Internet DRAFT - draft-zhang-mac-forced-forwarding-vepa

draft-zhang-mac-forced-forwarding-vepa



 



INTERNET-DRAFT                                              Mingui Zhang
Intended Status: Proposed Standard                           Xingjian He
Expires: April 25, 2013                                           Huawei
                                                        October 22, 2012

             MAC-Forced Forwarding Inter-operates with VEPA
             draft-zhang-mac-forced-forwarding-vepa-01.txt

Abstract

   If MAC Forced Forwarding (RFC4562) is enabled on Top Of Rack
   switches, ARPing messages exchanged within a Customer Premises
   Network should be discarded. However, when Virtual Ethernet Port
   Aggregator is deployed in the Customer Premises Network, this kind of
   discarding may disconnect VMs within the same subnet. This document
   suggests interfaces should be differentiated to address this problem.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html


Copyright and License Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
 


Mingui Zhang             Expires April 25, 2013                 [Page 1]

INTERNET-DRAFT        MAC-Forced Forwarding & VEPA      October 22, 2012


   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1. Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1. Conventions used in this document . . . . . . . . . . . . .  3
     1.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . .  3
   2. Customer Premises Networks Deploy VEPA  . . . . . . . . . . . .  3
     2.1. Intercommunication Between Customers  . . . . . . . . . . .  4
     2.2. VMs from the Same Customer  . . . . . . . . . . . . . . . .  5
   3. Interface Classification  . . . . . . . . . . . . . . . . . . .  5
     3.1. Network Interface . . . . . . . . . . . . . . . . . . . . .  5
     3.2. Normal User Interface . . . . . . . . . . . . . . . . . . .  5
     3.3. Isolated User Interface . . . . . . . . . . . . . . . . . .  5
   4. Security Considerations . . . . . . . . . . . . . . . . . . . .  5
   5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . .  6
   6. References  . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     6.1. Normative References  . . . . . . . . . . . . . . . . . . .  6
     6.2. Informative References  . . . . . . . . . . . . . . . . . .  6
   Author's Addresses . . . . . . . . . . . . . . . . . . . . . . . .  7























 


Mingui Zhang             Expires April 25, 2013                 [Page 2]

INTERNET-DRAFT        MAC-Forced Forwarding & VEPA      October 22, 2012


1. Introduction

   MAC Forced Forwarding (MFF) is specified in RFC 4562. According to
   it, MFF does not reply an ARP request destined to a VM located in the
   same Customer Premises Network (CPN) since it is assumed that this
   ARP request should have been replied within the CPN. However, this
   mechanism does not work any more when Virtual Ethernet Port
   Aggregator (VEPA) is deployed in this CPN.

   According to 802.1Qbg, when VEPA is used on servers, upstream frames
   via the same interface may come from different customers or different
   subnet from a same customer. All ARPing messages will be output to
   the external switch (i.e., the Ethernet Access Node as specified in
   RFC 4562. It corresponds to the Top Of Rack switches in Data Center
   Networks) via this interface. The ARP request should also be replied
   by the ARP proxy of this external switch, or else VMs attached to
   this VEPA will be disconnected.

   This document introduces 'isolated user interfaces' for VEPA. ARP
   request received via this kind of interface SHOULD NOT be discarded.
   The Ethernet Access Node's (EAN) ARP proxy MUST reply to it with the
   MAC address of the target Access Router (AR).

1.1. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

1.2. Terminology

   ARP: Address Resolution Protocol
   VM: Virtual Machine
   VEPA: Virtual Ethernet Port Aggregator
   MFF: The MAC Forced Forwarding technique provided in RFC 4562
   CPN: Customer Premises Network
   EAN: Ethernet Access Node
   AR: Access Router

2. Customer Premises Networks Deploy VEPA

   A Virtual Ethernet Port Aggregator (VEPA) outputs switching traffic
   to external switches and external switches provide layer 2
   connectivity for VMs. Customer Premises Networks may deploy VEPA
   therefore the Access Control List, Quality of Service, security and
   filtering, etc, can be executed on the external switch. This kind of
   offloading also frees up servers' resources consumed by switching
   functions.
 


Mingui Zhang             Expires April 25, 2013                 [Page 3]

INTERNET-DRAFT        MAC-Forced Forwarding & VEPA      October 22, 2012


   The following two sections analyzes the connectivity issues that may
   happen when VEPA inter-operates with MAC Forced Forwarding.

