<?xml version="1.0" encoding="UTF-8"?>


<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>


<rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" category="std" consensus="true" docName="draft-ietf-bess-pbb-evpn-isid-cmacflush-09" number="0000" ipr="trust200902" obsoletes="" updates="" xml:lang="en" symRefs="true" sortRefs="false" tocInclude="true" version="3">

  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <!-- Generated by id2xml 1.5.0 on 2020-10-30T09:55:35Z -->

  <front>
    <title abbrev="PBB-EVPN ISID-based CMAC-flush">PBB-EVPN ISID-based
    C-MAC-Flush</title>
    <seriesInfo name="RFC" value="0000"/>
    <author fullname="Jorge Rabadan" initials="J." role="editor" surname="Rabadan">
      <organization>Nokia</organization>
      <address>
        <postal>
          <street>520 Almanor Avenue</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94085</code>
          <country>United States of America</country>
        </postal>
        <email>jorge.rabadan@nokia.com</email>
      </address>
    </author>
    <author fullname="Senthil Sathappan" initials="S." surname="Sathappan">
      <organization>Nokia</organization>
      <address>
        <postal>
          <street>520 Almanor Avenue</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94085</code>
          <country>United States of America</country>
        </postal>
        <email>senthil.sathappan@nokia.com</email>
      </address>
    </author>
    <author fullname="Kiran Nagaraj" initials="K." surname="Nagaraj">
      <organization>Nokia</organization>
      <address>
        <postal>
          <street>520 Almanor Avenue</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94085</code>
          <country>United States of America</country>
        </postal>
        <email>kiran.nagaraj@nokia.com</email>
      </address>
    </author>
    <author fullname="M. Miyake" initials="M." surname="Miyake">
      <organization>Softbank</organization>
      <address>
        <email>masahiro.miyake@g.softbank.co.jp</email>
      </address>
    </author>
    <author fullname="T. Matsuda" initials="T." surname="Matsuda">
      <organization>Softbank</organization>
      <address>
        <email>taku.matsuda@g.softbank.co.jp</email>
      </address>
    </author>
    <date month="January" year="2024"/>
    <area>rtg</area>
    <workgroup>bess</workgroup>
    <abstract>
      <t>Provider Backbone Bridging (PBB) can be combined with Ethernet
      Virtual Private Networks (EVPN) to deploy Ethernet Local Area Network
      (ELAN) services in large Multi-Protocol Label Switching (MPLS) networks.
      That combination is what we refer to as PBB-EVPN. Single-Active
      Multi-homing and per-I-SID (per Service Instance Identifier)
      Load-Balancing can be provided to access devices and aggregation
      networks. In order to speed up the network convergence in case of
      failures on Single-Active Multi-Homed Ethernet Segments (ES), PBB-EVPN
      defines a flush mechanism for Customer MACs (C-MAC-flush) that works for
      different Ethernet Segment Backbone MAC (B-MAC) address allocation
      models. This document complements those C-MAC-flush procedures for cases
      in which no PBB-EVPN Ethernet Segments are defined (the attachment
      circuit is associated to a zero Ethernet Segment Identifier) and a
      Service Instance Identifier based (I-SID-based) C-MAC-flush granularity
      is required.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="default">
      <name>Introduction</name>
      <t><xref target="RFC7623" format="default"/> defines how Provider Backbone Bridging (PBB)
      can be combined with Ethernet Virtual Private Networks (EVPN) to deploy
      ELAN services in very large MPLS networks. <xref target="RFC7623" format="default"/> also
      describes how Single-Active Multi-homing and per-I-SID Load-Balancing
      can be provided to access devices and aggregation networks. When Access
      Ethernet/MPLS Networks exists, <xref target="I-D.ietf-bess-evpn-virtual-eth-segment" format="default"/> describes how virtual
      Ethernet Segments (ES) can be associated to a group of Ethernet Virtual
      Circuits (EVCs) or even Pseudowires (PWs). In order to speed up the
      network convergence in case of failures on Single-Active Multi-Homed
      Ethernet Segments, <xref target="RFC7623" format="default"/> defines a Customer MAC flush
