<?xml version='1.0' encoding='ascii'?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc compact="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes" ?>
<?rfc toc="yes" ?>
<rfc category="std" docName="draft-saum-evpn-lsp-ping-extension-05" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="Evpn Mpls Ping Extension">EVPN Mpls Ping Extension</title>
    <author fullname="Saumya Dikshit" initials="S" surname="Dikshit">
      <organization abbrev="Aruba, HPE">Aruba Networks, HPE</organization>
      <address>
        <postal>
          <street>Mahadevpura</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code>560 048</code>
          <country>India</country>
        </postal>
        <email>saumya.dikshit@hpe.com</email>
      </address>
    </author>
    <author fullname="Gyan Mishra" initials="G" surname="Mishra">
      <organization abbrev="Verizon Inc.">Verizon Inc.</organization>
      <address>
        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </author>
    <author fullname="Srinath Rao" initials="S" surname="Rao">
      <organization abbrev="Aruba, HPE">Aruba Networks, HPE</organization>
      <address>
        <email>srinath.krishnarao@hpe.com</email>
      </address>
    </author>
    <author fullname="Santosh Easale" initials="S" surname="Easale">
      <organization abbrev="Aruba, HPE">Aruba Networks, HPE</organization>
      <address>
        <email>santosh.easale@hpe.com</email>
      </address>
    </author>
    <author fullname="Ashwini Dahiya" initials="A" surname="Dahiya">
      <organization abbrev="Aruba, HPE">Aruba Networks, HPE</organization>
      <address>
        <email>ashwini.dahiya@hpe.com</email>
      </address>
    </author>
    <date day="22" month="May" year="2024"/>
    <area>General</area>
     <workgroup>BESS WG</workgroup>
    <keyword>RFC</keyword>
    <keyword>Request for Comments</keyword>
    <keyword>I-D</keyword>
    <keyword>Internet-Draft</keyword>
    <keyword>XML</keyword>
    <keyword>Extensible Markup Language</keyword>
    <abstract>
     <t>In an EVPN or any other VPN deployment, there is an urgent need to tailor the reachability checks of the client nodes via off-box tools which can be triggered from a remote Overlay end-point or a centralized controller. There is also a ease of operability needed when the knowledge known is partial or incomplete. This document aims to address the limitation in current standards for doing so and provides solution which can be made standards in future. As an additional requirement, in network border routers, there are liaison/dummy VRFs created to leak routes from one network/fabric to another. There are scenarios wherein an explicit reachability check for these type of VRFs is not possible with existing mpls-ping mechanisms. This draft intends to address this as well. Few of missing pieces are equally applicable to the native lsp ping as well.</t>
    </abstract>
  </front>
  <middle>
    <!--IMPORTANT TERMS -->
    <section anchor="imp_terms" title="Important Terms" toc="default">
     <t>VTEP: Virtual Tunnel End Point or Vxlan Tunnel End Point</t>
     <t>RD: Route Distinguisher</t>
     <t>RT: Route Target</t>
     <t>LSP: Label Switched Path</t>
     <t>LER: Label Edge Router</t>
     <t>LSR: Label Switch Router</t>
     <t>NLRI: Network Layer Reachability Information</t>
     <t>EVPN: Etherenet Virtual Private Network</t>
    </section>
    <!--IMPORTANT TERMS ENDS -->
    <!--INTRODUCTION BEGINS -->
    <section anchor="intro" title="Introduction" toc="default">
     <t>In an EVPN or any other VPN deployment, there is an urgent need to tailor the reachability checks of the client nodes via off-box tools which can be triggered from a remote Overlay end-point or a centralized controller and also customize check if the knowledge known is partial or incomplete. This document aims to address the limitation in current standards for doing so and provides solution which can be made standards in future. As an additional requirement, in network border routers, there are liaison/dummy VRFs created to leak routes from one network/fabric to another. There are scenarios wherein an explicit reachability check for these type of VRFs is not possible with existing mpls-ping mechanisms. This draft intends to address this as well.</t>
    </section>
    <!--INTRODUCTION ENDS -->
    <!--REQUIREMENTS LANGUAGE BEGINS -->
    <section anchor="req_language" title="Requirements Language" toc="default">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119" pageno="false" format="default"/>.</t>
