Internet DRAFT - draft-pang-nvo3-vxlan-path-detection

draft-pang-nvo3-vxlan-path-detection







Network Working Group                                       Junying Pang
Internet-Draft
Intended status: Informational                                   Jie Cao
Expires: September 21, 2016                                   Dapeng Liu
                                                           Dacheng Zhang
                                                                 Alibaba
                                                               Yizhou Li
                                                                Hao Chen
                                                     Huawei Technologies
                                                              David Zhou
                                                             BoJian Wang
                                                            Deepak Kumar
                                                           Cisco Systems
                                                            Ruichang Gao
                                                                Yan Qiao
                                                                     H3C
                                                           March 20 2016


                Path Detection in VXLAN Overlay Network
                draft-pang-nvo3-vxlan-path-detection-02

Abstract

   In VXLAN overlay networks, Operation and Management(OAM)functions are
   important for fault management and performance monitoring.  Path
   Detection(PD) is one critical OAM function which is applied to
   monitor and/or diagnose the potential paths between two VTEPs or
   between two Tenant System.  In addition, it can assist to identify
   the locations of failures on data transmission paths.

   This document specifies a method of PD method for VXLAN Overlay
   Networks by using a centralized controller.  However,the method can
   be easily extended to support the overlay networks without a
   centrilized controller.  It can also be generalized to other overlay
   technique such as NVGRE.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.





Junying Pang, et al.   Expires September 21, 2016               [Page 1]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 21, 2016.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Acronyms and Terminology  . . . . . . . . . . . . . . . .   4
   2.  Conventions Used in This Document . . . . . . . . . . . . . .   4
   3.  Path Detection Under the Assistance of Fabric Controller  . .   4
     3.1.  General Format of PD packet . . . . . . . . . . . . . . .   5
     3.2.  Format of VXLAN Header  . . . . . . . . . . . . . . . . .   6
     3.3.  Pseudo-Header . . . . . . . . . . . . . . . . . . . . . .   6
     3.4.  Format of OAM PDU . . . . . . . . . . . . . . . . . . . .   6
     3.5.  Format of Extendable OAM TLV  . . . . . . . . . . . . . .   7
       3.5.1.  TLV Type  . . . . . . . . . . . . . . . . . . . . . .   8
       3.5.2.  Content of Extendable OAM TLV . . . . . . . . . . . .   8
   4.  Path Detection between VTEPs  . . . . . . . . . . . . . . . .  10
   5.  Path Detection between Tenant Systems . . . . . . . . . . . .  12
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  12
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  13
   8.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  13
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  13
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  13
     9.2.  Informative References  . . . . . . . . . . . . . . . . .  14
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  14







Junying Pang, et al.   Expires September 21, 2016               [Page 2]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


1.  Introduction

   In VXLAN overlay networks, OAM functions such as fault management
   should be implemented to prevent the path failure problem [NVO3-OAM-
   REQ].  Path Detection is one of OAM function which can be used to
   detect all available paths between two Tenant Systems or two VTEPs,
   and so it is widely used to assist the identify of the failure
   locations along a transmission path.

   In this memo, a PD mechanism is specified for VXLAN overlay networks.
   A centralized Controller is provided as a centralized unit to: 1)
   construct Path Detection(PD) packets, 2) inject them into the network
   devices to record information such as device's Ingress/Egress
   interface number, and 3) collect the PD packets from network devices
   for further analysis.  Therefore, Path Detection such as monitoring
   and diagnose can be realized more efficient.

   Figure 1 shows the architecture of this mechanism:



                 *******************************************
                 *              +------------+             *
                 *              |            |             *
                 *      +-------+   Fabric   +------+      *
                 *      |       | Controller |      |      *
                 *      |       |            |      |      *
                 *      |       +-----+------+      |      *
                 *      |             |             |      *
                 *      |             |             |      *
                 *      |             |             |      *
                 *      |             |             |      *
       +-----+   *  +---+--+     +----+----+     +--+---+  *   +-----+
       | +--+|   *  |+----+|     |         |     |+----+|  *   |+--+ |
       | |VM|+---*--+|VTEP|+-----+ L3      +-----+|VTEP|+--*---+|VM| |
       | +--+|   *  |+----+|     | Devices |     |+----+|  *   |+--+ |
       |     |   *  |      |     |         |     |      |  *   |     |
       +-----+   *  +------+     +---------+     +------+  *   +-----+
        Server   *    ToR                          ToR     *    Server
                 *                                         *
                 *                                         *
                 *         VXLAN Overlay Network           *
                 *                                         *
                 *******************************************



          Figure 1: VXLAN Overlay Network with Fabric Controller



Junying Pang, et al.   Expires September 21, 2016               [Page 3]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


   This method can be extended to support the overlay network without
   fabric controller.  In this case, it could be regarded as a
   traditional OAM fault management solution described in draft-tissa-
   nvo3-oam-fm-02 [I-D.tissa-nvo3-oam-fm].It can also be generalized to
   support other overlay technique such as NVGRE [RFC7637].