      mechanism that works for different Ethernet Segment B-MAC address
      allocation models.</t>
      <t>In some cases, the administrative entities that manage the access
      devices or aggregation networks do not demand Multi-Homing Ethernet
      Segments (ES) from the PBB-EVPN provider, but simply multiple
      single-homed ES. Single-homed ES use null ESIs, whereas multi-homed ES
      use non-null ESIs. If case of using single-homed ES, the PBB-EVPN
      network is no longer aware of the redundancy offered by the access
      administrative entity. <xref target="pbb-evpn-and-non-es-based-redundancy" format="default"/> shows an example where
      the PBB-EVPN network provides four different Attachment Circuits for
      I-SID1, with those Attachment Circuits not being part of any Ethernet
      Segment or virtual Ethernet Segment (therefore they are referred to as
      null virtual Ethernet Segment).</t>
      <figure anchor="pbb-evpn-and-non-es-based-redundancy">
        <name>PBB-EVPN and non-ES based redundancy</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
     <----G.8032--><--PBB-EVPN Network---><----MPLS---->
          Access          MPLS                Access  
           Ring                               Network
     I-SID1    ESI +------+         +------+
     +----+    null| PE1  |---------| PE3  |
     |CE1 |--------|B-MAC1|         |B-MAC3| ESI null
     +----+  active|      |         |      |----+ PW     
       |           +------+         +------+     \active  
       |             |                 |          \  +----+
       |             |                 |           ==|CE3 |I-SID1
       |             |                 |          /  +----+
       |stb    ESI +------+         +------+     / PW   
     +----+    null| PE2  |         | PE4  |----+ standby      
     |CE2 |--------|B-MAC2|         |B-MAC4| ESI null
     +----+  active|      |---------|      |
     I-SID1        +------+         +------+ 
]]></artwork>
      </figure>
      <t>In the example in <xref target="pbb-evpn-and-non-es-based-redundancy" format="default"/>, CE1, CE2 and CE3 are
      attached to the same service, identified by I-SID1, in the PBB-EVPN PEs.
      CE1 and CE2 are connected to the PEs via G.8032 Ethernet Ring Protection
      Switching, and their Attachment Circuits to PE1 and PE2 are represented
      by a port and VLAN identifier. CE3 is dual-homed to PE3 and PE4 through
      an active-standby PW, and its Attachment Circuit to the PEs is
      represented by a PW. Each of the four PEs uses a dedicated Backbone MAC
      address as source MAC address (B-MAC1, B-MAC2, B-MAC3 and B-MAC4,
      respectively) when encapsulating customer frames in PBB packets and
      forwarding those PBB packets to the remote PEs as per <xref target="RFC7623" format="default"/>. There are no multi-homed Ethernet Segments defined
      in the PBB-EVPN network of the example, that is why the four Attachment
      Circuits in <xref target="pbb-evpn-and-non-es-based-redundancy" format="default"/> show
      the text "ESI null", which means the Ethernet Segment Identifier on
      those Attachment Circuits is zero. Since there are no multi-homed ES
      defined, the PEs keep their Attachment Circuits active as long as the
      physical connectivity is established and the CEs are responsible for
      managing the redundancy, avoiding loops and providing per-I-SID load
      balancing to the PBB-EVPN network. Examples of CEs managing their own
      redundancy are described in <xref target="G.8032" format="default"/>, or <xref target="RFC4762" format="default"/> for active/standby Pseudowires.</t>
      <t>For instance, in normal conditions, CE2 will block its link to CE1
      and CE3 will block its forwarding path to PE4. In this situation, a
      failure in one of the redundant Attachment Circuits will trigger the CEs
      to start using their redundant paths, however those failures will not
      trigger any Customer MAC flush procedures in the PEs that implement
      <xref target="RFC7623" format="default"/>, since the PEs are not using the PBB-EVPN
      multi-homing procedures. For example:</t>
      <ul spacing="normal">
        <li>
          <t>if the active PW from CE3 (to PE3) fails and the failure is due
