<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wlin-bess-group-policy-id-extended-community-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="Group Policy ID BGP Extended Community">Group Policy ID BGP Extended Community</title>
    <seriesInfo name="Internet-Draft" value="draft-wlin-bess-group-policy-id-extended-community-00"/>
    <author initials="W." surname="Lin" fullname="Wen Lin">
      <organization>Juniper Networks</organization>
      <address>
        <email>wlin@juniper.net</email>
      </address>
    </author>
    <author initials="J." surname="Drake" fullname="John Drake">
      <organization>Juniper Networks</organization>
      <address>
        <email>jdrake@juniper.net</email>
      </address>
    </author>
    <date year="2022" month="October" day="20"/>
    <area>Routing</area>
    <workgroup>bess</workgroup>
    <keyword>Group Based Policy, BGP Extended Community</keyword>
    <abstract>
      <t>Group Based Policy can be used to achieve micro or macro segmentation of the user traffic. For Group Based Policy, a Group Policy ID, as known as Group Policy Tag, is used to represent a logical group that shares the same policy and access privilege. This specification defines a new BGP extended community that can be used to propagate Group Policy ID through a route advertisement in the control plane. This is to facilitate policy enforcement at the ingress node when the optimization of network bandwidth is desired.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
      <t>EVPN: Ethernet Virtual Private Networks, as per <xref target="RFC7432"/>.</t>
      <t>GBP: Group Based Policy</t>
      <t>VXLAN: Virtual Extensible LAN</t>
      <t>NVO: Network Virtualization Overlay</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In the virtualized overlay network where EVPN with VXLAN encapsulation is used
as the overlay solution, without external management software or controller,
the propagation of a Group Policy ID is done through the data plane.
The source Group Policy ID is encoded in the VXLAN header before the user traffic
is sent to the VXLAN tunnel.   The encoding format of a Group Policy ID in the
VXLAN header is specified in <xref target="I-D.smith-vxlan-group-policy"/>.</t>
      <t>When the source Group Policy ID is propagated through the data plane to the
remote VXLAN tunnel endpoint, the policy enforcement is carried out at the
egress node based on both the source and destination Group Policy tags.
The policy rule for the source and destination Group Policy Tags may result
in the traffic being dropped at the remote VXLAN tunnel endpoint which is the
egress node.  To send the traffic all the way from an ingress node and then
drop it at an egress node is an inefficient use of the network bandwidth.</t>
      <t>To optimizes the network bandwidth usage, it may be desirable to have policy
enforcement done at the head-end of a VXLAN tunnel that is the ingress node
for the user traffic. To accomplish this, there is a need to communicate the
destination Group Policy ID from the egress node to the ingress node.
This document defines a Group Policy ID BGP Extended Community that can be
used in the control plane to achieve the propagation of Group Policy ID from
an ingress node to an egress node.</t>
    </section>
    <section anchor="nvo-use-case">
      <name>NVO Use Case</name>
      <t>In an EVPN VXLAN overlay network, a policy group tag may be assigned based
on the MAC, IP, port, VLAN, etc, or a combination of the above.  Similar
to the MAC/IP addresses in the EVPN network, once the Policy Group ID is
known for a local host/server/VM attached to an EVPN network,
its Group Policy ID can be advertised to other Network Virtualization
Edge devices in the control plane through the Group Policy ID extended
community.  The scheme used for classification and allocation of Policy
Group IDs used for GBP in an EVPN overlay network with VXLAN encapsulation
is outside the scope of this document.</t>
      <t>Policy group tag prorogation in the EVPN/BGP control plane can be applied
to the EVPN type-2 MAC/IP route<xref target="RFC7432"/>, EVPN type-3 Ethernet Inclusive
Multicast route <xref target="RFC7432"/> or EVPN type-5 IP host and prefix route <xref target="RFC9136"/>.
