<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC7432 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7432.xml">
<!ENTITY RFC8365 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8365.xml">
<!ENTITY RFC8584 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8584.xml">
<!ENTITY RFC9135 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9135.xml">
<!ENTITY RFC9136 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9136.xml">
<!ENTITY RFC9252 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9252.xml">
<!ENTITY RFC9251 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9251.xml">
<!ENTITY RFC9014 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9014.xml">
<!ENTITY RFC6513 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6513.xml">
<!ENTITY RFC6514 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6514.xml">
<!ENTITY RFC7761 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7761.xml">
<!ENTITY RFC4364 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4364.xml">
<!ENTITY RFC8214 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8214.xml">
<!ENTITY RFC8317 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8317.xml">
<!ENTITY RFC7623 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7623.xml">
<!ENTITY RFC9161 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9161.xml">
<!ENTITY RFC7348 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7348.xml">
<!ENTITY RFC9572 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9572.xml">
<!ENTITY RFC9625 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9625.xml">
<!ENTITY I-D.ietf-bess-rfc7432bis SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-rfc7432bis.xml">
<!ENTITY I-D.ietf-bess-evpn-virtual-eth-segment SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-virtual-eth-segment.xml">
<!ENTITY I-D.ietf-bess-evpn-unequal-lb SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-unequal-lb.xml">
<!ENTITY I-D.ietf-bess-evpn-ipvpn-interworking SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-ipvpn-interworking.xml">
<!ENTITY I-D.sr-bess-evpn-dpath SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.sr-bess-evpn-dpath.xml">
<!ENTITY I-D.ietf-bess-evpn-redundant-mcast-source SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-redundant-mcast-source.xml">
<!ENTITY I-D.heitz-bess-evpn-option-b SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.heitz-bess-evpn-option-b.xml">
<!ENTITY I-D.sr-bess-evpn-vpws-gateway SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.sr-bess-evpn-vpws-gateway.xml">
<!ENTITY I-D.ietf-bess-evpn-ip-aliasing SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-ip-aliasing.xml">
<!ENTITY I-D.ietf-bess-evpn-mh-split-horizon SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-mh-split-horizon.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info" docName="draft-rabadan-bess-evpn-inter-domain-opt-b-04"
     ipr="trust200902" submissionType="IETF">
  <!---->

  <?rfc strict="yes"?>

  <?rfc compact="yes"?>

  <?rfc subcompact="no"?>

  <?rfc symrefs="yes"?>

  <?rfc sortrefs="no"?>

  <?rfc text-list-symbols="-o+*"?>

  <?rfc toc="yes"?>

  <front>
    <title abbrev="EVPN Inter-Domain Option-B">EVPN Inter-Domain Option-B
    Solution</title>

    <author fullname="Jorge Rabadan" initials="J." role="editor"
            surname="Rabadan">
      <organization>Nokia</organization>

      <address>
        <postal>
          <street>520 Almanor Avenue</street>

          <city>Sunnyvale</city>

          <region>CA</region>

          <code>94085</code>

          <country>USA</country>
        </postal>

        <email>jorge.rabadan@nokia.com</email>
      </address>
    </author>

    <author fullname="Senthil Sathappan" initials="S." surname="Sathappan">
      <organization>Nokia</organization>

      <address>
        <postal>
          <street>520 Almanor Avenue</street>

          <city>Sunnyvale</city>

          <region>CA</region>

          <code>94085</code>

          <country>USA</country>
        </postal>

        <email>senthil.sathappan@nokia.com</email>
      </address>
    </author>

    <author fullname="Ali Sajassi" initials="A." surname="Sajassi">
      <organization>Cisco</organization>

      <address>
        <postal>
          <street/>

          <city/>

          <region/>

          <code/>

          <country/>
        </postal>

        <phone/>

        <facsimile/>

        <email>sajassi@cisco.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Wen Lin" initials="W." surname="Lin">
      <organization>Juniper</organization>

      <address>
        <postal>
          <street/>

          <city/>

          <region/>

          <code/>

          <country/>
        </postal>

        <phone/>

        <facsimile/>

        <email>wlin@juniper.net</email>

        <uri/>
      </address>
    </author>

    <date day="5" month="September" year="2024"/>

    <workgroup>BESS Workgroup</workgroup>

    <abstract>
      <t>An EVPN Inter-Domain interconnect solution is required if two or more
      sites of the same Ethernet Virtual Private Network (EVPN) are attached
      to different IGP domains or Autonomous Systems (AS), and they need to
      communicate. The Inter-Domain Option-B connectivity model is one of the
      most popular solutions for such EVPN connectivity. While multiple
      documents refer to this type of interconnect solution and specify
      different aspects of it, there is no document that summarizes the impact
      of the Inter-Domain Option-B connectivity in the EVPN procedures. This
      document does not specify new procedures but analyses the EVPN
      procedures in an Inter-Domain Option-B network and suggests potential
      solutions for the described issues. Those solutions are based on either
      other specifications or based on local implementations that do not
      modify the end-to-end EVPN control plane.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="sect-1" title="Introduction">
      <t>An EVPN Inter-Domain interconnect solution is required if two or more
      sites of the same Ethernet Virtual Private Network (EVPN) <xref
      target="I-D.ietf-bess-rfc7432bis"/> are attached to different IGP
      domains or Autonomous Systems (AS), and they need to communicate. In
      general, there are different types of EVPN Inter-Domain models that are
      classified depending on the procedures implemented on the Border Routers
      interconnecting the domains. The industry typically classifies the
      models into three groups:<list style="symbols">
          <t>EVPN Service Interworking Solution: also referred to as the
          Service Gateway solution, since the Border Routers instantiate
          Virtual Routing and Forwarding tables (MAC-VRFs and/or IP-VRFs) and
          perform a lookup (after decapsulating the transport headers) on
          those tables so that packets are forwarded between domains. <xref
          target="RFC9014"/>, <xref target="I-D.sr-bess-evpn-vpws-gateway"/>
          and <xref target="I-D.ietf-bess-evpn-ipvpn-interworking"/> specify
          the Service Gateway solution for EVPN ELAN, VPWS and Layer-3
          services, respectively.</t>

          <t>Inter-Domain Option-B Solution: described in <xref
          target="RFC8365"/> section 10, this solution provides an
          interconnect solution for EVPN services by using Border Routers that
          re-write the EVPN BGP next hops and program a swap operation of the
          VNIs or MPLS labels (depending on whether the encapsulation is
          NVO-based or MPLS-based). The "Option-B" term refers to the
          resemblance of this model with the Multi-AS "type B" interconnect
          for IP-VPN in <xref target="RFC4364"/>, only that this document uses
          the model for the EVPN family. This solution does not require the
          instantiation of Virtual Routing and Forwarding tables (VRFs) on the
          Border Routers.</t>

          <t>Inter-Domain Transport Solution: refers to any Inter-Domain
          solution that provides connectivity at the transport layer, and
          therefore does not instantiate VRFs or re-write EVPN BGP next hops
          or programs swap operations of the EVPN service identifiers (such as
          VNIs or MPLS service labels) on the Border Routers. The Inter-AS
          Option-C model described in <xref target="RFC4364"/> section 10
          subsection "c" (only that the procedures would be used for EVPN
          routes, as opposed to VPN-IPv4 and VPN-IPv6 routes in <xref
          target="RFC4364"/>) is an example of Inter-Domain Transport
          Solution.</t>
        </list></t>

