TRILL Working Group Tissa SenevirathneInternetDraftEngineering Task Force (IETF) T. Senevirathne Request for Comments: 7783 ConsultantIntended status: Standard Track Janardhanan PathangiUpdates: 6325DELL JonJ. Pathangi Category: Standards Track Dell ISSN: 2070-1721 J. Hudson BrocadeOctober 18, 2015 Expires: April2016February 2016 Coordinated Multicast Trees (CMT) forTRILL draft-ietf-trill-cmt-11.txtTransparent Interconnection of Lots of Links (TRILL) Abstract TRILL (Transparent Interconnection of Lots of Links) facilitatesloop freeloop-free connectivity to non-TRILL networks via a choice of an Appointed Forwarder for a set of VLANs. Appointed Forwarders provide VLAN-based load sharingbased on VLANwith an active-standby model.HighHigh- performance applications require an active-activeload- sharingload-sharing model. TheActive-Activeactive-active load-sharing model can be accomplished by representing any given non-TRILL network with a single virtualRBridge.RBridge (also referred to as a virtual Routing Bridge or virtual TRILL switch). Virtual representation of the non-TRILL network with a single RBridge poses serious challenges inmulti- destinationmulti-destination RPF (Reverse Path Forwarding) check calculations. This document specifies required enhancements to build Coordinated Multicast Trees (CMT) within the TRILL campus to solve related RPF issues. CMT, which only requires a software upgrade, provides flexibility to RBridges in selecting a desired path of association to a given TRILL multi-destination distribution tree. This document updates RFC 6325. Status ofthisThis Memo ThisInternet-Draftissubmitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsan Internet Standards Track document. This document is a product of the Internet Engineering Task Force(IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum(IETF). It represents the consensus ofsix monthsthe IETF community. It has received public review andmay be updated, replaced, or obsoletedhas been approved for publication byother documents at any time. Itthe Internet Engineering Steering Group (IESG). Further information on Internet Standards isinappropriate to use Internet-Drafts as reference material or to cite them other than as "workavailable inprogress." The listSection 2 of RFC 5741. Information about the currentInternet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The liststatus ofInternet-Draft Shadow Directories canthis document, any errata, and how to provide feedback on it may beaccessedobtained athttp://www.ietf.org/shadow.html This Internet-Draft will expire on April 18,2009.http://www.rfc-editor.org/info/rfc7783. Copyright Notice Copyright (c)20152016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction..................................................3....................................................3 1.1. Scope and Applicability..................................5....................................4 2. ConventionsusedUsed inthis document .............................5This Document ...............................5 2.1. Acronyms and Phrases.....................................5.......................................5 3. TheAFFINITY sub-TLV ..........................................6Affinity Sub-TLV ............................................6 4. Multicast Tree Construction and Use of Affinity Sub-TLV.......7.........6 4.1. Update to RFC 6325.......................................8.........................................7 4.2. AnnouncingvirtualVirtual RBridgenickname ......................9Nickname ........................8 4.3. Affinity Sub-TLV Capability..............................9................................8 5. Theory ofoperation ..........................................10Operation .............................................8 5.1. Distribution Tree Assignment............................10...............................8 5.2. Affinity Sub-TLVadvertisement ..........................10Advertisement .............................9 5.3. Affinitysub-TLV conflict resolution ....................11Sub-TLV Conflict Resolution .......................9 5.4. Ingress Multi-Destination Forwarding....................11......................10 5.4.1. Forwarding when n < k..............................12..............................10 5.5. Egress Multi-Destination Forwarding.....................12.......................11 