One document matched: draft-ietf-l3vpn-bgpvpn-auto-06.txt

Differences from draft-ietf-l3vpn-bgpvpn-auto-05.txt




L3VPN WG                                              Hamid Ould-Brahim 
Internet Draft                                                   Nortel 
Expiration Date: December 2005 
                                                          Eric C. Rosen 
                                                          Cisco Systems 
                                                                        
                                                          Yakov Rekhter 
                                                       Juniper Networks 
                                                                        
                                                              (Editors) 
                                                                        
                                                              June 2005                                                              
 
    
                    Using BGP as an Auto-Discovery 
                Mechanism for Layer-3 and Layer-2 VPNs 
                                      
                  draft-ietf-l3vpn-bgpvpn-auto-06.txt 
 
 
    
Status of this Memo 
     
   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware 
   have been or will be disclosed, and any of which he or she becomes 
   aware will be disclosed, in accordance with Section 6 of BCP 79." 
 
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that      
   other groups may also distribute working documents as Internet-
   Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other documents 
   at any time.  It is inappropriate to use Internet-Drafts as 
   reference material or to cite them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 
   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html. 
   
Abstract 
    
   In any Layer-3 and Layer-2 VPN scheme, the Provider Edge (PE) 
   devices attached to a common VPN must exchange certain information 
   as a prerequisite to establish VPN-specific connectivity. The main 
   purpose of an auto-discovery mechanism is to enable a PE to 
   dynamically discover the set of remote PEs having VPN members in 
   common. The auto-discovery mechanism proceeds by having a PE 
   advertises to other PEs, at a minimum, its own IP address and the 
 
Ould-Brahim & Rosen & Rekhter                                [Page 1] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
   list of VPN members configured on that PE. Once that information is 
   received the remote PEs will then identify the list of VPN members 
   they have in common with the advertising PE, and use the information 
   carried within the discovery mechanism to either establish layer-2/3 
   VPN connectivity or to learn remote site VPN routes. This draft 
   defines a BGP based auto-discovery mechanism for layer-2 VPN 
   architectures and Virtual router-based layer-3 VPNs. This mechanism 
   is based on the approach used by BGP/MPLS-IP-VPN for distributing 
   VPN routing information within the service provider(s). In the 
   context of L2VPNs, an auto-discovery mechanism enables a PE to 
   determine the set of other PEs having VPN members in common along 
   with information relative to each specific L2VPN endpoints such as 
   attachment circuit identifier, topology information, etc. Each VPN 
   scheme uses the mechanism to automatically discover the information 
   needed by that particular scheme.  
 
 
1. Introduction 
 
 
   In any Layer-2 and Layer-3 VPN scheme, the Provider Edge (PE) 
   devices attached to a common VPN must exchange certain information 
   as a prerequisite to establish VPN-specific connectivity. An auto-
   discovery mechanism allows a PE to dynamically discover the set of 
   remote PEs having VPN members in common. The auto-discovery 
   mechanism proceeds by having a PE advertises to other PEs, at a 
   minimum, its own IP address and the list of VPN members configured 
   on that PE. Once that information is received the remote PEs will 
   then identify the list of VPN members they have in common with the 
   advertising PE, and use the information carried within the discovery 
   mechanism to either establish layer-2/3 VPN connectivity or to learn 
   remote site VPN routes. 
    
   The purpose of this draft is to define a BGP based auto-discovery 
   mechanism for layer-2 VPNs (i.e., [VPLS-BGP], [L2VPN-ROSEN], [VPLS-
   LDP]) and layer-3 VPNs based on Virtual Router (VR) [VPN-VR] 
   solution. This mechanism is based on the approach used by [BGP/MPLS-
   IP-VPN] for distributing VPN routing information within the service 
   provider(s). Each VPN scheme uses the mechanism to automatically 
   discover the information needed by that particular scheme. Layer-2 
   and layer-3 VPN solutions that plan to use BGP-based auto-discovery 
   must comply with the general encoding proposed in this document. 
    
    
   In [BGP/MPLS-IP-VPN], VPN-specific routes are exchanged, along with 
   the information needed to enable a PE to determine which routes 
   belong to which VRFs.  
    
