<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" docName="draft-sharma-bess-multi-site-evpn-05" category="info" ipr="trust200902" obsoletes="" updates="" xml:lang="en" symRefs="true" sortRefs="false" tocInclude="true">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <!-- Generated by id2xml 1.5.2 on 2023-11-05T18:49:27Z -->
	<front>
    <title abbrev="Multi-Site EVPN">Multi-Site Solution for Ethernet VPN (EVPN) Overlay</title>
    <seriesInfo name="Internet-Draft" value="draft-sharma-bess-multi-site-evpn-04"/>
    <author initials="L." surname="Krattiger" fullname="Lukas Krattiger" role="editor">
      <organization>Cisco Systems</organization>
      <address> <email>lkrattig@cisco.com</email> </address>
    </author>
    <author initials="A." surname="Banerjee" fullname="Ayan Banerjee" role="editor">
      <organization>Cisco Systems</organization>
      <address> <email>ayabaner@cisco.com</email> </address>
    </author>
    <author initials="A." surname="Sajassi" fullname="Ali Sajassi">
      <organization>Cisco Systems</organization>
      <address> <email>sajassi@cisco.com</email> </address>
    </author>
    <author initials="K." surname="Ananthamurthy" fullname="K. Ananthamurthy">
      <organization>Cisco Systems</organization>
      <address> <email>kriswamy@cisco.com</email> </address>
    </author>
    <author initials="R." surname="Sharma" fullname="R. Sharma">
      <organization>Cisco Systems</organization>
      <address> <email>ramsharm@cisco.com</email> </address>
    </author>
    <date year="2023" month="November" day="04"/>
    <workgroup>BESS Working Group</workgroup>
    <abstract>
      <t>
   This document describes the procedures for interconnecting two or
   more Network Virtualization Overlays (NVOs) with EVPN via NVO over
   IP-only network. The solution interconnects Ethernet VPN network by
   using NVO with Ethernet VPN (EVPN) to facilitate the interconnect in
   a scalable fashion. The motivation is to support extension of Layer-2
   and Layer-3, Unicast &amp; Multicast, VPNs without having to rely on
   typical Data Center Interconnect (DCI) technologies like MPLS/VPLS.
   The requirements for the interconnect are similar to the ones
   specified in <xref target="RFC7209" format="default"/>, "Requirements for Ethernet VPN (EVPN)". In
   particular, this document describes the difference of the Gateways
   (GWs) procedure and combined functionality from <xref target="RFC9014" format="default"/>,
   "Interconnect Solution for Ethernet VPN (EVPN) Overlay Networks" and
   and <xref target="I-D.ietf-bess-evpn-ipvpn-interworking" format="default"/>, "EVPN Interworking with IPVPN", which this solution
   is interoperable to. This document updates and replaces all previous
   version of Multi-site EVPN based VXLAN using Border Gateways (draft-
   sharma-multi-site-evpn).</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
   Ethernet VPNs (EVPNs) are being used to support various VPN
   topologies with the motivation and requirements being discussed in
   <xref target="RFC7209" format="default"/>. EVPN has been used as the control plane to provide a
   Network Virtualization Overly (NVO) solution with a variety of tunnel
   encapsulation options, as per <xref target="RFC8365" format="default"/>. The Layer-2 Data center
   interconnect (DCI) procedures for IP and MPLS hand-off at domain
   boundaries are additionally discussed in <xref target="RFC9014" format="default"/>, which is
   complemented by <xref target="I-D.ietf-bess-evpn-ipvpn-interworking" format="default"/> for Layer-3 DCI. The Multi-Site Solution
   combines Layer-2 and Layer-3 DCI for Ethernet VPN (EVPN) Overlay.</t>
      <t>
   In current EVPN deployments, there is a need to segment the EVPN
   domains within a Data Center (DC), primarily due to the service
   architecture and the scaling requirements around it. The number of
   routes, tunnel end-points (TEPs), and next-hops needed within a DC
   domain are sometimes larger than the capability of the hardware
   elements that are being deployed. Network operators would like to
   interconnect these domains without using traditional DCI
   technologies. In essence, they want smaller EVPN domains with an IP-
   based backbone to interconnect. Additionally, they seek a simple and
   scalable redundancy model for the interconnect gateway with IP-based
   ECMP load distribution that does not incur additional protocol
   requirements to any of the surrounding TEPs. Using Anycast for the
   gateway redundancy provides minimal state sharing and it can scale
   out widely. A number of gateways participate in a  Anycast set, which
   is represented by a single Anycast IP Address often also referred to
   as Virtual IP address or VIP. A group of gateways shares the same VIP
   and together represents the entry and exit of a given DC domain. The
   many TEPs within a DC domain are masqueraded behind a single Anycast
   TEP, which represents the gateway between the DC internal and DC
   external domain. Also, the Anycast gateway approach alleviates the
   hardware of performing multi-path for overlay reachability and
   respectively reduces control plane paths.</t>
      <t>
   Network operators today are using the Virtual Network Identifier
   (VNI) to designate a service.  They would like to have this service
   available to a smaller set of nodes within the DC for administrative
   reasons; in essence they want to break up the EVPN domain to multiple
   smaller administrative domains. An advantage of having a smaller
   footprint for these EVPN sites results in fault isolation domains
   being constrained. It also allows for flexible VNI allocation across
   sites, which subsequent can be stitched together for end-to-end
   communication.</t>
      <t>
   In this document we focus on the Layer-2 and Layer-3 DCI with VXLAN
   encapsulation for EVPN deployments with the underlay providing only
   IP connectivity. We describe in detail the IP/VXLAN gateway procedure
   using the Anycast mode to interconnect smaller sites within the data
   center itself, and refer to this deployment model as multi-site EVPN
   (MS-EVPN). The procedures described here goes into substantial
   details regarding interconnecting Layer-2 (L2) and Layer-3 (L3)
   networks, for unicast and multicast domains across MS-EVPNs using the
   Anycast gateway model. In this specification, we are based on the
   <xref target="RFC9014" format="default"/> definitions for Layer-2 DCI with addition for operating
   with an Anycast gateway approach. The Anycast gateway mode as
   describe within this document can be extended to interop with a DC
   domain that interconnects with a <xref target="RFC9014" format="default"/> gateway, referred to as
   multi-path gateway.</t>
    </section>
    <section anchor="sect-2" numbered="true" toc="default">
      <name>Conventions and Terminology</name>
      <t>
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 <xref target="RFC2119" format="default"/> [RFC8174] when, and only when, they appear in all
   capitals, as shown here.</t>
      <dl newline="false" spacing="normal" indent="1">
        <dt>DC:</dt>
        <dd>
          <t>
	Data Center
          </t>
