Dear Opsawg colleagues,
During the last months and with the help of our regular LxNM
calls we have been working in solving the open issues in github. Let me remind
that the complete list of issues is available at
https://github.com/IETF-OPSAWG-WG/l3nm/issues .
The issues that have been closed since the last meeting can be
found with the query
https://github.com/IETF-OPSAWG-WG/l3nm/issues?q=is%3Aissue+closed%3A%3E2020-03-01+
Let me comment briefly what was discussed to close the issue
(more details in the link). If anyone has a concern, the issue can be
revisited. Please feel free to ask more details about any of them.
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/10 Nits in text
and reference to BESS-L3VPN. The draft text has been fully reviewed and is
ready for submission. The reference to bess
https://datatracker.ietf.org/doc/draft-ietf-bess-l3vpn-yang/ was removed since
it is no longer an active document. (can change if the document is back to
life).
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/18 Review VPN
profiles. The profiles were reviewed and maintained. Note that as per issue
https://github.com/IETF-OPSAWG-WG/l3nm/issues/113 explained later a new
forwarding profile was added. All the profiles are added to the common module.
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/20 We need to
indicate whether the RT and RDs are provided by the Network Operator / service
orchestrator or they are automatically assigned by the controller which has the
l3nm module. After a first proposal, the solution was not 100% OK for the
implementors. The issue was also raised by Roque in
https://github.com/IETF-OPSAWG-WG/l3nm/issues/114 Please check that issue for
the latest proposal (it is still open).
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/25 Delete
extranet VPNs container. The extranet VPNS information coming from L3SM is
needed to be analyzed by the Network operator/service orchestrator and create
the necessary import/export policies that will apply in L3SM. The container has
been removed from the yang model (it is present in L3SM).
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/32 Review Yang
for containers that can directly imported from L3SM. This is solved with the
new vpn common module, so avoiding directly importing containers from L3SM.
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/36: BGP Session
under vpn_node (erez proposal) or under vpn_network_access After several
discussions it was agreed to keep it under vpn-network-access. In the
implementation level there the fulfillment entity need to go down to the device
and set the BGP per VRF on the device level. each BGP over vpn-network-access
reflected as a neighbor configuration on the BGP instance on the VRF. Dual
homing is done from different PEs - metric is treated in the customer side.
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/39 Add Local-AS
under the BGP session. The request is to Include the Local-AS as an option to
announce a different AS to the CE. Fixed in
https://github.com/IETF-OPSAWG-WG/l3nm/commit/f987d5b4b7fcbebf10b59f114fa316a54ba877cd
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/41 In
vpn_target, make route_target a list of route_targets (meaning an and operation
between all route_targets) AND OR operations have been added
https://github.com/IETF-OPSAWG-WG/l3nm/commit/003fcabcd15429c097f7b66f2fb4eb342231c27c
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/45 Add RP PIM
Anycast under multicast configuration. Solved in
https://github.com/IETF-OPSAWG-WG/l3nm/pull/54 and
https://github.com/IETF-OPSAWG-WG/l3nm/pull/75 It is required to add the
following information to detail the Multicast service: Provider Tunnel:
RSVP-TE, mLDP, PMSI-Type: iPMSI sPMSI Threshold rt. Solved together with issue
https://github.com/IETF-OPSAWG-WG/l3nm/issues/47
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/53 Custom QoS.
We agreed on leaving just standard QoS profile and removing custom QoS.
https://github.com/IETF-OPSAWG-WG/l3nm/commit/3b74db5a029d44e1c51a87c61c9e7a67696fc392
Hence, the definition of the QoS is done outside the model.
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/73 This was just
the text for the I-D.
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/111 Fix issues
from Yang doctor review. All issues are dealt. 1) The module seems NMDA
compliant, so it should be mentioned in Introduction (or some other) section.
NMDA compliance text added to the draft text (the draft-04 is to be published
after solving the common module discussion). 2) the filename's revision part
does not match the latest revision date (2020-04-03) of the module. Fixed in
new version (to be published). 3) All the imported modules must have their
document (RFC) in the normative references section. The references have been
added (done together with the new vpn common module). 4) Since RFC 8277 is
referenced in the module, it should appear in the normative references section.
