<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
    There has to be one entity for each item to be referenced. 
    An alternate method (rfc include) is described in the references. -->

<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2629 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2629.xml">
<!ENTITY RFC3552 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC5226 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5226.xml">
<!ENTITY RFC6513 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6513.xml">
<!ENTITY RFC6514 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6514.xml">
<!ENTITY RFC7209 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7209.xml">
<!ENTITY RFC7432 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7432.xml">
<!ENTITY RFC8365 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8365.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
    please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
    (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
    (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-sharma-bess-multi-site-evpn-04" ipr="trust200902">
 <!-- category values: std, bcp, info, exp, and historic
    ipr values: trust200902, noModificationTrust200902, noDerivativesTrust200902,
       or pre5378Trust200902
    you can add the attributes updates="NNNN" and obsoletes="NNNN" 
    they will automatically be output with "(if approved)" -->

 <!-- ***** FRONT MATTER ***** -->

 <front>
   <!-- The abbreviated title is used in the page header - it is only necessary if the 
        full title is longer than 39 characters -->

   <title abbrev="Multi-site EVPN" > 
                  Multi-site EVPN based VXLAN using Border Gateways
   </title>

   <!-- add 'role="editor"' below for the editors if appropriate -->

   <!-- Another author who claims to be an editor -->

   <author fullname="Rajesh Sharma" initials="R.S." role="editor"
           surname="Sharma">
     <organization>Cisco Systems</organization>
     <address>
       <postal>
         <street> 170 W Tasman Drive</street>
         <city>San Jose</city>
         <region>CA</region>
         <code></code>
         <country>USA</country>
       </postal>
       <phone></phone>
       <email>rajshr@cisco.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
   </author>
   <author fullname="Ayan Banerjee" initials="A.B." role="editor"
           surname="Banerjee">
     <organization>Cisco Systems</organization>
     <address>
       <postal>
         <street> 170 W Tasman Drive</street>
         <city>San Jose</city>
         <region>CA</region>
         <code></code>
         <country>USA</country>
       </postal>
       <phone></phone>
       <email>ayabaner@cisco.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
   </author>
   <author fullname="Ali Sajassi" initials="A.S."
           surname="Sajassi">
     <organization>Cisco Systems</organization>
     <address>
       <postal>
         <street> 170 W Tasman Drive</street>
         <city>San Jose</city>
         <region>CA</region>
         <code></code>
         <country>USA</country>
       </postal>
       <phone></phone>
       <email>sajassi@cisco.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
   </author>
   <author fullname="Lukas Krattiger" initials="L.K."
           surname="Krattiger">
     <organization>Cisco Systems</organization>
     <address>
       <postal>
         <street> 170 W Tasman Drive</street>
         <city>San Jose</city>
         <region>CA</region>
         <code></code>
         <country>USA</country>
       </postal>
       <phone></phone>
       <email>lkrattig@cisco.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
   </author>
   <author fullname="Raghava Sivaramu" initials="R.S."
           surname="Sivaramu">
     <organization>Cisco Systems</organization>
     <address>
       <postal>
         <street> 170 W Tasman Drive</street>
         <city>San Jose</city>
         <region>CA</region>
         <code></code>
         <country>USA</country>
       </postal>
       <phone></phone>
       <email>raghavas@cisco.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
   </author>



   <date year="2018" />

   <!-- If the month and year are both specified and are the current ones, xml2rfc will fill 
        in the current day for you. If only the current year is specified, xml2rfc will fill 
	 in the current day and month for you. If the year is not the current one, it is 
	 necessary to specify at least a month (xml2rfc assumes day="1" if not specified for the 
	 purpose of calculating the expiry date).  With drafts it is normally sufficient to 
	 specify just the year. -->

   <!-- Meta-data Declarations -->

   <area>General</area>

   <workgroup>BESS Working Group</workgroup>

   <!-- WG name at the upperleft corner of the doc,
        IETF is fine for individual submissions.  
	 If this element is not present, the default is "Network Working Group",
        which is used by the RFC Editor as a nod to the history of the IETF. -->

   <keyword>evpn</keyword>

   <!-- Keywords will be incorporated into HTML output
        files in a meta tag but they have no effect on text or nroff
        output. If you submit your draft to the RFC Editor, the
        keywords will be used for the search engine. -->

   <abstract>
     <t> This document describes the procedures for interconnecting two or
         more BGP based Ethernet VPN (EVPN) sites in a scalable fashion over
         an IP-only network. The motivation is to support extension of EVPN
         sites  without having to rely on typical Data Center Interconnect 
         (DCI) technologies like MPLS/VPLS. The requirements for such a 
         deployment are very similar to the ones specified in RFC 7209 -- 
         "Requirements for Ethernet VPN (EVPN)".
     </t>
   </abstract>
 </front>

 <middle>


   <section anchor="sec_intro" title="Introduction">
     <t> 
         BGP based Ethernet VPNs (EVPNs) are being used to support various VPN
         topologies with the motivation and requirements being discussed in 
         <xref target="RFC7209">RFC7209</xref>. EVPN has been used to provide a Network Virtualization Overly (NVO) 
         solution with a variety of tunnel encapsulation options in 
         <xref target="RFC8365">RFC8365</xref> for the Data center interconnect (DCI) at the WAN Edge.
         Procedures for IP and MPLS hand-off at site boundaries are additionally discussed in 
         <xref target="DCI-OVERLAY"></xref>.
     </t>
  
     <t>
         In current EVPN deployments, there is a need to segment the EVPN
         domains within a Data Center (DC) primarily due to the service 
         architecture and the scaling requirements around it. The number 
         of routes, tunnel end-points, and next-hops needed in the DC are
         sometimes larger than the capability of the hardware elements that
         are being deployed. Network operators would like to inter-connect 
         these domains without using traditional DCI technologies. In essence,
         they want smaller multi-site EVPN domains with an IP backbone. 
         Additionally, they would 
         like to have an Anycast model for the nodes at the gateways. This alleviates the 
         hardware of having to support multi-path on overlay reachability. 
     </t>

     <t> 
         Network operators today are using the Virtual Network Identifier
         (VNI) to designate a service. They would like to have this service 
         available to a smaller set of nodes within the DC for 
         administrative reasons; in essence they want to break up the EVPN
         domain to multiple smaller sites. An advantage of having a smaller 
         footprint for these EVPN sites results in fault isolation domains 
         being constrained. It also allows for re-use of VNI space across sites.
     </t>