5.5.1. Traffic Arriving on anassignedAssigned Tree to RBk-RBv....12....11 5.5.2. Traffic Arriving onotherOther Trees....................12....................11 5.6. Failurescenarios .......................................13Scenarios .........................................11 5.6.1. Edge RBridge RBkfailure ...........................13Failure ...........................11 5.7. Backwardcompatibility ..................................14Compatibility ....................................12 6. Security Considerations......................................14........................................13 7. IANA Considerations..........................................15............................................13 8. References...................................................15.....................................................14 8.1. Normative References....................................15......................................14 8.2. Informative References..................................16 Appendix A. Change History ......................................17....................................15 Acknowledgments..............................................16...................................................16 Contributors........................................................................................................16 Authors' Addresses ................................................16 1. Introduction TRILL (Transparent Interconnection of Lots ofLinks)Links), as presented in [RFC6325] and other related documents, provides methods of utilizing all available paths for active forwarding, with minimum configuration. TRILL utilizes IS-IS (Intermediate System to IntermediateSystem [IS-IS])System) [IS-IS] as its control plane and uses a TRILLheader with hop count.Header that includes a Hop Count. [RFC6325], [RFC7177], and [RFC6439] provide methods for interoperability between TRILL and Ethernet end stations and bridged networks. [RFC6439] provides an active-standby solution, where only one of the RBridges (aka Routing Bridges or TRILL switches) on a link with end stations is in the active forwarding state forend stationend-station traffic for any given VLAN. That RBridge is referred to as the Appointed Forwarder (AF). All frames ingressed into a TRILL network via theAppointed ForwarderAF are encapsulated with the TRILLheaderHeader with a nickname held by the ingress AF RBridge. Due to failures,re-configurationsreconfigurations, and other network dynamics, theAppointed ForwarderAF for any set of VLANs may change. RBridges maintain forwarding tables that contain bindings for destinationMAC addressMedia Access Control (MAC) addresses and DataLabelLabels (VLAN orFine Grained Label (FGL))Fine-Grained Labels (FGLs)) to egressRBridge binding.RBridges. In the event of an AF change, forwarding tables of remote RBridges may continue to forward traffic to the previousAF and thatAF. That traffic may get discarded at the egress, causing traffic disruption.High performanceHigh-performance applications require resiliency during failover. The active-active forwarding model minimizes impact during failures and maximizes the available network bandwidth. A typical deployment scenario, depicted in Figure 1, may haveeither End Stationsend stations and/or bridges attached to the RBridges. These devices typically are multi-homed to several RBridges and treat all of the uplinks independently using a Local Active-Active Link Protocol(LAALP [RFC7379])(LAALP) [RFC7379], such as a single Multi-Chassis Link Aggregation (MC-LAG) bundle or Distributed Resilient Network Interconnect[8021AX].[802.1AX]. TheAppointed ForwarderAF designation presented in [RFC6439] requires each of the edge RBridges to exchange TRILL Hello packets. By design, an LAALP does not forward packets received on one of the member ports of the MC-LAG to other member ports of the same MC-LAG. As aresultresult, the AF designation methods presented in [RFC6439] cannot be applied to the deployment scenario depicted in Figure 1.