<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC8365 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8365.xml">
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC9574 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9574.xml">
<!ENTITY I-D.ietf-nvo3-rfc7348bis SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-nvo3-rfc7348bis.xml">
<!ENTITY I-D.ietf-nvo3-vxlan-gpe SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-nvo3-vxlan-gpe.xml">
]>
<rfc category="std" docName="draft-rabsaj-bess-evpn-vxlan-ir-bum-00"
     ipr="trust200902" submissionType="IETF">
  <!-- Generated by id2xml 1.5.0 on 2020-10-30T09:57:27Z -->

  <?rfc strict="yes"?>

  <?rfc compact="yes"?>

  <?rfc subcompact="no"?>

  <?rfc symrefs="yes"?>

  <?rfc sortrefs="no"?>

  <?rfc text-list-symbols="o*+?>

  <?rfc toc="yes"?>

  <front>
    <title abbrev="EVPN Redundant Sources">Ingress Replication BUM flag in
    VXLAN</title>

    <author fullname="Jorge Rabadan" initials="J." role="editor"
            surname="Rabadan">
      <organization>Nokia</organization>

      <address>
        <postal>
          <street>520 Almanor Avenue</street>

          <city>Sunnyvale</city>

          <region>CA</region>

          <code>94085</code>

          <country>USA</country>
        </postal>

        <email>jorge.rabadan@nokia.com</email>
      </address>
    </author>

    <author fullname="Ali Sajassi" initials="A." surname="Sajassi">
      <organization>Cisco</organization>

      <address>
        <postal>
          <street/>

          <street/>
        </postal>

        <email>sajassi@cisco.com</email>
      </address>
    </author>

    <date day="20" month="October" year="2025"/>

    <workgroup>BESS Workgroup</workgroup>

    <abstract>
      <t>This document proposes the allocation of an &ldquo;Ingress
      Replication BUM&rdquo; flag in the VXLAN Flags IANA registry and defines
      its use in EVPN networks that employ VXLAN tunnels with ingress
      replication to forward broadcast, unknown and multicast traffic.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="sect-1" title="Introduction">
      <t>Section 8.3.3 of <xref target="RFC8365"/> explains why tunnels used
      for EVPN ingress replication must include an indication that a given BUM
      (Broadcast, Unknown Unicast, Multicast) frame was ingress-replicated by
      the ingress PE. A summary of that section is provided here for the
      reader&rsquo;s convenience:</t>

      <t>In EVPN networks using ingress replication, unknown unicast traffic
      is flooded with a distinct MPLS label to mark it as BUM traffic. This
      allows egress PEs to apply Designated Forwarder (DF) filtering for
      All-Active multihomed sites. If unknown unicast flooding is enabled but
      no specific unknown-unicast label is used, transient duplicate traffic
      may occur. This happens when the ingress PE has not yet learned a host
      MAC via EVPN, while the egress PEs already have. The ingress PE floods
      the packet to all egress PEs, which then forward multiple copies to the
      multihomed site. Such duplication occurs only when: <list
          style="letters">
          <t>the destination host is multihomed (All-Active)</t>

          <t>unknown-unicast flooding is enabled</t>

          <t>ingress replication is used</t>

          <t>the ingress PE hasn&rsquo;t learned the MAC yet</t>
        </list>To prevent this, <xref target="RFC8365"/> recommends the use of
      VXLAN-GPE encapsulation <xref target="I-D.ietf-nvo3-vxlan-gpe"/>, with
      the ingress PE setting the BUM Traffic Bit (B-bit) to mark the traffic
      as ingress-replicated BUM.</t>

      <t>The goal of this document is twofold. First, it requests the
      allocation of the B-bit (also referred to as the &ldquo;Ingress
      Replication BUM&rdquo; flag) in the VXLAN Flags registry established by
      <xref target="I-D.ietf-nvo3-rfc7348bis"/>, and updates [RFC8365] to
      allow the use of this flag in VXLAN tunnels. Second, it analyzes
      additional use cases where the &ldquo;Ingress Replication BUM&rdquo;
      flag should be applied, beyond the scenario described in Section 8.3.3
      of <xref target="RFC8365"/>.</t>