     <t> 
         In a traditional leaf-spine architecture, it is conceivable, that the network operator
         may decide to support both the Route-Reflector and Gateway functionality on the spine nodes. 
         In such a deployment model, it is necessary to have a site identifier marked with each 
         domain, such that route import and export rules can work effectively. 
     </t>

     <t> In this document we focus primarily on the VXLAN encapsulation for
         EVPN deployments, with the underlay providing only IP connectivity. 
         We describe in detail the IP/VXLAN hand-off mechanisms to 
         interconnect these smaller sites within the data center itself, and
         refer to this deployment model as multi-site EVPN (MS-EVPN). The 
         procedures described here go into substantial detail regarding
         interconnecting Layer-2 (L2) and Layer-3 (L3) networks, for unicast
         and multicast domains across MS-EVPNs. In this specification,
         we also define the use of the Type 5 Ethernet Segment Identifier (ESI)
         (Section 5 of <xref target="RFC7432">RFC7432</xref>) 
         between multiple sites using the Anycast routing model. 
     </t>

     <section title="Requirements Language">
       <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
       document are to be interpreted as described in <xref
       target="RFC2119">RFC 2119</xref>.</t>
     </section>
   </section>

   <section anchor="terminology" title="Terminology">
     <t><list style="symbols">
         <t>
           Border Gateway (BG): This is the node that interacts with nodes
           that are internal to a site and external to it. It is responsible
           for functionality related to traffic entering and exiting a site.
         </t>

         <t>
          Anycast Border Gateway: A virtual set of shared BGs acting as 
          multiple entry-exit points for a single site.
         </t>
         <t>
          Multipath Border Gateway: A virtual set of unique BGs acting as a 
          multiple entry-exit points for a single site.
          </t>

          <t>
          RT-X: Route Type X as defined for various EVPN route types.
          </t>
      </list>
      </t>
   </section>



   <section anchor="sec_ms_evpn_overview" title="Multi-Site EVPN Overview">
     <t> 
        In this section we describe the motivation, requirements, and 
        framework for the Multi-Site EVPN (MS-EVPN) functionality. 
     </t>
           

        <section anchor="sec_ms_evpn_req" title="MS-EVPN Interconnect Requirements">
        <!--
        <t> MS-EVPN MUST satisfy the following requirements: </t>
        -->

        <t><list style="letters">
            <t> Scalability:  Multi-Site EVPN (MS-EVPN) should be able to
                interconnect multiple sites, allowing for addition/deletion of
                new sites or modifying capacity of existing ones seamlessly.
            </t>

            <t> Multi-Destination traffic over unicast-only cloud: MS-EVPN 
                mechanisms should provide an efficient forwarding mechanism for
                multi-destination frames by using existing network elements as-is.
                A large flat fabric rules out the option of ingress replication, 
                as the number of replications becomes practically 
                unachievable due to the internal hardware bandwidth needed. 
            </t>

            <t>
                Maintain Site-specific Administrative control: MS-EVPN
                should be able to 
                interconnect fabrics from different Administrative domains. 
                The solution should allow for different sites to have different
                VLAN-VNI mappings, use different underlay routing protocols, 
                and/or have different PIM-SM group ranges. 
            </t>

             <t> Isolate fault domains: MS-EVPN technology hand-off should have 
                 capability to isolate traffic across site boundaries and prevent
                 defects to percolate from one site to another. As an example, 
                 a broadcast storm in a site should not propagate to other sites.
             </t>

            <!--
            <t> Co-existence of other VPN Address Families: MS-EVPN should coexists with other VPN address 
                families like L3-VPN or MVPN. As each VPN address family provides different set of services,
                MS-EVPN architecture should allow for coexistence of such VPN address families in the same topology. 
            </t>

             <t> Loop detection and prevention:
                In the scenarios where flood domains are stretched across fabrics, interconnecting sites are very
                vulnerable to loops and flood storms. There is a need to provide comprehensive loop detection and
                prevention capabilities.
             </t>

             <t> Plug-and-play and extensibility: 
               Addition of new sites or increasing capacity of existing sites should be achievable in a completely
               plug-and-play fashion. This essentially means that all control plane and forwarding states 
               (L2 or L3 interconnect) should be built in downstream allocation mode. MS-EVPN should not pose any
               maximum requirements on the scale and capacity, it should be easily extendable on those metrics.
             </t>
            -->

         </list>
        </t>

        </section>

        <section anchor="sec_ms_evpn_concept" title="MS-EVPN Interconnect concept and framework">

           <t>
               EVPN with IP-only interconnect is conceptualized as multiple site-local
               EVPN control planes and IP forwarding domains interconnected 
               via a single common EVPN control and IP forwarding domain. Every 
               node is identified with a unique site-scope identifier. A site-local
               EVPN domain consists of EVPN nodes with the same site identifier. 
          </t>

           <t>
               Border Gateways (BGs) are explicitly part of a site-specific EVPN
               domain, and implicitly part of a common interconnect EVPN domain 
               with BGs from other sites. Although a BG has only a single explicit
               site-id (that of the site it is a member of, see <xref target="sec_ms_evpn_spec_ad" />), it can be 
               considered to also have a second implicit site-id, that of the
               interconnect-domain which has membership of all the BGs from all 
               sites that are being interconnected. 
               <!-- This implicit site-id membership
               is derived by the presence of a Site-Border bit in the flags of the
               ESI-Label Extended Community Attribute that is announced by that BG 
               node along with the traditional Type 1 Ethernet A-D (see 
               <xref target="RFC7432">RFC7432</xref>) route;
               please refer to <xref target="sec_ms_evpn_spec_ad" /> for details. 
               -->
               BGs discover each other through 
               EVPN RT-1 A-D routes and act as both control and forwarding plane 
               gateway across sites. This facilitates site-local nodes to visualize
               all other sites to be reachable only via its BGs.       
          </t>


          <t> We describe the MS-EVPN deployment model using the topology as shown in 
               <xref target="dci_topology" />. In the 
              topology there are 3 sites, Site A, Site B, and 
              Site C that are inter-connected using IP. This entire topology is
              deemed to be part of the same Data Center. In most deployments these
              sites can be thought of as pods, which may span a rack, a row, or
              multiple rows in the data center, depending on the size of domain
              desired for scale and fault and/or administrative isolation. 
          </t>