      <t>The Inter-Domain Option-B connectivity model is one of the most
      popular solutions for Inter-Domain EVPN connectivity, due to the fact
      that it provides isolation for each of the interconnected domains (it
      prevents the need to leak PE loopbacks between domains) while it does
      not require the instantiation of VRFs on the Border Routers. While
      multiple documents refer to this type of interconnect solution and
      specify different aspects of it, there is no document that summarizes
      the impact of the Inter-Domain Option-B connectivity in the EVPN
      procedures. This document does not specify new procedures but analyses
      the EVPN procedures in an Inter-Domain Option-B network for:<list
          style="symbols">
          <t>Multi-Homing</t>

          <t>EVPN E-Tree</t>

          <t>BUM and IP Multicast forwarding using Ingress Replication or
          Point-to-Multi-Point tunnels</t>

          <t>Other EVPN services and including Network Virtualization Overlay
          (NVO) encapsulations or MPLS-based encapsulations</t>
        </list></t>

      <t>and provide some guidelines for the described issues. Those
      guidelines are based on either other specifications or based on local
      implementations that do not modify the end-to-end EVPN control
      plane.</t>

      <section anchor="sect-1.1" title="Terminology and Conventions">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>

        <t><list style="symbols">
            <t>All-Active Redundancy Mode: When all PEs attached to an
            Ethernet segment are allowed to forward known unicast traffic
            to/from that Ethernet segment for a given BD, then the Ethernet
            segment is defined to be operating in All-Active redundancy
            mode.</t>

            <t>BD: Broadcast Domain. An EVI may be comprised of one BD
            (VLAN-based or VLAN Bundle services) or multiple BDs (VLAN-aware
            Bundle services). This document makes use of the term "BD" as
            described in <xref target="RFC9625"/> section 1.1.4.</t>

            <t>BR: Border Router, router that provides connectivity between
            domains, typically an Area Border Router (ABR) or Autonomous
            System Border Router (ASBR).</t>

            <t>BUM traffic: Broadcast, Unknown unicast and Multicast
            traffic.</t>

            <t>CE: Customer Edge device, e.g., a host, router, or switch.</t>

            <t>DF and non-DF: Designated Forwarder and non Designated
            Forwarder. In an Ethernet Segment, the Designated Forwarder PE or
            Service Gateway forwards unicast and BUM traffic. The
            non-Designated Forwarder PE or Service Gateway blocks BUM traffic
            (if working in All-Active redundancy mode) or unicast and BUM (if
            working in Single-Active redundancy mode).</t>

            <t>E-PE: Egress PE.</t>

            <t>Ethernet Segment (ES): When a customer site (device or network)
            is connected to one or more PEs via a set of Ethernet links, then
            that set of links is referred to as an 'Ethernet Segment'.</t>

            <t>Ethernet Segment Identifier (ESI): A unique non-zero identifier
            that identifies an Ethernet segment is called an 'Ethernet Segment
            Identifier'.</t>

            <t>EVI: An EVPN instance spanning the Provider Edge (PE) devices
            participating in that EVPN.</t>

            <t>MAC-VRF: A Virtual Routing and Forwarding table for Media
            Access Control (MAC) addresses on a PE. In VLAN-based or VLAN
            Bundle modes <xref target="I-D.ietf-bess-rfc7432bis"/> a BD is
            equivalent to a MAC-VRF.</t>

            <t>MPLS and non-MPLS NVO tunnels: refer to Multi-Protocol Label
            Switching (or the absence of it) Network Virtualization Overlay
            tunnels. Network Virtualization Overlay tunnels use an IP
            encapsulation for overlay frames, where the source IP address
            identifies the ingress PE (or ingress Border Router) and the
            destination IP address the egress PE (or egress Border
            Router).</t>

            <t>I-PE: Ingress PE.</t>

            <t>IP-VRF: A VPN Routing and Forwarding table for IP routes on an
            PE. In this document, an IP-VRF is an instantiation of a layer 3
            EVPN service in a PE as per <xref target="RFC9135"/><xref
            target="RFC9136"/>.</t>

            <t>IRB: Integrated Routing and Bridging</t>

            <t>IRB Interface: Integrated Bridging and Routing Interface. A
            virtual interface that connects the Bridge Table and the IP-VRF on
            an NVE.</t>

            <t>PE: Provider Edge device. In this document a PE can be a Leaf
            node in a Data Center or a traditional Provider Edge router in an
            MPLS network.</t>

            <t>Single-Active Redundancy Mode: When only a single PE, among all
            the PEs attached to an Ethernet segment, is allowed to forward
            traffic to/from that Ethernet segment for a given BD, then the
            Ethernet segment is defined to be operating in Single-Active
            redundancy mode.</t>

            <t>PMSI: Provider Multicast Service Interface.</t>

            <t>SBD: Supplementary Broadcast Domain, a special BD that has an
            IRB interface to an IP-VRF and it is used in the Optimized
            Inter-Subnet Multicast model, as described in <xref
            target="RFC9625"/>.</t>

            <t>SR-MPLS SID: Segment Routing MPLS Segment IDentifier.</t>

            <t>SRv6 SID: Segment Routing for IPv6 Segment IDentifier.</t>

            <t>VRF: A generic Virtual Routing and Forwarding table, used in
            this document to indicate the instantiation of an EVPN service
            onto a PE. This service can be any supported EVPN service such as
            layer-2 multipoint services <xref
            target="I-D.ietf-bess-rfc7432bis"/>, EVPN VPWS <xref
            target="RFC8214"/>, EVPN E-Tree <xref target="RFC8317"/>, PBB-EVPN
            <xref target="RFC7623"/>, or Layer-3 services as defined in <xref
            target="RFC9135"/> or <xref target="RFC9136"/>.</t>

            <t>VPWS: EVPN Virtual Private Wire Service, as in <xref
            target="RFC8214"/>.</t>
          </list></t>
      </section>
    </section>

    <section anchor="sect-2"
             title="EVPN Inter-Domain Option-B General Procedures">
      <t>The EVPN Inter-Domain Option-B procedures are applied in Border
      Routers that interconnect domains, and the Ingress and Egress PEs should
      be configured and operated in the same way they are when communicating
      with other PEs within their domain. The typical deployments are
      illustrated in <xref target="Figure1"/> and <xref target="Figure2"/>.
      <xref target="Figure1"/> illustrates an Inter-Domain example where each
      domain is an IGP instance. The Border routers BR-1 and BR-2 show direct
      BGP EVPN neighboring between them, and also with the Ingress PE (I-PE)
      and the Egress PE (E-PE) respectively. However, Route Reflectors may
      exist in each of the domains. The procedures described in this document
      remain unchanged irrespective of the presence of Route Reflectors in
      each domain. Note that in this document VRF is generically used, and may
      mean either MAC-VRF or IP-VRF, unless otherwise specified.</t>

      <figure anchor="Figure1"
              title="EVPN Inter-Domain Option-B scenario for IGP domains">
        <artwork><![CDATA[
      EVPN Route                                     EVPN Route
      Label L22       L22<-L33         L33<-L44      Label L44
      NHop BR-1       NHSelf           NHSelf        NHop E-PE
          <------------+ <--------------+ <-------------+
          +------------+ +--------------+ +-------------+
          |  AS 64500  | |   AS 64500   | |  AS 64500   |
        I-PE           BR-1             BR-2           E-PE
     +-------+       +-------+       +-------+       +-------+
     |+-----+|       |       |       |       |       |+-----+|
CE1--|| VRF ||       |       |       |       |       || VRF ||-->CE2
     |+-----+|       |       |       |       |       |+-----+|
     +-------+       +-------+       +-------+       +-------+
          |            | |              | |              |
          +------------+ +--------------+ +--------------+
          <--Domain-1--> <---Domain-2---> <---Domain-3--->
        +-------+         +-------+       +-------+
        |Tunnel |         |Tunnel |       |Tunnel |
        +-------+         +-------+       +-------+
        |L22    | --->    |L33    | --->  |L44    | --->
        +-------+         +-------+       +-------+
        |Eth/IP |         |Eth/IP |       |Eth/IP |
        |Payload|         |Payload|       |Payload|
        +-------+         +-------+       +-------+ 