      <section anchor="sect-1.1" title="Terminology and Conventions">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>

        <t><list style="symbols">
            <t>BUM traffic: Broadcast, Unknown unicast and Multicast
            traffic.</t>

            <t>PE: Provider Edge device. In this document a PE can be a Leaf
            node in a Data Center or a traditional Provider Edge router in an
            MPLS network.</t>
          </list></t>
      </section>
    </section>

    <section anchor="sect-2"
             title="The Ingress Replication BUM Flag in VXLAN tunnels">
      <t>This document requests the allocation of the the Ingress Replication
      BUM flag (B-bit) in VXLAN tunnels <xref
      target="I-D.ietf-nvo3-rfc7348bis"/> as follows:<figure>
          <artwork><![CDATA[ 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|R|R|R|R|I|R|B|R|            Reserved                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                VXLAN Network Identifier (VNI) |   Reserved    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+]]></artwork>
        </figure>This document requests IANA to allocate bit 6 of the VXLAN
      Flags registry for the &ldquo;Ingress Replication BUM&rdquo; flag. The
      chosen bit position aligns with that used in <xref
      target="I-D.ietf-nvo3-vxlan-gpe"/>, facilitating data path
      implementations that support both VXLAN-GPE and the procedures defined
      in this document for VXLAN tunnels.</t>

      <t>In an EVPN broadcast domain that uses Ingress Replication to forward
      BUM traffic:<list style="numbers">
          <t>Ingress PEs MUST set the Ingress Replication BUM flag in VXLAN
          packets that encapsulate broadcast, multicast, or unknown unicast
          frames.</t>

          <t>Egress PEs MUST treat any received packet with the Ingress
          Replication BUM flag set as BUM traffic, regardless of the
          destination MAC address in the encapsulated frame.</t>

          <t>Egress PEs MUST treat any received packet with the Ingress
          Replication BUM flag unset as known unicast traffic, regardless of
          the destination MAC address in the encapsulated frame.</t>
        </list>In an EVPN broadcast domain that uses Assisted Replication
      <xref target="RFC9574"/>, the ingress PE MUST set the Ingress
      Replication BUM flag in VXLAN packets that encapsulate broadcast,
      multicast or unknown unicast frames. In this context, the ingress PE may
      be an Assisted Replication Replicator, Leaf or RNVE (Regular Network
      Virtualization Edge) node.</t>

      <t>The following section illustrates how the use of the Ingress
      Replication BUM flag addresses issues in EVPN multi-homing networks.</t>
    </section>

    <section anchor="sect-3"
             title="Use of the Ingress Replication BUM Flag in EVPN Multi-Homing">
      <t>Consider the scenario in <xref target="Figure1"/>, where PE1 and PE2
      are multi-homed to CE1 in all-active mode, and ingress replication is
      used. Without the enhancement described in this document, when CE2 sends
      traffic to MAC M1, it is possible that PE3 has not yet learned M1, even
      though it already exists in the FIBs of PE1 and PE2. In this case, PE3
      will ingress-replicate the frame in VXLAN packets to both PE1 and PE2,
      and since both egress PEs forward the traffic to CE1, packet duplication
      occurs. This is considered a transient scenario, but packet duplication
      may still be harmful for the applications.</t>

      <t>Using the procedures in this document:<list style="symbols">
          <t>In the same example PE3 sets the Ingress Replication BUM
          flag.</t>

          <t>PE1 and PE2 receive the VXLAN packet with the flag set and treat
          it as BUM traffic. As a result, only the Designated Forwarder (DF)
          forwards the frame to CE1, thereby preventing packet
          duplication.</t>
        </list></t>