   In VR model, virtual router (VR) addresses must be exchanged, along 
   with the information needed to enable the PEs to determine which VRs 
   are in the same VPN ("membership"), and which of those VRs are to 
   have VPN connectivity ("topology"). Once the VRs are reachable 

 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 2] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
   through the tunnels, routes ("reachability") are then exchanged by 
   running existing routing protocols per VPN basis.  
    
   In the context of L2VPNs, an auto-discovery mechanism enables a PE 
   to determine the set of other PEs having VPN members in common along 
   with information relative to each specific L2VPN endpoints such as 
   attachment circuit identifier, topology information, etc. 
 
   The BGP-4 multiprotocol extensions are used to carry various 
   information about VPNs for both layer-2 and layer-3 VPN 
   architectures. VPN-specific information associated with the NLRI is 
   encoded either as attributes of the NLRI, or as part of the NLRI 
   itself, or both.   
 
    
2. Provider-Provisioned VPN Reference Model  
    
   Both the layer-2 and layer-3 vpn architectures ([VPLS-BGP],[VPLS-
   LDP], [L2VPN-ROSEN], [VPN-VR], [BGP/MPLS-IP-VPN]) are using a 
   network reference model as illustrated in figure 1. 
 
                     PE                         PE 
               +--------------+             +--------------+ 
   +--------+  | +----------+ |             | +----------+ | +--------+             
   |  VPN-A |  | |  VPN-A   | |             | |  VPN-A   | | |  VPN-A |  
   |  Sites |--| |Database /| |  BGP route  | | Database/| |-|  sites | 
   +--------+  | |Processing| |<----------->| |Processing| | +--------+              
               | +----------+ | Distribution| +----------+ | 
               |              |             |              | 
   +--------+  | +----------+ |             | +----------+ | +--------+             
   | VPN-B  |  | |  VPN-B   | |  --------   | |   VPN-B  | | |  VPN-B | 
   | Sites  |--| |Database /| |-(Backbones)-| | Database/| |-|  sites | 
   +--------+  | |Processing| |  --------   | |Processing| | +--------+ 
               | +----------+ |             | +----------+ |  
               |              |             |              | 
   +--------+  | +----------+ |             | +----------+ | +--------+             
   | VPN-C  |  | |  VPN-C   | |             | |   VPN-C  | | |  VPN-C | 
   | Sites  |--| |Database /| |             | | Database/| |-|  sites | 
   +--------+  | |Processing| |             | |Processing| | +--------+ 
               | +----------+ |             | +----------+ |  
               +--------------+             +--------------+ 
 
 
                Figure 1: Network based VPN Reference Model 
     
 
   It is assumed that the PEs can use BGP to distribute information to 
   each other. This may be via direct IBGP peering, via direct EBGP 
   peering, via multihop BGP peering, through intermediaries such as 
   Route Reflectors, through a chain of intermediate BGP connections, 
   etc. It is assumed also that the PE knows what VPN architecture it 
   is supporting. 
   
 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 3] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
 
3. Carrying VPN information in BGP Multi-Protocol (BGP-MP) Attributes 
 
   The BGP-4 multiprotocol extensions are used to carry various 
   information about VPNs for both layer-2 and layer-3 VPN 
   architectures. VPN-specific information associated with the NLRI is 
   encoded either as attributes of the NLRI, or as part of the NLRI 
   itself, or both.  The addressing information in the NLRI field is 
   ALWAYS within the VPN address space, and therefore MUST be unique 
   within the VPN. The address specified in the BGP next hop attribute, 
   on the other hand, is in the service provider addressing space.  
    
    
    
3.1 Carrying Layer-3 VPN Information in BGP-MP  
    
   This is done as follows.  The NLRI is a VPN-IP address or a labeled 
   VPN-IP address. In the case of the virtual router, the NLRI address 
   prefix is an address of one of the virtual routers configured on the 
   PE. That address is used by the VRs to establish routing adjacencies 
   and tunnel to each other [VPN-VR]. In the case of BGP/MPLS-IP-VPN, 
   the NLRI prefix represents a route to an arbitrary system or set of 
   systems within the VPN. 
    
3.2 Carrying Layer-2 VPN Information in BGP-MP  
    
    
   The NLRI in BGP-MP attribute carries Layer-2 VPN information, 
   which we will refer to as VPN-L2 information.  A VPN-L2 information 
   carried in the NLRI is composed of a quantity beginning with 
   an 8 bytes Route Distinguisher (RD) field and a variable length 
   quantity (see section 5 for specific encodings of this quantity). 
 
