idnits 2.17.00 (12 Aug 2021) /tmp/idnits9813/draft-ietf-bess-ipv6-only-pe-design-01.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- ** There are 3 instances of too long lines in the document, the longest one being 12 characters in excess of 72. Miscellaneous warnings: ---------------------------------------------------------------------------- == The document doesn't use any RFC 2119 keywords, yet seems to have RFC 2119 boilerplate text. -- The document date (7 March 2022) is 75 days in the past. Is this intentional? Checking references for intended status: Best Current Practice ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) == Unused Reference: 'RFC4291' is defined on line 1005, but no explicit reference was found in the text == Unused Reference: 'RFC5492' is defined on line 1018, but no explicit reference was found in the text == Unused Reference: 'RFC8277' is defined on line 1026, but no explicit reference was found in the text == Unused Reference: 'I-D.ietf-idr-dynamic-cap' is defined on line 1032, but no explicit reference was found in the text == Unused Reference: 'RFC4659' is defined on line 1038, but no explicit reference was found in the text == Unused Reference: 'RFC4684' is defined on line 1043, but no explicit reference was found in the text == Unused Reference: 'RFC4798' is defined on line 1050, but no explicit reference was found in the text == Unused Reference: 'RFC4925' is defined on line 1056, but no explicit reference was found in the text == Unused Reference: 'RFC6074' is defined on line 1070, but no explicit reference was found in the text == Unused Reference: 'RFC6513' is defined on line 1076, but no explicit reference was found in the text == Unused Reference: 'RFC6514' is defined on line 1080, but no explicit reference was found in the text == Unused Reference: 'RFC8126' is defined on line 1085, but no explicit reference was found in the text -- Obsolete informational reference (is this intentional?): RFC 5549 (Obsoleted by RFC 8950) Summary: 1 error (**), 0 flaws (~~), 13 warnings (==), 2 comments (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 2 BESS Working Group G. Mishra 3 Internet-Draft Verizon Inc. 4 Intended status: Best Current Practice M. Mishra 5 Expires: 8 September 2022 Cisco Systems 6 J. Tantsura 7 Microsoft, Inc. 8 S. Madhavi 9 Juniper Networks, Inc. 10 Q. Yang 11 Arista Networks 12 A. Simpson 13 Nokia 14 S. Chen 15 Huawei Technologies 16 7 March 2022 18 IPv6-Only PE Design for IPv4-NLRI with IPv6-NH 19 draft-ietf-bess-ipv6-only-pe-design-01 21 Abstract 23 As Enterprises and Service Providers upgrade their brown field or 24 green field MPLS/SR core to an IPv6 transport, Multiprotocol BGP (MP- 25 BGP)now plays an important role in the transition of their Provider 26 (P) core network as well as Provider Edge (PE) Edge network from IPv4 27 to IPv6. Operators must be able to continue to support IPv4 28 customers when both the Core and Edge networks are IPv6-Only. 30 This document details an important External BGP (eBGP) PE-CE Edge and 31 Inter-AS IPv6-Only peering design that leverages the MP-BGP 32 capability exchange by using IPv6 peering as pure transport, allowing 33 both IPv4 Network Layer Reachability Information (NLRI) and IPv6 34 Network Layer Reachability Information (NLRI)to be carried over the 35 same (Border Gateway Protocol) BGP TCP session. The design change 36 provides the same Dual Stacking functionality that exists today with 37 separate IPv4 and IPv6 BGP sessions as we have today. With this 38 design change from a control plane perspective a single IPv6 is 39 required for both IPv4 and IPv6 routing updates and from a data plane 40 forwarindg perspective an IPv6 address need only be configured on the 41 PE and CE interface for both IPv4 and IPv6 packet forwarding. 43 This document provides a much needed solution for Internet Exchange 44 Point (IXP) that are facing IPv4 address depletion at large peering 45 points. With this design, IXP can now deploy PE-CE IPv6-Only eBGP 46 Edge or Inter-AS peering design to eliminate IPv4 provisioning at the 47 Edge. This core and edge IPv6-Only peering design paradigm change 48 can apply to any eBGP peering, public internet or private, which can 49 be either Core networks, Data Center networks, Access networks or can 50 be any eBGP peering scenario. This document provides vendor specific 51 test cases for the IPv6-Only peering design as well as test results 52 for the five major vendors stakeholders in the routing and switching 53 indusrty, Cisco, Juniper, Arista, Nokia and Huawei. With the test 54 results provided for the IPv6-Only Edge peering design, the goal is 55 that all other vendors around the world that have not been tested 56 will begin to adopt and implement this new Best Current Practice for 57 eBGP IPv6-Only Edge peering. 59 As this issue with IXP IPv4 address depletion is a critical issue 60 around the world, it is imperative for an immediate solution that can 61 be implemented quickly. This Best Current Practice IPv6-only eBGP 62 peering design specification will help proliferate IPv6-Only 63 deployments at the eBGP Edge network peering points to starting 64 immediately at a minimum with operators around the world using Cisco, 65 Juniper, Arista, Nokia and Huawei. As other vendors start to 66 implement this Best Current Practice, the IXP IPv4 address depletion 67 gap will eventually be eliminated. 69 Status of This Memo 71 This Internet-Draft is submitted in full conformance with the 72 provisions of BCP 78 and BCP 79. 74 Internet-Drafts are working documents of the Internet Engineering 75 Task Force (IETF). Note that other groups may also distribute 76 working documents as Internet-Drafts. The list of current Internet- 77 Drafts is at https://datatracker.ietf.org/drafts/current/. 79 Internet-Drafts are draft documents valid for a maximum of six months 80 and may be updated, replaced, or obsoleted by other documents at any 81 time. It is inappropriate to use Internet-Drafts as reference 82 material or to cite them other than as "work in progress." 