/
i2rs i2rs

i2rs - PowerPoint Presentation

celsa-spraggs
celsa-spraggs . @celsa-spraggs
Follow
384 views
Uploaded On 2015-11-05

i2rs - PPT Presentation

Usecases for BGP draft keyupatei2rsbgpusecases01txt Keyur Patel Rex Fernando Hannes Gredler Shane Amante Russ White Sue Hares Motivation IRS provides an alternative way to control and interact with routing protocols ID: 183416

protocol bgp i2rs routes bgp protocol routes i2rs configuration route control cases provide routers events controllers monitoring command overlapping

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "i2rs" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

i2rs Usecases for BGP

draft-keyupate-i2rs-bgp-usecases-01.txt

Keyur Patel, Rex Fernando,

Hannes

Gredler

, Shane

Amante

, Russ White,

Sue HaresSlide2

Motivation

IRS provides an alternative way to control and interact with routing protocolsProtocol O

peration

Route Manipulation

Protocol diagnosis

Protocol Events

Filtering of overlapping BGP Traffic Engineering Routes

Control and Interaction through the use of well-known and standardized programmatic interfacesSlide3

Scope

i2rsDoes NOT intend to replace any existing configuration mechanismsDoes NOT intend to replace any existing protocol mechanisms

BGP

Document community’s understanding how i2rs can be used in context of BGPSlide4

Current Draft Status

Version 1 has merged BGP use cases from draft-keyupate-i2rs-bgp-usecases-00 and draft-white-i2rs-use-cases-00 as per WG’s feedbackVersion 1 has removed BGP Protocol Configuration and Policy Configuration as

per WG’s

feedback

Authors would like to request for WG adoptionSlide5

BGP Use Cases – Version 01

Registering BGP Protocol Operations

Error notifications for Internal BGP neighbors

Performing BGP Route Manipulation

Customized Best Paths

Flowspec

Routes

RT Constraint for Legacy routers

Optimized Exit Control

Registering BGP protocol Events

Notification of Routing Events

Tracing of Dropped BGP Routes

BGP Protocol Statistics

Identify and Remove overlapping (TE) routesSlide6

BGP Use Cases – BGP Protocol Operation

Errors reported by BGP protocol within an ASErrors reported by any EBGP Peers

Current BGP protocol

e

rror reporting is done using router debugs and

syslogs

i2rs Controllers provide centralize command control to report and react against BGP protocol ErrorsSlide7

BGP Use Cases – BGP Route Manipulation

Customize Best Path Selection allows custom bestpath computations

Usually done using BGP

cost communities

Flowspec

address family is used to disseminate the traffic flow specifications

RT Constrain for legacy Routers

Optimized Exit Control is used to provide route optimization and efficient load distribution

Current BGP Route manipulations are either done on routers or through some

propietary

orchestrators

i2rs

Controllers provide centralize command and control to push appropriate cost communities,

flowspec

routes, RT Filter routes on behalf of legacy

routers, manipulate route parameters

i2rs controllers can provide centralize monitoring for

Flowspec

routes and/or traffic flowsSlide8

BGP Use Cases – BGP Protocol Events

Monitoring announcements and withdrawals of high visibility BGP routesMonitoring dampening of high visibility BGP RoutesMonitoring filtering of BGP prefixes by policies, errors, etc.

Monitoring Protocol statistics

Neighbor based statistics

Route

Statistics

Currently, BGP protocol events are tracked though router debugs on routers or using automated scripts

i2rs Controllers provide central command and control to monitor protocol eventsSlide9

BGP Use Cases – Removing Overlapping Routes

Monitoring BGP ADJ-RIB-IN and identify overlapping routes that can be safely removedInsert filtering rules to remove or invalidate them

Currently, BGP protocol routes are either monitored manually or using automated scripts

i2rs Controllers provide central command and control to manipulate such BGP RoutesSlide10

Questions?Slide11

BGP Use Cases – BGP Configuration

Protocol ConfigurationLocal BGP protocol configuration

Local BGP neighbor configuration

BGP Policy Configuration (Generic)

Avoid Unwanted Route Announcements (Generic Filters)

Facilitate Route Summarization

Defensive Security. Filter non-customer routers from stub

customers

Current BGP configuration is done using CLI, XML or NETCONF

IRS Controllers provide centralize command control to push BGP Configurations