | |||
| in its local as well as the remote domain. Whereas, with the ICCP | well as the remote domain. Whereas, with the ICCP solution, the PE | |||
| solution, the PE only replicates to local PEs and to the Autonomous | only replicates to local PEs and to the ASBR. The ASBR then sends | |||
| System Border Router (ASBR). The ASBR then sends traffic P2P to the | traffic point-to-point to the remote ASBR, and the remote ASBR | |||
| remote ASBR, and the remote ASBR replicates to its local PEs. As a | replicates to its local PEs. As a result, the load of replication is | |||
| result, the load of replication is distributed and is more efficient | distributed and is more efficient than option B. | |||
| than option B. | ||||
| Two PW redundancy modes defined in [RFC6718], namely independent mode | Two PW redundancy modes defined in [RFC6718], namely independent mode | |||
| and master/slave mode, are applicable in this solution. In order to | and master/slave mode, are applicable in this solution. In order to | |||
| maintain control plane separation between two domains, the | maintain control plane separation between two domains, the | |||
| independent mode is preferred by operators. The master/slave mode | independent mode is preferred by operators. The master/slave mode | |||
| provides some enhanced capabilities and, hence, is included in this | provides some enhanced capabilities and, hence, is included in this | |||
| document. | document. | |||
| 4. Network Use Case | 4. Network Use Case | |||
| skipping to change at page 5, line 23 ¶ | skipping to change at page 5, line 26 ¶ | |||
| |PE2|---|-| PE4 |-|-----------------|--| PE6 ||----|PE8| | |PE2|---|-| PE4 |-|-----------------|--| PE6 ||----|PE8| | |||
| +---+ | +-----+ | standby PW2 | +-----+| +---+ | +---+ | +-----+ | standby PW2 | +-----+| +---+ | |||
| | | | | | | | | | | |||
| | | | | | | | | | | |||
| | RG1 | | RG2 | | | RG1 | | RG2 | | |||
| +---------+ +---------+ | +---------+ +---------+ | |||
| operator A network operator B network | operator A network operator B network | |||
| Figure 1 | Figure 1 | |||
| Figure 2 presents a four-PWs inter-domain VPLS redundancy use-case. | Figure 2 presents a four-PWs inter-domain VPLS redundancy use case. | |||
| PE3/PE4/PE5/PE6 may be ASBRs of their respective AS, or VPLS PEs | PE3/PE4/PE5/PE6 may be ASBRs of their respective AS, or VPLS PEs | |||
| within its own AS. A deployment example of this use case is where | within its own AS. A deployment example of this use case is where | |||
| there are four physical links between two domains and four PEs are | there are four physical links between two domains and four PEs are | |||
| physically connected with each other with four links. | physically connected with each other with four links. | |||
| +---------+ +---------+ | +---------+ +---------+ | |||
| +---+ | +-----+ | | +-----+| +---+ | +---+ | +-----+ | | +-----+| +---+ | |||
| |PE1|---|-| PE3 |-|--------PW1------|--| PE5 ||----|PE7| | |PE1|---|-| PE3 |-|--------PW1------|--| PE5 ||----|PE7| | |||
| | | | | |-|-PW3\ /------|--| || | | | | | | | |-|-PW3\ /------|--| || | | | |||
| +---+\ |/+-----+ | \ / | +-----+\ /+---+ | +---+\ |/+-----+ | \ / | +-----+\ /+---+ | |||
| skipping to change at page 6, line 16 ¶ | skipping to change at page 6, line 20 ¶ | |||
| PW redundancy application procedures are described in section 9.1 of | PW redundancy application procedures are described in section 9.1 of | |||
| [I-D.ietf-pwe3-iccp]. When a PE node encounters a failure, the other | [I-D.ietf-pwe3-iccp]. When a PE node encounters a failure, the other | |||
| PE takes over. This document reuses the PW redundancy mechanism | PE takes over. This document reuses the PW redundancy mechanism | |||
| defined in[I-D.ietf-pwe3-iccp], with new ICCP switchover conditions | defined in[I-D.ietf-pwe3-iccp], with new ICCP switchover conditions | |||
| as specified in following section. | as specified in following section. | |||
| There are two PW redundancy modes defined in [RFC6870]: Independent | There are two PW redundancy modes defined in [RFC6870]: Independent | |||