84 This Internet-Draft will expire on 8 September 2022. 86 Copyright Notice 88 Copyright (c) 2022 IETF Trust and the persons identified as the 89 document authors. All rights reserved. 91 This document is subject to BCP 78 and the IETF Trust's Legal 92 Provisions Relating to IETF Documents (https://trustee.ietf.org/ 93 license-info) in effect on the date of publication of this document. 94 Please review these documents carefully, as they describe your rights 95 and restrictions with respect to this document. Code Components 96 extracted from this document must include Revised BSD License text as 97 described in Section 4.e of the Trust Legal Provisions and are 98 provided without warranty as described in the Revised BSD License. 100 Table of Contents 102 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 103 2. Requirements Language . . . . . . . . . . . . . . . . . . . . 6 104 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 6 105 4. IPv6-Only Edge Peering Architecture . . . . . . . . . . . . . 7 106 4.1. Problem Statement . . . . . . . . . . . . . . . . . . . . 7 107 4.2. IPv6-Only PE-CE Design Solution . . . . . . . . . . . . . 8 108 4.3. IPv6-Only Edge Peering Design . . . . . . . . . . . . . . 9 109 4.3.1. IPv6-Only Edge Peering Packet Walk . . . . . . . . . 9 110 4.3.2. 6to4 Softwire IPv4-Only Core packet walk . . . . . . 10 111 4.3.3. 4to6 Softwire IPv6-Only Core packet walk . . . . . . 11 112 4.4. RFC5549 and RFC8950 Applicability . . . . . . . . . . . . 13 113 4.4.1. IPv6-Only Edge Peering design next-hop encoding . . . 14 114 4.4.2. RFC8950 updates to RFC5549 applicability . . . . . . 14 115 5. IPv6-Only PE Design Edge and Inter-AS Options E2E Test 116 Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 15 117 5.1. Test-1 E2E IPv6-Only PE-CE, Global Table over IPv4-Only 118 Core(6PE), 6to4 softwire . . . . . . . . . . . . . . . . 16 119 5.2. Test-2 E2E IPv6-Only PE-CE, VPN over IPv4-Only Core, 6to4 120 Softwire . . . . . . . . . . . . . . . . . . . . . . . . 17 121 5.3. Test-3 E2E IPv6-Only PE-CE, Global Table over IPv6-Only 122 Core, 4to6 Softwire . . . . . . . . . . . . . . . . . . 17 123 5.4. Test-4 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core, 4to6 124 Softwire . . . . . . . . . . . . . . . . . . . . . . . . 18 125 5.5. Test-5 E2E IPv6-Only PE-CE, Global Table over IPv4-Only 126 Core(6PE), 6to4 softwire -Inter-AS Option-B . . . . . . 18 127 5.6. Test-6 E2E IPv6-Only PE-CE, Global Table over IPv4-Only 128 Core(6PE), 6to4 softwire -Inter-AS Option-C . . . . . . 19 129 5.7. Test-7 E2E IPv6-Only PE-CE, VPN over IPv4-Only, 6to4 130 softwire -Inter-AS Option-B . . . . . . . . . . . . . . 19 131 5.8. Test-8 E2E IPv6-Only PE-CE, VPN over IPv4-Only Core, 6to4 132 softwire -Inter-AS Option-C . . . . . . . . . . . . . . 20 133 5.9. Test-9 E2E IPv6-Only PE-CE, Global Table over IPv6-Only 134 Core, 4to6 softwire -Inter-AS Option-B . . . . . . . . . 20 135 5.10. Test-10 E2E IPv6-Only PE-CE, Global Table over IPv6-Only 136 Core, 4to6 softwire -Inter-AS Option-C . . . . . . . . . 21 137 5.11. Test-11 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core, 4to6 138 softwire -Inter-AS Option-B . . . . . . . . . . . . . . 21 140 5.12. Test-12 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core, 4to6 141 softwire -Inter-AS Option-C . . . . . . . . . . . . . . 22 142 5.13. IPv6-Only PE-CE Operational Considerations Testing . . . 22 143 6. Operational Considerations . . . . . . . . . . . . . . . . . 23 144 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 24 145 8. Security Considerations . . . . . . . . . . . . . . . . . . . 24 146 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 24 147 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 24 148 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 24 149 11.1. Normative References . . . . . . . . . . . . . . . . . . 24 150 11.2. Informative References . . . . . . . . . . . . . . . . . 25 151 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 27 153 1. Introduction 155 As Enterprises and Service Providers upgrade their brown field or 156 green field MPLS/SR core to an IPv6 transport such as MPLS LDPv6, SR- 157 MPLSv6 or SRv6, Multiprotocol BGP (MP-BGP) now plays an important 158 role in the transition of the Provider (P) core networks and Provider 159 Edge (PE) edge networks from IPv4 to IPv6. Operators have a 160 requirement to support IPv4 customers and must be able to support 161 IPv4 address family and Sub-Address-Family Virtual Private Network 162 (VPN)-IPv4, and Multicast VPN IPv4 customers. 164 IXP are also facing IPv4 address depletion at their peering points, 165 which are large Layer 2 transit backbones that service providers peer 166 and exchange IPv4 and IPv6 Network Layer Reachability Information 167 (NLRI). Today, these transit exchange points are Dual Stacked. With 168 this IPv6-only BGP peering design, only IPv6 is configured on the PE- 169 CE interface, the Provider Edge (PE) - Customer Edge (CE), or Inter- 170 AS ASBR (Autonomous System Boundary Router) to ASBR (Autonomous 171 System Boundary Router) PE-PE Provider Edge (PE) - Provider Edge 172 (PE), the IPv6 BGP peer is now used to carry IPv4 (Network Layer 173 Reachability Information) NLRI over an IPv6 next hop using IPv6 next 174 hop encoding defined in [RFC8950], while continuing to forward both 175 IPv4 and IPv6 packets. In the framework of this design the PE is no 176 longer Dual Stacked. However in the case of the CE, PE-CE link CE 177 side of the link is no longer Dual Stacked, however all other 178 internal links within the CE domain may or maynot be Dual stacked. 179 In the Inter-AS case the ASBR-ASBR PE-PE peering all peerings would 180 be now IPv6-Only for all Inter-AS options Peering Option-A, Option-B, 181 Option-AB and Option-C per [RFC4364]. We now refer to this PE as an 182 "IPv6-Only PE" using the IPv6-Only PE Design framework. 