On this one, we don't think we need to cite it as normative as RFC8407 says the
following: If the reference statement identifies an informative reference that
identifies a separate document, a corresponding informative reference to that
document MAY appear in the Informative References section. 5) Additional
indentation (3 spaces on each line except the first one) in the module's
contact statement seems weird and unnecessary/unintentional (fixed). 6) The
whole groupings part need a cleanup and maybe some structural changes: A new
vpn common module has been proposed with the reusable groupings. Unnecessary
groupings not reused are removed.
https://github.com/IETF-OPSAWG-WG/l3nm/pull/122 ) 7) description of the
service-status grouping seems to be invalid. Description of the service-status
is updated (see issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/62 ). 8)
typedef protocol-type: Are you really sure that the list of the underlying
protocols is fixed forever in all its instances? Having it in the form of
identity would allow later augmenting of the list of possible values. Protocol
types changed to identity refs as per yang doctor suggestion (see common
module). 9) I'm afraid about the usability of appendix A. The status of the
implementations will tent to change quite intensively and having such
information in RFC does not make much sense to me: Regarding the usability of
appendix A, The status of the implementations, this is to be removed once the
document is RFC. With this all issues are closed. Note that as soon as the vpn
common discussion is closed, we will properly reply to yang doctor's review
with the previous comments
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/112 Fix issues
from Tom Petch review in Opsawg mailing list. All points were solved and the
references updated in issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/115
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/113 Routing
policy vs forwarding policy difference. On the global routing profiles, it
should be a difference between routing and forwarding policies. A forwarding
profile (which refers to the treatment of the packets received by the VPN at
the interface of the vpn-network-access) is added in
https://github.com/IETF-OPSAWG-WG/l3nm/pull/118
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/115 Add
reference and descriptions to identityrefs for protocol-type. They are added in
https://github.com/IETF-OPSAWG-WG/l3nm/pull/164
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/117 Routing
policy: just a name or a reference to leaf in a routing policy yang? The model
does not force any particular policy model to be implemented. Also, maintaining
leafrefs adds complexity to implementations. It was agreed to keep just a hook.
Before the last IETF we closed a bunch of issues summarized below:
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/59 This issue is
about how to model the filtering happening at vpn-network-access level, as part
of the qos profile. The way the match (of L3 and L4 packets) is changed from
the L3SM style to the more recent and generic RFC 8519: YANG Data Model for
Network Access Control Lists (ACLs). Hence, the model imports from RFC 8519.
Solved in pull https://github.com/IETF-OPSAWG-WG/l3nm/pull/88
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/61 A pointer to
L3SM service id is added, so the relation between a service created in the
service orchestrator with L3SM and in the network controller instantiated with
L3NM is maintained. The pointer is OPTIONAL. Solved with
https://github.com/IETF-OPSAWG-WG/l3nm/pull/60 (yang change) and explanation in
text in https://github.com/IETF-OPSAWG-WG/l3nm/pull/72
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/62 Overal
service status. A container with the service status was added See
https://github.com/IETF-OPSAWG-WG/l3nm/pull/58 . Note that the status related
groupings and types are now being revisited to be part of the common module.
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/70 control which
notifications should be supported for the service. This important issue will be
managed in a separate document. See
https://tools.ietf.org/html/draft-www-opsawg-yang-vpn-service-pm-00.html
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/71 Consider
exposing a set of VPN-related network capabilities. These capabilities may be
used by the service layer as input to service order handling (or service
activation). Examples can be:Limit on max routes per customer: supported/not,
FIB/RIB limits, Max supported VRF instances, link capacity. Max BGP sessions,
Encryption capabilities. It is an important line of work, but for the moment we
keep it out of the draft and we plan to initiate a new line of work related to
exposing the capabilities.
- Issue https://github.com/IETF-OPSAWG-WG/l3nm/issues/76 The model
does not support the creation of vrf-import & export profiles. Solved with
https://github.com/IETF-OPSAWG-WG/l3nm/commit/16fa91d76f9ecccbb16aca7052783c2266574ebb
by adding vrf import and export policies within vpn-targets container to
expand routing profiles functionality. Note that we are just pointing to a
policy. The information inside the policy is out of scope of the model. This
can be done, for example, with the routing-policy yang models defined in IETF
(https://tools.ietf.org/html/draft-ietf-rtgwg-policy-model-15).
Best Regards,
Oscar on behalf of L3NM authors and contributors
________________________________
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede
contener información privilegiada o confidencial y es para uso exclusivo de la
persona o entidad de destino. Si no es usted. el destinatario indicado, queda
notificado de que la lectura, utilización, divulgación y/o copia sin
autorización puede estar prohibida en virtud de la legislación vigente. Si ha
recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente
por esta misma vía y proceda a su destrucción.
The information contained in this transmission is privileged and confidential
information intended only for the use of the individual or entity named above.
If the reader of this message is not the intended recipient, you are hereby
notified that any dissemination, distribution or copying of this communication
is strictly prohibited. If you have received this transmission in error, do not
read it. Please immediately reply to the sender that you have received this
communication in error and then delete it.
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode
conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa
ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica
notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização
pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem
por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e
proceda a sua destruição
_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg