datatracker.ietf.org
Sign in
Version 5.3.0, 2014-04-12
Report a bug

LSP-Ping Mechanisms for E-VPN and PBB-EVPN
draft-jain-l2vpn-evpn-lsp-ping-02

Document type: Active Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2013-10-21
Intended RFC status: Unknown
Other versions: plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: I-D Exists
Responsible AD: (None)
Send notices to: No addresses provided

Network Working Group                                   Parag Jain, Ed. 
Internet Draft                                             Sami Boutros 
Intended status: Standards Track                            Samer Salam 
Expires: April 21, 2014                                    Cisco Systems

                                                        October 21, 2013

                LSP-Ping Mechanisms for E-VPN and PBB-EVPN  
                 draft-jain-l2vpn-evpn-lsp-ping-02.txt                

Abstract 

   LSP-Ping is a widely deployed Operation, Administration, and 
   Maintenance (OAM) mechanism in MPLS networks. This document 
   describes mechanisms for detecting data-plane failures using LSP
   Ping in MPLS based E-VPN and PBB-EVPN networks.

 Status of this Memo 

   This Internet-Draft is submitted in full conformance with the 
   provisions of BCP 78 and BCP 79.  

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-
   Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other documents 
   at any time.  It is inappropriate to use Internet-Drafts as 
   reference material or to cite them other than as "work in progress." 

   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt 

   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html 

Copyright Notice 

   Copyright (c) 2013 IETF Trust and the persons identified as the 
   document authors. All rights reserved. 

   This document is subject to BCP 78 and the IETF Trust's Legal 
   Provisions Relating to IETF Documents 
   (http://trustee.ietf.org/license-info) in effect on the date of 
   publication of this document.  Please review these documents 
   carefully, as they describe your rights and restrictions with 
   respect to this document. Code Components extracted from this 
   document must include Simplified BSD License text as described in 

 
 
 
Jain                     Expires April 2014                  [Page 1] 



Internet-Draft   draft-jain-l2vpn-evpn-lsp-ping-02.txt        October 2013 
 

   Section 4.e of the Trust Legal Provisions and are provided without 
   warranty described in the Simplified BSD License. 

    

Table of Contents 

  1. Introduction                                                     2 
  2. Conventions used in this document                                3 
  3. Terminology                                                      3 
  4. Proposed Target FEC Stack Sub-TLVs                               4 
     4.1. E-VPN MAC Sub-TLV                                           4 
     4.2. E-VPN Inclusive Multicast Sub-TLV                           5 
     4.3. E-VPN Auto-Discovery Sub-TLV                                6 
  5. Operations                                                       6 
     5.1. Unicast Data-plane connectivity checks                      6 
     5.2. Inclusive Multicast Data-plane Connectivity Checks          8 
          5.2.1. Ingress Replication                                  8 
          5.2.2. Using P2MP P-tree                                    9 
          5.2.3. Controlling Echo Responses when using P2MP P-tree    10 
     5.3. E-VPN Aliasing Data-plane connectivity check                10 
  6. Security Considerations                                          10 
  7. IANA Considerations                                              10 
  8. References                                                       11 
     8.1. Normative References                                        11 
     8.2. Informative References                                      11 
  9. Acknowledgments                                                  12 
    

1. Introduction 

   [EVPN] describes MPLS based Ethernet VPN (E-VPN) technology. An E-
   VPN comprises CE(s) connected to PE(s). The PEs provide layer 2 E-
   VPN among the CE(s) over the MPLS core infrastructure. In E-VPN 
   networks, PEs advertise the MAC addresses learned from the locally 
   connected CE(s), along with MPLS Label, to remote PE(s) in the 
   control plane using multi-protocol BGP. E-VPN enables multi-homing 
   of CE(s) connected to multiple PEs and load balancing of traffic to 
   and from multi-homed CE(s). 

 
 
Jain                     Expires April 2014                  [Page 2] 
 


Internet-Draft   draft-jain-l2vpn-evpn-lsp-ping-02.txt        October 2013 
 

   [PBBEVPN] describes the use of Provider Backbone Bridging [802.1ah] 
   with E-VPN. PBB-EVPN maintains the C-MAC learning in data plane and 
   only advertises Provider Backbone MAC (B-MAC) addresses in control 
   plane using BGP. 

[include full document text]