If Policy Group ID is allocated for a MAC address, IP host or prefix
address through the GBP classification scheme, EVPN can encode its Group
Policy ID through the Group Policy ID extended community and advertise
it alongside its corresponding EVPN route.</t>
      <t>For the flows that the ingress VXLAN tunnel endpoint has learned its destination group policy tag through EVPN/BGP control plane signaling, the policy enforcement can be thus carried out right at the ingress node.  Otherwise, policy enforcement can be carried out at the egress node.  If policy enforcement is carried out at the head-end VXLAN tunnel, the ingress node MUST set the GBP applied bit, the A-bit as it is specified in <xref target="I-D.smith-vxlan-group-policy"/>, to 1 in the VXLAN header before forwarding the traffic to the VXLAN tunnel.  Otherwise, the ingress node set the A-bit to 0 in the VXLAN header.</t>
    </section>
    <section anchor="evpn-interworking-with-ipvpn">
      <name>EVPN Interworking with IPVPN</name>
      <t>In the EVPN interworking use case as it is specified in the <xref target="I-D.ietf-bess-evpn-ipvpn-interworking"/>, two or more EVPN networks/domains are interconnected by a layer 3 IP-VPN network with VPN-IPv4/VPN-IPv6 BGP address families. To support ingress policy enforcement, the Policy Group ID extended community needs to be propagated by the GW PEs sitting at the border of an EVPN domain and IP-VPN domain from one domain to another.</t>
      <t>For the Uniform-Propagation-Mode defined in the <xref target="I-D.ietf-bess-evpn-ipvpn-interworking"/>, when propagating an EVPN IP prefix route across the domain boundary to IP-VPN network, the Gateway PE SHOULD propagate communities, extended communities and large communities except for all the EVPN extended communities. The Policy Group ID extended community defined in this document is a new transitive Opaque Extend Community. It is not subject to stripping at the GW PE when the Uniform-Propagation-Mode is used.</t>
    </section>
    <section anchor="the-group-policy-id-extended-community">
      <name>The Group Policy ID Extended Community</name>
      <t>The Group Policy ID BGP Extended Community is a new transitive Opaque
Extended Community with a Type value of 0x03.  This extended community
may be advertised along with an EVPN type-2 MAC/IP route,
EVPN type-3 Ethernet Inclusive Multicast route, and EVPN type-5 IP prefix route.
This new Opaque Extended Community enables the EVPN route it attached to
propagate the Group Policy ID used for Group Based Policy in the control plane.</t>
      <t>When the "Uniformed-Propagation-Mode" is used under the EVPN and IPVPN interworking use case, the Group Policy ID extended community is carried over by the GW PE when a route for a given IP or IPv6 prefix is propagated from one domain to another with a different address family.</t>
      <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Type=0x03   |   Sub-Type    |           Reserved            |          
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|            Reserved           |    Group Policy ID            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      <t>Group Policy ID (GPI): The GPI field is 16-bit long and it encodes the value of a Group Policy ID.</t>
      <t>The reserved fields MUST be set to zero by the sender and ignored by the receiver.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests a codepoint value in the Sub-type registry of Type 0x03 Transitive Opaque Extended Community.</t>
      <artwork><![CDATA[
 Sub-Type     Name                                  Reference
 
 TBD          Group Policy ID Extended Community    [this document]
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>All the security considerations for BGP extended communities can be applied there.
Attackers may alter the value carried in a BGP extended community. In this case,
the Group Policy ID carried in the Group Policy ID field can be altered by attackers,
which could lead to the wrong policy rule being enforced on the user traffic.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Jeffrey Zhang, Jeff Haas for their careful review and
   valuable feedbacks.</t>
      <t>We also would like to thank Prasad Miriyala and Selvakumar Sivaraj for their contributions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7432" target="https://www.rfc-editor.org/info/rfc7432" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7432.xml">
          <front>
            <title>BGP MPLS-Based Ethernet VPN</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="A. Isaac" initials="A." surname="Isaac"/>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document describes procedures for BGP MPLS-based Ethernet VPNs (EVPN).  The procedures described here meet the requirements specified in RFC 7209 -- "Requirements for Ethernet VPN (EVPN)".</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7432"/>
          <seriesInfo name="DOI" value="10.17487/RFC7432"/>
        </reference>
        <reference anchor="RFC9136" target="https://www.rfc-editor.org/info/rfc9136" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9136.xml">
          <front>
            <title>IP Prefix Advertisement in Ethernet VPN (EVPN)</title>
            <author fullname="J. Rabadan" initials="J." role="editor" surname="Rabadan"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="W. Lin" initials="W." surname="Lin"/>
            <author fullname="A. Sajassi" initials="A." surname="Sajassi"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The BGP MPLS-based Ethernet VPN (EVPN) (RFC 7432) mechanism provides a flexible control plane that allows intra-subnet connectivity in an MPLS and/or Network Virtualization Overlay (NVO) (RFC 7365) network.  In some networks, there is also a need for dynamic and efficient inter-subnet connectivity across Tenant Systems and end devices that can be physical or virtual and do not necessarily participate in dynamic routing protocols.  This document defines a new EVPN route type for the advertisement of IP prefixes and explains some use-case examples where this new route type is used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9136"/>
          <seriesInfo name="DOI" value="10.17487/RFC9136"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.smith-vxlan-group-policy" target="https://www.ietf.org/archive/id/draft-smith-vxlan-group-policy-05.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.smith-vxlan-group-policy.xml">
          <front>
            <title>VXLAN Group Policy Option</title>
            <author fullname="Michael Smith" surname="Michael Smith">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Lawrence Kreeger" surname="Lawrence Kreeger">
              <organization>Arrcus, Inc.</organization>
            </author>
            <date day="22" month="October" year="2018"/>
            <abstract>
              <t>This document defines a backward compatible extension to Virtual eXtensible Local Area Network (VXLAN) that allows a Tenant System Interface (TSI) Group Identifier to be carried for the purposes of policy enforcement.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-smith-vxlan-group-policy-05"/>
        </reference>
        <reference anchor="I-D.ietf-bess-evpn-ipvpn-interworking" target="https://www.ietf.org/archive/id/draft-ietf-bess-evpn-ipvpn-interworking-07.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-ipvpn-interworking.xml">
          <front>
            <title>EVPN Interworking with IPVPN</title>
            <author fullname="J. Rabadan">
              <organization>Nokia</organization>
            </author>
            <author fullname="A. Sajassi">
              <organization>Cisco</organization>
            </author>
            <author fullname="E. Rosen">
              <organization>Individual</organization>
            </author>
            <author fullname="J. Drake">
              <organization>Juniper</organization>
            </author>
            <author fullname="W. Lin">
              <organization>Juniper</organization>
            </author>
            <author fullname="J. Uttaro">
              <organization>AT&amp;T</organization>
            </author>
            <author fullname="A. Simpson">
              <organization>Nokia</organization>
            </author>
            <date day="6" month="July" year="2022"/>
            <abstract>
              <t>EVPN is used as a unified control plane for tenant network intra and inter-subnet forwarding. When a tenant network spans not only EVPN domains but also domains where BGP VPN-IP or IP families provide inter-subnet forwarding, there is a need to specify the interworking aspects between BGP domains of type EVPN, VPN-IP and IP, so that the end to end tenant connectivity can be accomplished. This document specifies how EVPN interworks with VPN-IPv4/VPN-IPv6 and IPv4/IPv6 BGP families for inter-subnet forwarding. The document also addresses the interconnect of EVPN domains for Inter-Subnet Forwarding routes. In addition, this specification defines a new BGP Path Attribute called D-PATH (Domain PATH) that protects gateways against control plane loops. D-PATH modifies the BGP best path selection for multiprotocol BGP routes of SAFI 1, 128 and EVPN IP Prefix routes, and therefore this document updates [RFC4271].</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-bess-evpn-ipvpn-interworking-07"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