          to the entire PE3 node failing, then the procedures in <xref target="RFC7623" format="default"/> guarantee that all the remote PEs flush all the
          Customer MACs associated with B-MAC3 (the B-MAC of PE3). In this
          case, CE3 detects the fault due to the PW going operationally
          down.</t>
        </li>
        <li>
          <t>however, if the active PW from CE3 (to PE3) fails (but PE3 is
          still operationally up), following the procedures in <xref target="RFC7623" format="default"/>, neither PE3 nor PE4 issue a Customer MAC flush
          message and therefore the remote PEs will continue pointing at PE3's
          Backbone MAC to reach CE3's Customer MACs, until the Customer MACs
          age out in the I-SID1 forwarding tables. In this case, PE3 may use
          any of the existing PW notifications so that CE3 switches the active
          PW to PE4.</t>
        </li>
        <li>
          <t>the same issue is exposed when the active PW from CE3 switches
          over from PE3 to PE4 due to a manual operation on CE3; that is,
          neither PE3 nor PE4 trigger any Customer MAC flush notification and
          the remote PEs continue sending the traffic to PE3 until the
          Customer MACs age out.</t>
        </li>
      </ul>
      <t><xref target="RFC7623" format="default"/> provides a Customer MAC flush solution based
      on a shared Backbone MAC update along with the MAC Mobility extended
      community where the sequence number is incremented. However, the
      procedure is only used along with multi-homed Ethernet Segments. Even if
      that procedure could be used for null Ethernet Segments, as in the
      example of <xref target="pbb-evpn-and-non-es-based-redundancy" format="default"/>, the
      <xref target="RFC7623" format="default"/> Customer MAC flush procedure would result in
      unnecessary flushing of unaffected I-SIDs on the remote PEs, and
      subsequent flooding of unknown unicast traffic in the network. For
      instance, in case CE3 switches its active PW over to PE4, a potential
      solution reusing the existing C-MAC Flush notifications in <xref target="RFC7623" format="default"/> could be for PE3 to issue an update for the MAC/IP
      Advertisement route of B-MAC3 with a higher sequence number. However,
      this update would have caused unnecessary Customer MAC flushing for all
      the I-SIDs attached to PE3 (supposing multiple I-SIDs in PE3), and not
      only I-SID1.</t>
      <t>This document describes an extension of the <xref target="RFC7623" format="default"/>
      Customer MAC flush procedures, so that in the above failure example, PE3
      can trigger a Customer MAC flush notification that makes PE1, PE2 and
      PE4 flush all the Customer MACs associated to PE3's B-MAC3 and (only)
      I-SID1. In order to do so, this specification introduces the encoding of
      the I-SID in the MAC/IP Advertisement routes advertised for the B-MACs.
      The Customer MAC flush procedure explained in this document is referred
      to as "PBB-EVPN I-SID-based C-MAC-flush" and can be used in PBB-EVPN
      networks with null or non-null (virtual) Ethernet Segments.</t>
      <t>This specification assumes that the reader is familiar with the
      procedures in <xref target="RFC7623" format="default"/>. </t>
      <section anchor="sect-1.1" numbered="true" toc="default">
        <name>Terminology and Conventions</name>
        <t>
    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
    NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
    "MAY", and "OPTIONAL" in this document are to be interpreted as
    described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
	<dl>
        <dt>AC:</dt><dd>Attachment Circuit.</dd>
        <dt>B-MAC:</dt><dd>Backbone MAC address.</dd>
        <dt>B-MAC/0 route:</dt><dd>an EVPN MAC/IP Advertisement route that uses a B-MAC
        in the MAC address field and a zero Ethernet Tag ID.</dd>
        <dt>B-MAC/I-SID route:</dt><dd>an EVPN MAC/IP Advertisement route that uses a
        B-MAC in the MAC address field and an I-SID in the Ethernet Tag field,
        and it is used to notify remote PEs about the required C-MAC-flush
        procedure for the C-MACs associated with the advertised B-MAC and
        I-SID.</dd>
        <dt>CE:</dt><dd>Customer Edge router.</dd>
        <dt>C-MAC:</dt><dd>Customer MAC address.</dd>