   Different layer-2 VPN solutions use the same common AFI, but 
   different SAFI. The AFI indicates that the NLRI is carrying a VPN-L2 
   information, while the SAFI indicates solution-specific semantics 
   and syntax of the VPN-l2 address that goes after the RD. The RD must 
   be chosen so as it ensures that each NLRI is globally unique (i.e., 
   the same NLRI does not appear in two VPNs).  
    
 
   BGP Route target extended community is used to constrain route 
   distribution between PEs. The BGP Next hop carries the service 
   provider tunnel endpoint address. 
    
   This draft doesn't preclude the use of additional extended 
   communities for encoding specific l2vpn parameters. 
 
    
4. Interpretation of VPN Information in Layer-3 VPNs 
    
4.1 Interpretation of VPN Information in the BGP/MPLS-IP-VPN Model 
    
 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 4] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
   For details see [BGP/MPLS-IP-VPN]. 
    
4.2 Interpretation of VPN Information in the VR Model 
    
4.2.1 Membership Discovery 
    
   The VPN-ID format as defined in [RFC-2685] is used to identify a 
   VPN. All virtual routers that are members of a specific VPN share 
   the same VPN-ID. A VPN-ID is carried in the NLRI to make addresses 
   of VRs globally unique. Making these addresses globally unique is 
   necessary if one uses BGP for VRs' auto-discovery. 
 
    
4.2.1.1 Encoding of the VPN-ID in the NLRI 
    
   For the virtual router model, the VPN-ID is carried within the route 
   distinguisher (RD) field. In order to hold the 7-bytes VPN-ID, the 
   first byte of RD type field is used to indicate the existence of the 
   VPN-ID format. A value of 0x80 in the first byte of RD's type field 
   indicates that the RD field is carrying the VPN-ID format. In this 
   case, the type field range 0x8000-0x80ff will be reserved for the 
   virtual router case. 
    
    
4.2.1.2 VPN-ID Extended Community 
    
   A new extended community is used to carry the VPN-ID format. This 
   attribute is transitive across the Autonomous system boundary. The 
   type field of the VPN-ID extended community is of regular type to be 
   assigned by IANA [BGP-COMM]. The remaining 7 bytes hold the VPN-ID 
   value field as per [RFC-2685]. The BGP UPDATE message will carry 
   information for a single VPN. It is the VPN-ID Extended Community, 
   or more precisely route filtering based on the Extended Community 
   that allows one VR to find out about other VRs in the same VPN.  
 
 
4.2.2 VPN Topology Information 
    
   A new extended community is used to indicate different VPN topology 
   values. This attribute is transitive across the Autonomous system 
   boundary. The value of the type field for extended type is assigned 
   by IANA. The first two bytes of the value field (of the remaining 6 
   bytes) are reserved. The actual topology values are carried within 
   the remaining four bytes. The following topology values are defined: 
    
         Value    Topology Type 
    
           1          "Hub" 
           2          "Spoke" 
           3          "Mesh" 
    
   Arbitrary values can also be used to allow specific topologies to be 
   constructed.  
 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 5] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
    
   In a hub and spoke topology, spoke VRs (i.e., PE having VRs as 
   spokes within the VPN)  will advertise their BGP information with 
   VPN topology extended community with value of "2". Spoke VRs will 
   only be allowed to connect to hub VRs and therefore spoke VR-based 
   PEs will just import VPN information from BGP that is set of "1". 
   Hub sites can connect to both hub and spoke sites (i.e., Hub VRs can 
   import VPN topology of both values "1", "2", or "3". In a mesh 
   topology, mesh sites connect to each other, each VR will advertise 
   VPN topology information of "3".  
    
   Furthermore, in the presence of both hub and spoke and mesh 
   topologies within the same VPN, mesh sites can as well connect to 
   hub sites and vice versa. 
 
 
5. Interpretation of VPN Information in VPLS 
    
   The interpretation of the VPN information for VPLS solutions is 
   described in the following sections. 
    
