draft-ietf-bess-mvpn-fast-failover-09.txt   draft-ietf-bess-mvpn-fast-failover-10.txt 
Network Working Group T. Morin, Ed. Network Working Group T. Morin, Ed.
Internet-Draft Orange Internet-Draft Orange
Intended status: Standards Track R. Kebler, Ed. Intended status: Standards Track R. Kebler, Ed.
Expires: August 4, 2020 Juniper Networks Expires: August 13, 2020 Juniper Networks
G. Mirsky, Ed. G. Mirsky, Ed.
ZTE Corp. ZTE Corp.
February 1, 2020 February 10, 2020
Multicast VPN fast upstream failover Multicast VPN fast upstream failover
draft-ietf-bess-mvpn-fast-failover-09 draft-ietf-bess-mvpn-fast-failover-10
Abstract Abstract
This document defines multicast VPN extensions and procedures that This document defines multicast VPN extensions and procedures that
allow fast failover for upstream failures, by allowing downstream PEs allow fast failover for upstream failures, by allowing downstream PEs
to take into account the status of Provider-Tunnels (P-tunnels) when to take into account the status of Provider-Tunnels (P-tunnels) when
selecting the upstream PE for a VPN multicast flow, and extending BGP selecting the upstream PE for a VPN multicast flow, and extending BGP
MVPN routing so that a C-multicast route can be advertised toward a MVPN routing so that a C-multicast route can be advertised toward a
standby upstream PE. standby upstream PE.
skipping to change at page 1, line 46 skipping to change at page 1, line 46
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 4, 2020. This Internet-Draft will expire on August 13, 2020.
Copyright Notice Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 45 skipping to change at page 2, line 45
4.2. Upstream PE behavior . . . . . . . . . . . . . . . . . . 12 4.2. Upstream PE behavior . . . . . . . . . . . . . . . . . . 12
4.3. Reachability determination . . . . . . . . . . . . . . . 13 4.3. Reachability determination . . . . . . . . . . . . . . . 13
4.4. Inter-AS . . . . . . . . . . . . . . . . . . . . . . . . 13 4.4. Inter-AS . . . . . . . . . . . . . . . . . . . . . . . . 13
4.4.1. Inter-AS procedures for downstream PEs, ASBR fast 4.4.1. Inter-AS procedures for downstream PEs, ASBR fast
failover . . . . . . . . . . . . . . . . . . . . . . 14 failover . . . . . . . . . . . . . . . . . . . . . . 14
4.4.2. Inter-AS procedures for ASBRs . . . . . . . . . . . . 14 4.4.2. Inter-AS procedures for ASBRs . . . . . . . . . . . . 14
5. Hot Root Standby . . . . . . . . . . . . . . . . . . . . . . 14 5. Hot Root Standby . . . . . . . . . . . . . . . . . . . . . . 14
6. Duplicate packets . . . . . . . . . . . . . . . . . . . . . . 15 6. Duplicate packets . . . . . . . . . . . . . . . . . . . . . . 15
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15
7.1. BFD Discriminator . . . . . . . . . . . . . . . . . . . . 15 7.1. BFD Discriminator . . . . . . . . . . . . . . . . . . . . 15
7.2. BFD Discriminator Extention Type . . . . . . . . . . . . 16 7.2. BFD Discriminator Extension Type . . . . . . . . . . . . 16
8. Security Considerations . . . . . . . . . . . . . . . . . . . 17 8. Security Considerations . . . . . . . . . . . . . . . . . . . 17
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 17 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 17
10. Contributor Addresses . . . . . . . . . . . . . . . . . . . . 17 10. Contributor Addresses . . . . . . . . . . . . . . . . . . . . 17
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 19 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 19
11.1. Normative References . . . . . . . . . . . . . . . . . . 19 11.1. Normative References . . . . . . . . . . . . . . . . . . 19
11.2. Informative References . . . . . . . . . . . . . . . . . 20 11.2. Informative References . . . . . . . . . . . . . . . . . 20
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 20 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 20
1. Introduction 1. Introduction
skipping to change at page 16, line 34 skipping to change at page 16, line 34
+-------+------------------+---------------+ +-------+------------------+---------------+
| Value | Description | Reference | | Value | Description | Reference |
+-------+------------------+---------------+ +-------+------------------+---------------+
| 0 | Reserved | This document | | 0 | Reserved | This document |
| TBA3 | P2MP BFD Session | This document | | TBA3 | P2MP BFD Session | This document |
| 255 | Reserved | This document | | 255 | Reserved | This document |
+-------+------------------+---------------+ +-------+------------------+---------------+
Table 2: BFD Mode Table 2: BFD Mode
7.2. BFD Discriminator Extention Type 7.2. BFD Discriminator Extension Type
IANA is requested to create a new BFD Discriminator Extention Type IANA is requested to create a new BFD Discriminator Extension Type
sub-registry in Border Gateway Protocol (BGP) Parameters registry as sub-registry in Border Gateway Protocol (BGP) Parameters registry as
described in Table 3. described in Table 3.
+---------+-------------+-------------------------+ +---------+-------------+-------------------------+
| Value | Description | Reference | | Value | Description | Reference |
+---------+-------------+-------------------------+ +---------+-------------+-------------------------+
| 0 | Reserved | | | 0 | Reserved | |
| 1-191 | Unassigned | IETF Review | | 1-191 | Unassigned | IETF Review |
| 192-251 | Unassigned | First Come First Served | | 192-251 | Unassigned | First Come First Served |
| 252-254 | Unassigned | Private Use | | 252-254 | Unassigned | Private Use |
| 255 | Reserved | | | 255 | Reserved | |
+---------+-------------+-------------------------+ +---------+-------------+-------------------------+
Table 3: BFD Discriminator Extention Type Sub-registry Table 3: BFD Discriminator Extension Type Sub-registry
8. Security Considerations 8. Security Considerations
This document describes procedures based on [RFC6513] and [RFC6514] This document describes procedures based on [RFC6513] and [RFC6514]
and hence shares the security considerations respectively represented and hence shares the security considerations respectively represented
in these specifications. in these specifications.
This document makes use of BFD, as defined in [RFC8562], which, in This document makes use of BFD, as defined in [RFC8562], which, in
turn, is based on [RFC5880]. Security considerations relevant to turn, is based on [RFC5880]. Security considerations relevant to
each protocol are discussed in the respective protocol each protocol are discussed in the respective protocol
 End of changes. 8 change blocks. 
8 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/