Internet DRAFT - draft-unbehagen-spb-ip-ipvpn

draft-unbehagen-spb-ip-ipvpn



 



INTERNET-DRAFT                                            Paul Unbehagen
Intended Status: Informational                               Roger Lapuh
Expires: September 6, 2012                                         Avaya
                                                               Sue Hares
                                                     Peter Ashwood-Smith
                                                                  Hauwei

                                                           March 5, 2012


           IP/IPVPN services with IEEE 802.1aq SPB networks 
                  draft-unbehagen-spb-ip-ipvpn-00.txt


Abstract

      This document describes a compact method of using a IEEE 802.1aq  
   Shortest Path Backbone Bridging (SPB) network to natively enable and
   carry IP and IPVPN services on native Ethernet links.  Further this
   documents the extensions to SPB's control protocol, IS-IS, required
   to allow it to be a single mechanism for providing all these services
   types.  On its own SPB provides virtual Ethernet networks; utilizing
   IS-IS to create loop free Ethernet topologies that forward Ethernet
   traffic using a standard Ethernet header.  This document shows how
   the same SPB network can also be leveraged to provide IP based
   services.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

 


Unbehagen et al        Expires September 6, 2012                [Page 1]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


Copyright and License Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.



Table of Contents

   1  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1  Terminology . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  SPB control of BMAC forwarding . . . . . . . . . . . . . . . .  4
   3. IP forwarding with SPB  . . . . . . . . . . . . . . . . . . . .  5
     3.1. IP Unicast  . . . . . . . . . . . . . . . . . . . . . . . .  5
   4. IPVPN services with SPB . . . . . . . . . . . . . . . . . . . .  6
     4.1. Route Propagation Techniques  . . . . . . . . . . . . . . .  6
     4.2. Ethernet underlay modes - 802.1aq and/or 802.1Qbp . . . . .  8
     4.3. I-TAG Encapsulation . . . . . . . . . . . . . . . . . . . .  9
   5. Interworking with MPLS based Networks . . . . . . . . . . . . . 10
   6. OAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
   7. Security Considerations . . . . . . . . . . . . . . . . . . . . 12
   8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 12
   9. References  . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     9.1 Normative References . . . . . . . . . . . . . . . . . . . . 12
     9.2 Informative References . . . . . . . . . . . . . . . . . . . 12
   10. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 13
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 13











 


Unbehagen et al        Expires September 6, 2012                [Page 2]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


1  Introduction

   The IEEE has defined a method for L2 virtualization called Shortest
   Path Bridging (SPB), which is leveraging IS-IS as a new Ethernet
   control plane to control the BMAC layer of the 802.1ah PBB
   encapsulation, replacing Ethernet's flooding and learning as the
   backbone forwarding protocol. In addition to layer 2 (bridging), the
   24 bits of the Service Instance defined in the 802.1ah frame format
   can also be leveraged for any network connectivity service including
   layer 3 Unicast and Multicast for IPv4 and IPv6. This document
   outlines the proposed extensions to ISIS-SPB to enable this
   functionality. The benefits of leveraging one protocol (ISIS-SPB) to
   provide any type of connectivity service on top of Ethernet are
   significant.

   SPB, through the use of ISIS to exchange the connectivity service
   topology, provides a powerful end-point-only provisioning model.
   IP/SPB leverages this and extends this to Layer 3, thus not only L2
   VPNs can be formed by attaching Virtual LANs to service IDs (ISIDs),
   but also L3 VPNs can be formed by binding Virtual Route Forwarders
   (VRFs) to ISIDs at the service attachment points.

   Due to the fact that all connectivity services described above are
   using the same SPB forwarding plane defined in IEEE802.1aq/.1Qbp,
   network availability is defined by the convergence timing of the
   single ISIS-SPB control plane.

1.1  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

      [IEEE802.1aq] defines a technology for providing a link state  
   protocol for the control of a common Ethernet switching layer.