          <t/>
        </dd>
        <dt>DCI:</dt>
        <dd>
          <t>
	Data Center Interconnect
          </t>
          <t/>
        </dd>
        <dt>DF:</dt>
        <dd>
          <t>
	Designated Forwarder
          </t>
          <t/>
        </dd>
        <dt>EVI:</dt>
        <dd>
          <t>
	EVPN Instance
          </t>
          <t/>
        </dd>
        <dt>EVPN:</dt>
        <dd>
          <t>
	Ethernet Virtual Private Network, as in <xref target="RFC7432" format="default"/>
          </t>
          <t/>
        </dd>
      </dl>
      <t>
   Border Gateway (BGW): This is the gateway node that is located
   between the DC/site internal and DC/site external domain. It is
   responsible for functionality related to traffic entering and exiting
   a site.</t>
      <t>
   Anycast Border Gateway (A-BGW): A virtual set of BGWs sharing the
   same Anycast IP address (Virtual IP / VIP) acting as common
   entry/exit points for a single site.</t>
      <t>
   Multipath Border Gateway: A virtual set of unique gateways, as
   described in <xref target="RFC9014" format="default"/>, acting as a multiple individual entry/exit
   points for a single site.</t>
      <dl newline="false" spacing="normal" indent="1">
        <dt>ES:</dt>
        <dd>
          <t>
	Ethernet Segment
          </t>
          <t/>
        </dd>
        <dt>ESI:</dt>
        <dd>
          <t>
	Ethernet Segment Identifier
          </t>
          <t/>
        </dd>
        <dt>GW:</dt>
        <dd>
          <t>
	Gateway or Data Center Gateway
          </t>
          <t/>
        </dd>
      </dl>
      <t>
   I-ES and I-ESI: Interconnect Ethernet Segment and Interconnect
   Ethernet Segment Identifier.  An I-ES is defined on the GWs for
   multihoming to/from the WAN.</t>
      <t>
   RT-X: Route Type X as defined for various EVPN route types.</t>
      <t>
   VNI: refers to VXLAN virtual identifiers</t>
      <t>
   VXLAN: Virtual eXtensible LAN</t>
    </section>
    <section anchor="sect-3" numbered="true" toc="default">
      <name>Multi-Site EVPN Overview</name>
      <t>
   In this section we describe the motivation, requirements, and
   framework for the Multi-Site EVPN (MS-EVPN) functionality. To
   introduce the Multi-Site solution, we compare <xref target="RFC9014" format="default"/> with the
   Multi-Site solution of this I-D.</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
+--------------+--------------------+-------------------------------+
|              | DCI EVPN-Overlay   | Multi-Site                    |
+--------------+--------------------+-------------------------------+
| Interconnect | Integrated (1-Box) | Integrated (1-Box)            |
|              | Decoupled (2-Box)  |                               |
+--------------+--------------------+-------------------------------+
| DCI Encap    | VPLS, PBB-VPLS,    | VXLAN                         |
|              |  EVPN-NPLS,        |                               |
|              |  PBB-EVPN, VXLAN   |                               |
+--------------+--------------------+---------------+---------------+
| Gateway Mode | Multipath PIP      | Anycast VIP   | Multipath PIP |
+--------------+--------------------+---------------+---------------+
| ECMP         | Underlay and       | Underlay      | Underlay and  |
|              |  Overlay           |               |  Overlay      |
+--------------+--------------------+---------------+---------------+
| RT-1 on GW   | Consumed           | None          | Consumed      |
|              |  and Generated     |               |  and Generated|
|              |              (PIP) |               |       and PIP |
+--------------+--------------------+---------------+---------------+
| RT-2 on GW   | Re-Originated by   | Re-Originated | Re-Originated |
|              | GW with I-ESI (PIP)|  with ESI 0   |  with I-ESI   |
|              |                    |       and VIP |       and PIP |
+--------------+--------------------+---------------+---------------+
| RT-3 on GW   | Consumed and       | Consumed and  | Consumed and  |
|              |  Generated (PIP)   |Generated (PIP)|Generated (PIP)|
+--------------+--------------------+---------------+---------------+
| RT-4 on GW   | Consumed and       | Consumed and  | Consumed and  |
|              |  Generated (PIP)   |Generated (PIP)|Generated (PIP)|
+--------------+--------------------+---------------+---------------+
| RT-5 on GW   | [EVPN-IPVPN]       | Re-Originated | Re-Originated |
|              |       next-hop PIP |      with VIP |      with PIP |
+--------------+--------------------+---------------+---------------+
| Route        | Separate RD for    | Separate RD for VIP and PIP   |
| Distinguisher|  Intra and Inter DC|                               |
+--------------+--------------------+-------------------------------+
| Route Target | Separate RT for    | Same RT for Intra and Inter   |
|              |  Intra and Inter DC|    DC with option to separate |
+--------------+--------------------+-------------------------------+
| VNI          | Global and         | Global and Downstream         |
|  Allocation  |  Downstream        |                               |
+--------------+--------------------+-------------------------------+
|  Stitching at| Gateway            | Gateway                       |
+--------------+--------------------+-------------------------------+
| DF Election  | Based on RT-4      | Based on RT-4                 |
+--------------+--------------------+-------------------------------+
|  Identifier  | I-ESI              | I-ESI (Site-ID)               |
+--------------+--------------------+-------------------------------+
|  Split       | Local Bias         | Local Bias                    |
|   Horizon    |                    |                               |
+--------------+--------------------+-------------------------------+
|  ESI-Type    | Type 0             | Type 5 (AS Based) or          |
|              |  (Operator Managed)|  Type 3 (MAC based)           |
+--------------+--------------------+-------------------------------+
| BUM Tree #   | 2, GW stitched     | 2, GW stitched                |
|              | (Intra & Inter DC) |  (Intra & Inter DC)           |
+--------------+--------------------+-------------------------------+
]]></artwork>
      <section anchor="sect-3.1" numbered="true" toc="default">
        <name>MS-EVPN Interconnect Requirements</name>
        <t>
   a. Scalability: Multi-Site EVPN (MS-EVPN) should be able to
   interconnect multiple sites, allowing for addition/deletion of new
   sites or modifying capacity of existing ones seamlessly.</t>
        <t>
   b. Multi-Destination traffic over unicast-only backbone: MS-EVPN
   mechanisms should provide an efficient forwarding mechanism for
   multi-destination frames by using existing network elements as-is. A
   large flat fabric rules out the option of ingress replication, as the
   number of replications becomes practically unachievable due to the
   internal hardware bandwidth needed.</t>
        <t>
   c. Maintain Site-specific Administrative control: MS-EVPN should be
   able to interconnect fabrics from different Administrative domains.