   The following of this document is organized as follows: Section 3
   describes the format of PD packets.  Section 4 introduces the
   procedure of Path Detection between VTEPs.  Section 5 describes the
   procedure of Path Detection between Tenant Systems.

1.1.  Acronyms and Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

   Because this document reuses most of the terms specified in RFC 7348
   [RFC7348] RFC 7364 [RFC7364] and RFC 7365 [RFC7365], this section
   only defines the key terms used by this document.

   NVGRE: Network Virtualization using Generic Routing Encapsulation

   OAM: Operations, Administration, and Management

   Controller: an entity that generates PD packets and injects them into
   the overlay network through VTEPs, also collects PD packets from
   network devices in overlay network.

2.  Conventions Used in This Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

3.  Path Detection Under the Assistance of Fabric Controller

   This section describes the format of PD packet.

   To provide accurate monitoring and/or diagnostic services, a PD
   packet and the corresponding user packets should be transported over
   the same data path.  In addition, PD packets SHOULD NOT be
   transferred to the outside of the overlay network.








Junying Pang, et al.   Expires September 21, 2016               [Page 4]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


3.1.  General Format of PD packet

   Figure 2 shows the format of a PD packet:


                  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
                  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                  |                               |
                  -      Outer MAC Header         -     14 Octets
                  |                               |
                  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                  |                               |
                  -     Outer IPv4 Header         -     20 Octets
                  |                               |
                  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                  |      Outer UDP Header         |      8 Octets
                  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                  |         VXLAN Header          |      8 Octets
                  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                  |                               |
                  ~        Pseudo-Header          ~    128 Octets
                  |                               |
                  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                  |            OAM PDU            |     Variable
                  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



                     Figure 2: Format of the PD packet

   VXLAN Header (8 Octets): A fixed size field, used to carry NVO3
   specific information.  This work complies with the VXLAN Header
   specified in Section 5 of [RFC 7348] but uses a reserve field as the
   flag to distinguish the packets for PD from the normal user packets.

   Pseudo-Header (128 Octets): A fixed size field, consists of the
   information of Ethernet MAC header, IPv4 header, and TCP/UDP header,
   which is used to identify the packets within the same flow.

   OAM PDU (Variable): A variable size field,used to carry the path
   detection information.  An OAM PUB consists of OAM flag, OAM type and
   Extendable TLV as shown in Section 3.4.  For a OAM PDU, 4 Octets
   alignment MUST be guaranteed.








Junying Pang, et al.   Expires September 21, 2016               [Page 5]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


3.2.  Format of VXLAN Header

   In this work, the "PD" flag(as with the illustration in Figure 3)
   MUST be set for all the PD packets.



              0                   1                   2                   3
              0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++--+-+-+-+
             |R|R|R|R|I|R|R|R|               Reserved                        |
             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
             |        VXLAN Network Identifier (VNI)         |R|R|R|R|R|R|R|PD|
             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++--+-+-+-+-+



                  Figure 3: VXLAN header with the PD Flag

   PD (1 bit) - Indicates it is a PD packet and needs to be handled as
   specified in this document.

   All other fields comply with what are specified in Section 5 of RFC
   7348 [RFC7348].

3.3.  Pseudo-Header

   The Pseudo-Header is used to ensure that the PD packets are
   transported along the paths that the service flows actually
   transported.  In order to achieve this, the five-tuples identifying
   the service flow should be copied directly into associating fields in
   the Pseudo-header.

3.4.  Format of OAM PDU

   OAM PDU consists of an OAM flag field, an OAM type field and an
   Extendable TLV field.  This structure is used to identify the type of
   Path Detection, and records the OAM information along the traverse
   path at each hop.  The information will be report to fabric
   controller at each hop, in order to depict the complete path
   information.  Following is the format of OAM PDU.