[RFC7379]An active-active load-sharing model can be implemented by representing the edge of the network connected to a specific edge group of RBridges by a single virtual RBridge. Each virtual RBridge MUST have a nickname unique within its TRILL campus. In addition to an active-active forwarding model, there may be other applications that mayrequiresrequire similar representations. Sections 4.5.1 and 4.5.2 of[RFC6325][RFC6325], as updated by[RFC7180bis][RFC7780], specify distribution tree calculation and RPF (Reverse Path Forwarding) check calculation algorithms for multi-destination forwarding. These algorithms strictly depend on link cost and parent RBridge priority. As a result, based on the network topology, it may be possible that a given edge RBridge, if it is forwarding on behalf of the virtual RBridge, may not have a candidate multicast treethat theon which it (the edgeRBridgeRBridge) can forwardtraffic ontraffic, because there is no tree for which the virtual RBridge is a leaf node from the edge RBridge. In thisdocumentdocument, we present a method that allows RBridges to specify the path of association for real or virtual child nodes to distribution trees. Remote RBridges calculate their forwarding tables and derive the RPF for distribution trees based on the distribution tree association advertisements. In the absence of distribution tree association advertisements, remote RBridges derive the SPF (Shortest Path First) based on the algorithm specified insectionSection 4.5.1 of[RFC6325][RFC6325], as updated by[RFC7180bis].[RFC7780]. This document updates [RFC6325] by changing, whenCMTCoordinated Multicast Trees (CMT) sub-TLVs are present, [RFC6325] mandatory provisions as to how distributiontreetrees are constructed.Other applications, besideIn addition to theabove mentionedabove-mentioned active-active forwarding model, other applications may utilize the distribution tree association framework presented in this document to associate to distribution trees through a preferred path. This proposal requires (1) the presence of multiple multi-destination trees within the TRILL campus andupdating(2) that all the RBridges in the network be updated to support the new Affinity sub-TLV (Section3. ).3). It is expected that both of these requirements will bemetmet, as they arecontrol plane changes,control-plane changes and will be common deployment scenarios. In case either of the above two conditionsareis not met, RBridges MUST support a fallback option for interoperability. Since the fallback is expected to be a temporary phenomenontilluntil all RBridges are upgraded, this proposal gives guidelines for suchfallbacks,fallbacks and does not mandate or specify any specific set of fallback options. 1.1. Scope and Applicability This document specifies an Affinity sub-TLV to solve RPF issues at the active-active edge. Specific methods in this document for making use of the Affinity sub-TLV are applicable where a virtual RBridge is used to represent multiple RBridges connected to an edgeCECustomer Ethernet (CE) device through anLAALPLAALP, such asmulti-chassis link aggregationMC-LAG or some similar arrangement where the RBridges cannot see each other's Hellos. This document does not provide other required operational elements to implement an active-active edge solution, such asmethods of multi-chassis link aggregation. Solution specificMC-LAG methods. Solution-specific operational elements are outside the scope of this document and will be covered in other documents. (See, forexample [TRILLPN].)example, [RFC7781].) Examples provided in this document are for illustration purposes only. 2. ConventionsusedUsed inthis documentThis Document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. In this document, these words will appear with that interpretation only when in ALL CAPS.Lower caseLowercase uses of these words are not to be interpreted as carrying [RFC2119] significance. 2.1. Acronyms and Phrases The following acronyms and phrases are used in this document: AF: Appointed Forwarder [RFC6439]. CE: Customer Ethernet device, that is, a device that performs forwarding based on 802.1Q bridging. This also can beend-stationan end station or a server. Data Label: VLAN or FGL. FGL:Fine GrainedFine-Grained Label [RFC7172]. LAALP: Local Active-Active Link Protocol [RFC7379]. MC-LAG: Multi-Chassis LinkAggregation is aAggregation. A proprietary extension to[8021AX],[802.1AX] that facilitates connecting a group of links from an originating device (A) to a group of discrete devices (B). Device (A)treats,treats all of the links in a givenMulti-Chassis Link AggregationMC-LAG bundle as a single logical interface and treats all devices in Group (B) as a single logical device for all forwarding purposes. Device (A) does not forward packetsreceivereceived onMulti-Chassis Linkthe multi-chassis link bundle out of the sameMulti-Chassismulti-chassis link bundle. Figure 1 depicts a specific use case example. RPF: Reverse Path Forwarding. SeesectionSection 4.5.2 of [RFC6325]. Virtual RBridge: A purely conceptual RBridge that represents anActive-Active Edgeactive-active edge group and is in turn represented by a nickname. For example, see[PseudoNickname].