184 MP-BGP specifies that the set of usable next-hop address families is 185 determined by the Address Family Identifier (AFI) and the Subsequent 186 Address Family Identifier (SAFI). Historically the AFI/SAFI 187 definitions for the IPv4 address family only have provisions for 188 advertising a Next Hop address that belongs to the IPv4 protocol when 189 advertising IPv4 or VPN-IPv4. [RFC8950] specifies the extensions 190 necessary to allow advertising IPv4 NLRI, Virtual Private Network 191 Unicast (VPN-IPv4) NLRI, Multicast Virtual Private Network (MVPN- 192 IPv4) NLRI with a Next Hop address that belongs to the IPv6 protocol. 193 This comprises of an extended next hop encoding MP-REACH BGP 194 capability exchange to allow the address of the Next Hop for IPv4 195 NLRI, VPN-IPv4 NLRI and MVPN-IPv4 NLRI to also belong to the IPv6 196 Protocol. [RFC8950] defines the encoding of the Next Hop to 197 determine which of the protocols the address actually belongs to, and 198 a new BGP Capability allowing MP-BGP Peers to discover dynamically 199 whether they can exchange IPv4 NLRI and VPN-IPv4 NLRI with an IPv6 200 Next Hop. 202 The current specification for carrying IPv4 NLRI of a given address 203 family via a Next Hop of a different address family is now defined in 204 [RFC8950], and specifies the extended next hop encoding MP-REACH 205 capability extension necessary to do so. This comprises an extension 206 of the AFI/SAFI definitions to allow the address of the Next Hop for 207 IPv4 NLRI or VPN-IPv4 NLRI to belong to either the IPv4 or the IPv6 208 protocol, the encoding of the Next Hop information to determine which 209 of the protocols the address belongs to, and a new BGP Capability 210 allowing MP-BGP peers to dynamically discover whether they can 211 exchange IPv4 NLRI and VPN- IPv4 NLRI with an IPv6 Next Hop. 213 With the new extensions defined in [RFC8950] supporting NLRI and next 214 hop address family mismatch, the BGP peer session can now be treated 215 as a pure TCP transport and carry both IPv4 and IPv6 NLRI at the 216 Provider Edge (PE) - Customer Edge (CE) or Inter-AS ASBR to ASBR PE- 217 PE over a single IPv6 TCP session. This allows for the elimination 218 of dual stack from the PE-CE and Inter-AS ASBR-ASBR PE-PE peering 219 point, and now enable the peering to be IPv6-ONLY. The elimination 220 of IPv4 on the PE-CE and Inter-AS ASBR-ASBR PE-PE peering points 221 translates into OPEX expenditure savings of point-to-point 222 infrastructure links as well as /31 address space savings and 223 administration and network management of both IPv4 and IPv6 BGP 224 peers. This reduction decreases the number of PE-CE BGP peers by 225 fifty percent, which is a tremendous cost savings for operators. 227 While the savings exists at the Edge eBGP PE-CE peering, on the core 228 side PE to Route Reflector (RR) peering carrying IPv4 229 <1/1>, VPN-IPV4 <1/128>, and Multicasat VPN <1/129>, there is no 230 savings as the Provider (P) Core is IPv6 Only and thus can only have 231 an IPv6 peer and must use [RFC8950] extended next hop encoding to 232 carrying IPv4 NLRI IPV4 <2/1>, VPN-IPV4 <2/128>, and Multicasat VPN 233 <2/129> over an IPv6 next hop. 235 This IPv6-Only PE design is applicable to both PE-CE Edge over a 236 IPv4-Only Core, IPv6-Only Core as well as Global table or VPN overlay 237 scenario as well as all Inter-AS Options Option-A, Option-B, Option- 238 AB and Option-C The following Address Family (AFI) / Subsequent 239 Address Family (SAFI) will be tested with both IPv4-Only Core, 240 IPv6-Only Core and Global Routing Table (GRT) and IP Virtual Private 241 Network (VPN) [RFC4364]. IPv4 <1/1>, VPN-IPV4 <1/128>, 242 and Multicasat VPN <1/129>. 244 This document provides a much needed solution for Internet Exchange 245 Point (IXP) that are facing IPv4 address depletion at large peering 246 points. With this design, IXP can now use deploy PE-CE IPv6-Only 247 eBGP Edge and Inter-AS peering design to eliminate IPv4 provisioning 248 at the PE Edge as well as PE Inter-AS. This core and edge IPv6-Only 249 peering design paradigm change can apply to any eBGP peering, public 250 internet or private, which can be either Core networks, Data Center 251 networks, Access networks or can be any eBGP peering scenario. This 252 document provides detailed vendor specific test cases and test 253 results for the IPv6-Only peering design as well as successful test 254 results between five major vendors stakeholders in the routing and 255 switching indusrty, Cisco, Juniper, Arista, Nokia and Huawei. With 256 the test results provided for the IPv6-Only Edge peering design, the 257 goal is that all other vendors around the world that have not been 258 tested will begin to adopt and implement this new best practice for 259 eBGP IPv6-Only Edge peering. This will give confidence to operators 260 to start the proliferation of this IPv6-Only PE design. 262 As this issue with IXP address depletion is a critical issue around 263 the world, it is imperative for an immediate solution that can be 264 implemented quickly. This best practice IPv6-only eBGP peering 265 design specification will help proliferate IPv6-Only deployments at 266 the eBGP Edge and Inter-AS network peering points starting 267 immediately at a minimum with operators around the world using Cisco, 268 Juniper, Arista, Nokia and Huawei. 270 2. Requirements Language 272 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 273 "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and 274 "OPTIONAL" in this document are to be interpreted as described in BCP 275 14 [RFC2119] [RFC8174] when, and only when, they appear in all 276 capitals, as shown here. 278 3. Terminology 280 Terminolgoy used in defining the IPv6-Only Edge specification. 282 AFBR: Address Family Border Router Provider Edge (PE). 