Junying Pang, et al.   Expires September 21, 2016               [Page 6]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


              0                   1                   2                   3
             0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
            +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
            |   OAM Type    |               Reserved                        |
            +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
            |                Extendable TLV (Variable)                      |
            +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


                        Figure 4: Format of OAM PDU

   OAM Type (1 Octet): used to identify the function of PD packets.
   Currently two functions are specified: path traversal and path
   tracking.


                OAM type               Function
                --------          ----------------------
                0x01              Path Traversal
                0x02              Path Tracking
                Other             Reserved


   Reserved (3 Octets): padding bits, used to keep the 4 Octets
   alignment.

   Extendable TLV (Variable): used to carry path detection information
   such as the Ingress/Egress Interface Identifiers of network devices
   along the path in VXLAN overlay network.

3.5.  Format of Extendable OAM TLV

   The following figure depicts the general format of an Extendable OAM
   TLV:


            0                   1                   2                   3
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++--+-+-+-+
           |             Type              |             Length            |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |                     Value (Variable)                          |
           |                                                               |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++--+-+-+-+-+


                    Figure 5: Extendable TLV of OAM PDU




Junying Pang, et al.   Expires September 21, 2016               [Page 7]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


   Type (2 Octets): Specifies the Type of the TLV.(see Section 3.5.1 for
   TLV types)

   Length (2 Octets): Specifies the length of the 'Value' field in
   octets.  Length of the 'field' can be either zero or more octets.

   Value (Variable): The length and the content of this field depend on
   the type of the TLV. (see Section 3.5.2 for content of TLV)

3.5.1.  TLV Type

   This document specifies two type of Extendable OAM TLV: Ingress
   Interface Identifier (IIID) TLV and Egress Interface Identifier
   (EIID) TLV.  The Type field of each TLV is specified as follows:


                Type           TLV Name
                ----           ----------------------------
                0x0001         Ingress Interface Identifier
                0x0002         Egress Interface Identifier
                0x0003         Transaction Identifier
                0x0004         Ingress Interface Name Identifier
                0x0005         Egress Interface Name Identifier
                0x0006         Authentication


3.5.2.  Content of Extendable OAM TLV

   For an IIID TLV, the type field is set as 0x0001, the length field is
   set as 4.  The value field is 4 Octets long which contains the
   device's Ingress Interface Identifier.


              0                   1                   2                   3
              0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++--+-+-+-+
             |            Type = 0x0001      |           Length = 4          |
             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
             |             Ingress Interface Identifier                      |
             |                                                               |
             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


                            Figure 6: IIID TLV

   For an EIID TLV, the type field is set as 0x0002, the length field is
   set as 4.  The value field is 4 Octets long which contains the
   device's Egress Interface Identifier.



Junying Pang, et al.   Expires September 21, 2016               [Page 8]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


            0                   1                   2                   3
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |          Type = 0x0002        |           Length = 4          |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |              Egress Interface Identifier                      |
           |                                                               |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



                            Figure 7: EIID TLV


            0                   1                   2                   3
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |          Type = 0x0003        |           Length = 16         |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |                    Transaction  Identifier                    |
           .                                                               .
           |                                                               |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



                   Figure 8: Transaction Identifier TLV


            0                   1                   2                   3
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |          Type = 0x0004        | Length = ifName length        |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |                ifName(RFC2863 (DisplayString))                |
           .                                                               .
           |                                                               |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



              Figure 9: Ingress Interface Name Identifier TLV









Junying Pang, et al.   Expires September 21, 2016               [Page 9]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


            0                   1                   2                   3
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |          Type = 0x0005        | Length = ifName length        |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |                ifName(RFC2863 (DisplayString))                |
           .                                                               .
           |                                                               |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



              Figure 10: Egress Interface Name Identifier TLV


            0                   1                   2                   3
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |          Type = 0x0006        |        Length = 20            |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           |  Key Id       |                      Reserved                 |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           .                                                               .
           |                          Key                                  |
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

           Key ID:  8 bits.  This allows multiple keys to be active
            simultaneously.

           Auth Key:  16 octets. This field carries the MD5 [RFC1321] checksum
            for the entire IP packet.  When the Auth Key
            is calculated, the shared MD5 key is stored in this field,
            and the checksum fields in the IP header, UDP header are set to zero.
            The result of the algorithm is placed in the Key field.