      [IEEE802.1ah] Provider Backbone Bridging is a set of architecture
   and   protocols for transporting of a customer network traffic over a
     provider's network

      BCB   - Backbone Core Bridge

      BDA   - Backbone Destination Address

      BEB   - Backbone Edge Bridge

      BMAC  - Backbone MAC Address

 


Unbehagen et al        Expires September 6, 2012                [Page 3]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


      BSA   - Backbone Source Address

      BVID  - Backbone VLAN ID

      ESP   - Ethernet Switched Path

      ISID  - Service Identifier

      ISIS  - Intermediate System to Intermediate System Routing
   Protocol

      ISIS-SPB - ISIS extensions for SPB

      MDT   - Multicast Distribution Tree

      SPF   - Shortest Path Forwarding

      SPB  - Shortest Path Bridging

      TLV   - Type Length Value

      VLAN  - Virtual LAN

2.  SPB control of BMAC forwarding

   SPB uses the terms Backbone Core Bridge (BCB) and Backbone Edge
   Bridge (BEB) to describe the functions of network nodes in the
   network.  These terms describe features that are similar in function
   to the PE and P nodes in an MPLS network.

   SPB enables a loop free construction of Ethernet switched paths
   between every SPB enabled node by reusing some existing components of
   IS-IS and by adding a small set of new IS-IS TLVs. SPB nodes use a
   standard IS-IS mechanism of operation for neighbor discovery and
   database distribution.  SPB utilizes an IS-IS based on IS-IS Ethernet
   link level peering protocol so it does not depend on link level IP
   addressing.  Also, due to the fact that the links are forwarding on
   the source and destination information in the Ethernet header, there
   is no requirement to verify that each node can do IP routing. 
   Multicast Forwarding entries (BMAC FDB or FIB) on each node are
   constructed based on a combination of a nodal unique identifier and a
   administratively controlled service identifier providing multicast
   trees that can be adjusted to match a desired service granularity.

   Each node uses standard IS-IS methods of sharing link state PDU's.
   Those PDUs contain the System-ID of each node, the attached neighbors
     and information such as EVPN ISIDs for SPB.  A unicast SPF process
   runs on each switch to construct the unicast connectivity of each
 


Unbehagen et al        Expires September 6, 2012                [Page 4]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


   switch to every other switch based on these nodal MAC's (BMACs)  
   derived from the System-ID.  Each node that is on the shortest path
   between any other given nodes will install corresponding FDB entries
   only on their associated ports.  This has the added benefit that
   Ethernet FDB entries exist only on nodes that are the source, root,
   or tandem point for a give SPF ESP between any given set of nodes. 
   Any node that does not need to participate in the tandem calculations
   may use the IS-IS overload bit to exclude tandem paths and behave as
   only the root or source for any given service traffic.

3. IP forwarding with SPB

   IP unicast and multicast can leverage this base BMAC switching layer
   by mapping IP to the Ethernet service points. For unicast forwarding
   the standard mechanisms of IS-IS IP route propagation can be used to
   associate remote IP networks to the far end nodal Ethernet address.  

   The encapsulation of IP unicast packets would use the standard method
   to include an Ethertype of 0x800 behind the BMAC header.


      Packets received       Packets in transit      Packets forwarded
      at ingress BEB          in the network          by egress BEB

      +============+          +=============+         +============+
      |  IP Header |          |   IP Header |         |  IP Header |
      +============+   >>>>>  +=============+  >>>>>  +============+
      |    C-MAC   |          |    B-MAC    |         |    C-MAC   |
      +============+          +=============+         +============+


3.1. IP Unicast

   The native unicast entries SPB constructs, provide a simple way of
   enabling end to end switching of IP packets along a deterministic
   Ethernet Switched Path (ESP).  Knowledge of the location of IP
   subnet's is achieved by utilizing the existing functionality of IS-IS
   TLVs for IPv4 and IPv6. The control plane operation becomes one of
   simply creating FDB entries that map IP routes to their points of
   presence. In other words the FDB entry for an IP route simply gives
   the last hop BMAC of the BEB which advertised that route. No shortest
   path computations are required since that has already been
   accomplished by the SPB layer. For IP subnet awareness the existing
   IS-IS TLVs are used to propagate routes. The encapsulation is the
   standard IP in Ethernet encapsulation.