      <t><figure anchor="Figure1" title="Packet Duplication">
          <artwork><![CDATA[              PE1                                
            +-------+                            
          M1| +---+ |--------------+             
   +--------| |BD1| |              |             
   |        | +---+ | <----+       | PE3         
   |        +-------+      |    +-------+        
+---+           |          +----+ +---+ |   +---+
|CE1|           |               | |BD1| +---|CE2|
+---+           |          +----+ +---+ |   +---+
M1 |            |          |    +-------+        
   |        +-------+ <----+       |  ? <------  
   |      M1| +---+ |              |      to-M1       
   +--------| |BD1| |--------------+             
            | +---+ |                            
            +-------+                            
              PE2     ]]></artwork>
        </figure><xref target="Figure2"/> illustrates a similar example under
      different conditions. Without the enhancement described in this
      document, consider a scenario where CE2 sends a unicast frame destined
      for MAC M1. It is possible that PE3&rsquo;s FIB still contains an entry
      for M1 pointing to PE1, while PE1 has already removed M1 from its own
      FIB (due to MAC aging or other conditions). In this case, if PE1 is not
      the Designated Forwarder (DF) for the Ethernet Segment, it will discard
      the frame, disrupting communication between CE2 and CE1. This represents
      another transient condition that can negatively affect applications.</t>

      <t>Using the procedures in this document:<list style="symbols">
          <t>PE3 does not set the Ingress Replication BUM flag for the VXLAN
          packet that encapsulates the frames to M1.</t>

          <t>PE1 receives the VXLAN packet with the flag unset and therefore
          treats it as unicast traffic. This allows PE1 to safely forward the
          frame to CE1, and to any other local attachment circuits, if
          present. The communication between CE2 and CE1 is no longer
          disrupted.</t>
        </list></t>

      <t><figure anchor="Figure2" title="Packet Discard">
          <artwork><![CDATA[              PE1                                
            +-------+                            
          ? | +---+ |--------------+             
   +--------| |BD1| |              |             
   |        | +---+ | <----+       | PE3         
   |        +-------+      |    +-------+        
+---+           |          +----+ +---+ |   +---+
|CE1|           |               | |BD1| +---|CE2|
+---+           |               | +---+ |   +---+
M1 |            |               +-------+        
   |        +-------+              |  PE1 <------  
   |        | +---+ |              |      to-M1       
   +--------| |BD1| |--------------+             
            | +---+ |                            
            +-------+                            
              PE2      ]]></artwork>
        </figure></t>
    </section>

    <section anchor="sect-4" title="Security Considerations">
      <t>The use of the Ingress Replication BUM flag in VXLAN packets is not
      expected to introduce any new security risks in existing EVPN VXLAN
      networks. On the contrary, this flag provides a clear indication to
      receiving PEs whether the traffic was originally classified as BUM or
      unicast. Since the setting of this bit for BUM-encapsulated packets is
      automatic and not controlled by configuration commands, an attacker with
      access to an EVPN VXLAN PE cannot exploit or modify it as a means of
      attack.</t>
    </section>

    <section anchor="sect-5" title="IANA Considerations">
      <t>This document requests a new Flag in the registry called "VxLAN
      Flags", to indicate "Ingress Replication BUM".</t>

      <t><figure anchor="iana" title="">
          <artwork><![CDATA[Bit         Name                           Reference
--------------------------------------------------------
6           Ingress Replication BUM        This document

]]></artwork>
        </figure></t>
    </section>

    <section anchor="sect-6" title="Contributors"/>

    <section anchor="sect-7" title="Acknowledgements">
      <t>The authors would like to acknowledge the authors of <xref
      target="RFC8365"/> and <xref target="I-D.ietf-nvo3-vxlan-gpe"/> for
      their initial discussions about the use of an Ingress Replication BUM
      flag in VXLAN-GPE.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      &RFC2119;

      &RFC8174;

      &RFC8365;

      &RFC9574;

      &I-D.ietf-nvo3-rfc7348bis;
    </references>

    <references title="Informative References">
      &I-D.ietf-nvo3-vxlan-gpe;
    </references>
  </back>
</rfc>