]]></artwork>
      </figure>

      <t>This document describes also the Inter-Domain Option-B aspects in
      scenarios such as the one portrayed in <xref target="Figure2"/>, where
      the Border Routers connect different Autonomous Systems. As in the case
      in <xref target="Figure1"/> the procedures do not change in case the
      Domains use Route Reflectors. <figure anchor="Figure2"
          title="EVPN Inter-Domain Option-B scenario for Multi-AS Backbones">
          <artwork><![CDATA[      EVPN Route                                     EVPN Route
      Label L22       L22<-L33         L33<-L44      Label L44
      NHop BR-1       NHSelf           NHSelf        NHop E-PE
          <------------+ <--------------+ <-------------+
          +------------+                  +-------------+
          |  AS 64500  |                  |  AS 64501   |
        I-PE           BR-1             BR-2           E-PE
     +-------+       +-------+       +-------+       +-------+
     |+-----+|       |       |       |       |       |+-----+|
CE1--|| VRF ||       |       |-------|       |       || VRF ||-->CE2
     |+-----+|       |       |       |       |       |+-----+|
     +-------+       +-------+       +-------+       +-------+
          |            |                  |              |
          +------------+                  +--------------+
          <--Domain-1-->                  <---Domain-3--->
        +-------+                         +-------+
        |Tunnel |                         |Tunnel |
        +-------+         +-------+       +-------+
        |L22    | --->    |L33    | --->  |L44    | --->
        +-------+         +-------+       +-------+
        |Eth/IP |         |Eth/IP |       |Eth/IP |
        |Payload|         |Payload|       |Payload|
        +-------+         +-------+       +-------+]]></artwork>
        </figure></t>

      <t>In either <xref target="Figure1"/> or <xref target="Figure2"/>, this
      Inter-Domain Option-B solution involves the redistribution of EVPN
      routes from domain to domain by the Border Routers. A Border Router
      learns all the EVPN routes of its own domain, typically via IBGP from
      the Egress PE or as a client from the domain's Route Reflector, and
      readvertises those routes to the neighboring Border Router(s), via EBGP
      or IBGP. When redistributing EVPN routes to the adjacent Border Routers
      or Route Reflectors within the adjacent domain, the Border Router
      changes the Next Hop IP address to itself, and the EVPN label of the
      readvertised BGP MP_REACH_NLRI message to a new generated label. In
      essence, this means that the Border Router programs a label swap
      operation in the data path for the EVPN label. For example, packets
      received on BR-1 with EVPN label L22 are looked up and switched to the
      interface to the next domain or Border Router, now with EVPN label L33.
      The EVPN label in this document can be a 20-bit label (that is, an MPLS
      label or Segment Routing MPLS Segment Identifier) or a 24-bit label
      (that is, a VNI label for non-MPLS NVO tunnels).</t>

      <t>For EVPN routes with 20-bit EVPN labels, in case the Border Router
      receives the EVPN route via IBGP, the route is resolved to a transport
      MPLS or SR-MPLS tunnel that provides reachability to the Egress PE or
      the adjacent Border Router. The imported EVPN route is considered valid
      and redistributed only in the case the Next Hop is resolved to such a
      transport tunnel. In case the Border Router receives the EVPN route via
      single-hop EBGP, the next hop is resolved to a local interface
      associated to the next hop, and packets matching the Forwarding
      Information Base entry for that route are forwarded with a single label
      in the label stack, i.e. the swapped EVPN label.</t>

      <t>In Inter-Domain Option-B scenarios where the transport in the domains
      is based on NVO tunnels, the EVPN routes advertised from the egress PEs
      (and redistributed by the Border Routers) use 20-bit labels (in case of
      MPLS NVO tunnels, e.g., MPLSoGRE) or 24-bit labels (in case if non-MPLS
      NVO tunnels, e.g., VXLAN). The Border Routers in this case not only swap
      the label (e.g., VNI) for the NVO packets that they route, but they
      change the source and destination IP address of the router IP header.
      When the Border Router forwards packets into an adjacent domain, the
      outer source IP address of the packets is an IP address of the Border
      Router. The outer destination IP address is given by the next hop of the
      EVPN route that created the Forwarding Information Base entry.</t>

      <t>The key attributes of the solution are that the Border Routers keep
      each domain isolated from each other, e.g. BR-2 does not leak E-PE's
      loopback into other domains, and the Border Routers do not need to have
      VRFs explicitly configured. The latter aspect also means that the Border
      Routers need to learn all the EVPN routes within their own domain(s)
      regardless of the Route Targets, as well as readvertise those to the
      adjacent domains, possibly selecting a subset of the EVPN routes to be
      redistributed, via RIB-IN or RIB-OUT policy. The solution does no impose
      any changes or requirements on the Ingress or Egress PEs, or Route
      Reflectors. The procedures are solely supported on the Border Routers
      and should be transparent for the Ingress and Egress PEs.</t>

      <t><xref target="RFC8365"/> section 10.2 is the existing specification
      for Inter-Domain Option-B in case EVPN uses encapsulations with 20-bit
      or 24-bit labels, and, in particular for the scenario in <xref
      target="Figure2"/>. This document clarifies that the same procedures and
      issues apply to the scenario in <xref target="Figure1"/>. Although the
      generic operation of the Border Routers on the received EVPN routes is
      characterized above, <xref target="sect-2.1"/> clarifies the expected
      behavior on each EVPN route type.</t>

      <section anchor="sect-2.1"
               title="Border Router procedures on EVPN routes">
        <t>The Border Router behavior described in <xref target="sect-2"/> can
        be summarized in the following tasks performed on each received EVPN
        BGP UPDATE:<list style="symbols">
            <t>The Border Router accepts any EVPN route from the Border
            Routers and PEs it is connected to (possibly filtering some of the
            routes via RIB-IN import policies).</t>

            <t>Extracts the EVPN label of each EVPN route, either from the
            NLRI (Network Layer Reachability Information) or from an attribute
            included in the BGP UPDATE.</t>

            <t>Programs an EVPN label swap operation in the data path, which
            switches the extracted EVPN label to a locally generated new EVPN
            label for the same EVPN route.</t>

            <t>Readvertises the EVPN route (assuming the operation is allowed
            by policy) with:<list style="letters">
                <t>Next Hop Self, i.e., a new IP address owned by the Border
                Router itself</t>

                <t>The locally generated EVPN label for the route</t>
              </list></t>
          </list>However, there are some subtleties with some EVPN route types
        that are important to clarify in order to guarantee interoperability
        across implementations. We differentiate between EVPN Labeled Routes
        and EVPN Unlabeled Routes.</t>