   The solution should allow for different sites to have different VLAN-
   VNI mappings, use different underlay routing protocols, and/or have
   different PIM-SM group ranges.</t>
        <t>
   d. Isolate fault domains: MS-EVPN technology hand-off should have
   capability to isolate traffic across site boundaries and prevent
   defects to percolate from one site to another. As an example, a
   broadcast storm in a site should not propagate to other sites.</t>
      </section>
      <section anchor="sect-3.2" numbered="true" toc="default">
        <name>MS-EVPN Interconnect concept and framework</name>
        <t>
   MS-EVPN is conceptualized as multiple EVPN control plane and NVO
   forwarding domains, interconnected via a single common EVPN control
   and NVO forwarding domain. A set of gateway node are identified with
   a unique identifier, which then represent a site. A site is a EVPN
   domain, consisting of multiple EVPN nodes frontended by a set of
   gateways.</t>
        <t>
   Border Gateways (BGWs) are explicitly part of one site-specific EVPN
   domain, and implicitly part of a common interconnect EVPN domain wit
   BGWs from other sites. Although a BGW has only a single explicit
   site-id (that of the site it is a member of, see Section X.X), it can
   be considered to also have a second implicit site-id, that of the
   interconnect-domain which has membership of all the BGWs from all
   sites that are being interconnected. BGWs act implicitly given they
   are the BGP next-hop from an entry/exit perspective; they perform
   both, the control and forwarding plane gateway functionally. This
   facilitates site internal nodes to visualize all other sites to be
   reachable only via its BGWs</t>
        <t>
   We describe the MS-EVPN deployment model using the topology as shown
   in Figure 1. In the topology there are 3 sites, Site A, Site B, and
   Site C that are inter-connected using a IP backbone. This entire
   topology is deemed to be part of the same Data Center. In most
   deployments these sites can be thought of as pods, which may span a
   rack, a row, or multiple rows in the data center, depending on the
   size of domain desired for scale and fault and/or administrative
   isolation. Nothing prevents MS-EVPN to perform long distance or
   geographically dispersed Data center interconnect service.</t>
        <t>
   In this topology, site internal nodes are connected to each other by
   iBGP EVPN peering and BGWs are connected by eBGP Muti-hop EVPN
   peering towards remote site BGW. We explicitly spell this out to
   ensure that we can re-use BGP semantics of route announcement between
   and across the sites. Other BGP mechanisms to instantiate this will
   be discussed in a separate document. This implies that each
   domain/site has its own AS number. In the topology, only 2 border
   gateway per site are shown; this is more for ease of illustration and
   explanation. The technology poses no such limitation. As mentioned
   earlier, site internal EVPN domain consists of only nodes within a
   site. A BGW is logically partitioned into site internal EVPN domain
   towards the site and into common EVPN domain towards other sites
   (external). This facilitates them to act as control and forwarding
   plane gateway for forwarding traffic across sites.</t>
        <t>
   EVPN nodes within a site will discover each other via regular EVPN
   procedures and build site internal bidirectional VXLAN tunnels and
   multi-destination trees from leaves to BGWs. Similarly BGWs will
   discover each other by regular EVPN procedure and build site external
   bi-directional VXLAN tunnels and multi-destination trees between
   them. We thus build an end-to-end bidirectional forwarding path
   across all sites by stitching (and not by stretching end-to-end) site
   internal VXLAN tunnels with site external VXLAN tunnels. In essence,
   a MS-EVPN fabric is built in complete downstream and modular fashion.</t>
        <figure anchor="ure-1">
          <artwork name="" type="" align="left" alt=""><![CDATA[
    +----+    +----+        +----+    +----+          ___
    |    |    |    |        |    |    |    |           |
    |NVE1|    |NVE2|        |NVE3|    |NVE4|           |
    |    |    |    |        |    |    |    |           |
    +----+    +----+        +----+    +----+           |
      |         |             |         |            EVPN
  +------------------+    +------------------+        Ovl*
  |                  |    |                  |         |
  |     Site A       |    |      Site B      |         |
  | +----+    +----+ |    | +----+    +----+ |         |
  +-|    |----|    |-+    +-|    |----|    |-+         |
    |BGW1|    |BGW2|        |BGW3|    |BGW4|          ---
+---|    |----|    |--------|    |----|    |---+       |
|   +----+    +----+        +----+    +----+   |       |
|                                              |       |
|                 IP Backbone                  |      EVPN
|                                              |      Ovl*
|              +----+     +----+               |       |
+--------------|    |-----|    |---------------+       |
               |BGW5|     |BGW6|                      ---
           +---|    |-----|    |---+                   |
           |   +----+     +----+   |                   |
           |         Site C        |                   |
           |                       |                   |
           +-----------------------+                   |
                |          |                         EVPN
              +----+    +----+                       Ovl*
              |    |    |    |                         |
              |NVE5|    |NVE6|                         |
              |    |    |    |                         |
              +----+    +----+                        ---

* EVPN-Ovl stands for EVPN-Overlay (and it's an interconnect option).
]]></artwork>
        </figure>
        <t>
   Intra site tenant domains (for example, bridging, flood, routing, and
   multicast) are interconnected only via BGWs with site external tenant
   domains (bridging, flood, routing, and multicast respectively) from
   remote sites. It stitches such tenant domains (bridging, flood,
   routing, and multicast) in complete downstream fashion using EVPN
   route advertisements. Such interconnects do not assume uniform
   mappings of mac-vrf (or IP-VRF) to VNI across sites.</t>
      </section>
    </section>
    <section anchor="sect-4" numbered="true" toc="default">
      <name>Multi-site EVPN Interconnect Procedures</name>
      <t>
   In this section we describe the new functionalities in the Border
   Gateway (BGW) nodes for interconnecting EVPN sites within the DC.</t>
      <t>
   In a nutshell, BGW discovery will facilitate termination and re-
   origination of inter-site VXLAN tunnels. Such discovery provides
   flexibility for intra-site TEP-to-TEP VXLAN tunnels to co-exist with
   inter-site tunnels terminating on BGWs. Additionally, BGWs need to
   discover each other such that it is possible to run the Designated
   Forwarder (DF) election between the border nodes of a site. It also
   needs to be aware of other remote BGWs such that it can allow for
   appropriate import/export of routes from other sites.</t>
      <section anchor="sect-4.1" numbered="true" toc="default">
        <name>Border Gateway Discovery</name>
        <t>
   BGW nodes of the same site MUST be configured or auto-generate the
   same site-identifier. In addition, the BGW is aware of its site
   internal and site external connection. Nodes that are part of the
   same site will build VXLAN tunnels only between members of the same
   site including the BGW; this is facilitated by site internal EVPN
   node reachability that stays site internal. BGWs will additionally
   build VXLAN tunnels between itself and other BGWs that are of a
   remote site. The remote BGWs are identified by the EVPN peering of
   type "external".</t>
        <t>
   The site-identifier, used for BGW site participation and DF election,
   is encoded within a Site ESI label (I-ESI) itself as described below.</t>
        <t>
   In this specification, we reuse the AS-based Ethernet Segment
   Identifier (ESI) Type 5 (see Section 5 of <xref target="RFC7432" format="default"/>) that can be
   auto-generated or configured by the operator. It is repeated here to
   illustrate the encoding of the site-identifier.</t>
        <t>
   o Type 5 (T=0x05): The ESI value is constructed with the site-id
   parameter being embedded as follows.</t>
        <ul spacing="normal">
          <li>
            <t>AS number (4 octets). This is an AS number owned by the system and</t>
            <dl newline="true" spacing="compact" indent="1">
              <dt>MUST be encoded in the high-order 4 octets of the ESI Value field. If</dt>
              <dd>
	a 2-octet AS number is used, the high-order extra 2 octets will be
   0x0000.
	</dd>
            </dl>
          </li>
          <li>
            <t>Local Discriminator/Site Identifier (4 octets): The Local</t>
            <dl newline="true" spacing="compact" indent="1">
              <dt>Discriminator is also referred to as the Site Identifier and its</dt>
              <dd>
	value MUST be encoded as follows. The high-order 2 octets will be
   0x0000, and the low order 2 octets will be set to the site-identifier
   to which this node belongs. All border gateways MUST announce this
   value. We need the AS number and the site identifier together to be
   automatically derivable to less than 6 octets; this enables for auto
   import and export of routes (see the ES-Import RT definition in
   <xref target="RFC7432" format="default"/>).