     <t>      
              In this topology, site-local nodes are connected to each other by
              iBGP EVPN peering and BGs are connected by eBGP Muti-hop EVPN 
              peering via inter-site cloud. We explicitly spell this out to 
              ensure that we can re-use BGP semantics of route announcement
              between and across the sites. Other BGP mechanisms to
              instantiate this will be discussed in a separate document.
              This implies that each domain/site has its own AS number. In 
              the topology, only 2 border gateway per site are shown; this is 
              more for ease of illustration and explanation. The technology poses
              no such limitation. As mentioned earlier, site-specific EVPN 
              domain consists of only site-local nodes in the sites. A BG 
              is logically partitioned into site specific EVPN domain towards
              the site and into common EVPN domain towards other sites. This 
              facilitates them to act as control and forwarding plane gateway for 
              forwarding traffic across sites. 
     </t>

          <t>
             EVPN nodes with in a site will discover each other via regular EVPN
             procedures and build site-local bidirectional VXLAN tunnels and 
             multi-destination trees from leaves to BGs. BGs will discover each
             other by RT-1 routes with unique site-identifiers and build inter-site
             bi-directional VXLAN tunnels and 
             multi-destination trees between them. We thus build an end-to-end 
             bidirectional forwarding path across all sites by stitching (and not 
             by stretching end-to-end) site-local VXLAN tunnels with inter-site
             VXLAN tunnels. In essence, a MS-EVPN fabric is built in complete 
             downstream and modular fashion. 

          </t>
       
     <t>
     <figure align="center" anchor="dci_topology">
        <!--
         <preamble>Preamble text - can be omitted or empty.</preamble>
          -->
       <artwork align="left"><![CDATA[
____________________________
| ooo Encapsulation tunnel |
| X X X  Leaf-spine fabric |
|__________________________|


 Site A (EVPN site A)              Site B (EVPN site B)
 ___________________________      ____________________________
|      X X X X X X X X     |      |      X X X X X X X X     | 
|         X X X X          |      |         X X X X          | 
|        o       o         |      |        o       o         |
|BG-1 Site A    BG-2 Site A|      |BG-1 Site B    BG-2 Site B|
 ___________________________      ____________________________
        o           o                o               o
         o           o              o               o
          o           o            o               o
           o           o          o               o
       _______________________________________________
       |                                             |
       |                                             |
       |        Inter-site common EVPN site          |
       |                                             |
       |                                             |
       _______________________________________________
                     o                   o
                      o                 o
                       o               o
                        o             o
                   ___________________________
 	           | BG-1 Site C    BG-2 Site C|
                   |         X X X X           | 
                   |      X X X X X X X X      |
                   _____________________________
                    Site C (EVPN site C)
                          ]]></artwork>

     </figure>
     </t>


	<t> Site-local tenant domains (for example, bridging, flood, routing, and 
            multicast) are interconnected only via BGs with site-remote tenant domains 
            (bridging, flood, routing, and multicast respectively) from other sites. 
            It stitches such tenant domains (bridging, flood, routing, and multicast) 
            in complete downstream fashion using EVPN route advertisements. Such 
            interconnects do not assume uniform mappings of mac-vrf (or IP-VRF) to VNI 
            across sites.
            <!--   It however does not exclude the possibility of building an end-to-end flood domain, 
                   if desired, for other reasons. 
            -->
        </t>
        <!--
        <t> Site-local tenant Routing domains are interconnected ONLY via BGs
            with Routing domains from other sites. Such interconnect do not 
            assume uniform mappings of IP VRF-VNI across sites and stitches such
            routing domains in complete downstream fashion using EVPN 
            route advertisements. </t>

        <t> Site-local tenant Multicast domains are interconnected ONLY via
            BGs by stitching tenant multicast trees via BGs;
            again in a complete downstream fashion.
        </t>
    
	<t> There could be potential use cases where border gateways should behave as gateway for a subset of 
            VXLAN tunnels (or VNIs) and an underlay pass through for the rest. The procedure
            defined here provides flexibility to accommodate such use cases. 
        </t>
      <t> 
          The above architecture satisfies the constraints laid out in <xref target="sec_ms_evpn_req" />. 
          For example, the size
          of a domain may be made dependent on the route and next-hop scale that can be supported by the
          deployment of the network nodes. There are no constraints on the network that connects the 
          nodes within the domain or across the domains. In the event multicast capability is available
          and enabled, the nodes can use those resources. In the event the underlay is connected 
          using unicast semantics, creation of ingress replication lists ensure that multi-destination
          frames reach their destinations. The domains may have their own deployment constraints, and
          the overlay does not need any form of stretching. It is within the control of the administrator
          with respect to containing fault isolation domains. The automated discovery of the border nodes
          needs no further configurations for existing deployed domains. 
          We next discuss in detail the various elements needed to facilitate this architecture. 
      </t>
          -->

   </section>
</section>

<section anchor="sec_ms_evpn_procedures" title="Multi-site EVPN Interconnect Procedures">
 
     <t> 
        In this section we describe the new functionalities in the Border 
        Gateway (BG) nodes for interconnecting EVPN sites within the DC. 
     </t>

     <t>
      In a nutshell, BG discovery will facilitate termination and 
      re-origination of inter-site VXLAN tunnels. Such discovery provides 
      flexibility for intra-site leaf-to-leaf VXLAN tunnels to co-exist
      with inter-site tunnels terminating on BGs. Additionally, BGs need
      to discover each other such that it is possible to run the Designated 
      Forwarder (DF) election between the border nodes of a site. It also 
      needs to be aware of other remote BGs such that it can allow for 
      appropriate import/export of routes from other sites.  
     </t>

<section anchor="sec_ms_evpn_spec_ad" title="Border Gateway Discovery">

     <t>
     BGs leverage the RT-1 A-D route type defined in <xref target="RFC7432">RFC7432</xref>. 
     BGs in different sites will use RT-1 A-D routes with unique 
     site-identifiers to announce themselves as
     "Borders" to other BGs. Nodes within the same site MUST be 
     configured or auto-generate the same site-identifier. Nodes 
     that are not configured to be a border node will build VXLAN 
     tunnels only between each member of the site (which it is aware 
     due to the site-identifier that is additionally announced by 
     them). Border nodes will additionally build VXLAN tunnels 
     between itself and other border nodes that are announced with 
     a different site identifier. The site-identifier is encoded 
     within the ESI label itself as described below.
     </t> 
     