[RFC7781]. 3. TheAFFINITY sub-TLVAffinity Sub-TLV Association of an RBridge to a multi-destination distribution tree through a specific path is accomplished by using a new IS-ISsub- TLV,sub-TLV, the Affinity sub-TLV. TheAFFINITYAffinity sub-TLV appears in Router Capability TLVs or MT Capability TLVs that are withinLSP PDUs,Link State PDUs (LSPs), as described in [RFC7176]. [RFC7176]whichspecifies the code point and data structure for the Affinity sub-TLV. 4. Multicast Tree Construction and Use of Affinity Sub-TLVFigureFigures 1 andFigure2 below show the reference topology and a logical topology using CMT to provide active-active service.--------------------------------------- / \ | | | TRILL Campus | | | \ / -------------------- | | | ----- | -------- | | | +------+ +------+ +------+ | | | | | | |(RB1) | |(RB2) | | (RBk)| +------+ +------+ +------+ |..| |..| |..| | +----+ | | | | | +---|-----|--|----------+ | | +-|---|-----+ +-----------+ | | | | +------------------+ | | (| | |) <-- MC-LAG (| | |)<-<-- MC-LAG +-------+ . . . +-------+ | CE1 | | CEn | | | | | +-------+ +-------+ Figure11: Reference Topology-------------------------------------- Sample Multicast Tree (T1) / \ | | | | TRILL Campus | o RBn | | / | \ \ / / | ---\--------------------- RB1o-------------------- RB1 o o o | | | | RB2 RBk | | -------------- | | | |oRBvo RBv +------+ +------+ +------+ | | | | | | |(RB1) | |(RB2) | | (RBk)| +------+ +------+ +------+ |..| |..| |..| | +----+ | | | | | +---|--|--|-------------+ | | +-|---|--+ +--------------+ |MC-| | | +------------------+ | |LAG--->(|MC-LAG -->(| | |) (| ||)<-|)<-- MC-LAG +-------+ . . . +-------+ | CE1 | | CEn | | | | | +-------+ +-------+ RBv: virtual RBridge Figure22: Example Logical Topology 4.1. Update to RFC 6325 This document updates Section 4.5.1 of[RFC6325], is updated to change[RFC6325] and changes the calculation of distributiontreestrees, as specified below: Each RBridge that desires to be the parent RBridge for a child RBridgeRBy(RBy) in a multi-destination distribution treex(Tree x) announces the desired association using an Affinity sub-TLV. The child is specified by its nickname. If an RBridgeRB1(RB1) advertises anAFFINITYAffinity sub-TLV designating one of its own nicknamesN1(N1) as its''child''"child" in some distribution tree, the effect is thatthatnickname N1 is ignored when constructing other distribution trees.ThusThus, the RPF check will enforce the rule that only RB1 can use nickname N1 to do ingress/egress ontreeTree x. (This has no effect onleast costleast-cost path calculations for unicast traffic.) When such an Affinity sub-TLV is present, the association specified by theaffinityAffinity sub-TLV MUST be used when constructing themulti- destinationmulti-destination distributiontreetree, except in the case of a conflicting Affinitysub-TLV, whichsub-TLV; such cases are resolved as specified in Section 5.3. In the absence of such an Affinity sub-TLV, or if there are any RBridges in the campus that do not support the Affinity sub-TLV, distribution trees are calculated as specified inthe sectionSection 4.5.1 of[RFC6325][RFC6325], as updated by[RFC7180bis].[RFC7780]. Section4.3.4.3 below specifies how to identify RBridges that support the Affinitysub-TLV capability.sub-TLV. 4.2. AnnouncingvirtualVirtual RBridgenicknameNickname Each edge RBridgeRB1(RB1 toRBkRBk) advertisesinits LSP virtual RBridge nicknameRBv(RBv) by using the Nickname sub-TLV(6),(6) [RFC7176], along with their regular nickname or nicknames. It will be possible for any RBridge to determine that RBv is a virtualRBridgeRBridge, because each RBridge (RB1 to RBk)thisthat appears to be advertising that it is holding RBv is also advertising an Affinity sub-TLV asking that RBv be its child in one or more trees. Virtual RBridges are ignored when determining the distribution tree roots for the campus. All RBridges outside the edge group assume that multi-destination packets withingress nicknametheir TRILL Header Ingress Nickname field set to RBv might use any of the distribution trees that any member of the edge groupis advertisingadvertises that it might use. 4.3. Affinity Sub-TLVCapability.Capability RBridges that announce the TRILLversionVersion sub-TLV [RFC7176] and set the Affinity capability bit (Section7. )7) support the Affinitysub- TLV andsub-TLV, calculation of multi-destination distributiontreestrees, and RPFcheckschecks, as specified herein. 