284 Edge: PE-CE Edge Network Provider Edge - Customer Edge 286 Core: P Core Network Provider (P) 288 4to6 Softwire : IPv4 edge over an IPv6-Only core 290 6to4 Softwire: IPv6 edge over an IPv4-Only core 292 E2E: End to End 294 4. IPv6-Only Edge Peering Architecture 296 4.1. Problem Statement 298 This specification addresses a real issue that has been discussed at 299 many operator groups around the world related to IXP major peering 300 points where hundreds of AS's have both IPv4 and IPv6 dual stacked 301 peering. IPv4 address depletion have been a major issue issue for 302 many years now. Operators around the world are clamoring for a 303 solution that can help solve issues related to IPv4 address depletion 304 at these large IXP peering points. With this solution IXPs as well 305 as all infrastructure networks such as Core networks, DC networks, 306 Access networks as well as any PE-CE public or private network can 307 now utilize this IPv6-Only Edge solution and reap the benefits 308 immediately on IPv4 address space saving. 310 IXP Problem Statement 312 Dual Stacked Dual Stacked 313 CE PE 315 +-------+ IPv4 BGP Peer +-------+ 316 | |---------------| | 317 | CE | IPv6 BGP Peer | PE | 318 | |---------------| | 319 +-------+ +-------+ 320 IPv4 forwarding IPv4 forwarding 321 IPv6 forwarding IPv6 forwarding 323 Figure 1: Problem Statement - IXP Dual Stack Peering 324 ________ 325 Dual Stacked _____ / \ Dual Stacked 326 PE / CE / \__/ \___ PE / CE 327 +----+ +----+ / \ +------+ +-----+ 328 | | | | |0====VPN Overlay Tunnel ==0| | | | | 329 | | | | | \ | | | | 330 | CE |--| PE |--\ IPv6-Only Core |----| PE |---| CE | 331 | | | | \0=========Underlay =======0| | | | | 332 +----+ +----+ \ __/ +------+ +-----+ 333 IPv4 IPv6 BGP peer \ IP / MPLS / SR domain / IPv4 and IPv6 BGP peer 334 IPv4 forwarding \__ __ / IPv4 forwarding 335 IPv6 forwarding \_______/ \_____/ IPv6 forwarding 337 Figure 2: Problem Statement - E2E Dual Stack Edge 339 4.2. IPv6-Only PE-CE Design Solution 341 The IPv6-Only Edge design solution provides a means of E2E single 342 protocol design solution extension of [RFC5565] Softwire Mesh 343 framework from the PE-CE Edge to the Core from ingres so egress 344 through the entire operators domain. This solution eliminates all 345 IPv4 addressing from end to end while still providing the same Dual 346 Stack functionality of IPv4 and IPv6 packet forwarding from a data 347 plane perspective by leveraging the [RFC8950] extended next hop 348 encoding so that IPv4 NLRI can be advertised over a single IPv6 pure 349 transport TCP session. This IPv6-Only E2E architecture eliminates 350 all IPv4 peering and IPv4 addressing E2E from the ingress CE to 351 ingress PE to egress PE to egress CE and all hops along the operator 352 E2E path. 354 Solution applicable to 355 any Edge peering scenario - IXP, Core, DC, Access, etc 357 +-------+ +-------+ 358 | | IPv6 Only | | 359 | CE |----------------| PE | 360 | | IPv6 BGP Peer | | 361 +-------+ +-------+ 362 IPv4 forwarding IPv4 forwarding 363 IPv6 forwarding IPv6 forwarding 365 Figure 3: IPv6-Only Solution Applicability 366 ________ 367 IPv6-Only _____ / \ IPv6-Only 368 PE / CE / \__/ \___ PE / CE 369 +----+ +----+ / \ +------+ +-----+ 370 | | | | |0====VPN Overlay Tunnel ==0| | | | | 371 | | | | | \ | | | | 372 | CE |--| PE |--\ IPv6-Only Core |----| PE |---| CE | 373 | | | | \0=========Underlay ===== ==0 | | | | 374 +----+ +----+ \ __/ +------+ +-----+ 375 IPv6 BGP peer \IP / MPLS / SR domain / IPv6 BGP peer 376 IPv4 forwarding \__ __ / IPv4 forwarding 377 IPv6 forwarding \_______/ \_____/ IPv6 forwarding 379 Figure 4: E2E VPN Solution 381 4.3. IPv6-Only Edge Peering Design 383 4.3.1. IPv6-Only Edge Peering Packet Walk 385 The IPv6-Only Edge Peering design utilizes two key E2E Softwire Mesh 386 Framework scenario's, 4to6 softwire and 6to4 softwire. The Softwire 387 mesh framework concept is based on the overlay and underlay MPLS or 388 SR based technology framework, where the underlay is the transport 389 layer and the overlay is a Virtual Private Network (VPN) layer, and 390 is the the tunneled virtualization layer containing the customer 391 payload. The concept of a 6to4 Softwire is based on transmission of 392 IPv6 packets at the edge of the network by tunneling the IPv6 packets 393 over an IPv4-Only Core. The concept of a 4to6 Softwire is also based 394 on transmission of IPv4 packets at the edge of the network by 395 tunneling the IPv4 packets over an IPv6-Only Core. 397 This document describes End to End (E2E) test scenarios that follow a 398 packet flow from IPv6-Only attachment circuit from ingress PE-CE to 399 egress PE-CE tracing the routing protocol control plane and data 400 plane forwarding of IPv4 packets in a 4to6 softwire or 6to4 softwire 401 within the IPv4-Only or IPv6-Only Core network. In both secneario we 402 are focusing on IPv4 packets and the control plane and data plane 403 forwarding aspects of IPv4 packets from the PE-CE Edge network over 404 an IPv6-Only P (Provider) core network or IPv4-Only P (Provider) core 405 network. With this IPv6-Only Edge peering design, the Softwire Mesh 406 Framework is not extended beyond the Provider Edge (PE) and continues 407 to terminate on the PE router. 409 4.3.2. 6to4 Softwire IPv4-Only Core packet walk 411 6to4 softwire where IPv6-Edge eBGP IPv6 peering where IPv4 packets at 412 network Edge traverse a IPv4-Only Core 414 In the scenario where IPv4 packets originating from a PE-CE edge are 415 tunneled over an MPLS or Segment Routing IPv4 underlay core network, 416 the PE and CE only have an IPv6 address configured on the interface. 417 In this scenario the IPv4 packets that ingress the CE from within the 418 CE AS are over an IPv6-Only interface and are forwarded to an IPv4 419 NLRI destination prefix learned from the Pure Transport Single IPv6 420 BGP Peer. In the IPv6-Only Edge peering architecture the PE is 421 IPv6-Only as all PE-CE interfaces are IPv6-Only. However, on the CE, 422 the PE-CE interface is the only interface that is IPv6-Only and all 423 other interfaces may or may not be IPv6-Only. Following the data 424 plane packet flow, IPv4 packets are forwarded from the ingress CE to 425 the IPv6-Only ingress PE where the VPN label imposition push per 426 prefix, per-vrf, per-CE occurs and the labeled packet is forwarded 427 over a 6to4 softwire IPv4-Only core, to the egress PE where the VPN 428 label disposition pop occurs and the native IPv4 packet is forwarded 429 to the egress CE. In the reverse direction IPv4 packets are 430 forwarded from the egress CE to egress PE where the VPN label 431 imposition per prefix, per-vrf, per-CE push occurs and the labeled 432 packet is forwarded back over the 6to4 softwire IPv4-Only core, to 433 the ingress PE where the VPN label disposition pop occurs and the 434 native IPv4 packet is forwarded to the ingress CE. . The 435 functionality of the IPv4 forwarding plane in this scenario is 436 identical from a data plane forwarding perspective to Dual Stack IPv4 437 forwarding scenario. 