        <section anchor="sect-2.1.1" title="EVPN Labeled Routes ">
          <t>EVPN Labeled Routes are those that carry EVPN Labels or
          demultiplexors in the NLRI or an attribute of the BGP UPDATE. If
          those EVPN Labels are used in the Forwarding Information Base of the
          Border Router to forward packets between domains, the Label is
          extracted and added to the Forwarding Information Base associated to
          a swap operation. If those EVPN Labels are not used to forward
          packets between domains, but they indicate certain properties of the
          route, e.g.,: ESI Labels or E-Tree Labels, then the Labels are not
          extracted, programmed or changed when the route is readvertised. The
          previous statements MUST be applied to existing and future EVPN
          route types in Inter-Domain Option-B networks. As an example:<list
              style="letters">
              <t>Ethernet Auto-Discovery per Ethernet Segment Route (or route
              type 1 per ES)<vspace blankLines="1"/>Defined in <xref
              target="I-D.ietf-bess-rfc7432bis"/>, this route signals the
              multi-homing mode information, as well as the value of the ESI
              label, encoded in the ESI Label extended community. It is used
              for fast convergence in case of multi-homed PE failures, via the
              "Mass Withdraw per Ethernet Segment" procedure. When used with
              an ESI of zero, the route is used to advertised a Leaf Label in
              the E-Tree extended community <xref target="RFC8317"/>. The Leaf
              Label is used by the Ingress PE when forwarding BUM traffic
              generated from a Leaf Attachment Circuit. Both labels, ESI label
              and Leaf label, are not used for packet forwarding at the Border
              Router and therefore the Border Router does not extract them.
              The Border Router MUST preserve the content of the ESI label or
              the E-Tree extended community when readvertising the route to
              the adjacent domain. Although the next hop self operation is
              performed on the route by the Border Router, none of the NLRI
              fields are changed when readvertising the route to the adjacent
              domain.</t>

              <t>Ethernet Auto-Discovery per EVPN Instance Route (or route
              type 1 per EVI)<vspace blankLines="1"/>Defined in <xref
              target="I-D.ietf-bess-rfc7432bis"/>, this route signals the
              forwarding information associated to the local EVPN-VPWS
              Attachment Circuit <xref target="RFC8214"/>, and when used with
              a non-zero ESI, it also performs the Aliasing and Backup
              procedures for multi-homing in EVPN services. The EVPN label
              encoded in the NLRI of this route is used when forwarding
              packets, hence the label must be extracted by the Border Router
              and programmed in the Forwarding Information Base for a swap
              operation. Besides the next hop self operation and the new valid
              label to be encoded in the route, the Border Router does not
              change any other field of the route. This includes the content
              of the EVPN Layer-2 Attributes extended community advertised
              with the route. <xref target="RFC8214"> </xref> section 4
              discusses the Inter-domain Option-B solution for EVPN-VPWS.</t>

              <t>MAC/IP Advertisement Route (or route type 2)<vspace
              blankLines="1"/>Defined in <xref
              target="I-D.ietf-bess-rfc7432bis"/>, this route advertises
              forwarding information for MAC and IP addresses that are used by
              the Ingress PE to populate the layer-2 Forwarding Information
              Base, the Address Resolution Protocol or Neighbor Discovery
              tables <xref target="RFC9161"/> or even the layer-3 Forwarding
              Information Base <xref target="RFC9135"/>. The route's NLRI
              contains a mandatory EVPN label, Label1, and an optional Label2.
              In addition to the next hop self operation, a Border Router that
              receives a route type 2, with only Label1, needs to extract
              Label1 from the NLRI, program its value in the Forwarding
              Information Base, and generate a new valid label that is encoded
              in Label1 when redistributing the route to the adjacent domain.
              If the received route type 2 contains a value for both, Label1
              and Label2, the Border Router needs to program two separate
              entries in the Forwarding Information Base (for the value in
              Label1 and the value in Label2) and generate two valid Label1
              and Label2 values. The rest of the information in the route,
              including EVPN extended communities and Default Gateway extended
              community, is preserved by the Border Router when readvertising.
              This method at the Border Router is applied irrespective of the
              Egress PE using an EVPN label per VRF, EVPN label per Ethernet
              Segment or EVPN label per MAC address. However, using a label
              per VRF on the Egress PEs has the least impact on the Border
              Routers Forwarding Information Base scale, compared to label per
              MAC or label per Ethernet Segment.</t>

              <t>Inclusive Multicast Ethernet Tag Route (or route type
              3)<vspace blankLines="1"/>Also defined in <xref
              target="I-D.ietf-bess-rfc7432bis"/>, this route is used for the
              auto-discovery of the remote PEs attached to the same Broadcast
              domain, as well as the creation of the flooding tree used to
              forward BUM traffic by the PEs attached to the same Broadcast
              Domain. The route type 3 does not contain any EVPN label in its
              NLRI. The Provider Tunnel (P-Tunnel) identification is carried
              in the PMSI Tunnel Attribute. When used for Ingress Replication
              or Assisted Replication tunnel types, the PMSI Tunnel Attribute
              contains an EVPN Label (downstream allocated) that is extracted
              by the Border Router and programmed in the Forwarding
              Information Base in the same way as for the EVPN labels in the
              routes above. The Border Router generates a valid new label that
              is encoded in the PMSI Tunnel Attribute of the route
              readvertised to the adjacent domain. In addition to the next hop
              self and label swap operation, the Border Router preserves all
              the fields in the NLRI (including the Originating Router's IP
              Address) and the attributes of the routes, including the Tunnel
              Identifier of the PMSI Tunnel Attribute and the Layer 2
              Attributes extended community. When the route type 3 uses a
              P-Tunnel different than Ingress Replication, the Border Router
              should carry out the segmentation procedures specified in <xref
              target="RFC9572"/>.</t>

              <t>IP Prefix Route (or route type 5)<vspace
              blankLines="1"/>Specified in <xref target="RFC9136"/>, this
              route allows the Egress PEs to advertise the IPv4 or IPv6
              prefixes that they have learned locally in their IP-VRF. The
              route's NLRI contains an EVPN label that the Option-B Border
              Router needs to extract and program in the Forwarding
              Information Base, along with a label swap operation. Besides the
              next hop self and generating a new valid EVPN label for the IP
              Prefix route readvertised to the adjacent domain, the Border
              Router does not change any of the fields in the NLRI and
              preserves all the attributes along with the route, including
              EVPN extended communities.</t>

              <t>Per-Region I-PMSI A-D Route (or route type 9)<vspace
              blankLines="1"/>Used for P-Tunnel Segmentation on Border
              Routers, its definition and procedures are described in <xref
              target="RFC9572"/>.</t>

              <t>S-PMSI A-D Route (or route type 10)<vspace
              blankLines="1"/>Also defined in <xref target="RFC9572"/>, the
              Border Router should follow the same procedures as for the
              Inclusive Multicast Ethernet Tag Route above.</t>
            </list></t>
        </section>

        <section anchor="sect-2.1.2" title="EVPN Unlabeled Routes">
          <t>Examples or EVPN Unlabeled Routes are:<list style="symbols">
              <t>Ethernet Segment Route (or route type 4)</t>

              <t>Selective Multicast Ethernet Tag Route (or route type 6)</t>

              <t>Multicast Membership Report Synch Route (or route type 7)</t>

              <t>Multicast Leave Synch Route (or route type 8)</t>

              <t>Leaf Auto-Discovery Route (or route type 11)</t>
            </list> The Border Router receiving these routes simply
          redistributes the routes to the adjacent domain with a next hop of
          itself, and preserving all the attributes that the routes
          contain.</t>
        </section>
      </section>
    </section>

    <section anchor="sect-3"
             title="EVPN Inter-Domain Option-B and Multi-Homing">
      <t>This section summarizes the issues of the Inter-Domain Option-B
      associated to EVPN Multi-Homing. <xref target="Figure3"/> illustrates
      the use of multi-homing in an Inter-Domain Option-B example.<figure
          anchor="Figure3" title="EVPN Inter-Domain Option-B and multi-homing">
          <artwork><![CDATA[         MAC CE2                                        MAC CE2
         RD1                                            RD1 ESI1
         Label L22       NHSelf           NHSelf        Label L44
         NHop BR-1     L22<-L33         L33<-L44        NHop E-PE1
             <------------+ <--------------+ <-------------+
           <--------------+ <--------------+ <-----------+ AD EVI RD1/ESI1
           <--------------+ <--------------+ <-----------+ AD ES  RDx/ESI1