5. Theory ofoperationOperation 5.1. Distribution Tree Assignment Let's assume that there are n distribution trees and k edge RBridges in the edge group of interest. If n >= k Let's assume that edge RBridges are sorted in numerically ascending order by IS-IS System ID such that RB1 < RB2 < RBk. Each RBridge in the numerically sorted list is assigned a monotonically increasing number j suchthat; RB1=0, RB2=1, RBi=jthat RB1 = 0, RB2 = 1, RBi = j, andRBi+1=j+1.RBi + 1 = j + 1. (See Section 4.5 of[RFC6325][RFC6325], asmodifiedupdated by Section 3.4 of[RFC7180bis][RFC7780], for how tree numbers are determined.) Assign each tree to RBi such that tree number (((tree_number) %k)+1)k) + 1) is assigned to edge group RBridge i for tree_number from 1 ton.n, where n is the number of trees, k is the number of edge group RBridges considered for tree allocation, and''%''"%" is the integer division remainder operation. If n < k Distribution trees are assigned to edge group RBridges RB1 to RBn, using the same algorithm as the n >= k case. RBridgesRBn+1RBn + 1 to RBk do not participate in the active-active forwarding process on behalf of RBv. 5.2. Affinity Sub-TLVadvertisementAdvertisement Each RBridge in the RB1 through RBk domain advertises an AffinityTLVsub-TLV for RBv to be its child. As an example, let's assume that RB1 has chosen Trees t1 andtk+1tk + 1 on behalf of RBv. RB1 advertisesaffinity TLV;the Affinity sub-TLV; {RBv, Num ofTrees=2,Trees = 2, t1,tk+1.tk + 1}. Other RBridges in the RB1 through RBk edge group follow the same procedure. 5.3. Affinitysub-TLV conflict resolutionSub-TLV Conflict Resolution In TRILL, multi-destination distribution trees are built outward from the root by each RBridge so that they all derive the same set of distribution trees [RFC6325]. IfanRBridge RB1 advertises an Affinity sub-TLV with an AFFINITY RECORD that asks for RBridge RBroot to be its child in a tree rooted at RBroot, that AFFINITY RECORD is in conflict with TRILL distribution tree root determination and MUST be ignored. IfanRBridge RB1 advertises an Affinity sub-TLV with an AFFINITY RECORD that asks for nickname RBn to be its child in any tree and RB1 isneithernot adjacent to RBn nor does nickname RBn identify RB1 itself, that AFFINITY RECORD is in conflict with the campus topology and MUST be ignored. If different RBridges advertise Affinity sub-TLVs that try to associate the same virtual RBridge as their child in the same tree or trees, those Affinity sub-TLVs are in conflict with each other for those trees. The nicknames of the conflicting RBridges are compared to identify which RBridge holds the nickname that is the highest priority to be a tree root, with the System ID as thetiebreakertiebreaker. The RBridge with the highest priority to be a tree root will retain the Affinity association. Other RBridges with lower priority to be a tree root MUST stop advertising their conflicting Affinitysub-TLV, re-calculatesub-TLVs, recalculate the multicast tree affinity allocation, and, if appropriate, advertiseanew non-conflicting Affinitysub-TLV.sub-TLVs. Similarly, remote RBridges MUST honor the Affinity sub-TLV from the RBridge with the highest priority to be a tree root(use system-ID(using System ID as thetie-breakertiebreaker in the event of conflicting priorities) and ignore the conflicting Affinity sub-TLV entries advertised by the RBridges with lower priorities to be tree roots. 5.4. Ingress Multi-Destination Forwarding If there is at least one tree on which RBv has affinity via RBk, then RBk performs the followingoperations,operations for multi-destination frames received from a CE node: 1. Flood to locally attached CE nodes subjected to VLAN and multicast pruning. 