439 +--------+ +--------+ 440 | IPv4 | | IPv4 | 441 | Client | | Client | 442 | Network| | Network| 443 +--------+ +--------+ 444 | \ / | 445 | \ / | 446 | \ / | 447 | X | 448 | / \ | 449 | / \ | 450 | / \ | 451 +--------+ +--------+ 452 | AFBR | | AFBR | 453 +--| IPv4/6 |---| IPv4/6 |--+ 454 | +--------+ +--------+ | 455 +--------+ | | +--------+ 456 | IPv4 | | | | IPv4 | 457 | Client | | | | Client | 458 | Network|------| IPv4 |-------| Network| 459 +--------+ | only | +--------+ 460 | | 461 | +--------+ +--------+ | 462 +--| AFBR |---| AFBR |--+ 463 | IPv4/6 | | IPv4/6 | 464 +--------+ +--------+ 465 | \ / | 466 | \ / | 467 | \ / | 468 | X | 469 | / \ | 470 | / \ | 471 | / \ | 472 +--------+ +--------+ 473 | IPv6 | | IPv4 | 474 | Client | | Client | 475 | Network| | Network| 476 +--------+ +--------+ 478 Figure 5: 6to4 Softwire - IPv6 Edge over an IPv4-Only Core 480 4.3.3. 4to6 Softwire IPv6-Only Core packet walk 482 4to6 softwire where IPv6-Edge eBGP IPv6 peering where IPv4 packets at 483 network Edge traverse a IPv6-Only Core 484 In the scenario where IPv4 packets originating from a PE-CE edge are 485 tunneled over an MPLS or Segment Routing IPv4 underlay core network, 486 the PE and CE only have an IPv6 address configured on the interface. 487 In this scenario the IPv4 packets that ingress the CE from within the 488 CE AS are over an IPv6-Only interface and are forwarded to an IPv4 489 NLRI destination prefix learned from the Pure Transport Single IPv6 490 BGP Peer. In the IPv6-Only Edge peering architecture the PE is 491 IPv6-Only as all PE-CE interfaces are IPv6-Only. However, on the CE, 492 the PE-CE interface is the only interface that is IPv6-Only and all 493 other interfaces may or may not be IPv6-Only. Following the data 494 plane packet flow, IPv4 packets are forwarded from the ingress CE to 495 the IPv6-Only ingress PE where the VPN label imposition push per 496 prefix, per-vrf, per-CE occurs and the labeled packet is forwarded 497 over a 4to6 softwire IPv6-Only core, to the egress PE where the VPN 498 label disposition pop occurs and the native IPv4 packet is forwarded 499 to the egress CE. In the reverse direction IPv4 packets are 500 forwarded from the egress CE to egress PE where the VPN label 501 imposition per prefix, per-vrf, per-CE push occurs and the labeled 502 packet is forwarded back over the 4to6 softwire IPv6-Only core, to 503 the ingress PE where the VPN label disposition pop occurs and the 504 native IPv4 packet is forwarded to the ingress CE. . The 505 functionality of the IPv4 forwarding plane in this scenario is 506 identical from a data plane forwarding perspective to Dual Stack IPv4 507 forwarding scenario. 509 +--------+ +--------+ 510 | IPv4 | | IPv4 | 511 | Client | | Client | 512 | Network| | Network| 513 +--------+ +--------+ 514 | \ / | 515 | \ / | 516 | \ / | 517 | X | 518 | / \ | 519 | / \ | 520 | / \ | 521 +--------+ +--------+ 522 | AFBR | | AFBR | 523 +--| IPv4/6 |---| IPv4/6 |--+ 524 | +--------+ +--------+ | 525 +--------+ | | +--------+ 526 | IPv6 | | | | IPv6 | 527 | Client | | | | Client | 528 | Network|------| IPv6 |-------| Network| 529 +--------+ | only | +--------+ 530 | | 531 | +--------+ +--------+ | 532 +--| AFBR |---| AFBR |--+ 533 | IPv4/6 | | IPv4/6 | 534 +--------+ +--------+ 535 | \ / | 536 | \ / | 537 | \ / | 538 | X | 539 | / \ | 540 | / \ | 541 | / \ | 542 +--------+ +--------+ 543 | IPv4 | | IPv4 | 544 | Client | | Client | 545 | Network| | Network| 546 +--------+ +--------+ 548 Figure 6: 4to6 Softwire - IPv4 Edge over an IPv6-Only Core 550 4.4. RFC5549 and RFC8950 Applicability 551 4.4.1. IPv6-Only Edge Peering design next-hop encoding 553 This section describes [RFC8950] next hop encoding updates to 554 [RFC5549] applicability to this specification. IPv6-only eBGP Edge 555 PE-CE peering to carry IPv4 Unicast NLRI IPv4 <1/1> over 556 an IPv6 next hop BGP capability extended hop encoding IANA capability 557 codepoint value 5 defined is applicable to both [RFC5549] and 558 [RFC8950] as IPv4 Unicast NLRI IPv4 <1/1> does not change 559 in the RFC updates. 561 IPv4 packets over an IPv6-Only core 4to6 Softwire E2E packet flow is 562 part of the IPv6-Only design vendor interoperaiblity test cases and 563 in that respect is applicable as [RFC8950] updates [RFC5549] for 564 VPN-IPV4 <1/128>, and Multicasat VPN <1/129> 566 4.4.2. RFC8950 updates to RFC5549 applicability 568 This section describes the [RFC8950] next hop encoding updates to 569 [RFC5549] 571 In [RFC5549] when AFI/SAFI 1/128 is used, the next-hop address is 572 encoded as an IPv6 address with a length of 16 or 32 bytes. This 573 document modifies how the next-hop address is encoded to accommodate 574 all existing implementations and bring consistency with VPNv4oIPv4 575 and VPNv6oIPv6. The next-hop address is now encoded as a VPN-IPv6 576 address with a length of 24 or 48 bytes [RFC8950] (see Sections 3 and 577 6.2 of this document). This change addresses Erratum ID 5253 578 (Err5253). As all known and deployed implementations are 579 interoperable today and use the new proposed encoding, the change 580 does not break existing interoperability. Updates to [RFC8950] is 581 applicable to the IPv6-Only PE-CE edge design for the IPv6 next hop 582 encoding E2E test case of IPv4 packets over and IPv6-Only core 4to6 583 Softwire. In this test case IPv4 Unicast NLRI IPv4 <1/1> 584 is advertised over the PE to RR core peering 4to6 softwire in VPN-IPV4 <1/128>. In this test case label allocation mode 586 comes into play which is discussed in section 8.9. 