                                                         E-PE1
                                          ES RDa/ESI1 +-------+
                                         <---------+  |+-----+|
                                                  +---|| VRF ||---+
         I-PE3            BR-1            BR-2    |   |+-----+|   |
       +-------+       +-------+       +-------+  |   +-------+   |
       |+-----+|       |       |       |       |--+               |   +---+
CE1 ---|| VRF ||-------|       |-------|       |         E-PE2    +---|CE2|
       |+-----+|       |       |       |       |--+   +-------+   |   +---+
       +-------+       +-------+       +-------+  |   |+-----+|   |
                                                  +---|| VRF ||---+
                                          ES RDb/ESI1 |+-----+|
                                         <----------  +-------+
                        NHSelf           NHSelf
           <--------------+ <--------------+ <-----------+ AD EVI RD2/ESI1
           <--------------+ <--------------+ <-----------+ AD ES  RDy/ESI1]]></artwork>
        </figure></t>

      <t>The Border Router rewriting the EVPN multi-homing routes next hop has
      an impact on the EVPN multi-homing procedures that follow:<list
          style="symbols">
          <t>Mass Withdrawal</t>

          <t>Aliasing and Backup Path procedures</t>

          <t>Designated Forwarder Election and AC-Influenced Capability</t>

          <t>Split Horizon Filtering</t>
        </list></t>

      <section anchor="sect-3.1" title="Mass Withdraw">
        <t>The limitations of the mass withdraw procedures when the
        multi-homed egress PEs and the ingress PEs are in different domains
        are explained in <xref target="RFC8365"/> section 10.2.2.</t>

        <t>As a refresher, suppose the example of <xref target="Figure3"/> in
        which CE2 is multi-homed to egress PE1 and PE2 (on Ethernet Segment
        ES1 with identifier ESI1), and the ingress PE3 sits in a different
        domain. As illustrated, only E-PE1 advertises the MAC/IP route for MAC
        CE2, whereas both E-PE1 and E-PE2 advertise the A-D per ES and A-D per
        EVI routes for ESI1. The fact that the Border Routers rewrite the next
        hops of all the routes, prevents I-PE3 from being able to correlate
        the MAC/IP Advertisement route with the A-D per ES route advertised
        from the same E-PE, since the only mechanism in <xref
        target="I-D.ietf-bess-rfc7432bis"/> to correlate A-D per ES and MAC/IP
        Advertisement routes advertised from the same E-PE is the route next
        hop. As an example, if the link from CE2 to E-PE1 fails, E-PE1 sends a
        MP_UNREACH_NLRI message for the A-D per ES route and A-D per EVI route
        for ESI1. The messages get to I-PE3 and are processed, however, I-PE3
        is unable to correlate the withdrawn A-D per ES route with the MAC/IP
        Advertisement route for CE2 and therefore it does not perform any mass
        withdraw of the MACs associated to ESI1, as long as at least one A-D
        per ES route for ESI1 exists. Note that the route distinguisher of the
        MAC/IP Advertisement route and A-D per ES route advertised from E-PE1
        are different, hence the routes cannot be associated.</t>

        <t>As also explained in <xref target="RFC8365"/> section 10.2.2, a
        "mass withdraw per EVI" is possible though, due to the fact that the
        A-D per EVI routes and MAC/IP Advertisement routes advertised from the
        same PE and ES can be correlated based on the route distinguisher. In
        <xref target="Figure3"/>, if the link between CE2 and E-PE1 fails,
        I-PE3 receives the A-D per EVI route withdrawal from E-PE1 and can
        withdraw all the MACs related to the MAC/IP Advertisement routes that
        match the route distinguisher of the A-D per EVI route, i.e., RD1 in
        the example, hence MAC CE2 is flushed on I-PE3. Although the issue is
        explained for MAC address mass withdrawal, the same issue exists with
        IP Prefixes, as in <xref
        target="I-D.ietf-bess-evpn-ip-aliasing"/>.</t>

        <t>This document assumes that "mass withdraw per EVI" is the default
        behavior that all PEs and Border Routers MUST support. When "mass
        withdraw per EVI" is used, unique RDs MUST be used on all the PEs
        attached to the same EVI.</t>

        <t>The following subsections also suggest some potential solutions to
        overcome the mass withdraw (per ES) limitation imposed by the Border
        Routers in the Inter-Domain Option-B model. All of them are based on
        finding a way to correlate the withdrawn A-D per ES route with the
        routes type 2 and/or 5 advertised by the same egress PE, so that the
        corresponding MACs or IP Prefixes can be removed.</t>

        <section anchor="sect-3.1.1"
                 title="The Originating PE Attribute Solution">
          <t>A way to solve the mass withdraw limitation imposed by the Border
          Routers (for MACs and IP Prefixes) is documented in <xref
          target="I-D.heitz-bess-evpn-option-b"/>, which defines a transitive
          attribute called Originating PE (OPE) that removes the ambiguity to
          find the identity of the originator of the routes. When the egress
          PE advertises the OPE attribute along with the A-D per ES routes and
          MAC/IP Advertisement or IP Prefix routes, the ingress PE is able to
          correlate the routes that are originally advertised from the same
          egress PE based on the same OPE value received on AD per ES and
          MAC/IP Advertisement (or IP Prefix) routes. The use of OPE provides
          a solution to support mass withdrawal per ES in Inter-Domain
          Option-B networks.</t>
        </section>

        <section anchor="sect-3.1.2"
                 title="The RD Administrator Subfield Solution">
          <t>An alternative solution is also hinted by <xref
          target="I-D.heitz-bess-evpn-option-b"/> section 9.2, where the
          routes type 2 and 5 can be correlated with the A-D per ES routes
          from the same PE based on the Administrator subfield of the route
          distinguishers (RDs). That is, in <xref target="Figure3"/>, suppose
          E-PE1 advertises the A-D per ES route with route distinguisher RDx =
          &lt;RD1:0&gt; and the MAC/IP Advertisement route with &lt;RD1:1&gt;,
          with "RD1" being the Administrator subfield of the route
          distinguisher. E-PE2 allocates "RD2" as Administrator subfield for
          A-D per ES and MAC/IP Advertisement routes. Now, in case of a
          withdraw of the A-D per ES route from E-PE1, I-PE3 can perform a
          mass withdraw operation based on the assumption that all the MACs
          from the MAC/IP Advertisement routes with RD1 as Administrator
          subfield are advertised from the same E-PE1 that failed and withdrew
          the A-D per ES route. The same solution is valid for the mass
          withdraw of IP Prefix routes.</t>
        </section>

        <section anchor="sect-3.1.3" title="The EVPN Instance RD Solution">
          <t>This document suggests a third solution based on the E-PEs using
          the same route distinguisher on A-D per ES routes and routes type 2
          or 5. The A-D per ES routes are normally advertised per &lt;ES,
          EVI-set&gt;, where an EVI-set is a group of EVPN Instances, each one
          represented by a different route target in the route. Because of
          this, the A-D per ES route cannot use the route distinguisher of an
          existing VRF in the PE, but a unique route distinguisher not
          assigned to any EVPN Instance (instantiated in a VRF). However,
          suppose each EVI-set is composed of a single EVI, hence the A-D per
          ES routes are advertised per &lt;ES, EVI&gt; and therefore there is
          a separate A-D per ES route per EVPN Instance (or VRF). If that is
          the case, now the A-D per ES routes can use the route distinguisher
          assigned to the EVPN Instance (or VRF), which is the same one used
          by the routes type 2 or 5 for the EVI. Since A-D per ES routes are -
          with this solution - advertised per &lt;ES, EVI&gt;, this is really
          a "mass withdraw per EVI" solution, similar to the one described in
          <xref target="sect-3.1"/> in terms of efficiency. However, the
          advantage of this solution is that the A-D per ES routes are
          REQUIRED, while A-D per EVI routes are OPTIONAL <xref
          target="I-D.ietf-bess-rfc7432bis"/> and may not be used in the
          EVI.</t>
        </section>
      </section>