 
    
5.1 VPLS 
    
      In order to use BGP-based auto-discovery for VPLS-based VPNs 
      where discovery and signaling are separate components such as 
      [VPLS-LDP] solutions each VSI needs to have an identifier, which 
      can be encoded as a BGP NLRI. This identifier MUST be unique 
      across all VPLSs, and MAY be unique across all VSIs (in all 
      VPLSs). This document uses Route Distinguishers (RDs) to construct 
      such identifiers. If several VSIs of a given VPLS use the same 
      RD, then the unique identifier could be constructed by prepending 
      the RD to an IP address of the PE containing the virtual LAN 
      switch (VSI).  Note that it is not strictly necessary for all 
      the VSIs in the same VPLS to have the same RD, all that is really 
      necessary is that the NLRI uniquely identify a virtual LAN switch. 
      If all VSIs have their own unique RDs, then these RDs alone could 
      be used as VSIs' identifiers. Any method of constructing unique 
      RDs (e.g., using the encoding techniques of [BGP/MPLS-IP-VPN]) 
      will do. 
  
      Each VSI needs to be associated with one or more Route Target 
      (RT) Extended Communities.  These control the distribution of 
      the NLRI, and hence will control the formation of the overlay 
      topology of pseudowires that constitutes a particular VPLS.  Any 
      method of constructing unique RTs (e.g., using the encoding 
      techniques of [BGP/MPLS-IP-VPN]) will do. 
    
      Auto-discovery proceeds by having each PE distribute, via BGP,    
      the NLRI for each of its VSIs, with itself as the BGP next hop, 
      and with the appropriate RT for each such NLRI.  Typically, each 

 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 6] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
      PE would be a client of a small set of BGP route reflectors, 
      which would redistribute this information to the other clients.  
       
       If a PE has a VSI with a particular RT, it can then receive all 
      the NLRI which have that same RT, and from the BGP next hop 
      attribute of these NLRI will learn the IP addresses of the other 
      PE routers which have VSIs with the same RT.    
     
      If a particular VPLS is meant to be a single fully connected 
      LAN, all its VSIs will have the same RT. If a particular VPLS 
      consists of multiple VLANs, each VLAN must have its own unique 
      RT.  A VSI can be placed in multiple VLANS (or even in multiple 
      VPLSs) by assigning it multiple RTs. 
    
 
 
5.1.1 VPLS using BGP as a signaling Mechanism 
 
   The interpretation of VPN information for VPLS services using BGP as 
   the signaling component is described in [VPLS-BGP]. Note that this 
   solution complies with procedures described in section 3.2.  
 
 
6. Tunnel Discovery 
    
   Layer-3 VPNs and Layer-2 VPNs must be implemented through some form 
   of tunneling mechanism, where the packet formats and/or the 
   addressing used within the VPN can be unrelated to that used to 
   route the tunneled packets across the backbone. There are numerous 
   tunneling mechanisms that can be used by a network based VPN (e.g., 
   IP/IP [RFC-2003], GRE tunnels [RFC-1701], IPSec [RFC-2401], and MPLS 
   tunnels [RFC-3031]). Each of these tunnels allows for opaque 
   transport of frames as packet payload across the backbone, with 
   forwarding disjoint from the address fields of the encapsulated 
   packets. A provider edge router may terminate multiple type of 
   tunnels and forward packets between these tunnels and other network 
   interfaces in different ways. 
    
   BGP can be used to carry tunnel endpoint addresses between edge 
   routers.  
 
    
   The BGP next hop will carry the service provider tunnel endpoint 
   address. As an example, if IPSec is used as tunneling mechanism, the 
   IPSec tunnel remote address will be discovered through BGP, and the 
   actual tunnel establishment is achieved through IPSec signaling 
   protocol.  
    
   When MPLS tunneling is used, the label carried in the NLRI field is 
   associated with an address of a VR, where the address is carried in 
   the NLRI and is encoded as a VPN-IP address. 
    

 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 7] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
   The auto-discovery mechanism should convey minimum information for 
   the tunnels to be setup. The means of distributing multiplexors must 
   be defined either via some sort of tunnel-protocol-specific signaling 
   mechanism, or via additional information carried by the   
   auto-discovery protocol. That information may or may not be  
   used directly within the specific signaling protocol. On one end of 
   the spectrum, the combination of IP address (such as BGP next hop and 
   IP address carried within the NLRI) and the label and/or VPN-ID 
   provides sufficient information for a PE to setup per VPN tunnels or 
   shared tunnels per set of VPNs. On another end of the spectrum 
   additional specific tunnel related information can be carried within 
   the discovery process if needed. 
 