| mode and Master/Slave mode. For the inter-domain four-PW scenario, | mode and Master/Slave mode. For the inter-domain four-PW scenario, | |||
| it is required for PEs to ensure that the same mode is supported on | it is required for PEs to ensure that the same mode is supported on | |||
| the two ICCP peers in the same RG. One method to ensure mode | the two ICCP peers in the same RG. This can be achieved using manual | |||
| consistency is by manual operation. Other methods are also possible | configuration at the ICCP peers. Other methods for ensuring | |||
| and are out of the scope of this document. | consistency are out of the scope of this document. | |||
| 5.1. ICCP switchover condition | 5.1. ICCP switchover condition | |||
| 5.1.1. Inter-domain PW failure | 5.1.1. Inter-domain PW failure | |||
| When a PE receives advertisements from the active PE, in the same RG, | When a PE receives advertisements from the active PE, in the same RG, | |||
| indicating that all the inter-domain PW status has changed to DOWN/ | indicating that all the inter-domain PW status has changed to DOWN/ | |||
| STANDBY, then if it has the highest priority (after the advertising | STANDBY, then if it has the highest priority (after the advertising | |||
| PE), it SHOULD advertise active state for all of its associated | PE), it SHOULD advertise active state for all of its associated | |||
| inter-domain PWs. | inter-domain PWs. | |||
| 5.1.2. PE node isolation | 5.1.2. PE node isolation | |||
| When a PE detects failure of all PWs to the local domain, it SHOULD | When a PE detects failure of all PWs to the local domain, it SHOULD | |||
| advertise standby state for all its inter-domain PWs to trigger | advertise standby state for all its inter-domain PWs to trigger | |||
| remote PE to switchover. | remote PE to switchover. | |||
| 5.1.3. PE node failure | 5.1.3. PE node failure | |||
| When a PE node detects that the active PE, that is member of the same | When a PE node detects that the active PE, that is a member of the | |||
| RG, has gone down, if the local PE has redundant PWs for the affected | same RG, has gone down, if the local PE has redundant PWs for the | |||
| services and has the highest priority (after the failed PE), it | affected services and has the highest priority (after the failed PE), | |||
| advertises the active state for all associated inter-domain PWs. | it SHOULD advertise the active state for all associated inter-domain | |||
| PWs. | ||||
| 5.2. Inter-domain redundancy with two-PWs | 5.2. Inter-domain redundancy with two-PWs | |||
| In this use case, it is recommended that the operation be as follows: | In this use case, it is recommended that the operation be as follows: | |||
| o ICCP deployment option: ICCP is deployed on VPLS edge nodes in | o ICCP deployment option: ICCP is deployed on VPLS edge nodes in | |||
| both domains; | both domains; | |||
| o PW redundancy mode: independent mode only; | o PW redundancy mode: independent mode only; | |||
| o Protection architectures: 1:1(1 standby, 1 active). | o Protection architectures: 1:1(1 standby, 1 active). | |||
| The switchover rules described in section 5.1 apply. Before | The switchover rules described in section 5.1 apply. Before | |||
| deploying this inter-domain VPLS, the operators should negotiate to | deploying this inter-domain VPLS, the operators should negotiate to | |||
| configure the same PW high/low priority at two PW end-points. The | configure the same PW high/low priority at two PW end-points. The | |||
| inter-domain VPLS relationship normally involves a contractual | inter-domain VPLS relationship normally involves a contractual | |||
| process between operators, and the configuration of PW roles forms | process between operators, and the configuration of PW roles forms | |||
| part of this process. E.g, in figure 1, PE3 and PE5 MUST both have | part of this process. E.g, in figure 1, PE3 and PE5 must both have | |||
| higher/lower priority than PE4 and PE6, otherwise both PW1 and PW2 | higher/lower priority than PE4 and PE6, otherwise both PW1 and PW2 | |||
| will be in standby state. | will be in standby state. | |||