      <section anchor="sect-3.2" title="Aliasing and Backup Path Procedures">
        <t>The Aliasing and Backup Path procedures work in an Inter-Domain
        Option-B solution as per <xref target="RFC8365"/>, section 10.2. That
        is, since EVPN MAC/IP Advertisement routes and A-D per EVI routes are
        both advertised on a per Broadcast Domain basis and they use the same
        route distinguisher and route target, the receiving ingress PE can
        associate them together to determine the BGP paths available for the
        MAC (multiple aliasing paths in case of all-active mode, or one active
        and one backup in case of single-active mode). Different paths can
        still be created without ambiguity even if they all go through the
        same Border Router.</t>

        <t>Although the Aliasing and Backup Path procedures per se are not
        affected, note that the ingress PE installs the MAC from an EVPN
        MAC/IP Advertisement route (with non-reserved ESI), only if the
        associated set of Ethernet A-D per ES routes are received from the
        same egress PE <xref target="I-D.ietf-bess-rfc7432bis">(</xref>,
        section 9.2.2). Due to the same issues described in <xref
        target="sect-3.1"/>, the ingress PE cannot determine if the received
        MAC/IP Advertisement route and the received set of Ethernet A-D per ES
        routes are coming from the same egress PE. This document suggests two
        approaches to solve this resolution issue:<list style="numbers">
            <t>Use a "loose" resolution for the MAC/IP Advertisement route -
            that is, the ingress PE considers the MAC/IP Advertisement route
            (with a non-reserved ESI) resolved if (and only if) at least one
            Ethernet A-D per ES route has been received with the same ESI and
            same next hop as the MAC/IP Advertisement route (it is assumed
            that its route target set contains the route target of the MAC/IP
            Advertisement route).</t>

            <t>Use any of the approaches in <xref target="sect-3.1"/> to
            correlate MAC/IP Advertisement routes and A-D per ES routes, and
            then resolve the MAC/IP Advertisement route as in <xref
            target="I-D.ietf-bess-rfc7432bis">(</xref>.</t>
          </list></t>
      </section>

      <section anchor="sect-3.3"
               title="Designated Forwarder Election and AC-Influenced Capability">
        <t>On an all-active Ethernet Segment, the Designated Forwarder is the
        PE router responsible for sending Broadcast, Unknown Unicast, and
        Multicast (BUM) traffic to a multi-homed Customer Edge (CE) device, in
        the &lt;ES, Ethernet Tag&gt; for which the PE is elected. If the
        Ethernet Segment works in single-active mode or port-active mode, the
        Designated Forwarder is the PE router that sends all traffic to a
        multi-homed CE <xref target="RFC8584"/>. When a CE is multi-homed to
        two or more PEs sitting in different domains, the Designated Forwarder
        candidate list is still created normally. The Designated Forwarder
        Election is unaffected by the Border Routers next hop self operation
        on the ES routes. This is due to the fact that the candidate list is
        created out of the Originating Router's IP Address of the ES routes
        (which is not changed by the Border Routers) as opposed to the ES
        route next hops <xref target="RFC8584"/>. However, the Attachment
        Circuit Influenced Designated Forwarder (AC-Influenced DF Election)
        capability <xref target="RFC8584"/> is affected by the next hop self
        operation of the Border Routers.</t>

        <t>If the AC-Influenced DF Election capability is enabled on all the
        PEs attached to the Ethernet Segment, the Designated Forwarder
        candidate list needs to be pruned based on the presence of the A-D per
        ES and A-D per EVI routes for a given candidate. That is, even if
        E-PE1's ES route is received <xref target="Figure3"/>, E-PE2 cannot
        add E-PE1 to the Designated Forwarder candidate list for &lt;ES1,
        BD1&gt; until the valid A-D per ES and A-D per EVI routes (for ES1 and
        BD1) are received and identified as originated from E-PE1. However,
        because BR-2 changes the next hop of the A-D routes, E-PE2 cannot rely
        on the next hop to identify the routes as coming from E-PE1. This
        issue is similar to the one discussed in <xref target="sect-3.1"/> for
        mass withdraw, only that the PE now needs to correlate the ES route
        and A-D per ES/EVI routes coming from the same PE of origin.</t>

        <t>This document assumes that, in case the PEs attached to the same
        Ethernet Segment are located in different domains, the operator may
        choose one of the following alternatives:<list style="symbols">
            <t>Disable the AC-Influenced Designated Forwarder capability in
            the PEs attached to the Ethernet Segment, or</t>

            <t>Enable the AC-Influenced Designated Forwarder capability in all
            the PEs attached to the Ethernet Segment, and correlate the
            received A-D per ES/EVI routes with their corresponding
            Originating Router's IP Address based on any of the three
            procedures of <xref target="sect-3.1"/>.</t>
          </list></t>
      </section>

      <section anchor="sect-3.4" title="Split Horizon Filtering">
        <t>The Split Horizon Filtering is a fundamental part of the EVPN
        multi-homing procedures to avoid BUM looped frames to go back to the
        multi-homed CE. As described in <xref
        target="I-D.ietf-bess-evpn-mh-split-horizon"/> there are two Split
        Horizon Filtering Types: ESI label based and Local Bias. Which one is
        applied depends on the transport tunnel being used by the EVPN BUM
        packets, and some transport tunnels may support both mechanisms. If
        two or more PEs of the same Ethernet Segment are sitting in different
        domains, the procedures in the Border Router may have an impact on the
        Split Horizon Filtering mechanisms. In particular:<list
            style="numbers">
            <t>If the multi-homed PEs use an ESI label based Split Horizon
            Filtering Type: <list style="letters">
                <t>Regardless of the PEs using upstream or downstream
                allocated ESI labels (for P2MP/MP2MP or Ingress Replication,
                respectively), the PEs in the Ethernet Segment need to
                correlate the identity of the PE advertising the ESI label
                with the Inclusive Multicast Ethernet Tag routes advertised by
                the same PE. This brings us back to the same issue of
                identifying the origin of the A-D per ES route described in
                <xref target="sect-3.1"/>, only that this time the receiving
                PE needs to correlate A-D per ES routes with routes type 3, as
                opposed to types 2 or 5. In this case, any of the solutions in
                <xref target="sect-3.1"/> could be used.</t>

                <t>The use of ESI labels allocated from a Domain-wide Common
                Block (DCB) and the same label used by all the PEs attached to
                the same Ethernet Segment may simplify the procedures. If that
                is the case, the ingress PE can program the received ESI label
                without the need to correlate the received A-D per ES routes
                with the Inclusive Multicast Ethernet Tag routes.</t>

                <t>In addition, the Border Routers need to preserve the ESI
                label when they route packets between domains.</t>
              </list></t>

            <t>If the multi-homed PEs use Local Bias as the Split Horizon
            Filtering Type:<list style="letters">
                <t>The Border Router cannot change the outer source IP address
                of the IP tunnel, so that the egress PE can still identify the
                source PE. Note this may not be possible in many
                implementations.</t>
              </list></t>
          </list> The above considerations may influence Inter-Domain Option-B
        designs, so the capabilities of the Border Routers and PEs have to be
        analyzed before the operator deploys CEs that are multi-homed to PEs
        located in different domains.</t>
      </section>
    </section>

