<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wlin-bess-group-policy-id-extended-community-03" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Group Policy ID BGP Extended Community">Group Policy ID BGP Extended Community</title>
    <seriesInfo name="Internet-Draft" value="draft-wlin-bess-group-policy-id-extended-community-03"/>
    <author initials="W." surname="Lin" fullname="Wen Lin">
      <organization>Juniper Networks</organization>
      <address>
        <email>wlin@juniper.net</email>
      </address>
    </author>
    <author initials="J." surname="Drake" fullname="John Drake">
      <organization>Individual</organization>
      <address>
        <email>je_drake@yahoo.com</email>
      </address>
    </author>
    <author initials="D." surname="Rao" fullname="Dhananjaya Rao">
      <organization>Cisco Systems</organization>
      <address>
        <email>dhrao@cisco.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="20"/>
    <area>Routing</area>
    <workgroup>bess</workgroup>
    <keyword>Group Based Policy, BGP Extended Community</keyword>
    <abstract>
      <?line 43?>

<t>Group Based Policy can be used to achieve micro or macro segmentation of user traffic. For Group Based Policy, a Group Policy ID, also known as Group Policy Tag, is used to represent a logical group that shares the same policy and access privilege. This specification defines a new BGP extended community that can be used to propagate Group Policy ID through a BGP route advertisement in the control plane. This is to facilitate policy enforcement at the ingress node when the optimization of network bandwidth is desired.</t>
    </abstract>
  </front>
  <middle>
    <?line 47?>

<section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
      <t>EVPN: Ethernet Virtual Private Networks, as per <xref target="RFC7432"/>.</t>
      <t>GBP: Group Based Policy</t>
      <t>VXLAN: Virtual Extensible LAN</t>
      <t>NVO: Network Virtualization Overlay</t>
      <t>NVE: Network Virtualization Edge</t>
      <t>DCI: Data Center Interconnect</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In the virtualized overlay network where EVPN with VXLAN encapsulation is used
as the overlay solution, without external management software or controller,
the propagation of a Group Policy ID is done through the data plane.
The source Group Policy ID is encoded in the VXLAN header before the user traffic
is sent to the VXLAN tunnel.   The encoding format of a Group Policy ID in the
VXLAN header is specified in <xref target="I-D.smith-vxlan-group-policy"/>.</t>
      <t>When the source Group Policy ID is propagated through the data plane to the
remote VXLAN tunnel endpoint, the policy enforcement is carried out at the
egress node based on both the source and destination Group Policy tags.
The policy rule for the source and destination Group Policy tags may result
in the traffic being dropped at the remote VXLAN tunnel endpoint which is the
egress node.  To send the traffic all the way from an ingress node and then
drop it at an egress node is an inefficient use of the network bandwidth.</t>
      <t>To optimize the network bandwidth usage, it may be desirable to have policy
enforcement done at the head-end of a VXLAN tunnel that is the ingress node
for the user traffic. To accomplish this, there is a need to communicate the
destination Group Policy ID from the egress node to the ingress node.
This document defines a Group Policy ID BGP Extended Community that can be
used in the control plane to achieve the propagation of Group Policy ID from
an egress node to an ingress node.</t>
    </section>
    <section anchor="nvo-use-case">
      <name>NVO Use Case</name>
      <t>In an EVPN VXLAN overlay network, a policy group tag may be assigned based
on the MAC, IP, port, VLAN, etc, or a combination of the above.  Similar
to the MAC/IP addresses in the EVPN network, once the Policy Group ID is
known for a local host/server/VM attached to an EVPN network,
its Group Policy ID can be advertised to other Network Virtualization
Edge devices in the control plane through the Group Policy ID extended
community.  The scheme used for classification and allocation of Policy
Group IDs used for GBP in an EVPN overlay network with VXLAN encapsulation
is outside the scope of this document.</t>
      <t>Policy group tag propagation in the EVPN/BGP control plane can be applied
to the EVPN type-2 MAC/IP route<xref target="RFC7432"/>, EVPN type-3 Ethernet Inclusive
Multicast route <xref target="RFC7432"/> or EVPN type-5 IP host and prefix route <xref target="RFC9136"/>.
If Policy Group ID is allocated for a MAC address, IP host or prefix
address through the GBP classification scheme, EVPN can encode its Group
Policy ID through the Group Policy ID extended community and advertise
it alongside its corresponding EVPN route.</t>
      <t>For the flows that the ingress VXLAN tunnel endpoint has learned its destination group policy tag through EVPN/BGP control plane signaling, the policy enforcement can be thus carried out right at the ingress node.  Otherwise, policy enforcement can be carried out at the egress node.  If policy enforcement is carried out at the head-end VXLAN tunnel, the ingress node MUST set the GBP applied bit, the A-bit as it is specified in <xref target="I-D.smith-vxlan-group-policy"/>, to 1 in the VXLAN header before forwarding the traffic to the VXLAN tunnel.  Otherwise, the ingress node sets the A-bit to 0 in the VXLAN header.</t>
    </section>
    <section anchor="interconnecting-multiple-evpn-vxlan-domains">
      <name>Interconnecting multiple EVPN VXLAN domains</name>
      <t>EVPN VXLAN based deployments may comprise of multiple EVPN networks, domains or sites.