 
 
7. Scalability Considerations 
    
   In this section, we briefly summarize the main characteristics of 
   our model with respect to scalability. 
    
   Recall that the Service Provider network consists of (a) PE routers, 
   (b) BGP Route Reflectors, (c) P routers (which are neither PE 
   routers nor Route Reflectors), and, in the case of multi-provider 
   VPNs, (d) ASBRs. 
    
   A PE router, unless it is a Route Reflector should not retain 
   VPN-related information unless it has at least one VPN with an 
   Import Target identical to one of the VPN-related information Route 
   Target attributes.  Inbound filtering should be used to cause such 
   information to be discarded.  If a new Import Target is later added 
   to one of the PE's VPNs (a "VPN Join" operation), it must then 
   acquire the VPN-related information it may previously have 
   discarded. 
    
   This can be done using the refresh mechanism described in [BGP-
   RFSH]. 
    
   The outbound route filtering mechanism of [BGP-ORF], [BGP-CONS] can 
   also be used to advantage to make the filtering more dynamic. 
    
   Similarly, if a particular Import Target is no longer present in 
   any of a PE's VPNs (as a result of one or more "VPN Prune" 
   operations), the PE may discard all VPN-related information which, 
   as a result, no longer have any of the PE's VPN's Import Targets as 
   one of their Route Target Attributes. 
    
   Note that VPN Join and Prune operations are non-disruptive, and do 
   not require any BGP connections to be brought down, as long as the 
   refresh mechanism of [BGP-RFSH] is used. 
    
   As a result of these distribution rules, no one PE ever needs to 
   maintain all routes for all VPNs; this is an important scalability 
   consideration. 
 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 8] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
    
   Route reflectors can be partitioned among VPNs so that each 
   partition carries routes for only a subset of the VPNs supported by 
   the Service Provider. Thus no single route reflector is required to 
   maintain VPN-related information for all VPNs. 
    
   For inter-provider VPNs, if multi-hop EBGP is used, then the ASBRs 
   need not maintain and distribute VPN-related information at all. 
    
   P routers do not maintain any VPN-related information.  In order 
   to properly forward VPN traffic, the P routers need only maintain 
   routes to the PE routers and the ASBRs.  
    
   As a result, no single component within the Service Provider network 
   has to maintain all the VPN-related information for all the VPNs. 
   So the total capacity of the network to support increasing numbers 
   of VPNs is not limited by the capacity of any individual component. 
    
   An important consideration to remember is that one may have any 
   number of INDEPENDENT BGP systems carrying VPN-related information. 
   This is unlike the case of the Internet, where the Internet BGP 
   system must carry all the Internet routes. Thus one significant 
   (but perhaps subtle) distinction between the use of BGP for the 
   Internet routing and the use of BGP for distributing VPN-related 
   information, as described in this document is that the former is not 
   amenable to partition, while the latter is. 
 
    
8. Security Considerations 
    
    
   This document describes a BGP-based auto-discovery mechanism which 
   enables a PE router that attaches to a particular VPN to discover 
   the set of other PE routers that attach to the same VPN.  Each PE 
   router that is attached to a given VPN uses BGP to advertise that 
   fact. Other PE routers which attach to the same VPN receive these 
   BGP advertisements. This allows that set of PE routers to discover 
   each other. Note that a PE will not always receive these 
   advertisements directly from the remote PEs; the advertisements may 
   be received from "intermediate" BGP speakers. 
    
   It is of critical importance that a particular PE should not be 
   "discovered" to be attached to a particular VPN unless that PE 
   really is attached to that VPN, and indeed is properly authorized to 
   be attached to that VPN.  If any arbitrary node on the Internet 
   could start sending these BGP advertisements, and if those 
   advertisements were able to reach the PE routers, and if the PE 
   routers accepted those advertisements, then anyone could add any 
   site to any VPN.  Thus the auto-discovery procedures described here 
   presuppose that a particular PE trusts its BGP peers to be who they 
   appear to be, and further that it can trusts those peers to be 
   properly securing their local attachments.  (That is, a PE must 

 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 9] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
   trust that its peers are attached to, and are authorized to be 
   attached to, the VPNs to which they claim to be attached.). 
    