2. Ingressin the(by encapsulating with a TRILLheaderHeader) andassign ingress RBridge nickname asset the Ingress Nickname field of the TRILL Header to RBv(nickname(the nickname of the virtual RBridge). 3. Forward to one of the distribution trees,tree xTree x, in which RBv is associated with RBk. 5.4.1. Forwarding when n < k If there is no tree on which RBv can claim affinity via RBk (probably because the number of treesn(n) built is less than the number of RBridgesk(k) announcing theaffinityAffinity sub-TLV), then RBk MUST fall back to one of thefollowingfollowing: 1. This RBridge (RBk) should stop forwarding frames from the CEnodes,nodes and should markthatits port towards those CE nodes as disabled. This will prevent the CE nodes from forwarding dataonto thisRBridge, andRBridge. Thus, the CE nodes will only use those RBridgeswhichthat have been assigned atree -tree. -OR- 2. This RBridge tunnels multi-destination frames received from attached native devices to an RBridge RBy that has an assigned tree. The tunnel destination should forward it to the TRILLnetwork,network and also to its local access links. (The mechanism of tunneling andhandshakehandshaking between the tunnel source and destination are out of scopeoffor this specification and may be addressed in otherdocumentsdocuments, such as [ChannelTunnel].)AboveThe above fallback options may be specific to the active-active forwarding scenario. However, as stated above, the Affinity sub-TLV may be used in other applications. In sucheventan event, the application SHOULD specify applicable fallback options. 5.5. Egress Multi-Destination Forwarding 5.5.1. Traffic Arriving on anassignedAssigned Tree to RBk-RBv Multi-destination frames arriving at RBk on a Tree x, where RBk has announced the affinity of RBv via x, MUST be forwarded to CE members of RBv that are in the frame's VLAN. Forwarding to otherend-nodesend nodes and RBridges that are not part of the network represented by theRBvvirtual RBridge nickname (RBv) MUST follow the forwarding rules specified in [RFC6325]. 5.5.2. Traffic Arriving onotherOther Trees Multi-destination frames arriving at RBk on a Tree y, where RBk has not announced the affinity of RBv via y, MUST NOT be forwarded to CE members of RBv. Forwarding to otherend-nodesend nodes and RBridges that are not part of the network represented by theRBvvirtual RBridge nickname (RBv) MUST follow the forwarding rules specified in [RFC6325]. 5.6. FailurescenariosScenarios Thebelowfailure recovery algorithm below is presented only as a guideline. An active-active edge group MAY use other failure recovery algorithms; it is recommended that only one algorithm be used in an edge group at a time. Details of such algorithms are outside the scope of this document. 5.6.1. Edge RBridge RBkfailureFailure Each of the member RBridges of a given virtual RBridge edge group is aware of its member RBridges through configuration, LSP advertisements, or some other method. Member RBridges detect nodal failure of a member RBridge throughIS- ISIS-IS LSP advertisements or lack thereof. Upon detecting a member failure, each of the member RBridges of the RBv edge group start recovery timer T_rec for failed RBridge RBi. If the previously failed RBridge RBi has not recovered after the expiry of timer T_rec,membersmember RBridges perform the distribution tree assignment algorithm specified insectionSection 5.1. Each of the member RBridges re-advertises the Affinity sub-TLV with the new tree assignment. This action causes the campus to update the tree calculation with the new assignment. RBi, uponstart-up,startup, advertises its presence through IS-IS LSPs and starts a timer T_i. Other member RBridges of the edge group, detecting the presence of RBi, start a timer T_j. Upon expiry of timer T_j, other member RBridges recalculate the multi-destination tree assignment andadvertisedadvertise the related trees using the Affinity sub-TLV. Upon expiry of timer T_i, RBirecalculaterecalculates the multi-destination tree assignment and advertises the related trees using the AffinityTLV.sub-TLV. If the new RBridge in the edge group calculates trees and starts to use one or more of them before the existing RBridges in the edge group recalculate, there could be duplication of packets (forexampleexample, more than one edge group RBridge could decapsulate and forward a multi-destination frame on links into