      Access       Aggregation  Access    Subscriber    Customer
      Routers      Network      Nodes     Lines         Premises
                                                        Networks
      +----+           |                             *************
    --+ AR +-----------|        +----+             +-*[]-------- *
      +----+           |        |    |(2)      VEPA| *************
                       |--------+ AN1+=============+
                       |     (1)|    |             |
                       |        +----+             | #############
                       |                           +-#[]-------- #
                       |        +----+(4)            #           #
                       |        |    +---------------#[]-------- #
                       |--------+ AN2|               #           #
                       |     (3)|    +---------------#[]-------- #
                       |        +----+(5)            #############
                       |
                       |        +----+               @@@@@@@@@@@@@
                       |        |    |(7)      VEPA+-@[]-------- @
                       |--------+ AN3+=============+ @           @
      +----+           |     (6)|    |             +-@[]-------- @
    --+ AR +-----------|        +----+               @@@@@@@@@@@@@
      +----+

          Figure 2.1: VEPA is deployed on the subscriber line.

2.1. Intercommunication Between Customers

   When an ARP request is sent to query a MAC address of a VM located in
   a different CPN, the EAN's ARP proxy will reply the request with the
   MAC address of an AR [RFC4562].

   When VEPA is deployed on Customer Premises servers, multiple CPNs may
   share the same subscribe line to communicate with each other
   [802.1Qbg]. Therefore an ARP request may need be answered by a VM
   from another CPN connected by the same subscribe line.  

   According to RFC 4562, EANs never answer an ARP request message via
   the same interface where it is received. MFF takes it for granted
   that the ARP request for a VM connected by the same subscribe line
   should have been answered by the target host. Therefore, the EAN will
   discard the ARPing messages directly thus these VMs will be
   disconnected.

   In Figure 2.1, the subscriber line attached to interface (2) faces
   the above problem.
 


Mingui Zhang             Expires April 25, 2013                 [Page 4]

INTERNET-DRAFT        MAC-Forced Forwarding & VEPA      October 22, 2012


2.2. VMs from the Same Customer

   Without VEPA, an ARP request to a target VM located in the same CPN
   is assumed to be directly answered by this VM. Therefore the attached
   EAN SHOULD discard this ARP request [RFC4562]. 

   However, when VEPA is deployed, the ARP request will not be answered
   within the CPN. VEPA will output the ARPing to the external switch.
   If the EAN discard the ARPing messages received from the subscriber
   line, VMs of this CPN will be disconnected.

   In Figure 2.1, the subscriber line attached to interface (7) faces
   the above problem.

3. Interface Classification

   According to the analysis in Section 2, whether an ARP request from a
   subscriber line should be answered by the ARP proxy depends on
   whether VEPA is used on this line. Interfaces connected to subscriber
   lines are distinguished to address this difference in this section.

3.1. Network Interface

   The interface where an EAN is connected to ARs is called the 'network
   interface'.

   In Figure 2.1, interface (1) (3) (6) are network interfaces.

3.2. Normal User Interface

   By default, the interface attached to a subscriber line will be set
   to be a 'normal user interface'. Legacy MAC Forced Forwarding rules
   apply to this kind of interfaces.

   In Figure 2.1, interfaces (4) and (5) are normal user interfaces.

3.3. Isolated User Interface

   When VEPA is used on a subscriber line, the interface SHOULD be set
   to be an 'isolated user interface'. EANs MUST use ARP proxy to reply
   ARP requests received on this kind of interfaces.

   In Figure 2.1, interfaces (2) and (7) are isolated user interfaces.

4. Security Considerations

   This document raises no new security issues.

 


Mingui Zhang             Expires April 25, 2013                 [Page 5]

INTERNET-DRAFT        MAC-Forced Forwarding & VEPA      October 22, 2012


5. IANA Considerations

   No new registry is requested to be assigned by IANA. RFC Editor:
   please remove this section before publication.

6. References 

6.1. Normative References

   [RFC4562] Melsen, T. and S. Blake, "MAC-Forced Forwarding: A Method
             for Subscriber Separation on an Ethernet Access Network",
             RFC 4562, June 2006.

6.2. Informative References

   [802.1Qbg]"IEEE Standard for Local and Metropolitan Area Networks---
             Virtual Bridged Local Area Networks - Amendment: Edge
             Virtual Bridging.". IEEE Std 802.1 Qbg-2009, December 9,
             2009.





























 


Mingui Zhang             Expires April 25, 2013                 [Page 6]

INTERNET-DRAFT        MAC-Forced Forwarding & VEPA      October 22, 2012


Author's Addresses


   Mingui Zhang
   Huawei
   	
   Email: zhangmingui@huawei.com

   Xingjian He
   Huawei

   xingjian.he@huawei.com	







































Mingui Zhang             Expires April 25, 2013                 [Page 7]