                       Figure 11: Authentication TLV

4.  Path Detection between VTEPs

   In VXLAN overlay networks, Equal Cost Multi-path(ECMP) may exist
   between two VTEPs, which may be leveraged to achieve load balance.
   Link failure and other reasons may lead to the broken of equal cost
   paths.  In order to avoid delivering packets to the broken paths,
   it's necessary to detect all the potential paths between the VTEPs.
   The basic idea is to traversal these paths using the PD packets.




Junying Pang, et al.   Expires September 21, 2016              [Page 10]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


   The process of path detection between VTEPs is:

   1.  The Fabric Controller generates a series of Path Traversal
   packets targeting to the same Egress VTEP.  The outer Source UDP port
   numbers of the Path Traversal packets keep increased by 1.  For
   example, assume the outer Source UDP port number of a Path Traversal
   packet is set to 4000.  Then the outer Source UDP port numbers of
   subsequent Path Traversal packets are set as 4001, 4002, 4003, etc.
   The 'PD bit' in VXLAN header is set to 1 . The content of Pseudo
   header is left to empty (default value is full-zero), and the OAM
   type field is set to 0x01 to indicate that it is a Path Traversal
   packet.

   2.  After the Ingress VTEP receives the Path Traversal packets from
   Controller, it then computes the corresponding egress port based on
   the outer header information and then delivers the packet to that
   port.  By continuous increasing the Source UDP port number, these
   packets can be distributed to different equal cost paths.  Therefore,
   these Path Traversal packets could go through all the equal cost
   paths between the two VTEPs.

   3.  The Extendable TLV field contains multipls TLVs.  Transaction
   Identifier TLV is set by controller and carried in packet without
   modification in scenario where multiple transactions are initiated by
   controller between two endpoints.  Network device can add Ingress
   Interface Identifier or Ingress Interface Name Identifier, and Egress
   Interface Identifier or Egress Interface Name Identifier starting at
   the end of Transaction Identifier TLV.  Both of these TLVs are set by
   the network devices along the transport path.  The TLVs are used to
   record the identifier of device's Ingress/Egress interface the PD
   packet goes through.  Each network device receives the Path Traversal
   packet from its upstream device, makes a copy of it and passes the
   copy to its CPU.  After filling the extendable TLVs in this copy, the
   network device will deliver this copy to the Fabric Controller for
   further handling.

   4.  As new TLVs are added by network device in payload section of
   UDP/Ipv4 packet, it's good practise to update the IP length, UDP
   length and IP CRC.

   5.  By gathering all the Path traversal packets from the network
   devices along the paths, the Controller is able to compute the number
   of available paths, which could be presented by graphical chart.








Junying Pang, et al.   Expires September 21, 2016              [Page 11]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


5.  Path Detection between Tenant Systems

   In VXLAN overlay network, link failures are common and it may affect
   normal operations of up-layer applications.  For example, it may lead
   to service flow interruptions which are unacceptable for most
   applications.

   Path Detection between two End Systems is essential for accurate
   monitoring and/or diagnostics.  The basic idea is to transport the
   Path Tracking packets right along the path, that the service flow are
   transport through.

   The process of Path Detection between Tenant Systems is:

   1.  The Fabric Controller generates one Path Tracking packet to
   Ingress VTEP.  The 'PD bit' in the VXLAN header of the packet is set
   to 1.  The content of Pseudo-header is set as the tuple information
   which are transported over the path being detected.  The OAM type
   field is set to 0x02 to indicate it is a Path Tracking packet.

   2.  After the Ingress VTEP receives the Path Tracking packets from
   Fabric Controller, it will firstly compute the outer source UDP port
   number based on the information form in Pseudo-header.  Then it
   deliveries these packets to the corresponding egress port based on
   the outer headers information.

   3.  Each network device receives the Path Tracking packet from its
   upstream device, makes a copy of it and passes the copy to its CPU.
   After filling the extendable TLVs in this copy, the network device
   will deliver this copy to the Controller for further handling.  By
   doing this, each network device along the path will deliver a copy of
   Path Tracking packets back to Fabric Controller in a hop-by-hop
   manner.

   4.  By gathering all the Path traversal packets from network devices
   along the paths, Fabric Controller is able to accurately monitor the
   status of each link on the data flow path and locate the point of
   failure.  Fabric Controller may also present the path status using
   graphical chart.