| 5.3. Inter-domain redundancy with four-PWs | 5.3. Inter-domain redundancy with four-PWs | |||
| In this use case, there are two options to provide protection: 1:1 | In this use case, there are two options to provide protection: 1:1 | |||
| and 3:1 protection. The inter-domain PWs that connect to the same PE | and 3:1 protection. The inter-domain PWs that connect to the same PE | |||
| should have proper PW priority to advertise same active/standby | should have proper PW priority to advertise same active/standby | |||
| state. E.g, in figure 2, both PW1 and PW3 connected to PE3 would | state. E.g, in figure 2, both PW1 and PW3 connected to PE3 should | |||
| advertise active/standby state. | advertise active/standby state. | |||
| For 1:1 protection model, the operation would be as follows: | For 1:1 protection model, the operation would be as follows: | |||
| o ICCP deployment option: ICCP is deployed on VPLS edge nodes in | o ICCP deployment option: ICCP is deployed on VPLS edge nodes in | |||
| both domains; | both domains; | |||
| o PW redundancy mode: independent mode only; | o PW redundancy mode: independent mode only; | |||
| o Protection architectures: 1:1(1 standby, 1 active). | o Protection architectures: 1:1(1 standby, 1 active). | |||
| The switchover rules described in section 5.1 apply. In this case, | The switchover rules described in section 5.1 apply. In this case, | |||
| the operators do not need to do any coordination of the inter-domain | the operators do not need to do any coordination of the inter-domain | |||
| PW priority. The PE detecting one PW DOWN should set the other PW to | PW priority. The PE detecting one PW DOWN SHOULD set the other PW to | |||
| STANDBY if available, and then synchronize the updated state to its | STANDBY if available, and then synchronize the updated state to its | |||
| ICCP peer. When a PE detects that the PWs from ICCP peer PE are DOWN | ICCP peer. When a PE detects that the PWs from ICCP peer PE are DOWN | |||
| or STANDBY, it should switchover as described in section 5.1.1. | or STANDBY, it SHOULD switchover as described in section 5.1.1. | |||
| There are two variants of the 3:1 protection model. We will refer to | There are two variants of the 3:1 protection model. We will refer to | |||
| them as option A and B. For option A of the 3:1 protection model, the | them as options A and B. The implementation MUST support option A, | |||
| support of Request Switchover status bit [RFC6870] is required. The | and MAY support option B. Option B will be useful when the two legacy | |||
| operation is as follows: | PEs in one domain does not support the function in this document. | |||
| The two legacy PEs still need to support PW redundancy defined in | ||||
| [RFC6870], and be configured as slave node. | ||||
| For option A of the 3:1 protection model, the support of Request | ||||
| Switchover status bit [RFC6870] is required. The operation is as | ||||
| follows: | ||||
| o ICCP deployment option: ICCP is deployed on VPLS edge nodes in | o ICCP deployment option: ICCP is deployed on VPLS edge nodes in | |||
| both domains; | both domains; | |||
| o PW redundancy mode: Independent mode with 'request switchover' bit | o PW redundancy mode: Independent mode with 'request switchover' bit | |||
| support; | support; | |||
| o Protection architectures: 3:1 (3 standby, 1 active). | o Protection architectures: 3:1 (3 standby, 1 active). | |||
| In this case, the procedure on the PE for the PW failure is per | In this case, the procedure on the PE for the PW failure is per | |||
| section 6.3 of [RFC6870], and with the following additions: | section 6.3 of [RFC6870], and with the following additions: | |||
| o When the PE detects failure of the active inter-domain PW, it | o When the PE detects failure of the active inter-domain PW, it | |||
| should switch to the other local standby inter-domain PW if | SHOULD switch to the other local standby inter-domain PW if | |||
| available, and send an updated LDP pseudowire status message with | available, and send an updated LDP PW status message with the | |||