   If a particular remote PE is a BGP peer of the local PE, then the 
   BGP authentication procedures of RFC 2385 can be used to ensure that 
   the remote PE is who it claims to be, i.e., that it is a PE that is 
   trusted. 
    
   If a particular remote PE is not a BGP peer of the local PE, then 
   the information it is advertising is being distributed to the local 
   PE through a chain of BGP speakers.  The local PE must trust that 
   its peers only accept information from peers that they trust in 
   turn, and this trust relation must be transitive.  BGP does not 
   provide a way to determine that any particular piece of received 
   information originated from a BGP speaker that was authorized to 
   advertise that particular piece of information.  Hence the 
   procedures of this document should be used only in environments 
   where adequate trust relationships exist among the BGP speakers. 
    
   Some of the VPN schemes which may use the procedures of this 
   document can be made robust to failures of these trust 
   relationships.  That is, it may be possible to keep the VPNs secure 
   even if the auto-discovery procedures are not secure.  For example, 
   a VPN based on the VR model can use IPsec tunnels for transmitting 
   data and routing control packets between PE routers.  An 
   illegitimate PE router which is discovered via BGP will not have the 
   shared secret which makes it possible to set up the IPsec tunnel, 
   and so will not be able to join the VPN.  Similarly, [IP-GRE] 
   describes procedures for using IPsec tunnels to secure VPNs based on 
   the BGP/MPLS-IP-VPN model.  The details for using IPsec to secure a 
   particular sort of VPN depend on that sort of VPN and so are out of 
   scope of the current document. 
    
    
9. IANA Considerations 
  
 
9.1 IANA Considerations for L2VPNs 
 
   New AFI value to be assigned by IANA to indicate that the NLRI is  
   carrying VPN-L2 information as described in section 3.2. 
 
    
   New SAFI number for VPLS-based L2VPNs solutions using LDP-based     
   signalling. 
 
9.2 IANA Considerations for VR-based L3VPNs 
 
    
    SAFI number "129" for indicating that the NLRI is carrying  
    information for VR-based solution. 
 
    SAFI number "140" for indicating that the NLRI is carrying  
 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 10] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
    information for VR for non-labeled prefixes. 
  
    New Extended Community to be assigned by IANA and used for Topology 
    values for VR-based L3VPN solution see section 4.2.2. 
     
    New Extended Community to be assigned by IANA for carrying VPN-ID  
    format based on RFC2685 format (see section 4.2.1.2) 
 
10. Use of BGP Capability Advertisement 
 
   A BGP speaker that uses VPN information as described in this 
   document with multiprotocol extensions should use the Capability 
   Advertisement procedures [RFC-3392] to determine whether the speaker 
   could use Multiprotocol Extensions with a particular peer. 
    
11. Acknowledgement 
 
   The authors would like to acknowledge Benson Schliesser, and Thomas 
   Narten for the constructive and fruitful comments. 
                                                         
12. Normative References 
    
    
   [BGP-COMM] Ramachandra, Tappan, et al., "BGP Extended Communities 
      Attribute",  draft-ietf-idr-bgp-ext-communities-08.txt,  
      August 2005, work in progress. 
    
   [BGP-MP] Bates, Chandra, Katz, and Rekhter, "Multiprotocol 
      Extensions for BGP4", February 1998, RFC 2283. 
    
   [RFC-3107] Rekhter Y, Rosen E., "Carrying Label Information in 
      BGP4", January 2000, RFC3107. 
       
   [BGP/MPLS-IP-VPN] Rosen E., et al, "BGP/MPLS VPNs", draft-ietf-
      l3vpn-rfc2547bis-03.txt, October 2004, Work in Progress. 
    
   [RFC-2685] Fox B., et al, "Virtual Private Networks Identifier",  
      RFC 2685, September 1999. 
    
   [RFC-3392] Chandra, R., et al., "Capabilities Advertisement with  
      BGP-4", RFC3392, May 2002. 
 