      <!-- 
      Discover Border Gateways Multi-destination tunnel end points. In case of multicast underlay build 
      by non-EVPN procedures,
      these A-D routes will be used to build Multi-destination IP tunnels rooted at Border Gateways. 
       -->

      <t>
          In this specification, we reuse the AS-based Ethernet Segment
          Identifier (ESI) Type 5 (see Section 5 of <xref target="RFC7432">RFC7432</xref>)
          that can be auto-generated or configured by the operator. It is
          repeated here to illustrate the encoding of the site-identifier. 
      </t>

       <t><list style="symbols">
	<t>
         Type 5 (T=0x05): The ESI value is constructed with the site-id parameter
         being embedded as follows.
         <list>
         <t> 
             AS number (4 octets).  This is an AS number owned by the system
             and MUST be encoded in the high-order 4 octets of the ESI Value
             field.  If a 2-octet AS number is used, the high-order extra
             2 octets will be 0x0000.
         </t>
         <t>
             Local Discriminator/Site Identifier (4 octets): The Local
             Discriminator is also referred to as the Site Identifier and 
             its value MUST be encoded as follows. The high-order 2 octets
             will be 0x0000, and the low order 2 octets will be set to the
             site-identifier to which this node belongs.  All
             border gateways MUST announce this value. We need the AS 
             number and the site identifier together to be automatically 
             derivable to less than 6 octets; this enables for auto import 
             and export of routes (see the ES-Import RT definition in
             <xref target="RFC7432">RFC7432</xref>). 
	  </t>
          <t>
              Reserved (1 octet): The low-order octets of the ESI Value will
              be set to 0 on transmission and will be ignored on receipt. 
 	  </t>

        </list>
        </t>

        </list>
       </t>


      <t>  
           Along with the RT-1 Ethernet A-D routes, border nodes MUST set the second low order bit
           (Flags B0: Single Active, B1: MS-Border) 
           of the octet flag in the ESI Label Extended Community attribute that is announced in tandem.
     </t>

      <t>  
     <figure align="center" anchor="esi_label_ext_comm">
        <!--
         <preamble>Preamble text - can be omitted or empty.</preamble>
          -->
       <artwork align="left"><![CDATA[
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type=0x06     | Sub-Type=0x01 | Flags(1 octet)|  Reserved=0   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Reserved=0   |          ESI Label                            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+]]></artwork>

     </figure>
     </t>


     <t> 
          The site-identifier value is globally unique within the deployments. 
          The RT-1 Ethernet A-D route along with (i) the MS-Border bit being 
          set in the ESI Label Extended Community and (ii) the per-VNI RT 
          Extended Community will enable all BGs be aware of all the other BGs
          in the network. All BGs are thus able to figure out other members in
          the same site, and armed with this information is able to run a
          Designated Forwarder (DF) election for BGs site and VNI scoped as
          against the traditional Ethernet segment DF election. In <xref target="dci_topology" />, nodes BG-A1, BG-A2, 
          BG-B1, BG-B2, BG-C1, and BG-C2, will announce the ESI Label and the 
          per-VNI RT Extended Communities. Nodes, BG-A1,
          and BG-A2, will perform a DF election for Site-A, whereas, nodes BG-B1, and BG-B2 will perform one 
          for site-B. Even though, all BG nodes 
          are able to see all the advertisements, the site-identifier scopes 
          the DF election (using RT-4 ES Routes) to its site members. This 
          specification uses the All-Active 
          Redundancy Mode specially when the Anycast model of route announcements 
          are used for the local routes.
     </t>

	<!-- 
        <t> 
          RT-1 A-D routes are advertised with mac-VRF and IP-VRF RTs depending on whether the VNI carried 
          is a mac-VRF VNI or an IP VRF VNI.
          After a Border Gateway is provisioned, Border A-D routes will re-originate EVPN routes 
          after some delay interval. This will provide sufficient time to learn Border A-D routes 
          from Border Gateways of different sites. Also, Border Gateways will not build VXLAN
          tunnels between same-site Border Gateway members.
        </t>
        -->


    </section>

    <section anchor="sec_ms_evpn_spec_bg_types"  title="Border Gateway Provisioning">

     <t> 
        Border Gateway nodes manage both the control-plane communications and
        the data forwarding plane for any inter-site traffic. Once BGs are 
        discovered (using RT-1 routes), any RT-2/RT-5 routes from other sites
        will be terminated and re-originated on such BGs. RT-2/RT-5 routes carry 
        downstream VNI labels. As BG discovery is agnostic to symmetric or 
        downstream VNI provisioning, rewriting next-hop attributes before 
        re-advertising these routes from other sites to a given site provides
        flexibility to keep different mac-VRF or IP-VRF to VNI mapping in 
        different sites and still able to interconnect L3 and L2 domains.
      </t>

      <t>
        RT-1, RT-3, and RT-4 from other sites will be terminated at the BGs. As
        has been defined in the specifications, RT-3 routes carry downstream VNI
        labels and will be used to pre-build VXLAN tunnels in the common EVPN 
        domain for L2, L3, and Multi-Destination traffic.  
      </t>
      

        <!-- This 
        can be perceived by intra-site nodes as multiple
        entry/exit points for inter-site traffic. For unknown unicast/multi-destination traffic, there must be a
        designated forwarder election mechanism to determine which node would
        perform the primary forwarding role at any given
        point in time, to ensure there is no 
        duplication of traffic for any given flow (see <xref target="sec_ms_evpn_spec_df_elect"/>).
        -->

    <section anchor="sec_ms_evpn_spec_df_elect"  title="Border Gateway Designated Forwarder Election">
    <t>
        In the presence of more than one BG nodes in a site, forwarding of 
        multi-destination L2 or L3 traffic both into the site and out of the 
        site needs to be carried out by a single node. This node is termed as
        a designated forwarder and elected per-VNI as per rules defined in 
        Section 8.5 of <xref target="RFC7432">RFC7432</xref>. RT-4 Ethernet 
        Segment routes are used for the DF election. In the multi-site deployment, 
        the RT-4 Ethernet Segment routes carry a ES-Import RT Extended 
        Community attribute with it. We need to enforce that these are imported
        to only the local site members when the ES-Import value matches with 
        its own value. The 6-byte values are generated using a concatenation of 
        the 4-byte AS number the member belongs, with the 2-bytes of site-identifier.
        As a result, only local site-members will match to form the candidate list.
        All the BGs are able to 
        extract the site identifier from this attribute and the list of nodes
        where this election is run is now constrained
        to the BGs between same site members. 