	</dd>
            </dl>
          </li>
          <li>
            <t>Reserved (1 octet): The low-order octets of the ESI Value will be</t>
            <dl newline="true" spacing="compact" indent="1">
              <dt>set to 0 on transmission and will be ignored on receipt.</dt>
              <dd/>
            </dl>
          </li>
        </ul>
        <figure anchor="ure-2">
          <artwork name="" type="" align="left" alt=""><![CDATA[
        0   1   2   3   4   5   6   7   8   9
     +---+---+---+---+---+---+---+---+---+---+
     | T |          ESI Value                |
     +---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        </figure>
        <t>
   The site identifier value must be globally unique within the
   deployments. Hence all BGWs are able to figure out other BGWs
   belonging to the same site, and armed with this information is able
   to run a Designated Forwarder (DF) election for BGWs site and VNI
   scoped as against the traditional Ethernet segment DF election. This
   said, the usage of the Type 5 ESI is not absolute, meaning other ESI
   Types could be leverage, like how <xref target="RFC9014" format="default"/> describes the usage. This
   alternate numbering is sufficient as long as the type and value
   requirement has ben satisfied globally, as well as for a set of BGW
   serving a common site. For example, if a implementation chooses to
   leverage a ESI of Type 0 or Type 3 and encodes the site-identifier
   respectively, this should not result in any disadvantage to any site
   internal or site external EVPN node. <xref target="RFC9014" format="default"/> for example recommends
   the usage of ESI Type 0 for the I-ESI. In Figure 1, nodes BGW1, BGW2,
   BGW3, BGW4, BGW5 and BGW6, will announce the ESI Label and the per-
   VNI RT Extended Communities.  Nodes, BGW1, and BGW2, will perform a
   DF election for Site-A, whereas, nodes BGW3, and BGW4 will perform
   one for site-B.  Even though, all BGW nodes are able to see all the
   advertisements, the site identifier scopes the DF election (using RT-
   4 ES Routes) to its site members. This specification uses the All-
   Active Redundancy Mode specially when the Anycast model of route
   announcements are used for the local routes. It is noteworthy that
   even with the DF election based on RT-4, the EVPN RT-2, MAC/IP Route,
   will not leverage any ESI in its NLRI and hence is not required to
   send a related RT-1 (EAD route). Given the Anycast BGW model, no
   overlay multi-path is required given the next-hop is always the VIP
   address.</t>
      </section>
      <section anchor="sect-4.2" numbered="true" toc="default">
        <name>Border Gateway Provisioning</name>
        <t>
   Border Gateways manage both the control-plane communications and the
   data forwarding plane for any traffic between sites.</t>
        <t>
   BGWs are implicitly discovered by any RT-2/RT-5 routes from other
   sites. Any RT-2/RT-5 route will be terminated and re-originated on
   such BGWs. RT-2/RT-5 routes carry downstream VNI labels. As BGW
   discovery is agnostic to symmetric or downstream VNI provisioning,
   rewriting next-hop attributes before re-advertising these routes from
   other sites to a given site provides flexibility to keep different
   mac-VRF or IP-VRF to VNI mapping in different sites and still able to
   interconnect L3 and L2 domains.</t>
        <t>
   RT-1, RT-3, and RT-4 from other sites will be terminated at the BGWs.
   As has been defined in the specifications, RT-3 routes carry
   downstream VNI labels and will be used to pre-build VXLAN tunnels in
   the common EVPN domain for L2, L3, and Multi-Destination traffic.</t>
        <section anchor="sect-4.2.1" numbered="true" toc="default">
          <name>Border Gateway Designated Forwarder Election</name>
          <t>
   In the presence of more than one BGW node in a site, forwarding of
   multi-destination L2 or L3 traffic both into the site and out of the
   site needs to be carried out by a single node. This node is termed as
   a designated forwarder and elected per-VNI as per rules defined in
   Section 8.5 of <xref target="RFC7432" format="default"/>. RT-4 Ethernet Segment routes are used for
   the DF election. In the multi-site deployment, the RT-4 Ethernet
   Segment routes carry a ES-Import RT Extended Community attribute with
   it. We need to enforce that these are imported to only the local site
   members when the ES-Import value matches with its own value. The 6-
   byte values are generated using a concatenation of the 4-byte AS
   number the member belongs, with the 2-bytes of site-identifier. As a
   result, only local site-members will match to form the candidate
   list. All the BGWs are able to extract the site-identifier from this
   attribute and the list of nodes where this election is run is now
   constrained to the BGWs between same site members.</t>
          <dl newline="true" spacing="normal" indent="1">
            <dt>In both modes (Anycast and Multipath), RT-3 routes will be generated</dt>
            <dd>
	locally and advertised by each Border Gateway with unique gateway IP.
    This will facilitate building fast converging flood domain
	</dd>
            <dt>connectivity inter-site and intra-site and on same time avoiding</dt>
            <dd>
	duplicate traffic by electing DF winner to forward multi-destination
   inter-site traffic.
	</dd>
          </dl>
          <t>
   Failure events which lead to a BGW losing all of its connectivity to
   the IP interconnect backbone should trigger the BGW to withdraw its
   Border RT-4 Ethernet Segment route(s), to indicate to other BGW's of
   the same site that it is no longer a candidate BGW.</t>
        </section>
        <section anchor="sect-4.2.2" numbered="true" toc="default">
          <name>Anycast Border Gateway</name>
          <t>
   In this mode all BGWs share same gateway IP (VIP) and rewrite EVPN
   next-hop attributes with a shared logical next-hop entity. However,
   these BGWs will maintain unique gateway IP (PIP) to facilitate
   building IR trees from site-local nodes to forward Multi-Destination
   traffic. EVPN RT-2, RT-5 routes will be advertised to the nodes in
   the site from all other BGWs and BGW will run DF election per VNI for
   Multi destination traffic. RT-3 routes will be advertised by each BGW
   for a given VNI so that only DF will receive and forward inter-site
   traffic. It is also possible to advertise and draw traffic by all
   BGWs at a site to improve convergence properties of the network. In
   case of multi-destination trees built by non-EVPN procedures (say
   PIM), all BGWs will receive but only DF winner will forward traffic.</t>
          <t>
   It is recommended that BGW be enabled in the Anycast mode wherein the
   BGW functionality is available to the rest of the network as a single
   logical entity for inter-site communication. In the absence of
   Anycast capability the BGW could be enabled as individual gateways.
   As of now, the Border Gateway system MAC of the other border nodes
   belonging to the same site is expected to be configured out-of-band.</t>
          <t>
   The Anycast Border Gateway the RT-2 MAC/IP Advertisement route is set
   to the reserved ESI value of 0. Hence the route resolution is
   performed based on the MAC/IP Advertisement alone as described in
   [RFC743]. Similar, RT-5 IP Prefix Advertisement requires no
   additional resolution as per <xref target="I-D.ietf-bess-evpn-ipvpn-interworking" format="default"/>, as long as in interface-
   less per <xref target="RFC9136" format="default"/>.</t>
        </section>
        <section anchor="sect-4.2.3" numbered="true" toc="default">
          <name>Multi-path Border Gateway</name>
          <t>
   In this mode, Border gateways will rewrite EVPN Next-hop attributes
   with unique next-hop entities. This provides flexibility to apply
   usual policies and pick per-VRF, per-VNI or per-flow primary/backup
   border Gateways. Hence, an intra-site node will see each BGW as a
   next-hop for any external L2 or L3 unicast destination, and would
   perform an ECMP path selection to load-balance traffic sent to
   external destinations. In case an intra-site node is not capable of
   performing ECMP hash based path-selection (possibly some L2
   forwarding implementations), the node is expected to choose one of
   the BGW's as its designated forwarder. EVPN RT-2, RT-5 routes will be
   advertised to the nodes in the site from all border gateways and
   Border gateway will run DF election per VNI for Multi destination
   traffic. RT-3 routes will be advertised by each Border gateway for a
   given VNI and only DF will receive and forward inter-site traffic. In
   case of multi-destination trees built by non-EVPN procedures (say
   PIM), all border gateways will receive but only DF winner will
   forward traffic. The Multi-path Border Gateway follows the model of
   the interconnect ESI (I-ESI) as described in <xref target="RFC9014" format="default"/>. With this
   requirement of multi-path, the RT-2 are labeled with the I-ESI and a
   RT-1 is used for the route resolution as described in <xref target="RFC7432" format="default"/>
   section 9.2.2. RT-5 requires no additional resolution as per <xref target="I-D.ietf-bess-evpn-ipvpn-interworking" format="default"/>.</t>
        </section>
      </section>
      <section anchor="sect-4.3" numbered="true" toc="default">
        <name>EVPN route processing at Border Gateway</name>
        <t>
   BGW functionality in an EVPN site SHOULD be enabled on more than one
   node in the network for redundancy and high-availability purposes.