   [VPN-VR] Knight, P., Ould-Brahim H., Gleeson, B., "Network based IP  
      VPN Architecture using Virtual Routers",  
      draft-ietf-l3vpn-vpn-vr-02.txt, April 2004, Work in Progress.  
   
    
13. Informative References 
 
   [L2VPN-ROSEN] Rosen, E., Radoaca, V., "Provisioning Models and 
       Endpoint Identifiers in L2VPN Signaling",  
       draft-ietf-l2vpn-signaling-03.txt, February 2005,  
       Work in Progress.  
 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 11] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
   
   [VPLS-BGP] Kompella, K., et al., "Virtual Private LAN Service",    
       draft-ietf-l2vpn-vpls-bgp-05, April 2005, Work in Progress. 
 
   [VPLS-LDP] Kompella, V., Lasserre, M., et al., "Virtual Private LAN  
       Services over MPLS", draft-ietf-l2vpn-vpls-ldp-06.txt,  
       February 2005, Work in Progress.                           
 
   [RFC-1701] Hanks, S., Li, T., Farinacci, D. and P. Traina, "Generic 
      Routing Encapsulation (GRE)", RFC 1701, October 1994. 
 
   [RFC-2003] Perkins, C., "IP Encapsulation within IP", RFC 2003, 
      October 1996. 
 
   [RFC-2026] Bradner, S., "The Internet Standards Process -- Revision 
      3", RFC 2026, October 1996. 
 
   [RFC-2401] Kent S., Atkinson R., "Security Architecture for the 
      Internet Protocol", RFC 2401, November 1998. 
 
   [RFC-2119] Bradner, S., "Key words for use in RFCs to Indicate  
      Requirement Levels", RFC 2119, March 1997. 
 
   [TLS-TISSA] "BGP/MPLS Layer-2 VPN", draft-tsenevir-bgpl2vpn-01.txt, 
      work in progress, July 2001. 
    
   [IP-GRE] Rosen, E., et al., "Use of PE-PE GRE or IP in BGP/MPLS IP 
      Virtual Private Networks", draft-ietf-l3vpn-gre-ip-2547-03.txt, 
      October 2004, Work in Progress.  
    
   [BGP-RFSH] Chen, A., "Route Refresh Capability for BGP-4", RFC 2918, 
      September 2000. 
    
   [BGP-ORF] Chen, E., and Rekhter, Y., "Cooperative Route Filtering 
      Capability for BGP-4", draft-ietf-idr-route-filter-11.txt, 
      December 2004, Work in Progress. 
 
   [BGP-CONS] Marques, P., et al., "Constrained VPN route distribution"  
     draft-ietf-l3vpn-rt-constrain-01.txt, September 2004, work in  
     progress 
 
14. Annex: Auto-Discovery in VR and MPLS-IP-VPN Interworking Scenarios 
 
   Two interwoking scenarios are considered when the network is using 
   both virtual routers and BGP/MPLS-IP-VPN. The first scenario is a 
   CE-PE relationship between a PE (implementing BGP/MPLS-IP-VPN), and 
   a VR appearing as a CE to the PE. The connection between the VR, and 
   the PE can be either direct connectivity, or through a tunnel (e.g., 
   IPSec).  
    
   The second scenario is when a PE is implementing both architectures. 
   In this particular case, a single BGP session configured on the 
   service provider network can be used to advertise either BGP/MPLS-
 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 12] 
Internet-Draft   draft-ietf-l3vpn-bgpvpn-auto-06.txt      June 2005 
 
   IP-VPN VPN information or the virtual router related VPN 
   information. From the VR and the BGP/MPLS-IP-VPN point of view there 
   is complete separation from data path and addressing schemes. 
   However the PE's interfaces are shared between both architectures. 
    
   A PE implementing only BGP/MPLS-IP-VPN will not import routes from a 
   BGP UPDATE message containing the VPN-ID extended community. On the 
   other hand, a PE implementing the virtual router architecture will 
   not import routes from a BGP UPDATE message containing the route 
   target extended community attribute. 
    
   The granularity at which the information is either BGP/MPLS-IP-VPN 
   related or VR-related is per BGP UPDATE message. Different SAFI 
   numbers are used to indicate that the message carried in BGP 
   multiprotocol extension attributes is to be handled by the VR or 
   BGP/MPLS-IP-VPN architectures. SAFI number of 128 is used for 
   BGP/MPLS-IP-VPN related format. A value of 129 for the SAFI number is 
   for the virtual router (where the NLRI are carrying a labeled 
   prefixes), and a SAFI value of 140 is for non labeled addresses. 
 