   To enable this behavior, this document specifies an efficient
   learning and forwarding operation where an edge BEB provides a
 


Unbehagen et al        Expires September 6, 2012                [Page 5]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


   standard IP interface to its attached IP devices.  The BEB performs a
   route lookup on the destination IP addresses which will resolve to a
   remote BMAC to forward towards on the SPB portion of the network, and
   then encapsulates the IP packet in a Ethernet header using the
   unicast BMAC operation with a standard IPv4 or IPv6 Ethertype. In
   essence this is IP over Ethernet where the Ethernet is a BMAC based
   Ethernet. One simple way to think of this is that existing ISIS for
   IP implementations forward IP packets to the next hop router, while
   this mechanism forwards an IP packet directly to the last hop BEB
   within the SPB domain thereby eliminating IP forwarding operations on
   tandem devices.

4. IPVPN services with SPB

   Using the TLV extensions described below it is possible to extend SPB
   to not only provide EVPN and the above described IP connectivity, but
   also provide virtualized solutions for IP services such as IPVPNs.
   The next sections will outline the route propagation techniques for
   two different deployment models.

   Two common modes of carrying information are: BGP or ISIS [ISIS]. 
   The IS-IS method will be described in this version of the draft.  The
   control plane encapsulation of VRF routes passed in BGP is similar to
   the method used here with ISIS.

4.1. Route Propagation Techniques

   The ability to share routes within a network can be provided within
   IS-IS.  To accomplish this flexibility the use of a new IPVPN TLV and
   an optional sub-TLV is proposed.
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |R R R R|      MT-ID            |U|Resv |          VID          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |T|R|  Resv   |S|             ISID Value                        |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     Figure 2 IPVPN TLV

   The TLV MAY appear any number of times (including none) within a Link
   State PDU.

   The up/down bit used for notification if this TLV has been leaked
   down into a L1.

   The T bit and R bit are used to signal to the other nodes whether to
   construct Multicast trees to and from this announcing node depending
   on the combination of bits set to 1.  If neither the T nor R bit is
 


Unbehagen et al        Expires September 6, 2012                [Page 6]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


   set, then the IPVPN service is unicast only. The next 4 bits are
   reserved and the S bit is used to signify that the VPN-Route Sub-TLVs
   are present. 

   Sub-TLVs may be set to carry specific routes for each VPN within IS-
   IS.  This allows for routes from multiple VPNs to be carried under
   their respective VPN ISID IDs and allow for overlapping IP subnet's.

   IP/SPB VPN ISIDs are comparable to RFC4364 Route distinguishers and
   route targets to separate VPN traffic in the control plane. VPN
   routes are exchanged through IS-IS and can be distinguished by the
   individual ISID they are associated with.  In order to form different
   types of IP VPNs on BEB's, routes can be exported into ISID's or
   imported from ISID's.

   This document also defines the following new sub-TLV types that need
   to be reflected in the IS-IS sub-TLV registry for the SPB ipvpn TLV:

               Sub-Type        Description
               -------     ------------------------------
                  1        IPv4 Prefix information
                  2        IPv6 Prefix information
                  3	   Reserved
                  4 	   Reserved


   The encapsulation is as follows:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |      Type     |     Length    |            Sub-TLVs           |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     Figure 3 Sub-TLV model


   The sub-TLVs are designed to mimic the top level TLVs for IP
   reachability within the VPN.  Allowing for a given VRF to support
   multiple IP service models within a single VPN-ID.