        <!-- 
        and this ensures that for the routes received from Border Gateways of different sites it will not
        trigger DF election for the local side. Identification of Border Gateways from other sides allows for local 
        site members to change the next-hop of Type-2/Type-5 routes as described in 
        <xref target="sec_ms_evpn_spec_route_proc"/> of this document.
        -->
    </t> 
       
	<t> In both modes
           (Anycast and Multipath), RT-3 routes will be generated locally and
            advertised by DF winner Border Gateway with unique gateway IP. This
            will facilitate building fast converging flood domain connectivity
            inter-site and intra-site and on same time avoiding duplicate 
            traffic by electing DF winner to forward multi-destination inter-site traffic.
        </t>

        <t>
        Failure events which lead to a BG losing all of its connectivity to the IP interconnect
        backbone should trigger the BG to withdraw
        its Border RT-4 Ethernet Segment route(s) and RT-1 A-D route, to indicate to other BG's of the same 
        site that it is no longer a candidate BG and to indicate BG's of different sites that it is no 
        longer a Border Gateway. 
    </t>


 </section>

    <section anchor="sec_ms_evpn_spec_aabg" title ="Anycast Border Gateway">
    <t>

	In this mode all BGs share same gateway IP and rewrite EVPN next-hop
        attributes with a shared logical next-hop entity. However, these BGs
        will maintain unique gateway IP to facilitate building IR trees from
        site-local nodes to forward Multi-Destination traffic. EVPN RT-2,
        RT-5 routes will be advertised to the nodes in the site from all 
        other BGs and BG will run DF election per VNI for Multi destination
        traffic. RT-3 routes will be advertised by the DF winner BG for a 
        given VNI so that only DF will receive and forward inter-site traffic.
        It is also possible to advertise and draw traffic by all BGs
        at a site to improve convergence properties of the network. In case 
        of multi-destination trees built by non-EVPN procedures (say PIM), 
        all BGs will receive but only DF winner will forward traffic. 
    </t>

    <!--
       <t> This mode is useful when there is no preference between different border-gateways to 
           forward traffic from different VNIs. Standard data plane hashing of VXLAN header will load balance traffic
           among Border Gateways.
      </t>
     -->

        <t>
           It is recommended that BG be enabled in the Anycast mode wherein the BG
           functionality is available to the rest of the network as a single logical
           entity for inter-site communication. In the absence of Anycast capability 
           the BG could be enabled as individual gateways (Single-Active BG)
           wherein a single node will perform the active BG role for a given flow at
           a given time. As of now, the Border Gateway system mac of the other border
           nodes belonging to the same site is expected to be configured out-of-band.
        </t>

    </section>


    <section anchor="sec_ms_evpn_spec_aabg1" title ="Multi-path Border Gateway">

	<t>
	In this mode, Border gateways will rewrite EVPN Next-hop attributes with unique next-hop entities. This provides
        flexibility to apply usual policies and 
        pick per-VRF, per-VNI or per-flow primary/backup border Gateways. Hence, an intra-site node will see each BG as a next-hop
        for any external L2 or L3 unicast destination, and would perform an ECMP path selection to load-balance traffic sent to
        external destinations. In case an intra-site node is not capable of performing ECMP hash based path-selection (possibly
        some L2 forwarding implementations), the node is expected to choose one of the BG's as its designated forwarder.
        EVPN RT-2, RT-5 routes will be advertised to the nodes in the site from all border gateways and Border gateway 
        will run DF election per VNI for 
        Multi destination traffic. 
        RT-3 routes will be advertised by DF winner Border gateway for a given VNI so that only DF will receive 
        and forward inter-site traffic. It is also possible to advertise and draw traffic by all  Border
        Gateways at a site to improve convergence properties of the network. In case of multi-destination trees 
        built by non-EVPN procedures (say PIM), all border gateways will receive but only DF winner will 
        forward traffic. 

 </t>

    </section>


    </section>


    <section anchor="sec_ms_evpn_spec_route_proc" title="EVPN route processing at Border Gateway">
    
       <t>
        BG functionality in an EVPN site SHOULD be enabled on more than one 
        node in the network for redundancy and high-availability purposes. 
        Any external 
        RT-2/RT-5 routes that are received by the BGs of a
        site are advertised to all the intra-site nodes by all the BGs. For 
        internal RT-2/RT-5 routes received by the BG's from the intra-site
        nodes, all the BGs of a site would advertise them to the remote BG's,
        so any L2/L3 known unicast traffic to internal destinations could be 
        sent to any one of the local BG's by remote sources. For known L2 and
        L3 unicast traffic, all of the individual BGs will behave either as 
        single logical forwarding node (Anycast model) or a set of active
        forwarding nodes. 
     </t>


         <t> 
                All control plane and data plane states are interconnected in a complete downstream
                fashion. For example, BGP import rules for a Type 3 route should be able to extend a 
                flood domain for a VNI and flood traffic destined to advertised EVPN node should 
                carry the VNI which is announced in Type 3 route. Similarly Type 2, Type 5 control 
                and forwarding states should be interconnected in a complete downstream fashion.

         </t>
	 		
	 <t><list style="symbols">	 		
		 		
	 <t> Route Target processing for RT-1 routes: Every IP-VRF and MAC-VRF
             will generate RT-1 with the format described in section 4.1. Route 
             targets can be auto derived from Ethernet Tag ID (VLAN ID) for that
             EVPN instance as described in section 7.10.1 of <xref target="RFC7432">RFC7432</xref>. ES import
             route target extended community as described in Section 7.6 of <xref target="RFC7432">RFC7432</xref> is optional
             for RT-1 routes in this context. ESI Label Extended Community Attribute is a MUST in this context, since it 
             carries the MS-Border notion as a new bit.
         </t>
         <t> Route Target processing for RT-4 routes: Every IP-VRF and MAC-VRF will
             generate RT-4 with the format described in section 4.1. Route targets can
             be auto derived from Ethernet Tag ID (VLAN ID) for that EVPN instance as
             described in Section 7.10.1 of <xref target="RFC7432">RFC7432</xref>.
             ES import route target extended community as described in Section 7.6 of <xref target="RFC7432">RFC7432</xref>
             is mandatory for RT-4 in this context. The encoding of ES-Import is
             based on AS number and Site-identifier as described in <xref target="sec_ms_evpn_spec_df_elect"/>. 
             Such import route target will
             allow import of RT-4 only to the Border gateways of same sites.
          </t>