    

15. Contributors 
 
 
   Bryan Gleeson  
   Tahoe Networks 
   3052 Orchard Drive  
   San Jose, CA 95134 USA  
   Email: bryan@tahoenetworks.com 
                                    
   Peter Ashwood-Smith 
   Nortel Networks 
   P.O. Box 3511 Station C, 
   Ottawa, ON K1Y 4H7, Canada 
   Phone: +1 613 763 4534                       
   Email: petera@nortelnetworks.com 
                        
  
 
   Luyuan Fang  
   AT&T 
   200 Laurel Avenue  
   Middletown, NJ 07748    
   Email: Luyuanfang@att.com 
   Phone: +1 (732) 420 1920 
 
  Jeremy De Clercq  
  Alcatel 
  Francis Wellesplein 1 
  B-2018 Antwerpen, Belgium 
  Phone: +32 3 240 47 52 
 
Ould-Brahim & Rosen & Rekhter       June 2005           [Page 13] 

                 draft-ietf-l3vpn-bgpvpn-auto-06.txt         May 2005 
 
  Email: jeremy.de_clercq@alcatel.be 
 
  Riad Hartani 
  Caspian Networks 
  170 Baytech Drive 
  San Jose, CA 95143 
  Phone: 408 382 5216 
  Email: riad@caspiannetworks.com 
 
  Tissa Senevirathne 
  Force10 Networks 
  1440 McCarthy Blvd,  
  Milpitas, CA 95035. 
  Phone: 408-965-5103 
  Email: tsenevir@hotmail.com 
 
 
17. Author' Addresses 
 
   Hamid Ould-Brahim                        
   Nortel Networks  
   P O Box 3511 Station C                   
   Ottawa, ON K1Y 4H7, Canada                      
   Email: hbrahim@nortelnetworks.com                            
    
 
 
   Eric C. Rosen 
   Cisco Systems, Inc. 
   1414 Massachusetts Avenue 
   Boxborough, MA 01719 
   E-mail: erosen@cisco.com                       
    
                         
   Yakov Rekhter  
   Juniper Networks 
   1194 N. Mathilda Avenue  
   Sunnyvale, CA 94089    
   Email: yakov@juniper.net 













 
Ould-Brahim & Rosen & Rekhter      May 2005                 [Page 14] 

                 draft-ietf-l3vpn-bgpvpn-auto-06.txt         May 2005 

 
   Intellectual Property Statement 
    
      The IETF takes no position regarding the validity or scope of any 
      Intellectual Property Rights or other rights that might be  
      claimed to pertain to the implementation or use of the technology  
      described in this document or the extent to which any license  
      under such rights might or might not be available; nor does it  
      represent that it has made any independent effort to identify any  
      such rights.  Information on the procedures with respect to  
      rights in RFC documents can be found in BCP 78 and BCP 79. 
    
      Copies of IPR disclosures made to the IETF Secretariat and any 
      assurances of licenses to be made available, or the result of an 
      attempt made to obtain a general license or permission for the 
      use of such proprietary rights by implementers or users of this 
      specification can be obtained from the IETF on-line IPR   
      repository at http://www.ietf.org/ipr. 
    
      The IETF invites any interested party to bring to its attention  
      any copyrights, patents or patent applications, or other  
      proprietary rights that may cover technology that may be required  
      to implement this standard.  Please address the information to  
      the IETF at ietf-ipr@ietf.org. 
    
   Disclaimer of Validity 
    
      This document and the information contained herein are provided 
      on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE 
      REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND  
      THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,  
      EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY  
      THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY  
      RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS  
      FOR A PARTICULAR PURPOSE. 
    
    
   Copyright Statement 
    
      Copyright (C) The Internet Society (2005).  This document is    
      subject to the rights, licenses and restrictions contained in BCP  
      78, and except as set forth therein, the authors retain all their  
      rights. 
 








 
Ould-Brahim & Rosen & Rekhter      June 2005                 [Page 15] 


PAFTECH AB 2003-20262026-04-21 02:40:02