   Any external RT-2/RT-5 routes that are received by the BGWs of a site
   are advertised to all the intra-site nodes by all the BGWs. For
   internal RT-2/RT-5 routes received by the BGW's from the intra-site
   nodes, all the BGWs of a site would advertise them to the remote
   BGW's, so any L2/L3 known unicast traffic to internal destinations
   could be sent to any one of the local BGW's by remote sources. For
   known L2 and L3 unicast traffic, all of the individual BGWs will
   behave either as single logical forwarding node (Anycast model) or a
   set of active forwarding nodes.</t>
        <t>
   All control plane and data plane states are interconnected in a
   complete downstream fashion. For example, BGP import rules for a RT-3
   route should be able to extend a flood domain for a VNI and flood
   traffic destined to advertised EVPN node should carry the VNI which
   is announced in RT-3 route. Similarly Type 2, Type 5 control and
   forwarding states should be interconnected in a complete downstream
   fashion.</t>
        <t>
   o Route Target processing for RT-4 routes: Every IP-VRF and MAC-VRF
   will generate RT-4 with the format described in section 4.1. Route
   targets can be auto derived from Ethernet Tag ID (VLAN ID) for that
   EVPN instance as described in Section 7.10.1 of <xref target="RFC7432" format="default"/>. ES import
   route target extended community as described in Section 7.6 of
   <xref target="RFC7432" format="default"/> is mandatory for RT-4 in this context. The encoding of ES-
   Import is based on AS number and Site-identifier as described in
   <xref target="sect-4.2.1" format="default"/>.  Such import route target will allow import of RT-4
   only to the Border gateways of same sites.</t>
        <t>
   o Route Target processing for RT-2, RT-3, RT-5 routes: These routes
   will carry either auto-derived route targets (based on Ethernet Tag
   ID (VLAN ID) for that EVPN instance) or explicit route targets.
   Border gateways usual import rules will imports these routes and re-
   advertise these with border gateway next hops.  Also the routes which
   are imported at Border Gateways and re-advertised SHOULD implement a
   mechanism to avoid looping of updates should they come back at Border
   Gateways. RT-3 routes will be imported and processed on border
   gateways from other border gateways but MUST NOT be advertised again.</t>
      </section>
      <section anchor="sect-4.4" numbered="true" toc="default">
        <name>Multi-Destination tree between Border Gateways</name>
        <t>
   The procedures described here recommends building an Ingress
   Replication (IR) tree between Border Gateways. This will facilitate
   every site to independently build site-specific Multi-destination
   trees.  Multi-destination end-to-end trees between leafs could be PIM
   (site 1) + IR (between border Gateways) + PIM (site 2) or IR-IR-IR or
   PIM-IR-IR. However this does not rule out using IR-PIM-IR or end-to-
   end PIM to build multi-destination trees end-to-end.</t>
        <t>
   Border Gateways will generate RT-3 routes with unique gateway IP and
   advertise to Border Gateways of other sites. These RT-3 routes will
   help in building IR trees between border gateways. However, only DF
   winner per VNI will forward multi-destination traffic across sites.</t>
        <t>
   As Border Gateways are part of both site-specific and inter-site
   Multi-destination IR trees, split-horizon mechanism will be used to
   avoid loops. Multi-destination tree with Border gateway as root to
   other sites (or Border-Gateways) will be in a separate horizon group.</t>
        <t>
   Similarity Multi-destination IR tree with Border Gateway as root to
   site-local nodes will be in another split horizon group.</t>
        <t>
   If PIM is used to build Multi-Destination trees in site-specific
   domain, all Border gateway will join such PIM trees and draw multi-
   destination traffic. However only DF Border Gateway will forward
   traffic towards other sites.</t>
      </section>
      <section anchor="sect-4.5" numbered="true" toc="default">
        <name>Inter-site Unicast traffic</name>
        <t>
   As site internal node will see all site external EVPN routes via
   Border Gateways, VXLAN tunnels will be built between leafs and site
   internal Border Gateways and Inter-site VXLAN tunnels will be built
   between Border gateways in different sites. An end-to-end VXLAN
   bidirectional forwarding path between inter-site leafs will consist
   of VXLAN tunnel from leaf (say Site A) to its Border Gateway (BGW1),
   another VXLAN tunnel from Border Gateway (BGW1) to Border Gateway
   (BGW3) in another site (say site B) and Border gateway (BGW3) to leaf
   (in site B). Such an arrangement of a hierarchical tunnel topology is
   more scalable as a full mesh of VXLAN tunnels across inter-site leafs
   is substituted by combination of intra-site and inter-site tunnels.</t>
        <t>
   L2 and L3 unicast frames from site internal leafs will reach border
   gateway using VXLAN encapsulation. At Border gateway, VXLAN header is
   stripped out and another VXLAN header is pushed to sent frames to
   destination site Border Gateway. Destination site Border gateway will
   strip off VXLAN header and push another VXLAN header to send frame to
   the destination site leaf.</t>
      </section>
      <section anchor="sect-4.6" numbered="true" toc="default">
        <name>Inter-site Multi-destination traffic</name>
        <t>
   Multi-destination traffic will be forwarded from one site to other
   site only by DF for that VNI. As frames reach Border Gateway from
   site internal nodes, VXLAN header will be decapsulated from the
   payload, and encapsulated with another VXLAN header (derived from
   downstream RT-3 EVPN routes received from the border gateways of the
   destination site) to forward the payload to the destination site
   border gateway. Similarly destination site Border Gateway will strip
   off VXLAN header and forward the payload after encapsulating with
   another VXLAN header towards the destination leaf.</t>
        <t>
   As explained in <xref target="sect-4.4" format="default"/>, split horizon mechanism will be used to
   avoid looping of inter-site multi-destination frames.</t>
      </section>
      <section anchor="sect-4.7" numbered="true" toc="default">
        <name>Host Mobility</name>
        <t>
   Host movement handling will be same as defined in <xref target="RFC7432" format="default"/>. When
   host moves, EVPN RT-2 routes with updated sequence number will be