the active-active group) or loss of packets (forexampleexample, due to the Reverse Path ForwardingCheckcheck, in the rest of thecampuscampus, if two edge group RBridges are trying to forward on the sametreetree, those from one will be discarded). Alternatively, if the new RBridge in the edge group calculates trees and starts to use one or more of them after the existing RBridges recalculate, there could be loss of data due to frames arriving at the new RBridge beingblack holed.black-holed. Timers T_i and T_j should be initialized to values designed to minimize theseproblemsproblems, keeping in mind that, in general,duplicatingduplication of packets is a more serious problem thandropping.dropped packets. It is RECOMMENDED that T_j be less thanT_iT_i, and a reasonable default is 1/2 of T_i. 5.7. BackwardcompatibilityCompatibility Implementations MUST support a backward compatibilitymodemodes to interoperate withpre Affinity sub-TLV"pre-Affinity sub-TLV" RBridges in the network. Such backward compatibilityoperationoperations MAY include,however isbut are not limited to, tunneling and/or active-standby modes ofoperations.operation. It should be noted that tunneling would require silicon changes. However, CMT in itself is a software upgrade. Example: Step 1. Stop using the virtual RBridge nickname for traffic ingressing from CEnodesnodes. Step 2. Stop performing active-active forwarding.And fallFall back to active standby forwarding, based on locally defined policies.DefinitionThe definition of such policies is outside the scope of this document and may be addressed in other documents. 6. Security Considerations In general, the RBridges in a campus are trustedroutersrouters, and the authenticity of theirlink statelink-state information (LSPs) andlink locallink-local PDUs(Hellos, etc.)(e.g., Hellos) can be enforced using regular IS-IS security mechanisms [IS-IS] [RFC5310]. Thisincludingincludes authenticating the contents of the PDUs used to transport Affinity sub-TLVs. The particularSecurity Considerationssecurity considerations involved with different applications of the Affinity sub-TLV will be covered in the document(s) specifying those applications. For general TRILLSecurity Considerations,security considerations, see [RFC6325]. 7. IANA Considerations This document serves as the reference for"TRILL-VER Sub-TLV Capability Flags"the registration of "Affinity sub-TLVsupport."support" (bit 0)so that reference should be updated when this document is published as an RFC.in the "TRILL-VER Sub-TLV Capability Flags" registry. This document mentions the registration of "AFFINITY" (value 17) in the "Sub-TLVs for TLV 144"registration "AFFINITY" (value 17),registry, butshouldit is intentionally notbelisted as a reference for thatregistration which should remainregistration; the reference remains [RFC7176]. 8. References 8.1. Normative References [IS-IS] International Organization for Standardization, ISO/IEC 10589:2002, "Information technology -- Telecommunications and information exchange between systems -- Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service", ISO 8473, Second Edition, November 2002. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March1997.1997, <http://www.rfc-editor.org/info/rfc2119>. [RFC5310] Bhatia, M.,et.al. ''IS-ISManral, V., Li, T., Atkinson, R., White, R., and M. Fanto, "IS-IS Generic CryptographicAuthentication'',Authentication", RFC 5310, DOI 10.17487/RFC5310, February2009.2009, <http://www.rfc-editor.org/info/rfc5310>. [RFC6325] Perlman, R.,et.al. ''RBridge:Eastlake 3rd, D., Dutt, D., Gai, S., and A. Ghanwani, "Routing Bridges (RBridges): Base ProtocolSpecification'',Specification", RFC 6325, DOI 10.17487/RFC6325, July2011. [RFC7177] Eastlake 3rf, D. et.al., ''RBridge: Adjacency'', RFC 7177, May 2014.2011, <http://www.rfc-editor.org/info/rfc6325>. [RFC6439]Eastlake 3rd, D. et.al., ''RBridge:Perlman, R., Eastlake, D., Li, Y., Banerjee, A., and F. Hu, "Routing Bridges (RBridges): AppointedForwarder'',Forwarders", RFC 6439, DOI 10.17487/RFC6439, November2011.2011, <http://www.rfc-editor.org/info/rfc6439>. [RFC7172] Eastlake 3rd, D., Zhang, M., Agarwal, P., Perlman, R., and D. Dutt, "Transparent Interconnection of Lots of Links (TRILL): Fine-Grained Labeling", RFC 7172, DOI 10.17487/RFC7172, May 2014, <http://www.rfc-editor.org/info/rfc7172>. [RFC7176] Eastlake 