          <t> Route Target processing for RT-2, RT-3, RT-5 routes: These routes
              will carry either auto-derived route targets (based on Ethernet Tag
              ID (VLAN ID) for that EVPN instance) or explicit route targets. 
              Border gateways usual import rules will imports these routes and
              re-advertise these with border gateway next hops.	Also the routes 
              which are imported at Border Gateways and re-advertised SHOULD 
              implement a mechanism to avoid looping of updates should they come
              back at Border Gateways. RT-3 routes will be imported and processed
              on border gateways from other border gateways but MUST NOT be advertised again. 			
	  </t>	 		
		 		
	 </list>
         </t>
        <t>

	  </t>

        <!--
        Additionally, RT-2/RT-5 EVPN routes will be rewritten with Border Gateway IP, Border Gateway 
        system mac as next-hop and re-advertised. Only EVPN routes received from discovered BGs
        with different site identifiers will be rewritten and re-advertised. This will avoid rewriting every
        EVPN update if BGs are also acting as Route reflector (RR) for site-local EVPN peering. 
        Also, this will help in interoperating MS-EVPN fabric with sites which do not have BG 
        functionality.
        -->


       <!-- We will check if these options need to be in the standard. For a later version of the 
            draft. 

	   <t> There are few mechanisms suggested below for re-advertising these
               inter-site routes to a site and provide connectivity of inter-site hosts and subnets. 
           </t>


    <t><list style="symbols">


    <t>  All routes everywhere : In this mode all inter-site EVPN Type2/Type5 routes are downloaded on 
         site-local leafs from Border Gateways. In other words, every leaf in the MS-EVPN fabric will have routes
         from every intra-site and inter-site leafs. This mechanism is best-fit for the scenarios where
         inter-site traffic is as voluminous as intra-site flow traffic. Also this mechanism preserves usual
         glean processing, silent host discovery and unknown traffic handling at the leafs.   
    </t>

    <t> 
        Default bridging and routing to Border Gateways : In this mode, all received inter-site EVPN
        Type 2/Type 5 routes will be installed only at Border Gateways and will not be advertised in the site.
        Border Gateways will inject Type 5 default routes to site-local nodes and avoid re-advertising 
        Type 2 from other sites. This mode provides scaling advantage by not downloading all inter-site 
        routes to every leaf in MS-EVPN fabric. This mechanism MAY require glean processing and unknown traffic
        handling to be tailored to provide efficient traffic forwarding.
    </t>


      <t> 
          Site-scope flow registry and discovery : This mechanism provides scaling advantage by downloading
          inter-site routes on-demand. It provides scaling advantages of default routing with out need to 
          tailor glean processing and unknown traffic handling at the leafs. Leafs will create on-demand flow
          registry on their border Gateways and based on this flow registry border gateways will advertise 
          RT-2 routes in a site. In other words, assuming that we have a trigger to send the EVPN routes that 
          are needed by the site for conversational learning from the Border Gateways, we can optimize on the 
          control plane state that is needed at the various leaf nodes. Hardware programming can be further 
          optimized based on actual conversations needed by the leaf, as opposed to to the ones needed by the
          site. We will describe a mechanism in the appendix with respect to ARP processing at the Border Gateway.
       </t>

     </list>
       </t>
      -->

       </section>

 

	<section anchor="sec_ms_evpn_spec_md_tree" title="Multi-Destination tree between Border Gateways">

	 <t> The procedures described here recommends building an Ingress Replication (IR) tree between Border Gateways. 
        This will facilitate every site to independently build site-specific Multi destination trees. 
        Multi-destination end-to-end trees between leafs could be PIM (site 1) + IR (between border Gateways) +
        PIM(site 2) or IR-IR-IR or PIM-IR-IR. However this does not rule out using IR-PIM-IR or end-to-end PIM 
        to build multi-destination trees end-to-end. </t>

	 <t> Border Gateways will generate RT-3 routes with unique gateway IP and advertise
             to Border Gateways of other sites.
             These RT-3 routes will help in building IR trees between border gateways. However,
             only DF winner per VNI will forward multi-destination traffic across sites.
        </t>

	 <t> As Border Gateways are part of both site-specific and inter-site Multi-destination IR trees, 
        split-horizon mechanism will be used to avoid loops. Multi-destination tree with Border gateway 
        as root to other sites (or Border-Gateways) will be in a separate horizon group. 
        Similarity Multi-destination IR tree with Border Gateway as root to site-local nodes 
        will be in another split horizon group. </t>

	 <t> If PIM is used to build Multi-Destination trees in site-specific domain, all Border gateway 
        will join such PIM trees and draw multi-destination traffic. However only DF Border Gateway will 
        forward traffic towards other sites. </t>
      </section>


  <section anchor="sec_ms_evpn_spec_ucast_traffic" title="Inter-site Unicast traffic">

	<t>
         As site-local nodes will see all inter-site EVPN routes via Border Gateways, VXLAN tunnels 
         will be built between
         leafs and site-local Border Gateways and Inter-site VXLAN tunnels will be built between Border gateways in 
         different sites. An end-to-end VXLAN bidirectional forwarding path between inter-site leafs will 
         consist of VXLAN tunnel from leaf (say Site A) to its Border Gateway (BG-A1), another VXLAN tunnel from 
         Border Gateway (BG-A1) to Border Gateway (BG-B1) in another site (say site B) and Border gateway (BG-B1)
         to leaf (in site B). Such an arrangement of tunnels is scalable as a full mesh of VXLAN tunnels across
         inter-site leafs is substituted
         by combination of intra-site and inter-site tunnels. 
        </t>

	<t> 
         L2 and L3 unicast frames from site-local leafs will reach border gateway using
         VXLAN encapsulation. At Border gateway, VXLAN header is stripped out and another VXLAN header is pushed to sent
         frames to destination site Border Gateway. Destination site Border gateway will strip off VXLAN header and push
         another VXLAN header to send frame to the destination site leaf. 
        </t>


  </section>
       
  <section anchor="sec_ms_evpn_spec_mbcast_traffic" title ="Inter-site Multi-destination traffic"> 