        <dt>ES, and ESI:</dt><dd>Ethernet Segment and Ethernet Segment Identifier.</dd>
        <dt>EVI:</dt><dd>EVPN Instance.</dd>
        <dt>EVPN:</dt><dd>Ethernet Virtual Private Networks, as in <xref target="RFC7432" format="default"/>.</dd>
        <dt>G.8032:</dt><dd>Ethernet Ring Protection <xref target="G.8032" format="default"/>.</dd>
        <dt>I-SID:</dt><dd>Service Instance Identifier.</dd>
        <dt>MAC-VRF:</dt><dd>A Virtual Routing and Forwarding table for MAC
        addresses.</dd>
        <dt>PBB-EVPN:</dt><dd>Provider-Backbone-Bridging and EVPN, as in <xref target="RFC7623" format="default"/>.</dd>
        <dt>PE:</dt><dd>Provider Edge router.</dd>
      </dl>
        <t>Familiarity with the terminology in <xref target="RFC7623" format="default"/> is
        expected.</t>
      </section>
    </section>
    <section anchor="sect-2" numbered="true" toc="default">
      <name>Solution requirements</name>
      <t>The following requirements are followed by the C-MAC-flush solution
      described in this document:</t>
      <ol spacing="normal" type="a"><li>
          <t>The solution <bcp14>MUST</bcp14> prevent black-hole scenarios in case of
          failures on null ES ACs (Attachment Circuits not associated to ES,
          that is, their corresponding ESI is zero) when the access
          device/network is responsible for the redundancy.</t>
        </li>
        <li>
          <t>This extension described in this document <bcp14>MUST</bcp14> work with
          Single-Active non-null ES and virtual ES, irrespective of the PE
          B-MAC address assignment (dedicated per-ES B-MAC or shared B-MAC, as
          in <xref target="RFC7623" format="default"/>).</t>
        </li>
        <li>
          <t>In case of failure on the egress PE, the solution <bcp14>MUST</bcp14> provide a
          C-MAC-flush notification at B-MAC and I-SID granularity level.</t>
        </li>
        <li>
          <t>The solution <bcp14>MUST</bcp14> provide a reliable C-MAC-flush notification in
          PBB-EVPN networks that use Route-Reflectors (RRs). MAC flushing
          needs to be provided to all affected I-SIDs in spite of the BGP
          flush notification messages being aggregated at the RR.</t>
        </li>
        <li>
          <t>The solution <bcp14>MUST</bcp14> coexist in <xref target="RFC7623" format="default"/> networks
          where there are PEs that do not support this specification.</t>
        </li>
        <li>
          <t>The solution <bcp14>SHOULD</bcp14> be enabled/disabled by an administrative
          option on a per-PE and per-I-SID basis (as opposed to be always
          enabled for all the I-SIDs).</t>
        </li>
      </ol>
    </section>
    <section anchor="sect-3" numbered="true" toc="default">
      <name>EVPN BGP Encoding for ISID-based C-MAC-flush</name>
      <t>The solution does not use any new BGP attributes but reuses the MAC
      Mobility extended community as an indication of C-MAC-flush (as in <xref target="RFC7623" format="default"/>) and encodes the I-SID in the Ethernet Tag field of
      the EVPN MAC/IP advertisement route. As a reference, <xref target="ure-cmac-flush-notification-encoding-bmac-isid-route" format="default"/> shows
      the MAC Mobility extended community and the EVPN MAC/IP advertisement
      route that are used specified in <xref target="RFC7432" format="default"/> and used in
      this document as a C-MAC-flush notification message.</t>
      <figure anchor="ure-cmac-flush-notification-encoding-bmac-isid-route">
        <name>CMAC-Flush notification encoding: BMAC/ISID route</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type=0x06     | Sub-Type=0x03 |   Flags       |   Reserved=0  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       Sequence Number                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

            +---------------------------------------+
            |  Route Distinguisher                  |
            +---------------------------------------+
            |  ESI = 0                              |
            +---------------------------------------+
            |  Ethernet Tag ID = I-SID              |
            +---------------------------------------+
            |  MAC Address Length = 48              |
            +---------------------------------------+
            |  B-MAC Address                        |