        <t>When used in lowercase, these words convey their typical use in common language, and they are not to be interpreted as described in <xref target="RFC2119" pageno="false" format="default"/>.</t>
      </section>
    <!--REQUIREMENT LANGUAGE ENDS -->
    <!--PROBLEM DESCRIPTION BEGINS -->
    <section anchor="problem" title="Problem Description" toc="default">
     <t>This document intends to solve multiple problems, all related to ease of serviceability, troubleshooting and provisioning. In a nut shell, the solution eases out the network management of overlay network with MPLS fabric for network operators and end-users. the following subsections detail out the problems at hand.</t>
     <!--PROBLEM1 BEGINS -->
     <section anchor="problem1" title="EVPN NLRI is a Complex String" toc="default">
      <t>For overlays like EVPN, where the NLRI key is complex to remember; the OAM ping (access) to a NLRI, may be difficult to achieve by providing the exact prefix key. For example, an EVPN NLRI index consists of list of following parameters, which typically are combined to be treated as long string index, comprising of, Route Type, RD, Ethernet Segment Index (ESI), Ethernet-Tag, IP-prefix, MAC-IP. Instead it will be easier, if the administrator remembers few or significant of the above information and remaining can be sent as wild-card or dont care values. For example, the OAM trigger for LSP-ping for a host 10.10.10.1 to a remote tunnel endpoint referred by IP address 1.1.1.1, can be initiated a combination of Route-Distinguisher, Ethernet Segment Index and Ethernet tag as wild card values, thus simplifying the OAM procedures.</t><t>The complex string problem is generic in nature and is applicable to other attributes like FEC, thus making this enhancement useful for underlay mpls ping as well.</t>
      <!--PROBLEM1 FEC BEGINS -->
      <section anchor="problem1-fec" title="FEC is a Complex String too" toc="default">
       <t>The complex string is similar to FEC carried in the ping packet. For example, RSVP IPv4 FEC carries attributes to complete the traffic engineering tuple index. While remembering the complete information may not be trivial for the operator. Hence partial information like Tunnel-ID and Destination IP address may be significant ones which can achieve the same check.</t>        
      </section>
      <!--PROBLEM1 FEC ENDS-->
     </section>
     <!--PROBLEM1 ENDS -->
     <!--PROBLEM2 BEGINS -->
     <section anchor="problem2" title="Partial Validation Support" toc="default">
      <t>The current set of OAM standards are built around validating the co-relation of control plane and dataplane information. For example, set of same-prefixes which are published by more than two external border routers, only one of them may make it to the Routing table of other routers (receiving these routes).<list style="symbols"><t>The remote OAM check may want to check all the routes published into the routing table or may want to check all the routes in the protocol fib.</t><t>This selective mechanism to fetch information is not supported for Overlays via standard OAM methods.</t></list></t> <t>As mentioned above, the choice of validating control plane and dataplane for an NLRI ping is not in place in the EVPN( or any Overlay) OAM specifications <xref target="I-D.draft-ietf-bess-evpn-lsp-ping"/>. When the routing data is huge, and the control plane protocol are in the middle of churn, it is difficult to ascertain if the remote network in remote site is in steady state or not. An overlay ping is should help validate only the data plane and forgo any control plane validation, so that the control plane churn is not adding to the CPU cycles for the routing or OAM entities like processes and daemons running on the remote vteps.</t><t>To extend this problem state further, when admin access to vtep (in a non-local operator domain) is not possible, control plane information can be obtained by leveraging the control plane options only. Thus providing a side-view of the protocol rib on the remote device.</t><t>This problem is also generic in nature and not restricted to EVPN or any other VPN NLRI per-se. Hence equally applicable to underlay or transport LSPs.</t>
      </section>
      <!--PROBLEM2 ENDS-->
      <!--PROBLEM3 BEGINS -->
      <section anchor="problem3" title="Reachability to Liaison VRFs" toc="default">