	<t> Multi-destination traffic will be forwarded from one site to other site only by DF
            for that VNI. As frames reach Border Gateway from site-local nodes, VXLAN header will 
            be decapsulated from the payload, and encapsulated with another VXLAN header (derived
            from downstream Type 3 EVPN routes received from the border gateways of the destination
            site) to forward the payload to the destination site border gateway. 
            Similarly destination site Border Gateway will strip off VXLAN header and forward the 
            payload after encapsulating with another VXLAN header towards the destination 
            leaf. 
        </t>

	<t> As explained in <xref target="sec_ms_evpn_spec_md_tree" />, split horizon mechanism 
            will be used to avoid looping of inter-site  multi-destination frames. 
        </t>
   </section>


   <section anchor="sec_ms_evpn_spec_host_mob" title="Host Mobility">
    <t>

	Host movement handling will be same as defined in <xref target="RFC7432">RFC7432</xref>. When host moves, 
        EVPN RT-2 routes with updated sequence number will be propagated to every EVPN node. When a host moves 
        inter-site, only Border gateways may see EVPN updates with both next-hop attributes and sequence number 
        changes and leafs may see updates only with updated sequence numbers. However in other cases, both Border
        gateway and leaves may see next-hop and sequence number changes.  </t>
   </section>

   </section>

   <section anchor="sec_ms_evpn_spec_converg" title ="Convergence">

     <section title="Fabric to Border Gateway Failure">

	 <t>
             If a Border Gateway is lost, Border gateway next-hop will be withdrawn for RT-2/RT-5 routes. 
             Also per-VNI DF election will be triggered to chose new DF. DF new winner will become forwarder 
             of Multi-destination inter-site traffic. 
         </t>
      </section>
		
 
      <section title="Border Gateway to Border Gateway Failures">
       <t>
                 In case where inter-site cloud has link failures, direct forwarding path between 
                 border gateways can be lost. In this case, traffic from one site can reach other site via 
                 border gateway of an intermediate site. However, this will be addressed like regular 
                 underlay failure and traffic terminations end-points will still stay same for inter-site
                 traffic flows.
       </t>
       </section>
   </section>
       

   <section anchor="sec_ms_evpn_spec_interop" title="Interoperability">

	<t> The procedures defined here are only for Border Gateways. Therefore other EVPN nodes in the network should 
     be <xref target="RFC7432">RFC7432</xref> compliant to operate in such topologies.</t>


	<t> As the procedures described here are applicable only after receiving Border A-D route, if other domains
        are connected which are not capable of such multi-site gateway model, they can work in regular EVPN mode. The 
        exact procedures will be detailed in a future version of the draft. </t> 

	<t> The procedures here provides flexibility to connect non-EVPN VXLAN sites by provisioning Border Gateways
	    on such sites and inter-connecting such Border Gateways by Border Gateways of other sites. Such Border Gateways
	    in non-EVPN VXLAN sites will play dual role of EVPN gateway towards common EVPN domain and non-EVPN gateway towards
	    non-EVPN VXLAN site.
	</t>

   </section>


   <section anchor="sec_ms_evpn_spec_fault_iso" title="Isolation of Fault Domains">
    <t>

 	Isolation of network defects requires policies like storm control, security ACLs etc to be implemented at
        site boundaries. Border gateways should be capable of inspecting inner payload of packets received 
        from VXLAN tunnels and enforce configured policies to prevent defects percolating from one part to rest
	of the network. 

    </t>
    </section>

<!-- COMMENT We will tackle this in a future version of the draft 
<section anchor="sec_ms_evpn_spec_loop_detect" title="Loop detection and Prevention">

       <t>
      Customer L2 network deploy some flavor of Spanning tree protocol (STP) to detect and prevent loops. Also Customer L2 segments deploy some form of multihoming to connect L2 segments to EVPN nodes or VTEPs. Such multihoming connectivity takes care of preventing L2 loops by multihoming mechanisms at the VTEPs. However misconfiguration or other unexpected events in the customer L2 segments can lead to inconsistent
connectivity to VTEPs leading to L2 loops. </t>

<t>
This specification leverages Type-2 encoding of ESI label extended community in Type-1 A-D route type as defined in <xref target="RFC7432">RFC7432</xref> to exchange STP root bridge information among VTEPs. When VTEPs discovers same STP root bridge from VTEPs which are not multihoming VTEP peers for a given L2 segment, it signals possibility of loop and forwarding engine prunes VNI from the server facing ports to cut down loop. As root bridge conflict across VTEPs is resolved, forwarding engine will reestablish VNI on the server facing ports.  

This mechanism can coexist with other mechanism like fast mac move detections and is recommended as additional protection to prevent L2 loops poised by inconsistent connectivity of customer L2 segments to L3 MS-EVPN fabric. </t>

<t>
Such route advertisement should be originated by every EVPN node and terminated at the border gateways. However if there is possibility of server facing L2 segments to be stretched across sites, such routes can be terminated and re-originated with out modifications to be received by every other EVPN node. This behavior is exception to usual guideline of terminating (and re-originating if required) all routes types at border gateway. However such exception will help in detecting loops if a customer L2 segment is inconsistently connected to VTEPs in different sites.

     </t>

    <t> 
       Also as defined in <xref target="sec_ms_evpn_spec_df_elect" /> border gateways
       uses mechanisms like Designated Forwarder and Split Horizon forwarding to prevent inter-site loops in this network. 
     </t>

     </section>

 -->
         
<section anchor="sec_ms_evpn_spec_mvpn" title="MVPN with Multi-site EVPN">

       <t>
         BGP based MVPN as defined in <xref target="RFC6513">RFC6513</xref> and <xref target="RFC6514">RFC6514</xref> 
         will coexist with Multisite-EVPN with out any changes in route types
         and encodings defined for MVPN route types in these RFCs. Route Distinguisher and VRF route import extended 
         communities will be attached to MVPN routes as defined in the BGP MVPN RFCs. Import and Export Route targets will 
         be attached to MVPN routes either by Auto-generating them from VNI or by explicit configuration per MVPN. Since,
         BGP MVPN RFC adapts to any VPN address family to provide RPF information to build C-Multicast trees, EVPN 
         route types will be used to provide required RPF information for Multicast sources in MVPNs. 