   Sub-TLV 1 is similar as the Extended IPv4 TLV 135 and MAY appear
   multiple times in the same TLV with a data structure consisting of:






 


Unbehagen et al        Expires September 6, 2012                [Page 7]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |      Type     |     Length    |              Metric           |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |             Metric            |        Resv     |S| Prefix Ln |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                         IPv4 Prefix                           |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     Figure 4 IPv4 sub-TLV

   Sub-TLV 2 is similar to the IPv6 TLV 236 and MAY appear multiple
   times in the same TLV with a data structure consisting of:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |      Type     |     Length    |  Resv     |E|S|   Prefix Ln   |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                            Metric                             |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                         IPv6 Address                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                         IPv6 Address                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     Figure 5 IPv6 sub-TLV


4.2. Ethernet underlay modes - 802.1aq and/or 802.1Qbp

   Shortest Path Bridging supports two major modes for L2VPNs via
   802.1aq [SPB] and 802.1Qbp [ECMP] the behaviors of which may be
   selected on a per ISID basis for carriage of L3VPNs as follows.

   The 802.1aq [SPB] L2 underlay on which IPVPN packets flow, supports
   deterministic and symmetric multiple equal cost routes with hashing
   to the different routes at the head end via normal IP n-tuple or
   other micro flow order preserving hash mechanisms. To obtain this
   behavior the IPVPN TLV VID field MUST contain a BVID value which has
   been associated with one of the 802.1aq ECT-ALGORITHMS by the SPB
   underlay in the SPB Base VLAN-Identifiers sub-TLV. This will cause
   the ISID information which follows to have 802.1aq semantics - i.e.
   (S,G) multicast and symmetric/congruent routing. The normal 802.1aq
   ECT-ALGORITHM values 00-80-C2-01 thru 00-80-C2-10 and their
   associated VIDs are advertised normally in the IIH and LSPs for
   802.1aq and the head end IPVPN behavior is free to hash over any or
   all of those VIDs.

 


Unbehagen et al        Expires September 6, 2012                [Page 8]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


   The 802.1Qbp [ECMP] extensions to [SPB] supports a flow-tag with a
   FlowId and TTL resulting in a per hop hashed choice of next hop by L2
   forwarding. To obtain this behavior the IPVPN TLV VID field MUST
   contain a BVID value which has been associated with one of the
   802.1Qbp ECT-ALGORITHMS by the SPB underlay in the SPB Base VLAN-
   Identifiers sub-TLV.  This will cause the ISID information which
   follows to have 802.1Qbp semantics - i.e. (*,G) and/or (S,G)
   multicast and non deterministic non symmetric routing. The normal
   802.1Qbp ECT-ALGORITHM value 00-80-C2-11 and its associated VIDs are
   advertised normally in the IIH and LSPs for 802.1Qbp and the head end
   IPVPN behavior is free to hash over all ECMP L2 next hops for this
   VID and to insert a flow-tag with appropriate TTL value and FlowId
   based on the L3 hash result. The TTL and FlowId will then be used to
   enable tandem .1Qbp ECMP behavior without knowledge of or inspection
   of the L3VPN headers.

4.3. I-TAG Encapsulation

   For the forwarding of IPVPN traffic the use of the standard 802.1ah
   I-TAG would require the encapsulation of a nulled out CMAC address,
   since the traffic is IP and routed at each BEB there is no need for a
   CMAC. Therefore the more optimal encapsulated method used for IPVPN
   traffic within the SPB network is to use the ISID portion of the I-
   TAG without a CMAC header, called the short I-TAG.  This allows the
   network to carry forward the benefits of the global label/VPN ID
   purpose of the ISID without enforcing unnecessary header overhead.

   The encapsulation of IP packets being forwarded for a IPVPN would use
   a short I-Tag (ISID with no CMAC) behind the BMAC header. While the
   short I-TAG is the recommended mode for carrying IPVPN traffic this
   standard permits the inclusion of a zerod out CMAC. In this case the
   sender MUST zero out the CMAC on transmission and MUST ignore a non-
   zero CMAC on receipt.