       <t>In a typical VPN deployments between branch offices, or a Datacenter deployment in an enterprise, be it MPLS or Vxlan fabric, the border routers of the fabric cater to terminating or relaying of multi-tenancy across fabric. That is, border routers are provisioned with routing and/or bridging-domains for clients while also extending it beyond the geography or site. The border routers are provisioned with stitching of inter-site tunnels/Overlays.</t>
       <t>To simplify configuration and provisioning of overlays, a dedicated VRF is created to ensure all routes learnt from external network (from various client VRFs) over, lets say, BGP-MPLS L3VPN peering, can be de-multiplexed or leaked into a single VRF which is leveraged as a dedicated VRF for learnings from external network. This VRF is used by the intra fabric constructs as a client VRF. For example, in a Vxlan fabric, this is vrf is one of the tenant VRFs which a rightful mapping to EVPN constructs like EVI( for example VNI). This client VRF does not require any interface configuration, as the purpose of this VRF is to act as a liaison for the external routes.</t>
       <t>Since there is no ip address( layer 3 interface) configured on this VRF, its not possible to check the state of the VRF on the border router via OAM methods. The state of VRF can be defined as following <list style="symbols"><t>Working Configuration that is, VRF is operationally and administratively UP and WORKING </t><t>Network Reachability, that is, VRF is reachable via remote fabric routers like Vteps or LSR or LER routers</t><t>Existing OAM tools DO NOT provide enough ammunition to address this use case.</t></list></t>
       <t>If there is no route leaked into the VRF, the BR will not form a tunnel with any other Vtep in the site. Hence an OAM check to reach out to the VRF will not work even though the VRF is up and working.</t>
      </section>
      <!--PROBLEM3 ENDS-->
    </section>
    <!--PROBLEM DESCRIPTION ENDS -->
    <!--SOLUTION BEGINS -->
    <section anchor="solution" title="Solution(s)" toc="default">
     <t>The EVPN extension for MPLS OAM is being driven by  <xref target="I-D.draft-ietf-bess-evpn-lsp-ping"/>, and does not resolves the problem mentioned above.</t>
     <t>This document proposes a three new TLVs which an Overlay OAM PDU like mpls ping, that can carry to fill up the gap with the rightful or optimal information to the remote tunnel end points <list style="symbols"><t>dont care option</t><t>mode of validation</t><t>liaison vrf information.</t></list></t><t>These PDUs are described for an MPLS EVPN fabric, but can be generalized for any EVPN fabric per se<list style="symbols"><t>Wild Card List TLV</t><t>Validation TLV</t><t>EVI Sub Tlv</t></list></t>
    <!--WILD CARD TLV BEGINS -->
    <section anchor="WildCard" title="Wild Card Tlv" toc="default">
     <t>The Wild Card Tlv addresses the problem described in section <xref target="problem1" pageno="false" format="default"/>.<list style="format (%d)"><t>It Carries the information regarding the fields (TLVs or sub TLVs), which need to be ignored on processing in mpls lsp ping PDU.</t><t>For example, if an OAM ping to a prefix does not requires any RD (Route-Distinguisher) validation, then RD value, to be carried in IP prefix TLV; can be indicated as wild-card (dont care).<list style="symbols"><t> The control-plane validation of the lsp-ping then should ignore the RD value in the TLV, and respond back as success even if there is atleast one NLRI which complies with other attributes (not set as wild card).</t></list></t></list></t>    
    <!--WILD CARD TLV DESCRIPTION BEGINS -->
    <section anchor="WildCardDescription" title="Description" toc="default">
     <t>The following diagram shows the wild-card list TLV and the following table, describe the fields, followed by the receive side processing</t>
     <figure title="Figure 1: WILD CARD TLV" suppress-title="false" align="left" alt="" width="" height="">
      <artwork xml:space="preserve" name="" type="" align="left" alt="" width="" height="">

        0              1               2               3               4
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |        Type   |    Length       |       Sub-TLV Type          |                 
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |          Bits corresponding to fields in Sub-TLV              |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

        Field         |    Description
  ============================================================
         Type         | Type field can be newly defined as a proprietary one.