    <section anchor="sect-4"
             title="Inter-Domain Option-B and Load Balancing Procedures">
      <t>This section will cover the impact of Inter-Domain Option-B Border
      Router procedures in load balancing related mechanisms such as Flow
      Label or Control Word for MPLS tunnels (see <xref
      target="I-D.ietf-bess-rfc7432bis"/> section 18), or the source UDP port
      for NVO tunnels that is used for provide entropy when load balancing
      traffic on the core routers. VXLAN <xref target="RFC7348"/> is an
      example of NVO tunnel type that uses the source UDP port to provide
      entropy.</t>

      <section anchor="sect-4.1" title="Flow Label ">
        <t>The use of Flow Label and its signaling is described in <xref
        target="I-D.ietf-bess-rfc7432bis"/> section 18.1. The ingress PE
        pushes the Flow Label only on EVPN-encapsulated known unicast packets
        forwarded to egress PEs that previously advertised their Flow Label
        support on Inclusive Multicast Ethernet Tag routes with the F-bit set.
        When programming the data path for a given MAC, the ingress PE needs
        therefore to program the use of Flow Label if the MAC/IP Advertisement
        route came from the same PE that advertised an Inclusive Multicast
        Ethernet Tag route with F-bit set. The ingress PE correlates both,
        MAC/IP Advertisement route and Inclusive Multicast Ethernet Tag route
        based on the matching route distinguisher of the two.</t>

        <t>The Flow Label MUST be preserved by the Border Routers receiving
        EVPN-encapsulated packets containing a Flow Label, so that the EVPN
        packets for the same flow are forwarded following the same path within
        each domain.</t>
      </section>

      <section anchor="sect-4.2" title="Control Word">
        <t>The signaling of the Control Word in the Inclusive Multicast
        Ethernet Tag routes (C-bit) is described in <xref
        target="I-D.ietf-bess-rfc7432bis"/> section 7.11. As in the case
        described in <xref target="sect-4.2"/>, when a Border Router rewrites
        the next hops of the MAC/IP Advertisement and Inclusive Multicast
        Ethernet Tag routes, the ingress PE needs to identify the egress PE
        based on the matching route distinguisher of the two routes. Also, if
        included in the received EVPN-encapsulated packets, the Control Word
        MUST be preserved by the Border Routers so that no packet reordering
        happens for flows forwarded into an adjacent domain.</t>
      </section>

      <section anchor="sect-4.3" title="Source UDP port">
        <t>If ingress and egress PEs use NVO tunnels <xref target="RFC8365"/>,
        i.e., IP tunnels, the ingress PE typically encodes a per-flow hash
        value into the the outer tunnel source UDP port of the
        EVPN-encapsulated packets. Examples of tunnel types that use the outer
        source UDP port as an entropy field are VXLAN, GENEVE, or MPLSoUDP.
        The Border Routers between the ingress and egress PEs MUST preserve
        the value of the source UDP port so that EVPN-encapsulated packets for
        the same flow are forwarded following the same path within each
        domain.</t>
      </section>
    </section>

    <section anchor="sect-5" title="Inter-Domain Option-B and Layer-2 MTU">
      <t>In the same way the support for Flow Label or Control Word is
      signaled, the egress PE's supported layer-2 MTU (Maximum Transfer Unit)
      is indicated in the Layer-2 MTU field of the EVPN Layer-2 Attributes
      extended community advertised along with the Inclusive Multicast
      Ethernet Tag route (<xref target="I-D.ietf-bess-rfc7432bis"/>, section
      7.11.1). The Border Router(s) between ingress an egress PEs do not
      modify any of the advertised attributes, and therefore the layer-2 MTU
      value is propagated end to end up to the ingress PE. In general, the
      layer-2 MTU configured in all PEs attached to the same EVPN service
      SHOULD match, irrespective of the domain where they reside. In case MTUs
      are different in the different domains, <xref
      target="I-D.ietf-bess-rfc7432bis"/> allows the signaling a layer-2 MTU
      of zero from the egress PE, which is not checked at the ingress PE and
      ensures the EVPN destination is properly programmed at this ingress
      PE.</t>
    </section>

    <section anchor="sect-6" title="E-Tree Considerations">
      <t><xref target="RFC8317"/>, or Ethernet-Tree in EVPN networks,
      describes two areas that are impacted by the presence of an Inter-Domain
      Option-B Border Router between ingress and egress PEs: the use of
      composite tunnels for BUM traffic and the egress PE filtering of BUM
      traffic originated from a Leaf Attachment Circuit.</t>

      <section anchor="sect-6.1" title="E-Tree Composite Tunnels">
        <t>A composite tunnel is tunnel type used by the Root PE to
        simultaneously indicate a P2MP tunnel in the transmit direction and an
        Ingress Replication tunnel in the receive direction for BUM traffic.
        For this reason, an Inclusive Multicast Ethernet Tag route for a
        composite tunnel comprises both, a downstream allocated EVPN label for
        Ingress replication, and a P2MP tunnel identifier. The EVPN label is
        extracted by the Border Router and programmed in the Forwarding
        Information Base, as described in <xref target="sect-2.1.1"/> bullet
        "d". Since the Ingress Replication procedures are followed, the Border
        Router generates a valid new label that is encoded in the (composite
        type) PMSI Tunnel Attribute of the route readvertised to the adjacent
        domain. Also, as described in <xref target="sect-2.1.1"/>, the
        segmentation procedures in <xref target="RFC9572"/> are followed for
        the encoded P2MP tunnel in the same PMSI Tunnel Attribute.</t>
      </section>

      <section anchor="sect-6.2"
               title="Egress Filtering of BUM Traffic Originated from a Leaf Attachment Circuit">
        <t>E-Tree in EVPN networks requires the filtering of traffic
        originated from a Leaf Attachment Circuit. While the ingress PE can
        determine if known unicast leaf traffic can be forwarded, based on
        whether the destination MAC address belongs to a leaf Attachment
        Circuit, filtering of the BUM traffic must be done at the egress PE.
        For such filtering, the egress PE advertises a Leaf Label along with
        an Ethernet A-D per ES route (with ESI of zero), and the egress PE
        relies on the ingress PE to push that Leaf Label when sending Leaf BUM
        traffic to it <xref target="RFC8317"/>. If ingress and egress PEs are
        located in different domains of an Inter-Domain Option-B network, the
        ingress PE cannot correlate the received Inclusive Multicast Ethernet
        Tag route and A-D per ES route (comprising the Leaf Label) from the
        same egress PE. Due to this issue when identifying the egress PE's
        Leaf Label, the ingress PE cannot push the Leaf Label below the EVPN
        multicast label for a given egress PE. The issue is illustrated in
        <xref target="Figure4"/>.</t>

        <figure anchor="Figure4"
                title="EVPN Inter-Domain Option-B and Leaf BUM filtering">
          <artwork><![CDATA[                             NHSelf      NHSelf
IMET orig-ip E-PE1          L55<-L33    L33<-L11        IMET orig-ip E-PE1
RD1 Label 55 NHop BR-1 <-------+ <---------+ <--------+ RD1 Label 11 NHop PE1