            +---------------------------------------+
            |  IP Address Length = 0                |
            +---------------------------------------+
            |  MPLS Label1                          |
            +---------------------------------------+
]]></artwork>
      </figure>
      <t>Where:</t>
      <ul spacing="normal">
        <li>
          <t>The route's route distinguisher and route targets are the ones
          corresponding to its EVI. Alternatively to the EVI's RT, the route
          <bcp14>MAY</bcp14> be tagged with an RT auto-derived from the Ethernet Tag (I-SID)
          instead. <xref target="RFC7623" format="default"/> describes how the EVPN MAC/IP
          Advertisement routes can be advertised along with the EVI RT or an
          RT that is derived from the I-SID.</t>
        </li>
        <li>
          <t>The Ethernet Tag encodes the I-SID for which the PE that receives
          the route must flush the C-MACs upon reception of the route.</t>
        </li>
        <li>
          <t>The MAC address field encodes the B-MAC Address for which the PE
          that receives the route must flush the C-MACs upon reception of the
          route.</t>
        </li>
        <li>
          <t>The MAC Mobility extended community is used as in <xref target="RFC7623" format="default"/>, where an increment in the sequence number
          between two updates for the same B-MAC/I-SID will be interpreted as
          a C-MAC-flush notification for the corresponding B-MAC and
          I-SID.</t>
        </li>
      </ul>
      <t>All the other fields are set and used as defined in <xref target="RFC7623" format="default"/>. This document will refer to this route as the
      B-MAC/I-SID route, as opposed to the EVPN MAC/IP Advertisement route
      used in <xref target="RFC7623" format="default"/> that contains a specific B-MAC, and the
      Ethernet Tag ID set to zero. This document uses the term B-MAC/0 route
      to represent a B-MAC route advertised with Ethernet Tag ID = 0.</t>
      <t>Note that this B-MAC/I-SID route will be accepted and reflected by
      any <xref target="RFC7432" format="default"/> RR, since no new attributes or values are
      used. A PE receiving the route will process the received B-MAC/I-SID
      update only in case of supporting the procedures described in this
      document.</t>
    </section>
    <section anchor="sect-4" numbered="true" toc="default">
      <name>Solution description</name>
      <t><xref target="pbb-evpn-and-non-es-based-redundancy" format="default"/> will be used in
      the description of the solution. CE1, CE2 and CE3 are connected to ACs
      associated to I-SID1, where no (Multi-Homed) Ethernet Segments have been
      enabled, and the ACs and PWs are in active or standby state as per <xref target="pbb-evpn-and-non-es-based-redundancy" format="default"/>.</t>
      <t>Enabling or disabling I-SID-based C-MAC-flush <bcp14>SHOULD</bcp14> be an
      administrative choice on the system that <bcp14>MAY</bcp14> be configured per I-SID
      (I-Component, Service Instance Component), as opposed to being
      configured for all I-SIDs. When enabled on a PE:</t>
      <ol spacing="normal" type="a"><li>
          <t>The PE will be able to generate B-MAC/I-SID routes as C-MAC-Flush
          notifications for the remote PEs.</t>
        </li>
        <li>
          <t>The PE will be able to process B-MAC/I-SID routes received from
          remote PEs.</t>
        </li>
      </ol>
      <t>The PE <bcp14>MUST</bcp14> follow the <xref target="RFC7623" format="default"/> procedures for
      C-MAC-flush. This specification brings some additional procedures when
      I-SID-based C-MAC-flush is enabled.</t>
      <t>This C-MAC-flush specification is described in three sets of
      procedures:</t>
      <ul spacing="normal">
        <li>
          <t>I-SID-based C-MAC-flush activation</t>
        </li>
        <li>
          <t>C-MAC-flush notification generation upon AC failures</t>
        </li>
        <li>
          <t>C-MAC-flush process upon receiving a C-MAC-flush notification</t>
        </li>
      </ul>
      <section anchor="sect-4.1" numbered="true" toc="default">
        <name>ISID-based C-MAC-Flush activation procedures</name>
        <t>The following behavior <bcp14>MUST</bcp14> be followed by the PBB-EVPN PEs