     Packets received       Packets in transit      Packets forwarded
     at ingress BEB VRF       in the network         by egress BEB VRF

                             +=============+
                             |  IP Header  |
     +============+          +=============+         +============+
     |  IP Header |          | Short I-TAG |         |  IP Header |
     +============+   >>>>>  +=============+  >>>>>  +============+
     |    C-MAC   |          |    B-MAC    |         |    C-MAC   |
     +============+          +=============+         +============+
     Figure 7 Short I-TAG encapsulation of IPVPN Packets


 


Unbehagen et al        Expires September 6, 2012                [Page 9]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


   Where the ISID encapsulation is as follows. Directly between the VLAN
   and IP header.

     			.1ah I-TAG TCI
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | P/DE  |R1 |R2 |                    I-SID                      |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     Figure 9 Short I-Tag

     P/DE 3 Bits Priority, 1 bit Drop Eligible
     R1 Res1
     R2 Res2

5. Interworking with MPLS based Networks

   Any IP/SPB and/or IPVPN SPB network may exist on its own or may be
   part of a larger network.  For example it may be attached to a
   standard IP or IP/MPLS network.  This section will define a use case
   for using an SPB base network as a method of extending IPVPNs from a
   IP/MPLS core network. A similar model exists for the ELAN service
   that may span both a SPB and VPLS portions of the network as defined
   in [PBBVPLS] The scale and size of the SPB portion of the network and
   network devices can then be utilized more efficiently as a single
   protocol will drain less resources and thereby allow the IPVPN VRFs
   extend closer to the end customer.  Another benefit is that packets
   that are destined within the SPB network can be forwarded directly in
   the SPB portion of the domain without needing to be processed by the
   MPLS PE.




















 


Unbehagen et al        Expires September 6, 2012               [Page 10]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


                               _,,..--..,,,
                           ,-'`            `'-,
                         .`                    `'
                       ,'                        `.
                      /                            ,
                      |         IP MPLS Core       |
                                                  `
                       `.                         `
                         ',                    _-`
                    +------/-,,            _,-,------+
                    |  ,-,/ |  ``'''--'''``   | ,-,  |
           MPLS-PE1 | |VRF| |                 | |VRF| |MPLS-PE2
                    | |   | |     BC-PEs      | |   | |
                    |  `|'  |                 |  `|'  |
                    +-,--,,-+                 +--,--,,+
                    ,'                        ,'     
                   /                         /        
                  |   SPB   |               |   SPB   |
                  |  Network |               |  Network |
                  |          |               |          |
                           /                         /
                    `.     /                   `.     /
              +------`-,,+-------+       +-------+'-'+-------+
              |  ,-,  |  |  ,-,  |       |  ,-,  |   |  ,-,  |
              | |VRF| |  | |VRF| |       | |VRF| |   | |VRF| |
              | |   | |  | |   | |  BEBs | |   | |   | |   | |
              |  `''  |  |  `''  |       |  `''  |   |  `''  |
              +-------+  +-------+       +-------+   +-------+
                BEB1        BEB2             BEB3       BEB4

     Figure 12 MPLS Interworking

   A vrf does Service Address Encapsulation on a VPN basis with some
   entries of the VRF having MPLS labels and some have IPVPN SPB entries
   based on the direction from which the route was learned. The VRF also
   gets information from different topologies.  Routes learned via BGP
   have FIB entries pointing to the appropriate next hop and Label set. 
   While routes learned from the IPVPN ISID SPB domain have FDB entries
   for the appropriate BMAC address and ISID.

   Route propagation to and from each domain happens naturally via the
   protocol interaction within a given VRF.  Routes learned from the SPB
   domain are automatically announced into the BGP domain or may have
   policies applied and routes learned from other PE's from BGP are
   automatically propagated towards the CE's by injecting them into the
   SPB domain as a sub-TLV under the VRF's IPVPN ISID TLV.