A-D per ES(Leaf-Lbl 1)<-------+ <---------+ <--------+ A-D per ES(Leaf-Lbl 1)
RDx/ESI0 NHop BR-1           NHSelf      NHSelf        RDx/ESI0 NHop PE1
                                                         E-PE1
                                                       +-------+
                                                       |+-----+|
                                                   +---|| VRF ||---CE1(Root)
                  I-PE3        BR-1        BR-2    |   |+-----+|   
                +-------+   +-------+   +-------+  |   +-------+   
                |+-----+|   |       |   |       |--+               
    CE1(Leaf)---|| VRF ||---|       |---|       |         E-PE2    
                |+-----+|   |       |   |       |--+   +-------+   
                +-------+   +-------+   +-------+  |   |+-----+|---CE21(Leaf)  
                                                   +---|| VRF ||
                                                       |+-----+|---CE22(Root)
                             NHSelf      NHSelf        +-------+
IMET orig-ip E-PE2          L66<-L44    L44<-L22        IMET orig-ip E-PE2
RD2 Label 66 NHop BR-1 <------+ <----------+ <--------+ RD2 Label 22 NHop PE2

A-D per ES(Leaf-Lbl 2)<------+ <----------+ <--------+ A-D per ES(Leaf-Lbl 2)
RDy/ESI0 NHop BR-1         NHSelf       NHSelf         RDy/ESI0 NHop E-PE2]]></artwork>
        </figure>

        <t>Suppose the egress PEs and ingress PE are in a different domain
        <xref target="Figure4"/>, and that I-PE3 needs to forward
        EVPN-encapsulated BUM traffic from Leaf CE1, using Ingress
        Replication. I-PE3 receives Inclusive Multicast Ethernet Tag routes
        and A-D per ES routes from the two egress PEs, however, I-PE3 is
        unable to identify what Leaf Label needs to push when sending
        EVPN-encapsulated BUM traffic to E-PE1 or E-PE2. This is due to the
        fact that the A-D per ES routes cannot longer be associated with their
        corresponding Inclusive Multicast routes based on the next hop, since
        the four routes in the example are received from the same next hop.
        This section suggests different solutions, as follows.</t>

        <section anchor="sect-6.2.1" title="Identication of the PE of Origin">
          <t>A way to solve the issue with E-Tree and the egress filtering of
          Leaf BUM traffic is to identify and correlate the Inclusive
          Multicast Ethernet Tag routes and A-D per ES routes (with ESI of
          zero) originated from the same egress PE. In order to do that, any
          of the three techniques in <xref target="sect-3.1"/> are valid, only
          that the identification is now done so that Inclusive Multicast
          Ethernet Tag routes and A-D per ES routes can be correlated, instead
          of MAC/IP Advertisement routes and A-D per ES routes.</t>
        </section>

        <section anchor="sect-6.2.2"
                 title="Domain-wide Common Block Leaf Labels">
          <t>The use of Leaf Labels allocated from a Domain-wide Common Block
          (DCB) and the same Leaf label value used by all the PEs attached to
          the E-Tree EVPN service simplify the procedures. If that is the
          case, all the egress PEs advertise the same Leaf label in their A-D
          per ES routes for ESI of zero, and that Label value matches the
          local Leaf label on the ingress PE. The ingress PE can then program
          the allocated Leaf label for all the destination egress PEs, without
          correlating the received Inclusive Multicast and A-D per ES routes.
          This assumes all the PEs in the Broadcast Domain allocate the same
          Leaf label. If the ingress PE detects any inconsistency in the
          signaled Leaf label, that is, if at least one PE of the Broadcast
          Domain advertises a different label than the local Leaf label, then
          the ingress PE SHOULD NOT program the Leaf label when sending
          traffic to the egress PEs.</t>
        </section>

        <section anchor="sect-6.2.3"
                 title="Source MAC-based Egress Filtering ">
          <t>Another potential solution is the use of source MAC-based egress
          filtering, as opposed to Leaf label-based egress filtering for
          EVPN-encapsulated BUM traffic. If the ingress PE receives two or
          more A-D per ES routes (with ESI of zero) with the same next hop,
          then it does not program any of the received Leaf labels and
          forwards EVPN-encapsulated BUM packets with the EVPN label and
          without any Leaf label. If we assume that the ingress PE has
          previously advertised the local Leaf MAC addresses, when the BUM
          packets get to the egress PE, a source MAC lookup in the MAC-VRF
          will determine if the BUM packet is coming from a Leaf or a Root
          Attachment Circuit.</t>

          <t>Taking the example of <xref target="Figure4"/>, I-PE3 advertises
          CE1's MAC as a Leaf MAC in a route type 2, and hence CE1's MAC is
          programmed in E-PE1 and E-PE2 as Leaf. Since I-PE3 receives two A-D
          per ES routes (with ESI of zero) from the same next hop, I-PE3
          determines that it cannot program the received Leaf labels, and
          therefore I-PE3 forwards BUM packets from CE1 to E-PE1 and E-PE2
          with their corresponding Inclusive Multicast labels and without any
          Leaf label. When the packets get to the egress PEs, E-PE1 and E-PE2
          perform a source MAC lookup in the MAC-VRF. Since CE1's MAC appear
          as a Leaf MAC, E-PE1 and E-PE2 can filter appropriately. That is,
          e.g., E-PE2 forwards to CE22 (root) only and not to CE21 (leaf).</t>
        </section>
      </section>
    </section>

    <section anchor="sect-7" title="Inter-Domain Option-B and PBB-EVPN">
      <t>Provider Backbone Bridging EVPN <xref target="RFC7623"/> is also
      supported in Inter-Domain Option-B. The following considerations
      apply:<list style="symbols">
          <t>PBB-EVPN does not have any of the issues described in <xref
          target="sect-3"/>. This is due to the fact that PBB-EVPN
          multi-homing procedures do not rely on Ethernet A-D per ES or per
          EVI routes at all.</t>

          <t>PBB-EVPN does not have any of the issues described in <xref
          target="sect-6"/> either, for the same reason. For E-Tree egress
          filtering of the EVPN-encapsulated BUM packets (so that they are
          only forwarded to local Root Attachment Circuits and not Leaf
          Attachment Circuits), PBB-EVPN relies on the source B-MAC
          identification at the egress PE. The procedures are not impacted by
          the presence of a Border Router between ingress and egress PEs.</t>

          <t>Also, this document assumes that the <xref
          target="I-D.ietf-bess-rfc7432bis"/> procedures to signal Flow Label,
          Control Word or Layer-2 MTU, do not apply to PBB-EVPN networks,
          hence there are no issues derived from those components.</t>
        </list></t>
    </section>

    <section anchor="sect-8" title="Security Considerations">
      <t>This document is intended to be published as Informational and hence
      does not impose and procedures that introduce any new security risks.
      The described solutions are based on existing specifications and
      therefore this document inherits the security considerations described
      in each of the normative reference documents.</t>
    </section>

    <section anchor="sect-9" title="IANA Considerations">
      <t>No IANA actions.</t>
    </section>

    <section title="Contributors">
      <t/>
    </section>

    <section title="Acknowledgments">
      <t>The authors would like to thank Jeffrey Zhang for his review and
      comments.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      &RFC2119;

      &RFC8174;

      &RFC9135;

      &RFC9136;

      &RFC8365;

      &RFC4364;

      &I-D.ietf-bess-rfc7432bis;

      &RFC9014;

      &RFC8214;

      &RFC8317;

      &RFC7623;

      &RFC8584;

      &RFC9625;

      &I-D.ietf-bess-evpn-ipvpn-interworking;
    </references>

    <references title="Informative References">
      &RFC9161;

      &RFC7348;

      &RFC9572;

      &I-D.heitz-bess-evpn-option-b;

      &I-D.sr-bess-evpn-vpws-gateway;

      &I-D.ietf-bess-evpn-ip-aliasing;

      &I-D.ietf-bess-evpn-mh-split-horizon;
    </references>
  </back>
</rfc>