   propagated to every EVPN node. When a host moves inter-site, only
   Border gateways may see EVPN updates with both next-hop attributes
   and sequence number changes and leafs may see updates only with
   updated sequence numbers; this is as described in <xref target="RFC9014" format="default"/> section
   4.4.4. However in other cases, both Border gateway and leaves may see
   next-hop and sequence number changes.</t>
      </section>
    </section>
    <section anchor="sect-5" numbered="true" toc="default">
      <name>Convergence</name>
      <section anchor="sect-5.1" numbered="true" toc="default">
        <name>Fabric to Border Gateway Failure</name>
        <t>
   If a Border Gateway is lost, Border gateway next-hop will be
   withdrawn for RT-2/RT-5 routes. Also per-VNI DF election will be
   triggered to chose new DF. DF new winner will become forwarder of
   Multi-destination inter-site traffic.</t>
      </section>
      <section anchor="sect-5.2" numbered="true" toc="default">
        <name>Border Gateway to Border Gateway Failures</name>
        <t>
   In case where inter-site cloud has link failures, direct forwarding
   path between border gateways can be lost. In this case, traffic from
   one site can reach other site via border gateway of an intermediate
   site.  However, this will be addressed like regular underlay failure
   and traffic terminations end-points will still stay same for inter-
   site traffic flows.</t>
      </section>
    </section>
    <section anchor="sect-6" numbered="true" toc="default">
      <name>Interoperability</name>
      <t>
   The procedures defined here are only for Border Gateways. Therefore
   other EVPN nodes require only to be compliant with <xref target="RFC7432" format="default"/> and
   <xref target="RFC8365" format="default"/> to operate in such topologies</t>
      <t>
   As the procedures described here are applicable only based on the
   respective topology configuration or discovery, if other domains are
   connected which are not capable of such multi-site gateway model,
   they can work in regular EVPN mode. In the case of remote sites
   operate in different modes, for example some in Anycast mode, others
   in Multi-Path or <xref target="RFC9014" format="default"/> mode, the Anycast BGW will be able to
   accommodate either and adjusts the respective mode. The signalization
   of the respective mode is driven through the presence of ESI in RT-2
   and the per-ES EAD RT-1 route. The purpose of RT-3 routes are solely
   for the case of BUM replication and doesn't provide any neighbor
   discovery function. This is crucial as in cases where only IP routing
   is used, with the IP portion of RT-2 and/or RT-5 only, the
   MP_RACH_NLRI attribute, or the RT-1 in the case of ESI, is sufficient
   for route resolution.</t>
      <t>
   The procedures here provides flexibility to connect non-EVPN VXLAN
   sites by provisioning Border Gateways on such sites and inter-
   connecting such Border Gateways by Border Gateways of other sites.
   Such Border Gateways in non-EVPN VXLAN sites will play dual role of
   EVPN gateway towards common EVPN domain and non-EVPN gateway towards
   non-EVPN VXLAN site.</t>
    </section>
    <section anchor="sect-7" numbered="true" toc="default">
      <name>Isolation of Fault Domains</name>
      <t>
   Isolation of network defects requires policies like storm control,
   security ACLs etc to be implemented at site boundaries. Border
   gateways should be capable of inspecting inner payload of packets
   received from VXLAN tunnels and enforce configured policies to
   prevent defects percolating from one part to rest of the network.</t>
    </section>
    <section anchor="sect-8" numbered="true" toc="default">
      <name>MVPN with Multi-site EVPN</name>
      <t>
   BGP based MVPN as defined in <xref target="RFC6513" format="default"/> and <xref target="RFC6514" format="default"/> will coexist
   with Multisite-EVPN with out any changes in route types and encodings
   defined for MVPN route types in these RFCs. Route Distinguisher and
   VRF route import extended communities will be attached to MVPN routes
   as defined in the BGP MVPN RFCs. Import and Export Route targets will
   be attached to MVPN routes either by Auto-generating them from VNI or
   by explicit configuration per MVPN. Since, BGP MVPN RFC adapts to any
   VPN address family to provide RPF information to build C-Multicast
   trees, EVPN route types will be used to provide required RPF
   information for Multicast sources in MVPNs. In order to follow
   segmentation model of Multisite-EVPN, following procedures are
   recommended to build provider and customer multicast trees between
   sources and receivers across sites.</t>
      <section anchor="sect-8.1" numbered="true" toc="default">
        <name>Inter-Site MI-PMSI</name>
        <t>
   As defined in above mentioned MVPN RFCs, I-PMSI A-D routes are used
   to signal a provider tunnel or MI-PMSI per MVPN. Multisite-EVPN
   recommends EVPN Type-3 routes to build such MI-PMSI provider tunnel
   per VPN between Border Gateways of different sites.  Every MVPN node
   will use its unique router identifier to build these MI-PMSI provider
   tunnels. In Anycast Border gateway model also, these MI-PMSI provider
   tunnels are built using unique router identifier of Border gateways.
   In similar fashion, these Type-3 routes can be used to build MI-PMSI
   provider tunnel per MVPN with in sites.</t>
      </section>
      <section anchor="sect-8.2" numbered="true" toc="default">
        <name>Stitching of customer multicast trees across sites</name>
        <t>
   All Border Gateways will rewrite next-hop and re-originate MVPN
   routes received from other sites to local site and from local site to
   other sites.  Therefore customer Multicast trees will be logically
   built end-to-end across sites by stitching these trees via Border
   gateways. A C-multicast join route (say Type 7 MVPN) will follow EVPN
   RPF path to build C-multicast tree from leaf in a site to its Border
   gateway and to destination site leafs via destination site Border
   Gateways. Similarly Source-Active A-D MVPN route (Type 5 MVPN) will
   be rewritten with next-hop and re-originated via Border gateways so
   that source C-Multicast trees will be stitched via Border gateways.</t>
      </section>
      <section anchor="sect-8.3" numbered="true" toc="default">
        <name>RP placement across sites</name>
        <t>
   Multisite-EVPN recommends only Source C-Multicast trees across sites.