| the 'request switchover' bit set on that local standby inter- | 'request switchover' bit set on that local standby inter-domain PW | |||
| domain PW to the remote PE; | to the remote PE; | |||
| o Local and remote PE should also update the new PW status to their | o Local and remote PE SHOULD also update the new PW status to their | |||
| ICCP peers, respectively, in Application Data Messages with PW-RED | ICCP peers, respectively, in Application Data Messages with PW-RED | |||
| Synchronization Request TLV for corresponding service, so as to | Synchronization Request TLV for corresponding service, so as to | |||
| synchronize the latest PW status on both PE sides; | synchronize the latest PW status on both PE sides. | |||
| o While waiting for the acknowledgement, the PE that sent the | o While waiting for the acknowledgement, the PE that sends the | |||
| 'request switchover' bit may receive a switchover request from its | 'request switchover' bit may receive a switchover request from its | |||
| ICCP peer's PW remote endpoint by virtue of the ICCP | ICCP peer's PW remote endpoint by virtue of the ICCP | |||
| synchronization. The PE MUST compare IP addresses with that PW | synchronization. The PE MUST compare IP addresses with that PW | |||
| remote peer. The PE with a higher IP address will ignore the | remote peer. The PE with a higher IP address SHOULD ignore the | |||
| request and continue to wait for the acknowledgement from its peer | request and continue to wait for the acknowledgement from its peer | |||
| in the remote domain. The PE with the lower IP address MUST clear | in the remote domain. The PE with the lower IP address SHOULD | |||
| 'request switchover' bit and set 'Preferential Forwarding' local | clear 'request switchover' bit and set 'Preferential Forwarding' | |||
| status bit, and update the PW status to ICCP peer. | local status bit, and update the PW status to ICCP peer. | |||
| o The remote PE receiving 'request switchover' bit will acknowledge | o The remote PE receiving 'request switchover' bit SHOULD | |||
| the request and activate the PW only when it is ready to take over | acknowledge the request and activate the PW only when it is ready | |||
| as described in section 5.1, otherwise, it MUST ignore the | to take over as described in section 5.1, otherwise, it SHOULD | |||
| request. | ignore the request. | |||
| The node isolation failure and node failure is described in section | The PE node isolation failure and PE node failure is described in | |||
| 5.1. | section 5.1. | |||
| For option B of 3:1 protection model, master/slave mode support is | For option B of 3:1 protection model, master/slave mode support is | |||
| required, and should be as follows: | required, and should be as follows: | |||
| o ICCP deployment option: ICCP is deployed on VPLS edge nodes in | o ICCP deployment option: ICCP is deployed on VPLS edge nodes in | |||
| only one domain; | only one domain; | |||
| o PW redundancy mode: master/slave only; | o PW redundancy mode: master/slave only; | |||
| o Protection architectures: 3:1 (3 standby, 1 active). | o Protection architectures: 3:1 (3 standby, 1 active). | |||
| When master/slave PW redundancy mode is employed, the network | When master/slave PW redundancy mode is employed, the network | |||
| operators of two domains must agree on which domain PEs will be | operators of two domains must agree on which domain PEs will be | |||
| skipping to change at page 8, line 35 ¶ | skipping to change at page 9, line 4 ¶ | |||
| only one domain; | only one domain; | |||
| o PW redundancy mode: master/slave only; | o PW redundancy mode: master/slave only; | |||
| o Protection architectures: 3:1 (3 standby, 1 active). | o Protection architectures: 3:1 (3 standby, 1 active). | |||
| When master/slave PW redundancy mode is employed, the network | When master/slave PW redundancy mode is employed, the network | |||
| operators of two domains must agree on which domain PEs will be | operators of two domains must agree on which domain PEs will be | |||
| master, and configure the devices accordingly. The inter-domain PWs | master, and configure the devices accordingly. The inter-domain PWs | |||