6.  Security Considerations

   VXLAN security consideration is discussed in Section 7 of RFC 7348.
   This document specifies a path failure detection mechanism by
   extending the VXLAN header.  Thus it has the similar vulnerability as
   VXLAN.  For example, attackers can inject spoofed path failure
   detection packets to the VXLAN overlay network.  Administrative




Junying Pang, et al.   Expires September 21, 2016              [Page 12]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


   measures, ACL(Access Control List), authentication and encryption etc
   could be used to mitigate the attack.

   In addition, because the controller needs to collect and process the
   PD packets sent from the network devices.  An attacker may perform
   DDoS attacks to the controller by generating a large amount of PD
   packets and sent them to a VXLAN overlay network.  This issue will be
   well analyzed in our future work.

   As communication between controller and network switch is over
   internet and it's IP traffic, IPSEC Encryption [RFC 6071] may be used
   to encrypt the communication.

7.  IANA Considerations

   TBD.

8.  Acknowledgements

   The authors would like to specially thank Daolong zhou for his
   generous help in improving the readability of this document.

9.  References

9.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC7348]  Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger,
              L., Sridhar, T., Bursell, M., and C. Wright, "Virtual
              eXtensible Local Area Network (VXLAN): A Framework for
              Overlaying Virtualized Layer 2 Networks over Layer 3
              Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014,
              <http://www.rfc-editor.org/info/rfc7348>.

   [RFC7364]  Narten, T., Ed., Gray, E., Ed., Black, D., Fang, L.,
              Kreeger, L., and M. Napierala, "Problem Statement:
              Overlays for Network Virtualization", RFC 7364,
              DOI 10.17487/RFC7364, October 2014,
              <http://www.rfc-editor.org/info/rfc7364>.








Junying Pang, et al.   Expires September 21, 2016              [Page 13]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


9.2.  Informative References

   [I-D.ashwood-nvo3-oam-requirements]
              Chen, H., Ashwood-Smith, P., Xia, L., Iyengar, R., Tsou,
              T., Sajassi, A., Boucadair, M., Jacquenet, C., Daikoku,
              M., Ghanwani, A., and R. Krishnan, "NVO3 Operations,
              Administration, and Maintenance Requirements", draft-
              ashwood-nvo3-oam-requirements-03 (work in progress), July
              2015.

   [I-D.tissa-nvo3-oam-fm]
              Senevirathne, T., Salam, S., Kumar, D., Finn, N.,
              Eastlake, D., and S. Aldrin, "NVO3 Fault Management",
              draft-tissa-nvo3-oam-fm-02 (work in progress), June 2015.

   [RFC7365]  Lasserre, M., Balus, F., Morin, T., Bitar, N., and Y.
              Rekhter, "Framework for Data Center (DC) Network
              Virtualization", RFC 7365, DOI 10.17487/RFC7365, October
              2014, <http://www.rfc-editor.org/info/rfc7365>.

   [RFC7637]  Garg, P., Ed. and Y. Wang, Ed., "NVGRE: Network
              Virtualization Using Generic Routing Encapsulation",
              RFC 7637, DOI 10.17487/RFC7637, September 2015,
              <http://www.rfc-editor.org/info/rfc7637>.

Authors' Addresses

   Junying Pang


   Jie Cao
   Alibaba

   Email: jie.caojie@alibaba-inc.com


   Dapeng Liu
   Alibaba

   Email: max.ldp@alibaba-inc.com


   Dacheng Zhang
   Alibaba

   Email: dacheng.zdc@alibaba-inc.com





Junying Pang, et al.   Expires September 21, 2016              [Page 14]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


   Yizhou Li
   Huawei Technologies
   101 Software Avenue,
   Nanjing  210012
   China

   Phone: +86-25-56624440
   Email: liyizhou@huawei.com


   Hao Chen
   Huawei Technologies
   101 Software Avenue,
   Nanjing  210012
   China

   Phone: +86-25-56624440
   Email: philips.chenhao@huawei.com


   David Zhou
   Cisco Systems
   China


   BoJian Wang
   Cisco Systems
   China


   Deepak Kumar
   Cisco Systems
   USA

   Email: dekumar@cisco.com


   Ruichang Gao
   H3C
   China

   Email: gaoruichang@h3c.com









Junying Pang, et al.   Expires September 21, 2016              [Page 15]

Internet-Draft   Path Detection in VXLAN Overlay Network   March 20 2016


   Yan Qiao
   H3C
   China

   Email: qiaoyan@h3c.com














































Junying Pang, et al.   Expires September 21, 2016              [Page 16]