   Therefore Customer RP placement per MVPN should be restricted with in
   sites. Source-Active A-D MVPN route type (Type 5) will be used to
   signal C-Multicast sources across sites.</t>
      </section>
      <section anchor="sect-8.4" numbered="true" toc="default">
        <name>Inter-Site S-PMSI</name>
        <t>
   As defined in BGP MVPN RFCs, S-PMSI A-D routes (Type 3 MVPN) will be
   used to signal selective PMSI trees for high bandwidth C-Multicast
   streams. These S-PMSI A-D routes will be signaled across sites via
   Border gateways rewriting next-hop and re-originating them to other
   sites.  PMSI tunnel attribute in re-originated S-PMSI routes will be
   adjusted to the provide tunnel types between Border gateways across
   sites.</t>
      </section>
    </section>
    <section anchor="sect-9" numbered="true" toc="default">
      <name>Secure Data and Control Plane</name>
      <t>
   In <xref target="I-D.sajassi-bess-secure-evpn" format="default"/> the use case is centered around providing inter-site
   and WAN connectivity over public Internet in a secured manner with
   same level of privacy, integrity, and authentication for tenant's
   traffic as IPsec tunneling using IKEv2. The multi-site enhancements
   in this draft in conjunction with the definitions specified in
   <xref target="I-D.sajassi-bess-secure-evpn" format="default"/> can provide EVPN domains with secure communications
   between them.</t>
    </section>
    <section anchor="sect-10" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>
   These authors would like to thank Max Ardica, Murali Garimella,
   Swaraj Kumar Chikyala, Anuj,Mittal, Lilian Quan, Veera Ravinutala,
   Tarun Wadhwa for their review and comments. Special thanks to Jorge
   Rabadan for his contribution and feedback to align with <xref target="RFC9014" format="default"/> and
   <xref target="I-D.ietf-bess-evpn-ipvpn-interworking" format="default"/>.</t>
    </section>
    <section anchor="sect-11" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
   TBD.</t>
    </section>
    <section anchor="sect-12" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
   TBD.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.sharma-multi-site-evpn" target="https://datatracker.ietf.org/doc/html/draft-sharma-multi-site-evpn-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.sharma-multi-site-evpn.xml">
          <front>
            <title>Multi-site EVPN based VXLAN using Border Gateways</title>
            <author fullname="Rajesh Sharma" initials="R." surname="Sharma">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Ayan Banerjee" initials="A." surname="Banerjee">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Raghava Sivaramu" initials="R." surname="Sivaramu">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Ali Sajassi" initials="A." surname="Sajassi">
              <organization>Cisco Systems</organization>
            </author>
            <date day="23" month="June" year="2022"/>
            <abstract>
              <t>This document described the procedures for interconnecting two or more Network Virtualization Overlays (NVOs) via NVO over IP-only network. The solution interconnects Ethernet VPN network by using NVO with Ethernet VPN (EVPN) to facilitate the interconnect in a scalable fashion. The motivation is to support extension of Layer-2 and Layer-3, Unicast and Multicast, VPNs without having to rely on typical Data Center Interconnect (DCI) technologies like MPLS/VPLS. The requirements for the interconnect are similar to the ones specified in RFC7209 [RFC7209] "Requirements for Ethernet VPN (EVPN)". In particular, this document describes the difference of the Gateways (GWs) procedure and incremental functionality from [RFC9014] "Interconnect Solution for Ethernet VPN (EVPN) Overlay Networks", which this solution is interoperable with. This document is OBSOLETE and replaced by [SHARMA-BESS-MULTI-SITE].</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sharma-multi-site-evpn-04"/>
        </reference>
        <reference anchor="RFC9014" target="https://www.rfc-editor.org/info/rfc9014" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9014.xml">
          <front>
            <title>Interconnect Solution for Ethernet VPN (EVPN) Overlay Networks</title>
            <author fullname="J. Rabadan" initials="J." role="editor" surname="Rabadan"/>
            <author fullname="S. Sathappan" initials="S." surname="Sathappan"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="A. Sajassi" initials="A." surname="Sajassi"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Network Virtualization Overlays (NVOs) can be connected to a Wide Area Network (WAN) in order to extend the Layer 2 connectivity required for some tenants. The solution analyzes the interaction between NVO networks running Ethernet Virtual Private Networks (EVPNs) and other Layer 2 VPN (L2VPN) technologies used in the WAN, such as Virtual Private LAN Services (VPLSs), VPLS extensions for Provider Backbone Bridging (PBB-VPLS), EVPN, or PBB-EVPN. It also describes how the existing technical specifications apply to the interconnection and extends the EVPN procedures needed in some cases. In particular, this document describes how EVPN routes are processed on Gateways (GWs) that interconnect EVPN-Overlay and EVPN-MPLS networks, as well as the Interconnect Ethernet Segment (I-ES), to provide multihoming. This document also describes the use of the Unknown MAC Route (UMR) to avoid issues of a Media Access Control (MAC) scale on Data Center Network Virtualization Edge (NVE) devices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9014"/>
          <seriesInfo name="DOI" value="10.17487/RFC9014"/>
        </reference>
        <reference anchor="RFC7432" target="https://www.rfc-editor.org/info/rfc7432" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7432.xml">
          <front>
            <title>BGP MPLS-Based Ethernet VPN</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="A. Isaac" initials="A." surname="Isaac"/>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document describes procedures for BGP MPLS-based Ethernet VPNs (EVPN). The procedures described here meet the requirements specified in RFC 7209 -- "Requirements for Ethernet VPN (EVPN)".</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7432"/>
          <seriesInfo name="DOI" value="10.17487/RFC7432"/>
        </reference>
        <reference anchor="RFC9136" target="https://www.rfc-editor.org/info/rfc9136" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9136.xml">
          <front>
            <title>IP Prefix Advertisement in Ethernet VPN (EVPN)</title>
            <author fullname="J. Rabadan" initials="J." role="editor" surname="Rabadan"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="W. Lin" initials="W." surname="Lin"/>
            <author fullname="A. Sajassi" initials="A." surname="Sajassi"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The BGP MPLS-based Ethernet VPN (EVPN) (RFC 7432) mechanism provides a flexible control plane that allows intra-subnet connectivity in an MPLS and/or Network Virtualization Overlay (NVO) (RFC 7365) network. In some networks, there is also a need for dynamic and efficient inter-subnet connectivity across Tenant Systems and end devices that can be physical or virtual and do not necessarily participate in dynamic routing protocols. This document defines a new EVPN route type for the advertisement of IP prefixes and explains some use-case examples where this new route type is used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9136"/>
          <seriesInfo name="DOI" value="10.17487/RFC9136"/>
        </reference>
        <reference anchor="I-D.ietf-bess-evpn-ipvpn-interworking" target="https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-ipvpn-interworking-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-ipvpn-interworking.xml">
          <front>
            <title>EVPN Interworking with IPVPN</title>
            <author fullname="Jorge Rabadan" initials="J." surname="Rabadan">
              <organization>Nokia</organization>
            </author>
            <author fullname="Ali Sajassi" initials="A." surname="Sajassi">
              <organization>Cisco</organization>
            </author>
            <author fullname="Eric C. Rosen" initials="E. C." surname="Rosen">
              <organization>Individual</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Independent</organization>
            </author>
            <author fullname="Wen Lin" initials="W." surname="Lin">
              <organization>Juniper</organization>
            </author>
            <author fullname="Jim Uttaro" initials="J." surname="Uttaro">
              <organization>AT&amp;T</organization>
            </author>
            <author fullname="Adam Simpson" initials="A." surname="Simpson">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>Ethernet Virtual Private Network (EVPN) is used as a unified control plane for tenant network intra and inter-subnet forwarding. When a tenant network spans not only EVPN domains but also domains where BGP VPN-IP or IP families provide inter-subnet forwarding, there is a need to specify the interworking aspects between BGP domains of type EVPN, VPN-IP and IP, so that the end to end tenant connectivity can be accomplished. This document specifies how EVPN interworks with VPN-IPv4/VPN-IPv6 and IPv4/IPv6 BGP families for inter-subnet forwarding. The document also addresses the interconnect of EVPN domains for Inter-Subnet Forwarding routes. In addition, this specification defines a new BGP Path Attribute called D-PATH (Domain PATH) that protects gateways against control plane loops. D-PATH modifies the BGP best path selection for multiprotocol BGP routes of SAFI 128 and EVPN IP Prefix routes, and therefore this document updates the BGP best path selection in [RFC4271], but only for IPVPN and EVPN families.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-bess-evpn-ipvpn-interworking-09"/>
        </reference>
        <reference anchor="I-D.sajassi-bess-secure-evpn" target="https://datatracker.ietf.org/doc/html/draft-sajassi-bess-secure-evpn-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.sajassi-bess-secure-evpn.xml">