| that connect to one PE should have higher PW priority than the PWs on | that connect to one PE should have higher PW priority than the PWs on | |||
| the other PE in the same RG. The procedure on the PE for PW failure | the other PE in the same RG. The procedure on the PE for PW failure | |||
| is as follows: | is as follows: | |||
| o The PE with higher PW priority should only enable one PW active, | o The PE with higher PW priority should only enable one PW active, | |||
| and the other PWs standby. | and the other PWs standby. | |||
| o When the PE detects active PW DOWN, it should enable the other | o When the PE detects active PW DOWN, it SHOULD enable the other | |||
| local standby PW to be active with preference. Only when two | local standby PW to be active with preference. Only when two | |||
| inter-domain PWs connect to the PE are DOWN, the ICCP peer PE in | inter-domain PWs connect to the PE are DOWN, the ICCP peer PE in | |||
| the same RG would switchover as described in section 5.1. | the same RG SHOULD switchover as described in section 5.1. | |||
| The node isolation failure and node failure is described in section | The PE node isolation failure and PE node failure is described in | |||
| 5.1. | section 5.1. | |||
| 6. Management Considerations | 6. Management Considerations | |||
| When deploying the inter-domain redundancy mechanism described in | When deploying the inter-domain redundancy mechanism described in | |||
| this document, some manual operation/negotiation is required to be | this document, consistent provisioning is required for proper | |||
| done correctly and securely. E.g., each node within one RG should be | operation. The two domains must both use the same use case (section | |||
| configured with same redundancy mode; the two operators should | 5.2 or section 5.3). Within each section, all of the described modes | |||
| negotiate to configure same PW priority at two nodes. If the | and options must be provisioned identically both within each RG and | |||
| configuration consistency is broken, the inter-domain redundancy | between the RGs. Additionally, for the two-PWs redundancy options | |||
| defined in section 5.2, the two operators must also negotiate to | ||||
| configure same high/low PW priority at the two PW end-points. If the | ||||
| provisioning is inconsistent, then the inter-domain redundancy | ||||
| mechanism may not work properly. | mechanism may not work properly. | |||
| 7. Security Considerations | 7. Security Considerations | |||
| Besides the security properties of [I-D.ietf-pwe3-iccp], [RFC4762] | Besides the security properties of [I-D.ietf-pwe3-iccp] for ICCP | |||
| and [RFC6870], this document will have additional security | control plane, [RFC4762] and [RFC6870] for PW control plane, this | |||
| consideration. | document has additional security consideration for ICCP control | |||
| plane. | ||||
| ICCP is now deployed between two PEs or ASBRs, the two PEs or ASBRs | ||||
| should be connected by a well managed and highly monitored network. | ||||
| The LDP session could be secured with TCP Authentication Option | ||||
| [RFC5925]. This provides integrity and authentication for the ICCP | ||||
| messages. The LDP MD5 authentication key option, as described in | ||||
| section 2.9 of [RFC5036] MAY also be used. | ||||
| The attention of implementers and deployers is drawn to [RFC6941] and | In this document, ICCP protocol is deployed between two PEs or ASBRs. | |||
| [RFC6952] with special attention to the recommendation to use TCP-AO | The two PEs or ASBRs should only be connected by a network that is | |||
| [RFC5925] for enhanced security of LDP sessions. | well managed and whose service levels and availability are highly | |||
| monitored. This should be ensured by the operator. | ||||
| The activitiy on the inter-domain and intra-domain pseudowire may | The state flapping on the inter-domain and intra-domain PW may cause | |||
| cause security threats or be exploited to create denial of service | security threats or be exploited to create denial of service attacks. | |||