588 [RFC5549] next hop encoding of MP_REACH_NLRI with: 590 * NLRI= NLRI as per current AFI/SAFI definition 592 Advertising with [RFC4760] MP_REACH_NLRI with: 594 * AFI = 1 596 * SAFI = 128 or 129 598 * Length of Next Hop Address = 16 or 32 599 * NLRI= NLRI as per current AFI/SAFI definition 601 [RFC8950] next hop encoding of MP_REACH_NLRI with: 603 * NLRI= NLRI as per current AFI/SAFI definition 605 Advertising with [RFC4760] MP_REACH_NLRI with: 607 * AFI = 1 609 * SAFI = 128 or 129 611 * Length of Next Hop Address = 24 or 48 613 * Next Hop Address = VPN-IPv6 address of next hop with an 8-octet RD 614 set to zero (potentially followed by the link-local VPN-IPv6 615 address of the next hop with an 8-octet RD is set to zero). 617 * NLRI= NLRI as per current AFI/SAFI definition 619 5. IPv6-Only PE Design Edge and Inter-AS Options E2E Test Cases 621 Proof of conept interoperability testing of the 4 test cases between 622 the 5 vendors Cisco, Juniper, Arista, Nokia and Huawei. 624 Cisco, Juniper, Arista, Nokia, Huawei, platform, code revision and 625 test results for all use cases 627 Cisco: Edge Router- XR ASR 9910 IOS XR 7.4.1, Core Router- NCS 6000 628 7.2.2, CRS-X 6.7.4 630 Juniper: Edge Router- MX platform MX480, MX960, Core Router- PTX 631 Platform PTX5000, PTC10K8 (JUNOS and EVO) Release 20.4R2 633 Tested v4 edge over v6 core in a virtual setup using vMX platforrm 634 and 20.4R2 and LDPv6 as underlay, but there were some data plane 635 forwarding issues. Tested same setup on latest release 21.4 and it 636 worked. Investigating what the minimum version is for this setup to 637 work. 639 Nokia: Edge and Core-7750 Service Router, Release R21 641 Huawei: Edge and Core-VRPv8, Release VRP-V800R020C10 643 Arista: 645 Intra-AS tests PE-CE Edge Peering IPv4-Only Core, IPv6-Only Core, 646 Global Table (GRT) and IP VPN 647 AFI/SAFI IPv4-Unicast SAFI IPv6-Unicast SAFI 649 IPv4 Core: 651 Test-1 Global table (6PE) 653 Test-2 IP VPN 655 Global table IPv6 657 IPv6 Core: 659 Test-3 Global table 661 Test-4 IP VPN 663 Inter-AS Options tests IPv4-Only Core, IPv6-Only Core, Global 664 Table (GRT) and IP VPN 666 AFI/SAFI VPN and MVPN 668 IPv4-Only Core 670 Test-5 Global table 6PE Option-B 672 Test-6 Global table 6PE Option-C 674 Test-7 IP VPN Inter AS Option-B 676 Test-8 IP VPN Inter AS Option-C 678 IPv6-Only Core 680 Test-9 Global table Option-B 682 Test-10 Global table Option-C 684 Test-11 IP VPN Inter AS Option-B 686 Test-12 IP VPN Inter AS Option-C 688 5.1. Test-1 E2E IPv6-Only PE-CE, Global Table over IPv4-Only Core(6PE), 689 6to4 softwire 690 ________ 691 IPv6-Only _____ / \ IPv6-Only 692 PE / CE / \__/ \___ PE / CE 693 +----+ +----+ / \ +------+ +-----+ 694 | | | | | |_ | | | | 695 | | | | | \ | | | | 696 | CE |--| PE |--\ IPv4-Only Core |----| PE |---| CE | 697 | | | | \0=========Underlay =======0| | | | | 698 +----+ +----+ \ __/ +------+ +-----+ 699 IPv6 BGP peer \ MPLS / SR domain / IPv6 BGP peer 700 IPv4 forwarding \__ __ / IPv4 forwarding 701 IPv6 forwarding \_______/ \_____/ IPv6 forwarding 703 Figure 7: Test-1 E2E IPv6-Only PE-CE, Global Table over IPv4-Only 704 Core (6PE) 706 5.2. Test-2 E2E IPv6-Only PE-CE, VPN over IPv4-Only Core, 6to4 Softwire 708 ________ 709 IPv6-Only _____ / \ IPv6-Only 710 PE / CE / \__/ \___ PE / CE 711 +----+ +----+ / \ +------+ +-----+ 712 | | | | | 0====VPN Overlay Tunnel ==0| | | | | 713 | | | | | \ | | | | 714 | CE |--| PE |--\ IPv4-Only Core |----| PE |---| CE | 715 | | | | \0=========Underlay =======0| | | | | 716 +----+ +----+ \ __/ +------+ +-----+ 717 IPv6 BGP peer \ MPLS / SR domain / IPv6 BGP peer 718 IPv4 forwarding \__ __ / IPv4 forwarding 719 IPv6 forwarding \_______/ \_____/ IPv6 forwarding 721 Figure 8: Test-2 E2E IPv6-Only PE-CE, VPN over IPv4-Only Core 723 5.3. Test-3 E2E IPv6-Only PE-CE, Global Table over IPv6-Only Core, 4to6 724 Softwire 725 ________ 726 IPv6-Only _____ / \ IPv6-Only 727 PE / CE / \__/ \___ PE / CE 728 +----+ +----+ / \ +------+ +-----+ 729 | | | | | |_ | | | | 730 | | | | | \ | | | | 731 | CE |--| PE |--\ IPv6-Only Core |----| PE |---| CE | 732 | | | | \0=========Underlay =======0| | | | | 733 +----+ +----+ \ __/ +------+ +-----+ 734 IPv6 BGP peer \ MPLS / SR domain / IPv6 BGP peer 735 IPv4 forwarding \__ __ / IPv4 forwarding 736 IPv6 forwarding \_______/ \_____/ IPv6 forwarding 738 Figure 9: Test-3 E2E IPv6-Only PE-CE, Global Table over IPv6-Only 739 Core 741 5.4. Test-4 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core, 4to6 Softwire 743 ________ 744 IPv6-Only _____ / \ IPv6-Only 745 PE / CE / \__/ \___ PE / CE 746 +----+ +----+ / \ +------+ +-----+ 747 | | | | | 0====VPN Overlay Tunnel ==0| | | | | 748 | | | | | \ | | | | 749 | CE |--| PE |--\ IPv6-Only Core |----| PE |---| CE | 750 | | | | \0=========Underlay =======0| | | | | 751 +----+ +----+ \ __/ +------+ +-----+ 752 IPv6 BGP peer \ MPLS / SR domain / IPv6 BGP peer 753 IPv4 forwarding \__ __ / IPv4 forwarding 754 IPv6 forwarding \_______/ \_____/ IPv6 forwarding 756 Figure 10: Test-4 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core 758 5.5. Test-5 E2E IPv6-Only PE-CE, Global Table over IPv4-Only Core(6PE), 759 6to4 softwire -Inter-AS Option-B 761 IPv6-Only __________ __________ IPv6-Only 762 PE / CE / \ / \ PE / CE 763 +--+ +----+ / \ / \ +--+ +--+ 764 | | | | | AS 1 \ | AS 2 \ | | | | 765 | | | | | \ | \ | | | | 766 |CE|-| PE |--| IPv4-Only Core|---| IPv4-Only Core|-|PE|-|CE| 767 | | | | |0=Underlay==0 | |0==Underlay===0| | | | | 768 +--+ +----+ \ / \ / +--+ +--+ 769 IPv6 BGP peer \ MPLS/SR / \ MPLS/SR / IPv6 BGP peer 770 IPv4 forwarding \_________/ \_________/ IPv4 forwarding 771 IPv6 forwarding IPv6 forwarding 773 Figure 11: Test-5 E2E IPv6-Only PE-CE, Global Table over 774 IPv4-Only Core (6PE) - Inter-AS Option-B 776 5.6. Test-6 E2E IPv6-Only PE-CE, Global Table over IPv4-Only Core(6PE), 777 6to4 softwire -Inter-AS Option-C 779 IPv6-Only __________ __________ IPv6-Only 780 PE / CE / \ / \ PE / CE 781 +--+ +----+ / \ / \ +--+ +--+ 782 | | | | | AS 1 \ | AS 2 \ | | | | 783 | | | | | \ | \ | | | | 784 |CE|-| PE |--| IPv4-Only Core|---| IPv4-Only Core|-|PE|-|CE| 785 | | | | |0=Underlay==0 | |0==Underlay===0| | | | | 786 +--+ +----+ \ / \ / +--+ +--+ 787 IPv6 BGP peer \ MPLS/SR / \ MPLS/SR / IPv6 BGP peer 788 IPv4 forwarding \_________/ \_________/ IPv4 forwarding 789 IPv6 forwarding IPv6 forwarding 791 Figure 12: Test-6 E2E IPv6-Only PE-CE, Global Table over 792 IPv4-Only Core (6PE) - Inter-AS Option-C 794 5.7. Test-7 E2E IPv6-Only PE-CE, VPN over IPv4-Only, 6to4 softwire - 795 Inter-AS Option-B 797 IPv6-Only __________ __________ IPv6-Only 798 PE / CE / \ / \ PE / CE 799 +--+ +----+ / \ / \ +--+ +--+ 800 | | | | | AS 1 \ | AS 2 \ | | | | 801 | | | | | \ | \ | | | | 802 |CE|-| PE |--| IPv4-Only Core|---| IPv4-Only Core|-|PE|-|CE| 803 | | | | |0=Underlay==0 | |0==Underlay===0| | | | | 804 +--+ +----+ \ / \ / +--+ +--+ 805 IPv6 BGP peer \ MPLS/SR / \ MPLS/SR / IPv6 BGP peer 806 IPv4 forwarding \_________/ \_________/ IPv4 forwarding 807 IPv6 forwarding IPv6 forwarding 809 Figure 13: Test-7 E2E IPv6-Only PE-CE, VPN over IPv4-Only Core - 810 Inter-AS Option-B 812 5.8. Test-8 E2E IPv6-Only PE-CE, VPN over IPv4-Only Core, 6to4 softwire 813 -Inter-AS Option-C 815 IPv6-Only __________ __________ IPv6-Only 816 PE / CE / \ / \ PE / CE 817 +--+ +----+ / \ / \ +--+ +--+ 818 | | | | | AS 1 \ | AS 2 \ | | | | 819 | | | | | \ | \ | | | | 820 |CE|-| PE |--| IPv4-Only Core|---| IPv4-Only Core|-|PE|-|CE| 821 | | | | |0=Underlay==0 | |0==Underlay===0| | | | | 822 +--+ +----+ \ / \ / +--+ +--+ 823 IPv6 BGP peer \ MPLS/SR / \ MPLS/SR / IPv6 BGP peer 824 IPv4 forwarding \_________/ \_________/ IPv4 forwarding 825 IPv6 forwarding IPv6 forwarding 827 Figure 14: Test-8 E2E IPv6-Only PE-CE, VPN over IPv4-Only Core - 828 Inter-AS Option-C 830 5.9. Test-9 E2E IPv6-Only PE-CE, Global Table over IPv6-Only Core, 4to6 831 softwire -Inter-AS Option-B 833 IPv6-Only __________ __________ IPv6-Only 834 PE / CE / \ / \ PE / CE 835 +--+ +----+ / \ / \ +--+ +--+ 836 | | | | | AS 1 \ | AS 2 \ | | | | 837 | | | | | \ | \ | | | | 838 |CE|-| PE |--| IPv6-Only Core|---| IPv6-Only Core|-|PE|-|CE| 839 | | | | |0=Underlay==0 | |0==Underlay===0| | | | | 840 +--+ +----+ \ / \ / +--+ +--+ 841 IPv6 BGP peer \ MPLS/SR / \ MPLS/SR / IPv6 BGP peer 842 IPv4 forwarding \_________/ \_________/ IPv4 forwarding 843 IPv6 forwarding IPv6 forwarding 845 Figure 15: Test-9 E2E IPv6-Only PE-CE, Global Table over 846 IPv6-Only Core - Inter- AS Option-B 848 5.10. Test-10 E2E IPv6-Only PE-CE, Global Table over IPv6-Only Core, 849 4to6 softwire -Inter-AS Option-C 851 IPv6-Only __________ __________ IPv6-Only 852 PE / CE / \ / \ PE / CE 853 +--+ +----+ / \ / \ +--+ +--+ 854 | | | | | AS 1 \ | AS 2 \ | | | | 855 | | | | | \ | \ | | | | 856 |CE|-| PE |--| IPv6-Only Core|---| IPv6-Only Core|-|PE|-|CE| 857 | | | | |0=Underlay==0 | |0==Underlay===0| | | | | 858 +--+ +----+ \ / \ / +--+ +--+ 859 IPv6 BGP peer \ MPLS/SR / \ MPLS/SR / IPv6 BGP peer 860 IPv4 forwarding \_________/ \_________/ IPv4 forwarding 861 IPv6 forwarding IPv6 forwarding 863 Figure 16: Test-10 E2E IPv6-Only PE-CE, Global Table over 864 IPv6-Only Core - Inter-AS Option-C 866 5.11. Test-11 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core, 4to6 867 softwire -Inter-AS Option-B 869 IPv6-Only __________ __________ IPv6-Only 870 PE / CE / \ / \ PE / CE 871 +--+ +----+ / \ / \ +--+ +--+ 872 | | | | | AS 1 \ | AS 2 \ | | | | 873 | | | | | \ | \ | | | | 874 |CE|-| PE |--| IPv6-Only Core|---| IPv6-Only Core|-|PE|-|CE| 875 | | | | |0=Underlay==0 | |0==Underlay===0| | | | | 876 +--+ +----+ \ / \ / +--+ +--+ 877 IPv6 BGP peer \ MPLS/SR / \ MPLS/SR / IPv6 BGP peer 878 IPv4 forwarding \_________/ \_________/ IPv4 forwarding 879 IPv6 forwarding IPv6 forwarding 881 Figure 17: Test-11 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core - 882 Inter-AS Option-B 884 5.12. Test-12 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core, 4to6 885 softwire -Inter-AS Option-C 887 IPv6-Only __________ __________ IPv6-Only 888 PE / CE / \ / \ PE / CE 889 +--+ +----+ / \ / \ +--+ +--+ 890 | | | | | AS 1 \ | AS 2 \ | | | | 891 | | | | | \ | \ | | | | 892 |CE|-| PE |--| IPv6-Only Core|---| IPv6-Only Core|-|PE|-|CE| 893 | | | | |0=Underlay==0 | |0==Underlay===0| | | | | 894 +--+ +----+ \ / \ / +--+ +--+ 895 IPv6 BGP peer \ MPLS/SR / \ MPLS/SR / IPv6 BGP peer 896 IPv4 forwarding \_________/ \_________/ IPv4 forwarding 897 IPv6 forwarding IPv6 forwarding 899 Figure 18: Test-12 E2E IPv6-Only PE-CE, VPN over IPv6-Only Core - 900 Inter-AS Option-C 902 5.13. IPv6-Only PE-CE Operational Considerations Testing 903 Ping CE to PE when destination prefix is withdrawn 904 Traceroute CE to PE and test all ICMPv4 and ICMPv6 type codes 906 +-------+ +-------+ 907 | | IPv6 Only | | 908 | CE |----------------| PE | 909 | | IPv6 BGP Peer | | 910 +-------+ +-------+ 911 IPv4 forwarding IPv4 forwarding 912 IPv6 forwarding IPv6 forwarding 914 Figure 19: Ping and Trace Test Case 916 6. Operational Considerations 918 With a single IPv6 Peer carrying both IPv4 and IPv6 NLRI there are 919 some operational considerations in terms of what changes and what 920 does not change. 922 What does not change with a single IPv6 transport peer carrying IPv4 923 NLRI and IPv6 NLRI below: 925 Routing Policy configuration is still separate for IPv4 and IPv6 926 configured by capability as previously. 928 Layer 1, Layer 2 issues such as one-way fiber or fiber cut will 929 impact both IPv4 and IPv6 as previously. 931 If the interface is in the Admin Down state, the IPv6 peer would go 932 down, and IPv4 NLRI and IPv6 NLRI would be withdrawn as previously. 934 Changes resulting from a single IPv6 transport peer carrying IPv4 935 NLRI and IPv6 NLRI below: 937 Physical interface is no longer dual stacked. 939 Any change in IPv6 address or DAD state will impact both IPv4 and 940 IPv6 NLRI exchange. 942 Single BFD session for both IPv4 and IPv6 NLRI fate sharing as the 943 session is now tied to the transport, which now is only IPv6 address 944 family. 