Internet DRAFT - draft-chen-trill-isis-purge
draft-chen-trill-isis-purge
Network Working Group G. Chen
Internet-Draft China Mobile
Intended status: Standards Track July 15, 2013
Expires: January 16, 2014
Extension to Purge Initiator Identification TLV for ISIS in TRILL
draft-chen-trill-isis-purge-01
Abstract
This memo specified an extension of ISIS TLV for identifying purge
initiator in TRILL environments. With the extension, it's beneficial
for operators to nail down the root cause when there is a corrupted
Link State Protocol (LSP) data unit spread within a layer-2 network.
The defined TLV is expected to record Nickname and impacted VLAN
information. RBridge should propagate the TLV information without
changes in order to flood the information.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 16, 2014.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
Chen Expires January 16, 2014 [Page 1]
Internet-Draft trill-isis-purge July 2013
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Requirements Language . . . . . . . . . . . . . . . . . . . . 2
3. The Purge Initiator Identification TLV . . . . . . . . . . . 3
4. Security Considerations . . . . . . . . . . . . . . . . . . . 4
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 4
6. Normative References . . . . . . . . . . . . . . . . . . . . 4
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 4
1. Introduction
It's a increasing demand to build a flexible layer 2 network within a
data center network. TRILL(Transparent Interconnection of Lots of
Links) was created to provide optimum point-to-point forwarding
automatically by performing layer 2 customer bridging with ISIS link
state routing. Multi-pathing has been supported for both unicast and
multi-destination traffic through extension of ISIS in TRILL
contexts. It's required that TRILL implements a separate IS-IS
instance from any used by Layer 3, that is, different from the one
used by routers.[RFC6325]. Layer 3 IS-IS frames must be
distinguished from TRILL IS-IS frames even when those Layer 3 IS-IS
frames are transiting an RBridge campus.
[RFC6232]specified Purge Originator Identification(POI) TLV for Layer
3 IS-IS frames, which could provide significant signals to facilitate
trouble-shooting. Some of TRILL specific extension of TLV have been
defined in[RFC6165] [RFC6326].It's desirable to make Layer 2 IS-IS to
be able to identify the purge initiator with a distinct indicator
compared to POI. In addition, several identification information has
been introduced in TRILL protocol, e.g. nickname of RBridge and VLAN.
Those information is likely useful to identify the corrupted source
in a large layer 2 network. It's worthwhile to map those Layer 3
feature into Layer 2. This memo specified the extension of ISIS TLV
for identifying purge initiator in TRILL environments. With the
extension, it's beneficial for operators to nail down the root cause
when there is a corrupted LSP(Link State Protocol) data unit spread
within a layer-2 network. The defined TLV is expected to record the
Nickname and impacted VLAN information. RBridge should propagate the
TLV information without changes in order to flood the information.
2. Requirements Language
Chen Expires January 16, 2014 [Page 2]
Internet-Draft trill-isis-purge July 2013
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3. The Purge Initiator Identification TLV
In order to trace the source of purge, the document defined the Purge
Initiator Identification(PII) TLV for Layer 2 ISIS system. If an
RBridge receives a corrupted LSP and generates purge message, it
SHOULD include this TLV with its own nickname and optional VLAN
information. If an RBridge receives a purge that does not include
this TLV, then it SHOULD add this TLV with its own nickname, optional
VLAN and the nickname of the RBridge that it received the purge from.
This allows RBridges receiving purges to log the identification of
the initiator. This makes it much easier for the network
administrator to locate the origin of the purge and thus the cause of
the purge.
The PII TLV is ISIS TLV and has the following format:
+-+-+-+-+-+-+-+-+
| Code | (1 byte)
+-+-+-+-+-+-+-+-+
| Length | (1 byte)
+-+-+-+-+-+-+-+-+
| Value | (1 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Nickname | (2 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| VLAN-ID | RESV | (2 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
o Code: TLV Type, it's to be assigned for the PII type.
o Length: It indicates the total length of the value field.
o Value: Number of entity information carried in this TLV (1 octet)
-- only the values 1 and 2 are defined.
o Nickname: If Value is set to 1, Nickname of the Intermediate
System that inserted this TLV has been included. If Value is set
to 2, Nickname of the Intermediate System from which the purge was
received have also been included
o VLAN-ID: This carries a 12-bit VLAN identifier that is to idenfity
PII is relevant to a specific VLAN.(optional)
Chen Expires January 16, 2014 [Page 3]
Internet-Draft trill-isis-purge July 2013
o RESV: (4 bits) MUST be sent as zero and ignored on
receipt.(optional)
4. Security Considerations
For general TRILL protocol security considerations, see the TRILL
base protocol standard [RFC6325]. IS-IS security may be used to
secure the IS-IS messages discussed here. In that case, some of
considerations could be found in [RFC6232]
5. IANA Considerations
IANA is asked to assign code point for the 'Trill Purge Initiator
Identification' TLV from the IS-IS 'TLV Codepoints' registry. The
additional values for this TLV should be IIH:n, LSP:y, SNP:n.
6. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC6165] Banerjee, A. and D. Ward, "Extensions to IS-IS for Layer-2
Systems", RFC 6165, April 2011.
[RFC6232] Wei, F., Qin, Y., Li, Z., Li, T., and J. Dong, "Purge
Originator Identification TLV for IS-IS", RFC 6232, May
2011.
[RFC6325] Perlman, R., Eastlake, D., Dutt, D., Gai, S., and A.
Ghanwani, "Routing Bridges (RBridges): Base Protocol
Specification", RFC 6325, July 2011.
[RFC6326] Eastlake, D., Banerjee, A., Dutt, D., Perlman, R., and A.
Ghanwani, "Transparent Interconnection of Lots of Links
(TRILL) Use of IS-IS", RFC 6326, July 2011.
Author's Address
Gang Chen
China Mobile
53A,Xibianmennei Ave.,
Xuanwu District,
Beijing 100053
China
Email: phdgang@gmail.com
Chen Expires January 16, 2014 [Page 4]