        following this specification. <xref target="pbb-evpn-and-non-es-based-redundancy" format="default"/> is used as a
        reference.</t>
        <ul spacing="normal">
          <li>
            <t>As in <xref target="RFC7623" format="default"/>, each PE advertises a shared
            B-MAC in a B-MAC/0 route (with B-MAC1, B-MAC2, B-MAC3 and B-MAC4
            in the MAC address field, respectively). This is the B-MAC that
            each PE will use as B-MAC SA (Source Address) when encapsulating
            the frames received on any local single-homed AC. Each PE will
            import the received B-MAC/0 routes from the remote PEs and will
            install the B-MACs in its B-component (Backbone Component)
            MAC-VRF. For instance, PE1 will advertise B-MAC1/0 and will
            install B-MAC2, B-MAC3 and B-MAC4 in its MAC-VRF.</t>
          </li>
          <li>
            <t>Assuming I-SID-based C-MAC-flush is activated for I-SID 1, the
            PEs will advertise the shared B-MAC with I-SID 1 encoded in the
            Ethernet Tag. That is, PE1 will advertise B-MAC1/1 and will
            receive B-MAC2/1, B-MAC3/1 and B-MAC4/1. The receiving PEs <bcp14>MUST</bcp14>
            use these B-MAC/I-SID routes only for C-MAC-flush procedures and
            they <bcp14>MUST NOT</bcp14> be used them to add/withdraw any B-MAC entry in the
            MAC-VRFs. As per <xref target="RFC7623" format="default"/>, only B-MAC/0 routes can
            be used to add/withdraw B-MACs in the MAC-VRFs.</t>
          </li>
          <li>
            <t>The above procedure <bcp14>MAY</bcp14> also be used for dedicated B-MACs
            (B-MACs allocated per Ethernet Segment).</t>
          </li>
        </ul>
      </section>
      <section anchor="sect-4.2" numbered="true" toc="default">
        <name>C-MAC-Flush generation</name>
        <t>If, for instance, there is a failure on PE1's AC, PE1 will generate
        an update including B-MAC1/1 along with the MAC Mobility extended
        community where the Sequence Number has been incremented. The
        reception of the B-MAC1/1 with an increment in the sequence number
        will trigger the C-MAC-flush procedures on the receiving PEs.</t>
        <ul spacing="normal">
          <li>
            <t>An AC going operationally down <bcp14>MUST</bcp14> generate a B-MAC/I-SID with
            a higher Sequence Number. If the AC going down makes the entire
            local I-SID go operationally down, the PE will withdraw the
            B-MAC/I-SID route for the I-SID.</t>
          </li>
          <li>
            <t>An AC going operationally up <bcp14>SHOULD NOT</bcp14> generate any
            B-MAC/I-SID update, unless it activates its corresponding I-SID,
            in which case the PE will advertise the B-MAC/I-SID route.</t>
          </li>
          <li>
            <t>An AC receiving a G.8032 flush notification or a flush message
            in any other protocol from the access network <bcp14>MAY</bcp14> propagate it to
            the remote PEs by generating a B-MAC/I-SID route update with
            higher Sequence Number.</t>
          </li>
        </ul>
      </section>
      <section anchor="sect-4.3" numbered="true" toc="default">
        <name>C-MAC-flush process upon receiving a CMAC-flush notification</name>
        <t>A PE receiving a C-MAC-flush notification will follow these
        procedures:</t>
        <ul spacing="normal">
          <li>
            <t>A received B-MAC/I-SID route (with non-zero I-SID) <bcp14>MUST NOT</bcp14>
            add/remove any B-MAC to/from the MAC-VRF.</t>
          </li>
          <li>
            <t>An update of a previously received B-MAC/I-SID route with an
            increment Sequence Number, <bcp14>MUST</bcp14> flush all the C-MACs associated to
            that I-SID and B-MAC. C-MACs associated to the same I-SID but
            different B-MAC <bcp14>MUST NOT</bcp14> be flushed.</t>
          </li>
          <li>
            <t>A received B-MAC/I-SID withdraw (with non-zero I-SID) <bcp14>MUST</bcp14>
            flush all the C-MACs associated to that B-MAC and I-SID.</t>
          </li>
        </ul>
        <t>Note that the C-MAC-flush procedures described in <xref target="RFC7623" format="default"/> for B-MAC/0 routes are still valid and a PE