3rd,D. et.al., ''TransparentD., Senevirathne, T., Ghanwani, A., Dutt, D., and A. Banerjee, "Transparent Interconnection of Lots of Links (TRILL) Use ofIS-IS'',IS-IS", RFC 7176, DOI 10.17487/RFC7176, May2014. [RFC7180bis]2014, <http://www.rfc-editor.org/info/rfc7176>. [RFC7177] Eastlake 3rd,D. et.al., ''TRILL:D., Perlman, R., Ghanwani, A., Yang, H., and V. Manral, "Transparent Interconnection of Lots of Links (TRILL): Adjacency", RFC 7177, DOI 10.17487/RFC7177, May 2014, <http://www.rfc-editor.org/info/rfc7177>. [RFC7780] Eastlake 3rd, D., Zhang, M., Perlman, R., Banerjee, A., Ghanwani, A., and S. Gupta, "Transparent Interconnection of Lots of Links (TRILL): Clarifications, Corrections, andUpdates'', draft-ietf-trill-rfc7180bis, work in progress. [IS-IS] ISO/IEC, ''Intermediate System to Intermediate System Routing Information Exchange Protocol for use in Conjunction with the Protocol for Providing the Connectionless-mode Network Service (ISO 8473)'' ISO/IEC 10589:2002. [PseudoNickname] H.Updates", RFC 7780, DOI 10.17487/RFC7780, February 2016, <http://www.rfc-editor.org/info/rfc7780>. [RFC7781] Zhai,T.H., Senevirathne,R.T., Perlman,M.R., Zhang, M., and Y. Li,"TRILL:"Transparent Interconnection of Lots of Links (TRILL): Pseudo-Nickname for Active-Active Access",draft-ietf-trill-pseudonode-nickname, inRFCEditor's queue.7781, DOI 10.17487/RFC7781, February 2016, <http://www.rfc-editor.org/info/rfc7781>. 8.2. Informative References [802.1AX] IEEE, "IEEE Standard for Local and metropolitan area networks - Link Aggregation", IEEE Std 802.1AX-2014, DOI 10.1109/IEEESTD.2014.7055197, December 2014. [ChannelTunnel] Eastlake 3rd, D., Umair, M., and Y. Li, "TRILL: RBridge Channel Tunnel Protocol", Work in Progress, draft-ietf-trill-channel-tunnel-07, August 2015. [RFC7379] Li, Y., Hao, W., Perlman, R., Hudson, J., and H. Zhai, "Problem Statement and Goals for Active-Active Connection at the Transparent Interconnection of Lots of Links (TRILL) Edge", RFC 7379,2014. [TRILLPN] Zhai, H., et.al ''RBridge: Pseudonode Nickname'', draft-hu- trill-pseudonode-nickname, Work in progress, November 2011. [8021AX] IEEE, ''Link Aggregation'', IEEE Std 802.1AX-2014, December 2014. [ChannelTunnel] D. Eastlake and Y. Li, "TRILL: RBridge Channel Tunnel Protocol", draft-ietf-trill-channel-tunnel, work in progress. Appendix A. Change History. From -01 to -02: Replaced all references to ''LAG'' with references to Multi-Chassis (MC-LAG) or the like. Expanded, Security Considerations section. Other editorial changes. From -02 to -03 Minor editorial changes From -03 to -04 Minor editorial changes and version update. From -04 to -05 Editorial, reference, and other minor changes based on Document Shepherd review. From -05 to -6 Minor editorial fixes. From -06 to -07 Clarifications primarily based on AD review. From -08 to -09 to -10 IANA Considerations updated based on IANA feedback. Typos fixed based on IESG, GENART and SECDIR reviews. From -10 to -11 Editorial changes based on IESG review.DOI 10.17487/RFC7379, October 2014, <http://www.rfc-editor.org/info/rfc7379>. AcknowledgmentsAuthorsThe authors wish to extend their appreciations towards individuals who volunteered to review and comment on the work presented in this document and who provided constructive and critical feedback. Specificacknowledgementsacknowledgments are due for Anoop Ghanwani, Ronak Desai, Gayle Noble, and Varun Shah. Very specialThanksthanks to Donald Eastlake for his careful review and constructive comments.This document was prepared using 2-Word-v2.0.template.dot.Contributors The work in this document is a result of many passionate discussions and contributions from the followingindividuals. Their names areindividuals, listed in alphabeticalorder:order by their first names: Ayan Banerjee, Dinesh Dutt, Donald Eastlake, Hongjun Zhai, Mingui Zhang, Radia Perlman, Sam Aldrin,Shivakumar Sundaram,andZhai Hongjun.Shivakumar Sundaram. Authors' Addresses Tissa Senevirathne Consultant Email: tsenevir@gmail.com Janardhanan Pathangi Dell/Force10 Networks Olympia TechnologyPark,Park Guindy Chennai 600 032 India Phone:+91 44 4220 8400 Email:Pathangi_Janardhanan@Dell.com+91-44-42208400 Email: Pathangi_Janardhanan@Dell.com Jon Hudson Brocade 130 Holger Way San Jose, CA 95134USAUnited States Phone: +1-408-333-4062Email:jon.hudson@gmail.comEmail: jon.hudson@gmail.com