In such cases, a VXLAN overlay may extend from an ingress node to an egress node across different domains;
or it may be divided into multiple stitched overlay segments that are interconnected via DCI through gateway devices.</t>
      <t>In this document, we simply refer to each EVPN network or site as a EVPN domain or domain for short unless it 
is explicitly specified otherwise.</t>
      <t>From a control plane point of view, 
border GWs in each domain may learn routes of other domains either via direct peering sessions 
or via a set of external route reflectors.</t>
      <t>In such deployments, the allocation and management of Group Policy IDs may be done 
independently in different domains, and consequently the allocated values scoped to each domain. 
Therefore, when a group policy tag is signaled with routes to a different domain, the tag 
needs to be translated to a value local to the receiving domain before it can be 
used in a group based policy at an ingress node in that domain.</t>
      <t>A domain may receive routes from multiple sender domains. In order to facilitate simpler and 
flexible application of translation policies regardless of the deployed overlay design or 
control plane peering model, the advertised Policy ID may also carry with it a Scope, which 
identifies the allocation domain. Any suitable BGP node in the route distribution path can 
then consistently translate a received Policy ID based on the scope.</t>
      <t>Scope assignment is done by the administrator or orchestration system managing the multi-domain 
deployment. The exact mechanism is out of the purview of this document.</t>
    </section>
    <section anchor="evpn-interworking-with-ipvpn">
      <name>EVPN Interworking with IPVPN</name>
      <t>In the EVPN interworking use case as it is specified in the <xref target="I-D.ietf-bess-evpn-ipvpn-interworking"/>, two or more EVPN networks/domains are interconnected by a layer 3 IP-VPN network with VPN-IPv4/VPN-IPv6 BGP address families. To support ingress policy enforcement, the Policy Group ID extended community needs to be propagated by the GW PEs sitting at the border of an EVPN domain and IP-VPN domain from one domain to another.</t>
      <t>For the Uniform-Propagation-Mode defined in the <xref target="I-D.ietf-bess-evpn-ipvpn-interworking"/>, when propagating an EVPN IP prefix route across the domain boundary to IP-VPN network, the Gateway PE SHOULD propagate communities, extended communities and large communities except for all the EVPN extended communities. The Policy Group ID extended community defined in this document is a new transitive Opaque Extend Community. It is not subject to stripping at the GW PE when the Uniform-Propagation-Mode is used, and SHOULD be propagated.</t>
    </section>
    <section anchor="the-group-policy-id-extended-community">
      <name>The Group Policy ID Extended Community</name>
      <t>The Group Policy ID BGP Extended Community is a new transitive Opaque
Extended Community with a Type value of 0x03.  This extended community
may be advertised along with an EVPN type-2 MAC/IP route,
EVPN type-3 Ethernet Inclusive Multicast route, and EVPN type-5 IP prefix route.
This new Opaque Extended Community enables the EVPN route it is attached to
propagate the Group Policy ID used for Group Based Policy in the control plane.</t>
      <t>When the "Uniformed-Propagation-Mode" is used under the EVPN and IPVPN interworking use case, the Group Policy ID extended community is carried over by the GW PE when a route for a given IP or IPv6 prefix is propagated from one domain to another with a different address family.</t>
      <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Type=0x03   |   Sub-Type    |        Policy ID Scope        |          
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|            Reserved           |    Group Policy ID            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      <t>Policy ID Scope:  The Policy ID Scope field is 16-bit long, and is an optional field.</t>
      <t>Group Policy ID (GPI): The GPI field is 16-bit long and it encodes the value of a Group Policy ID.</t>
      <t>The reserved fields MUST be set to zero by the sender and ignored by the receiver.</t>
      <t>If the Policy ID Scope is not set, 
any EVPN VXLAN NVE node that receives a route with a Group Policy ID may use the received value as is.
If the Scope is set, a node that has the same locally configured Scope in the received route may use the 
received Policy ID value. A node that has a different local Scope than in the received route may need 
to translate the received Policy ID to a locally assigned value.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>For the Group Policy ID extended community defined in this document, IANA has allocated the
following codepoint in the Sub-type registry of Type 0x03 Transitive Opaque Extended Community.</t>
      <artwork><![CDATA[
 Sub-Type     Name                                  Reference
 
 0x17         Group Policy ID Extended Community    [this document]
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>All the security considerations for BGP extended communities can be applied there.