        receiving <xref target="RFC7623" format="default"/> C-MAC-flush notification messages
        <bcp14>MUST</bcp14> observe the behavior specified in <xref target="RFC7623" format="default"/>.</t>
      </section>
    </section>
    <section anchor="sect-5" numbered="true" toc="default">
      <name>Conclusions</name>
      <t>The I-SID-based C-MAC-flush solution described in this document has
      the following benefits:</t>
      <ol spacing="normal" type="a"><li>
          <t>The solution solves black-hole scenarios in case of failures on
          null ES ACs, since the C-MAC-flush procedures are independent of the
          Ethernet Segment definition.</t>
        </li>
        <li>
          <t>This extension can also be used with Single-Active non-null ES
          and virtual ES, irrespective of the PE B-MAC address assignment
          (dedicated per-ES B-MAC or shared B-MAC).</t>
        </li>
        <li>
          <t>It provides a C-MAC-flush notification at B-MAC and I-SID
          granularity level, therefore flushing a minimum number of C-MACs and
          reducing the amount of unknown unicast flooding in the network.</t>
        </li>
        <li>
          <t>It provides a reliable C-MAC-flush notification in PBB-EVPN
          networks that use RRs. RRs will propagate the C-MAC-flush
          notifications for all the affected I-SIDs and irrespective of the
          order in which the notifications make it to the RR.</t>
        </li>
        <li>
          <t>The solution can coexist in a network with systems supporting or
          not supporting this specification. Non-supporting systems ignore the
          B-MAC/I-SID routes, however they still follow the C-MAC-flush
          procedures in <xref target="RFC7623" format="default"/>.</t>
        </li>
      </ol>
    </section>
    <section anchor="sect-7" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>Security considerations described in <xref target="RFC7623" format="default"/> apply
      to this document.</t>
      <t>In addition, this document suggests additional procedures, that can
      be activated on a per I-SID basis, and generate additional EVPN MAC/IP
      Advertisement routes in the network. The format of these additional EVPN
      MAC/IP Advertisement routes is backwards compatible with <xref target="RFC7623" format="default"/> procedures and should not create any issues on
      receiving PEs not following this specification, however, the additional
      routes may consume extra memory and processing resources on the
      receiving PEs. Because of that, it is <bcp14>RECOMMENDED</bcp14> to activate this
      feature only when necessary (when multi-homed networks or devices are
      attached to the PBB-EVPN PEs), and not by default in any PBB-EVPN
      PE.</t>
    </section>
    <section anchor="sect-8" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document requests no actions from IANA.</t>
    </section>
    <section anchor="sect-9" numbered="true" toc="default">
      <name>Acknowledgments</name>
      <t>The authors want to thank <contact fullname="Vinod Prabhu"/>,
      <contact fullname="Sriram Venkateswaran"/>, <contact fullname="Laxmi
      Padakanti"/>, and <contact fullname="Ranganathan Boovaraghavan"/> for
      their review and contributions.</t>
    </section>
    <section anchor="sect-10" numbered="true" toc="default">
      <name>Contributors</name>
    </section>
  </middle>
  <back>

<displayreference target="I-D.ietf-bess-evpn-virtual-eth-segment" to="EVPN-VIRTUAL-ES"/>

    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7623.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7432.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
      </references>
      <references>
        <name>Informative References</name>
	<xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-virtual-eth-segment.xml"/>

        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4762.xml"/>

<reference anchor="G.8032" target="https://www.itu.int/rec/T-REC-G.8032-202003-I/en">
     <front>
       <title>Ethernet ring protection switching</title>
       <author>
         <organization>ITU-T</organization>
       </author>
       <date month="March" year="2020" />
     </front>
     <seriesInfo name="ITU-T Recommendation" value="G.8032/Y.1344"/>
   </reference>

      </references>
    </references>
  </back>
</rfc>