| attackes. Excessive pseudowire state flapping (e.g., by malicious | For example, excessive PW state flapping (e.g., by malicious peer | |||
| peer PE's implementation) may lead to excessive ICCP exchanges. | PE's implementation) may lead to excessive ICCP exchanges. | |||
| Implementations SHOULD provide mechanisms to perform control-plane | Implementations SHOULD provide mechanisms to perform control-plane | |||
| policing and mitigate such types of attacks. | policing and mitigate such types of attacks. | |||
| 8. IANA Consideration | 8. IANA Consideration | |||
| No IANA allocation is required in this document. | No IANA allocation is required in this document. | |||
| 9. Acknowledgements | 9. Acknowledgements | |||
| The author would like to thank Sami Boutros, Giles Heron for their | The authors would like to thank Sami Boutros, Giles Heron, Adrian | |||
| valuable comments. | Farrel, Andrew G. Malis and Stephen Kent for their valuable comments. | |||
| 10. Contributors | 10. Contributors | |||
| Daniel Cohn | Daniel Cohn | |||
| Email:daniel.cohn.ietf@gmail.com | Email:daniel.cohn.ietf@gmail.com | |||
| Yubao Wang | Yubao Wang | |||
| ZTE Corporation | ZTE Corporation | |||
| Nanjing, China | Nanjing, China | |||
| Email: wang.yubao@zte.com.cn | Email: wang.yubao@zte.com.cn | |||
| 11. References | 11. References | |||
| 11.1. Normative references | 11.1. Normative references | |||
| [I-D.ietf-pwe3-iccp] | [I-D.ietf-pwe3-iccp] | |||
| skipping to change at page 10, line 34 ¶ | skipping to change at page 10, line 46 ¶ | |||
| 11.2. Informative references | 11.2. Informative references | |||
| [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private | [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private | |||
| Networks (VPNs)", RFC 4364, February 2006. | Networks (VPNs)", RFC 4364, February 2006. | |||
| [RFC4762] Lasserre, M. and V. Kompella, "Virtual Private LAN Service | [RFC4762] Lasserre, M. and V. Kompella, "Virtual Private LAN Service | |||
| (VPLS) Using Label Distribution Protocol (LDP) Signaling", | (VPLS) Using Label Distribution Protocol (LDP) Signaling", | |||
| RFC 4762, January 2007. | RFC 4762, January 2007. | |||
| [RFC5036] Andersson, L., Minei, I., and B. Thomas, "LDP | ||||
| Specification", RFC 5036, October 2007. | ||||
| [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP | ||||
| Authentication Option", RFC 5925, June 2010. | ||||
| [RFC6074] Rosen, E., Davie, B., Radoaca, V., and W. Luo, | [RFC6074] Rosen, E., Davie, B., Radoaca, V., and W. Luo, | |||
| "Provisioning, Auto-Discovery, and Signaling in Layer 2 | "Provisioning, Auto-Discovery, and Signaling in Layer 2 | |||
| Virtual Private Networks (L2VPNs)", RFC 6074, | Virtual Private Networks (L2VPNs)", RFC 6074, | |||
| January 2011. | January 2011. | |||
| [RFC6718] Muley, P., Aissaoui, M., and M. Bocci, "Pseudowire | [RFC6718] Muley, P., Aissaoui, M., and M. Bocci, "Pseudowire | |||
| Redundancy", RFC 6718, August 2012. | Redundancy", RFC 6718, August 2012. | |||
| [RFC6941] Fang, L., Niven-Jenkins, B., Mansfield, S., and R. | ||||
| Graveman, "MPLS Transport Profile (MPLS-TP) Security | ||||
| Framework", RFC 6941, April 2013. | ||||
| [RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of | ||||
| BGP, LDP, PCEP, and MSDP Issues According to the Keying | ||||
| and Authentication for Routing Protocols (KARP) Design | ||||
| Guide", RFC 6952, May 2013. | ||||
| [RFC7117] Aggarwal, R., Kamite, Y., Fang, L., Rekhter, Y., and C. | [RFC7117] Aggarwal, R., Kamite, Y., Fang, L., Rekhter, Y., and C. | |||
| Kodeboniya, "Multicast in Virtual Private LAN Service | Kodeboniya, "Multicast in Virtual Private LAN Service | |||
| (VPLS)", RFC 7117, February 2014. | (VPLS)", RFC 7117, February 2014. | |||
| Authors' Addresses | Authors' Addresses | |||
| Zhihua Liu | Zhihua Liu | |||
| China Telecom | China Telecom | |||
| 109 Zhongshan Ave. | 109 Zhongshan Ave. | |||
| Guangzhou 510630 | Guangzhou 510630 | |||
| End of changes. 39 change blocks. | ||||
| 140 lines changed or deleted | 140 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||