Attackers may alter the value carried in a BGP extended community. In this case,
the Group Policy ID carried in the Group Policy ID field can be altered by attackers,
which could lead to the wrong policy rule being enforced on the user traffic.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Jeffrey Zhang, Jeff Haas for their careful review and
   valuable feedbacks.</t>
      <t>We also would like to thank Prasad Miriyala and Selvakumar Sivaraj for their contributions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7432" target="https://www.rfc-editor.org/info/rfc7432" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7432.xml">
          <front>
            <title>BGP MPLS-Based Ethernet VPN</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="A. Isaac" initials="A." surname="Isaac"/>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document describes procedures for BGP MPLS-based Ethernet VPNs (EVPN). The procedures described here meet the requirements specified in RFC 7209 -- "Requirements for Ethernet VPN (EVPN)".</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7432"/>
          <seriesInfo name="DOI" value="10.17487/RFC7432"/>
        </reference>
        <reference anchor="RFC9136" target="https://www.rfc-editor.org/info/rfc9136" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9136.xml">
          <front>
            <title>IP Prefix Advertisement in Ethernet VPN (EVPN)</title>
            <author fullname="J. Rabadan" initials="J." role="editor" surname="Rabadan"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="W. Lin" initials="W." surname="Lin"/>
            <author fullname="A. Sajassi" initials="A." surname="Sajassi"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The BGP MPLS-based Ethernet VPN (EVPN) (RFC 7432) mechanism provides a flexible control plane that allows intra-subnet connectivity in an MPLS and/or Network Virtualization Overlay (NVO) (RFC 7365) network. In some networks, there is also a need for dynamic and efficient inter-subnet connectivity across Tenant Systems and end devices that can be physical or virtual and do not necessarily participate in dynamic routing protocols. This document defines a new EVPN route type for the advertisement of IP prefixes and explains some use-case examples where this new route type is used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9136"/>
          <seriesInfo name="DOI" value="10.17487/RFC9136"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.smith-vxlan-group-policy" target="https://datatracker.ietf.org/doc/html/draft-smith-vxlan-group-policy-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.smith-vxlan-group-policy.xml">
          <front>
            <title>VXLAN Group Policy Option</title>
            <author fullname="Michael Smith" initials="M." surname="Smith">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Larry Kreeger" initials="L." surname="Kreeger">
              <organization>Arrcus, Inc.</organization>
            </author>
            <date day="22" month="October" year="2018"/>
            <abstract>
              <t>This document defines a backward compatible extension to Virtual eXtensible Local Area Network (VXLAN) that allows a Tenant System Interface (TSI) Group Identifier to be carried for the purposes of policy enforcement.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-smith-vxlan-group-policy-05"/>
        </reference>
        <reference anchor="I-D.ietf-bess-evpn-ipvpn-interworking" target="https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-ipvpn-interworking-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-ipvpn-interworking.xml">
          <front>
            <title>EVPN Interworking with IPVPN</title>
            <author fullname="Jorge Rabadan" initials="J." surname="Rabadan">
              <organization>Nokia</organization>
            </author>
            <author fullname="Ali Sajassi" initials="A." surname="Sajassi">
              <organization>Cisco</organization>
            </author>
            <author fullname="Eric C. Rosen" initials="E. C." surname="Rosen">
              <organization>Individual</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Independent</organization>
            </author>
            <author fullname="Wen Lin" initials="W." surname="Lin">
              <organization>Juniper</organization>
            </author>
            <author fullname="Jim Uttaro" initials="J." surname="Uttaro">
              <organization>AT&amp;T</organization>
            </author>
            <author fullname="Adam Simpson" initials="A." surname="Simpson">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>Ethernet Virtual Private Network (EVPN) is used as a unified control plane for tenant network intra and inter-subnet forwarding. When a tenant network spans not only EVPN domains but also domains where BGP VPN-IP or IP families provide inter-subnet forwarding, there is a need to specify the interworking aspects between BGP domains of type EVPN, VPN-IP and IP, so that the end to end tenant connectivity can be accomplished. This document specifies how EVPN interworks with VPN-IPv4/VPN-IPv6 and IPv4/IPv6 BGP families for inter-subnet forwarding. The document also addresses the interconnect of EVPN domains for Inter-Subnet Forwarding routes. In addition, this specification defines a new BGP Path Attribute called D-PATH (Domain PATH) that protects gateways against control plane loops. D-PATH modifies the BGP best path selection for multiprotocol BGP routes of SAFI 128 and EVPN IP Prefix routes, and therefore this document updates the BGP best path selection in [RFC4271], but only for IPVPN and EVPN families.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-bess-evpn-ipvpn-interworking-09"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