 


Unbehagen et al        Expires September 6, 2012               [Page 11]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


6. OAM

   Various techniques exist within the Ethernet standards space for
   scalable management of Ethernet based networks. For example OAM
   techniques defined in the IEEE 802.ag and the ITU Y.1731 can be used
   for the IP based services similarly as they are defined for the EVPNs

7. Security Considerations

   The extensions defined in this document do not incur any additional
   security considerations. Any IS-IS SPB network may utilize the
   security enhancements already defined within the IS-IS working group.


8. IANA Considerations

   IP/SPB requires that IANA/ISO allocate a new number from ISIS-TLV
   Codepoints for the IPVPN TLV.

   IP/SPB also requires that IANA/ISO allocate a new registry for sub
   TLV values within the above TLV. The first four values being:      1
   IPV4      2 IPV6      3 reserved      4 reserved


9. References

9.1 Normative References

   [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [MTISIS]   Przygienda, T., Shen, N., and N. Sheth, "M-ISIS: Multi
              Topology (MT) Routing in Intermediate System to
              Intermediate Systems (IS-ISs)", RFC 5120, February 2008.

   [IPVPN]    Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
              Networks (VPNs)", RFC 4364, February 2006.

   [802.1AQ] "IEEE P802.1aq/D4.5 Draft Standard for Local and           
              Metropolitan Area Networks -- Media Access Control (MAC)  
              Bridges and Virtual Bridged Local Area Networks,          
              Amendment 8: Shortest Path Bridging", IEEE 802.1aq D4.5,  
              Feb 6, 2012

   [802.1AQ] Ashwood-Smith, P, Fedyk, D., "IS-IS Extensions Supporting  
             IEEEE 802.1aq Shortest Path Bridging" RFC 6329, XXX, 2012.

9.2 Informative References
 


Unbehagen et al        Expires September 6, 2012               [Page 12]

INTERNET DRAFT                   IP/SPB                    March 5, 2012


   [IEEE802.1ah] "IEEE Standard for Local and Metropolitan Networks,    
           Virtual Bridged Local Area Networks, Amendment 7:            
           Provider Backbone Bridges" IEEE Std 802.1ah - 2008           
           amendment to IEEE 802.Q - 2005.

   [ISIS]  ISO/IEC 10589:2002, "Intermediate system to Intermediate     
          system routing information exchange protocol,"                
          ISO/IEC10589:2002.

   [PBBVPLS] Extensions to VPLS PE model for Provider Backbone Bridging,
            IETF, Internet Draft, draft-ietf-l2vpn-pbb-vpls-pe-model-   
            00.txt, Work in Progress, May 12 2009

10. Acknowledgments

      The authors would like to thank Don Fedyk for input into the
   contents of this document. And also Dave Allan, Nigel Bragg, Gautam
   Khera, Srikanth Keesara and Harish Sankaran for their detailed review
   of larger work that is behind this memo.

   This document was prepared using nroff.

Authors' Addresses

   Paul Unbehagen Jr
   Avaya
   1300 W. 120th Avenue 
   Westminster, CO 80234 USA 
   Email: unbehagen@avaya.com

   Roger Lapuh
   Avaya
   Flughofstrasse 54
   8152 Glattbrugg
   Switzerland
   Email: rlapuh@avaya.com

   Peter Ashwood-Smith
   Huawei Technologies Canada LTD.
   303 Terry Fox drive, Suite 400
   Kanata, Ontario , K2K 2J1, Canada
   Email: peter.ashwoodsmith@huawei.com

   Susan Hares
   Huawei 
   Email: shares@ndzh.com
   1-734-604-0332

 


Unbehagen et al        Expires September 6, 2012               [Page 13]

INTERNET DRAFT                   IP/SPB                    March 5, 2012





















































Unbehagen et al        Expires September 6, 2012               [Page 14]