          <front>
            <title>Secure EVPN</title>
            <author fullname="Ali Sajassi" initials="A." surname="Sajassi">
              <organization>Cisco</organization>
            </author>
            <author fullname="Ayan Banerjee" initials="A." surname="Banerjee">
              <organization>Cisco</organization>
            </author>
            <author fullname="Samir Thoria" initials="S." surname="Thoria">
              <organization>Cisco</organization>
            </author>
            <author fullname="David Carrel" initials="D." surname="Carrel">
              <organization>Graphiant</organization>
            </author>
            <author fullname="Brian Weis" initials="B." surname="Weis">
              <organization>Independent</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>The applications of EVPN-based solutions ([RFC7432] and [RFC8365]) have become pervasive in Data Center, Service Provider, and Enterprise segments. It is being used for fabric overlays and inter- site connectivity in the Data Center market segment, for Layer-2, Layer-3, and IRB VPN services in the Service Provider market segment, and for fabric overlay and WAN connectivity in Enterprise networks. For Data Center and Enterprise applications, there is a need to provide inter-site and WAN connectivity over public Internet in a secured manner with same level of privacy, integrity, and authentication for tenant's traffic as IPsec tunneling using IKEv2. This document presents a solution where BGP point-to-multipoint signaling is leveraged for key and policy exchange among PE devices to create private pair-wise IPsec Security Associations without IKEv2 point-to-point signaling or any other direct peer-to-peer session establishment messages.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sajassi-bess-secure-evpn-06"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="KEYWORDS" target="http://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
	</author>
            <date month="March" year="1997"/>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC1776" target="https://www.rfc-editor.org/info/rfc1776" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1776.xml">
          <front>
            <title>The Address is the Message</title>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="April" year="1995"/>
            <abstract>
              <t>Declaring that the address is the message, the IPng WG has selected a packet format which includes 1696 bytes of address space. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1776"/>
          <seriesInfo name="DOI" value="10.17487/RFC1776"/>
        </reference>
        <reference anchor="TRUTHS">
          <front>
            <title>The Twelve Networking Truths</title>
            <author initials="R." surname="Callon" fullname="R. Callon">
	</author>
            <date/>
          </front>
          <seriesInfo name="RFC" value="1925"/>
          <seriesInfo name="DOI" value="10"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6513" target="https://www.rfc-editor.org/info/rfc6513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6513.xml">
          <front>
            <title>Multicast in MPLS/BGP IP VPNs</title>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <author fullname="R. Aggarwal" initials="R." role="editor" surname="Aggarwal"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>In order for IP multicast traffic within a BGP/MPLS IP VPN (Virtual Private Network) to travel from one VPN site to another, special protocols and procedures must be implemented by the VPN Service Provider. These protocols and procedures are specified in this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6513"/>
          <seriesInfo name="DOI" value="10.17487/RFC6513"/>
        </reference>
        <reference anchor="RFC6514" target="https://www.rfc-editor.org/info/rfc6514" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6514.xml">
          <front>
            <title>BGP Encodings and Procedures for Multicast in MPLS/BGP IP VPNs</title>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="T. Morin" initials="T." surname="Morin"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes the BGP encodings and procedures for exchanging the information elements required by Multicast in MPLS/BGP IP VPNs, as specified in RFC 6513. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6514"/>
          <seriesInfo name="DOI" value="10.17487/RFC6514"/>
        </reference>
        <reference anchor="RFC7209" target="https://www.rfc-editor.org/info/rfc7209" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7209.xml">
          <front>
            <title>Requirements for Ethernet VPN (EVPN)</title>
            <author fullname="A. Sajassi" initials="A." surname="Sajassi"/>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="A. Isaac" initials="A." surname="Isaac"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The widespread adoption of Ethernet L2VPN services and the advent of new applications for the technology (e.g., data center interconnect) have culminated in a new set of requirements that are not readily addressable by the current Virtual Private LAN Service (VPLS) solution. In particular, multihoming with all-active forwarding is not supported, and there's no existing solution to leverage Multipoint-to-Multipoint (MP2MP) Label Switched Paths (LSPs) for optimizing the delivery of multi-destination frames. Furthermore, the provisioning of VPLS, even in the context of BGP-based auto-discovery, requires network operators to specify various network parameters on top of the access configuration. This document specifies the requirements for an Ethernet VPN (EVPN) solution, which addresses the above issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7209"/>
          <seriesInfo name="DOI" value="10.17487/RFC7209"/>
        </reference>
        <reference anchor="RFC8365" target="https://www.rfc-editor.org/info/rfc8365" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8365.xml">
          <front>
            <title>A Network Virtualization Overlay Solution Using Ethernet VPN (EVPN)</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="R. Shekhar" initials="R." surname="Shekhar"/>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document specifies how Ethernet VPN (EVPN) can be used as a Network Virtualization Overlay (NVO) solution and explores the various tunnel encapsulation options over IP and their impact on the EVPN control plane and procedures. In particular, the following encapsulation options are analyzed: Virtual Extensible LAN (VXLAN), Network Virtualization using Generic Routing Encapsulation (NVGRE), and MPLS over GRE. This specification is also applicable to Generic Network Virtualization Encapsulation (GENEVE); however, some incremental work is required, which will be covered in a separate document. This document also specifies new multihoming procedures for split-horizon filtering and mass withdrawal. It also specifies EVPN route constructions for VXLAN/NVGRE encapsulations and Autonomous System Border Router (ASBR) procedures for multihoming of Network Virtualization Edge (NVE) devices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8365"/>
          <seriesInfo name="DOI" value="10.17487/RFC8365"/>
        </reference>
        <reference anchor="EVILBIT">
          <front>
            <title>The Security Flag in the IPv4 Header</title>
            <author initials="S." surname="Bellovin" fullname="S. Bellovin">
	</author>
            <date/>
          </front>
          <seriesInfo name="RFC" value="3514"/>
          <seriesInfo name="DOI" value="10"/>
        </reference>
        <reference anchor="RFC5513" target="https://www.rfc-editor.org/info/rfc5513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5513.xml">
          <front>
            <title>IANA Considerations for Three Letter Acronyms</title>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="April" year="2009"/>
            <abstract>
              <t>Three Letter Acronyms (TLAs) are commonly used to identify components of networks or protocols as designed or specified within the IETF. A common concern is that one acronym may have multiple expansions. While this may not have been an issue in the past, network convergence means that protocols that did not previously operate together are now found in close proximity. This results in contention for acronyms, and confusion in interpretation. Such confusion has the potential to degrade the performance of the Internet as misunderstandings lead to misconfiguration or other operating errors.</t>
              <t>Given the growing use of TLAs and the relatively small number available, this document specifies a Badly Construed Proposal (BCP) for the management of a registry of TLAs within the IETF, and the procedures for the allocation of new TLAs from the registry. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5513"/>
          <seriesInfo name="DOI" value="10.17487/RFC5513"/>
        </reference>
        <reference anchor="RFC5514" target="https://www.rfc-editor.org/info/rfc5514" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5514.xml">
          <front>
            <title>IPv6 over Social Networks</title>
            <author fullname="E. Vyncke" initials="E." surname="Vyncke"/>
            <date month="April" year="2009"/>
            <abstract>
              <t>There is a lack of IPv6 utilization in early 2009; this is partly linked to the fact that the number of IPv6 nodes is rather low. This document proposes to vastly increase the number of IPv6 hosts by transforming all Social Networking platforms into IPv6 networks. This will immediately add millions of IPv6 hosts to the existing IPv6 Internet. This document includes sections on addressing and transport of IPv6 over a Social Network. A working prototype has been developed. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5514"/>
          <seriesInfo name="DOI" value="10.17487/RFC5514"/>
        </reference>
      </references>
    </references>
    <section anchor="sect-14" numbered="true" toc="default">
      <name>Authors' Addresses</name>
    </section>
  </back>
</rfc>