         In order to follow segmentation model of Multisite-EVPN, following procedures are recommended to build
         provider and customer multicast trees between sources and receivers across sites.
       </t>

          <section title="Inter-Site MI-PMSI">

	  <t> As defined in above mentioned MVPN RFCs, I-PMSI A-D routes are used to signal a provider tunnel or MI-PMSI per MVPN.
             Multisite-EVPN recommends EVPN Type-3 routes to build such MI-PMSI provider tunnel per VPN between 
             Border Gateways of different sites. Every MVPN node will use its unique router identifier to build
             these MI-PMSI provider tunnels. In Anycast Border gateway model also, these MI-PMSI provider tunnels
             are built using unique router identifier of Border gateways.

             In similar fashion, these Type-3 routes can be used to build MI-PMSI provider tunnel per MVPN with in sites.
          </t>
          </section>


         <section title="Stitching of customer multicast trees across sites">

	 <t>  All Border Gateways will rewrite next-hop and re-originate MVPN routes received from other
              sites to local site and from local site to other sites. Therefore customer Multicast trees will
              be logically built end-to-end across sites by stitching these trees via Border gateways. A 
              C-multicast join route (say Type 7 MVPN) will follow EVPN RPF path to build C-multicast tree 
              from leaf in a site to its Border gateway and to destination site leafs via destination 
              site Border Gateways. Similarly Source-Active A-D MVPN route (Type 5 MVPN) will be rewritten 
              with next-hop and re-originated via Border gateways so that source C-Multicast trees will 
              be stitched via Border gateways.
         </t>
         </section>
		   

         <section title="RP placement across sites">

	 <t> Multisite-EVPN recommends only Source C-Multicast trees across sites. Therefore Customer RP 
             placement per MVPN should be restricted with in sites. Source-Active A-D MVPN route type
             (Type 5) will be used to signal C-Multicast sources across sites. 
         </t>
         </section>

         <section title="Inter-Site S-PMSI">
	 <t> As defined in BGP MVPN RFCs, S-PMSI A-D routes (Type 3 MVPN) will be used to signal 
             selective PMSI trees for high bandwidth C-Multicast streams. These S-PMSI A-D routes will be 
             signaled across sites via Border gateways rewriting next-hop and re-originating them to other sites. 
             PMSI tunnel attribute in re-originated S-PMSI routes will be adjusted to the provide tunnel 
             types between Border gateways across sites.

         </t>
         </section>

</section>


<section anchor="sec_ms_evpn_limitation" title="Observations with Multi-site EVPN">
        <t>  Since an Anycast address is now advertised in the underlay protocols per ES, this solution does 
             increase the scale of routes for the underlay. Furthermore, the ES failures are now conveyed via
             the underlay protocols. To drop down to single homing mode, one would need to track the interfaces 
             that are used for the inter-site traffic. It is a requirement to not have intra-site and inter-site
             traffic use the same links from the nodes. Due to the anycast formulation of the gateways, it is 
             not possible to entertain any load-balancing per ES link for the gateway nodes.
         </t>
         
         <t> 
             Loop avoidance by the use of the domain-path-id as defined in
             <xref target="EVPN-IPVPN-INTERWORKING"></xref> will be detailed in a
             future version of the draft. 
         </t>

</section>


   <section anchor="Acknowledgements" title="Acknowledgements">
     <t>This authors would like to thank Max Ardica, Murali Garimella, 
        Anuj Mittal, Lilian Quan, 
        Veera Ravinutala, Tarun Wadhwa for 
        their review and comments.</t>
   </section>

   <!-- Possibly a 'Contributors' section ... -->

   <section anchor="IANA" title="IANA Considerations">
     <t>TBD.</t>

   </section>

   <section anchor="Security" title="Security Considerations">
          <t>TBD.</t>
   </section>
 </middle>

 <!--  *****BACK MATTER ***** -->

 <back>
   <!-- References split into informative and normative -->

   <!-- There are 2 ways to insert reference entries from the citation libraries:
    1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
    2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
       (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

    Both are cited textually in the same manner: by using xref elements.
    If you use the PI option, xml2rfc will, by default, try to find included files in the same
    directory as the including file. You can also define the XML_LIBRARY environment variable
    with a value containing a set of directories to search.  These can be either in the local
    filing system or remote ones accessed by http (http://domain/dir/... ).-->

   <references title="Normative References">
     <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?-->
     &RFC2119;
     &RFC7432;

       <reference anchor="DCI-OVERLAY"
                target="https://tools.ietf.org/html/draft-ietf-bess-dci-evpn-overlay-07">
       <front>
         <title>A Network Virtualization Overlay Solution using EVPN</title>

         <author>
           <organization>A. Sajassi et. al.</organization>
         </author>

         <date year="2018" />
       </front>
     </reference>

       <reference anchor="EVPN-IPVPN-INTERWORKING"
                target="https://tools.ietf.org/html/draft-rabadan-sajassi-bess-evpn-ipvpn-interworking-00">
       <front>
         <title>EVPN Interworking with IPVPN</title>

         <author>
           <organization>A. Sajassi et. al.</organization>
         </author>

         <date year="2018" />
       </front>
     </reference>


   </references>

   <references title="Informative References">
     <!-- Here we use entities that we defined at the beginning. -->

     &RFC6513;
     &RFC6514;
     &RFC7209;
     &RFC8365;

     <!-- A reference written by by an organization not a person. -->

     </references>

   <section anchor="app-additional" title="Additional Stuff">
     <t>TBD.</t>
   </section>

   <!-- Change Log

v00 2006-03-15  EBD   Initial version

v01 2006-04-03  EBD   Moved PI location back to position 1 -
                     v3.1 of XMLmind is better with them at this location.
v02 2007-03-07  AH    removed extraneous nested_list attribute,
                     other minor corrections
v03 2007-03-09  EBD   Added comments on null IANA sections and fixed heading capitalization.
                     Modified comments around figure to reflect non-implementation of
                     figure indent control.  Put in reference using anchor="DOMINATION".
                     Fixed up the date specification comments to reflect current truth.
v04 2007-03-09 AH     Major changes: shortened discussion of PIs,
                     added discussion of rfc include.
v05 2007-03-10 EBD    Added preamble to C program example to tell about ABNF and alternative 
                     images. Removed meta-characters from comments (causes problems).

v06 2010-04-01 TT     Changed ipr attribute values to latest ones. Changed date to
                     year only, to be consistent with the comments. Updated the 
                     IANA guidelines reference from the I-D to the finished RFC.  -->
 </back>
</rfc>