946 Both IPv4 and IPv6 peer now exists under the IPv6 address family 947 configuration. 949 Fate sharing of IPv4 and IPv6 address family from a logical 950 perspective now carried over a single physical IPv6 peer. 952 From an operations perspective, prior to elimination of IPv4 peers, 953 an audit is recommended to identify and IPv4 and IPv6 peering 954 incongruencies that may exist and to rectify them. No operational 955 impacts or issues are expected with this change. 957 With MPLS VPN overlay, per-CE next-hop label allcoation mode where 958 both IPv4 and IPv6 prefixes have the same label in no table lookup 959 pop-n-forward mode should be taken into consideration. 961 7. IANA Considerations 963 There are not any IANA considerations. 965 8. Security Considerations 967 The extensions defined in this document allow BGP to propagate 968 reachability information about IPv4 prefixes over an MPLS or SR 969 IPv6-Only core network. As such, no new security issues are raised 970 beyond those that already exist in BGP-4 and the use of MP-BGP for 971 IPv6. Both IPv4 and IPv6 peers exist under the IPv6 address family 972 configuration. The security features of BGP and corresponding 973 security policy defined in the ISP domain are applicable. For the 974 inter-AS distribution of IPv6 routes according to case (a) of 975 Section 4 of this document, no new security issues are raised beyond 976 those that already exist in the use of eBGP for IPv6 [RFC2545]. 978 9. Acknowledgments 980 Thanks to Kaliraj Vairavakkalai, Linda Dunbar, Aijun Wang, Eduardfor 981 Vasilenko, Joel Harlpern, Michael McBride, Ketan Talaulikar for 982 review comments. 984 10. Contributors 986 The following people contributed substantive text to this document: 988 Mohana Sundari 989 EMail: mohanas@juniper.net 991 11. References 993 11.1. Normative References 995 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 996 Requirement Levels", BCP 14, RFC 2119, 997 DOI 10.17487/RFC2119, March 1997, 998 . 1000 [RFC2545] Marques, P. and F. Dupont, "Use of BGP-4 Multiprotocol 1001 Extensions for IPv6 Inter-Domain Routing", RFC 2545, 1002 DOI 10.17487/RFC2545, March 1999, 1003 . 1005 [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing 1006 Architecture", RFC 4291, DOI 10.17487/RFC4291, February 1007 2006, . 1009 [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private 1010 Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February 1011 2006, . 1013 [RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter, 1014 "Multiprotocol Extensions for BGP-4", RFC 4760, 1015 DOI 10.17487/RFC4760, January 2007, 1016 . 1018 [RFC5492] Scudder, J. and R. Chandra, "Capabilities Advertisement 1019 with BGP-4", RFC 5492, DOI 10.17487/RFC5492, February 1020 2009, . 1022 [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 1023 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 1024 May 2017, . 1026 [RFC8277] Rosen, E., "Using BGP to Bind MPLS Labels to Address 1027 Prefixes", RFC 8277, DOI 10.17487/RFC8277, October 2017, 1028 . 1030 11.2. Informative References 1032 [I-D.ietf-idr-dynamic-cap] 1033 Chen, E. and S. R. Sangli, "Dynamic Capability for BGP-4", 1034 Work in Progress, Internet-Draft, draft-ietf-idr-dynamic- 1035 cap-16, 21 October 2021, . 1038 [RFC4659] De Clercq, J., Ooms, D., Carugi, M., and F. Le Faucheur, 1039 "BGP-MPLS IP Virtual Private Network (VPN) Extension for 1040 IPv6 VPN", RFC 4659, DOI 10.17487/RFC4659, September 2006, 1041 . 1043 [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, 1044 R., Patel, K., and J. Guichard, "Constrained Route 1045 Distribution for Border Gateway Protocol/MultiProtocol 1046 Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual 1047 Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, 1048 November 2006, . 1050 [RFC4798] De Clercq, J., Ooms, D., Prevost, S., and F. Le Faucheur, 1051 "Connecting IPv6 Islands over IPv4 MPLS Using IPv6 1052 Provider Edge Routers (6PE)", RFC 4798, 1053 DOI 10.17487/RFC4798, February 2007, 1054 . 1056 [RFC4925] Li, X., Ed., Dawkins, S., Ed., Ward, D., Ed., and A. 1057 Durand, Ed., "Softwire Problem Statement", RFC 4925, 1058 DOI 10.17487/RFC4925, July 2007, 1059 . 1061 [RFC5549] Le Faucheur, F. and E. Rosen, "Advertising IPv4 Network 1062 Layer Reachability Information with an IPv6 Next Hop", 1063 RFC 5549, DOI 10.17487/RFC5549, May 2009, 1064 . 1066 [RFC5565] Wu, J., Cui, Y., Metz, C., and E. Rosen, "Softwire Mesh 1067 Framework", RFC 5565, DOI 10.17487/RFC5565, June 2009, 1068 . 1070 [RFC6074] Rosen, E., Davie, B., Radoaca, V., and W. Luo, 1071 "Provisioning, Auto-Discovery, and Signaling in Layer 2 1072 Virtual Private Networks (L2VPNs)", RFC 6074, 1073 DOI 10.17487/RFC6074, January 2011, 1074 . 1076 [RFC6513] Rosen, E., Ed. and R. Aggarwal, Ed., "Multicast in MPLS/ 1077 BGP IP VPNs", RFC 6513, DOI 10.17487/RFC6513, February 1078 2012, . 1080 [RFC6514] Aggarwal, R., Rosen, E., Morin, T., and Y. Rekhter, "BGP 1081 Encodings and Procedures for Multicast in MPLS/BGP IP 1082 VPNs", RFC 6514, DOI 10.17487/RFC6514, February 2012, 1083 . 1085 [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for 1086 Writing an IANA Considerations Section in RFCs", BCP 26, 1087 RFC 8126, DOI 10.17487/RFC8126, June 2017, 1088 . 1090 [RFC8950] Litkowski, S., Agrawal, S., Ananthamurthy, K., and K. 1091 Patel, "Advertising IPv4 Network Layer Reachability 1092 Information (NLRI) with an IPv6 Next Hop", RFC 8950, 1093 DOI 10.17487/RFC8950, November 2020, 1094 . 1096 Authors' Addresses 1098 Gyan Mishra 1099 Verizon Inc. 1100 Email: gyan.s.mishra@verizon.com 1102 Mankamana Mishra 1103 Cisco Systems 1104 821 Alder Drive, 1105 MILPITAS 1106 Email: mankamis@cisco.com 1108 Jeff Tantsura 1109 Microsoft, Inc. 1110 Email: jefftant.ietf@gmail.com 1112 Sudha Madhavi 1113 Juniper Networks, Inc. 1114 Email: smadhavi@juniper.net 1116 Qing Yang 1117 Arista Networks 1118 Email: qyang@arista.com 1120 Adam Simpson 1121 Nokia 1122 Email: adam.1.simpson@nokia.com 1124 Shuanglong Chen 1125 Huawei Technologies 1126 Email: chenshuanglong@huawei.com