                      | 
         Length       | length of the TLV
                      | 
         Sub-TLV Type | Sub-TLV type value as defined in  draft-ietf-bess-evpn-lsp-ping
                      |   
         Bitmap       | Maps to field(s) inside Sub-TLV. The bit-map indicates which field(s)
                      | in the Sub-TLV type is carried as wild card.
        </artwork>
      </figure>
      <t>NOTE: The bitmap for fields is very specific to the sub-tlv. The assumption is that there are no more than 32 unique fields carried in mpls ping packet across all sub tlvs. For example, in <xref target="I-D.draft-ietf-bess-evpn-lsp-ping"/>, if for a EVPN MAC Sub-TLV, the RD is to set as wild card, then the Sub-TLV-Type carries a value 2 as defined in <xref target="RFC7432" pageno="false" format="default"/> and bitmap has 1st bit set indicating the 1st field of the TLV is RD.</t>
    </section>
    <!--WILD CARD TLV DESCRIPTION ENDS -->
    <!--WILD CARD TLV PROCESSING BEGINS -->
    <section anchor="WildCardprocessing" title="Processing" toc="default">
	    <t><list style="format (%d)"><t>If the receiving BGP peer does not supports the wild-card list TLV,<list style="symbols"><t>it ignores the TLV while processing other information carried in sub-TLVs</t></list></t><t>If the receiving BGP peer support wild-card-list TLV but does not supports the wild-card ignorance of the field for validating the OAM request<list style="format (%c)"><t>It responds back the error defined in <xref target="RFC4379" pageno="false" format="default"/></t><t>The error code which is to be leveraged is '2' which represent the error: 'One or more of the TLVs was not understood'.</t></list></t><t>if the receiving BPG peer supports wild-card list TLV, then,<list style="format (%c)"><t>it extracts the information and maps it to the corresponding fields in other sub-TLVs as carried in the OAM message (MPLS LSP ping or any other fabric OAM).</t><t>It Ignores the value carried in those fields for performing Control-plane or Dataplane Validation.</t><t>Then, responds back with appropriate messages with errors or otherwise as described in <xref target="I-D.draft-ietf-bess-evpn-lsp-ping"/>.</t></list></t></list></t>
    </section>
    <!--WILD CARD TLV PROCESSING ENDS -->
    </section>
    <!--WILD CARD TLV ENDS -->
    <!--VALIDATION SCOPE TLV BEGINS -->
    <section anchor="validation" title="Validation Scope Tlv" toc="default">
    <t>The validation Scope TLV addresses the problem mentioned in section <xref target="problem2" pageno="false" format="default"/>.<list style="format (%d)"><t>It defines the type validation to be done for the OAM mpls ping PDU at the receiving end before a response can be corroborated and sent back to the sender</t><t>The validation types are defined as follows<list style="format (%c)"><t>Dataplane Validation: Validating the parameters which matter to the FIB (forwarding information base) or routing/switching/bridging table</t><t>Control Plane Validation: Validating parameters which are matter to the protocol(s) producing those routes. For example, validating the carried parameters against the protocol(s) RIB (routing information base). This operation can be CPU intensive and can impact the control plane processing</t><t>Both Control plane and Dataplane Validation: Typically performed to sanitize the network in a new-installation or post/pre upgrades when the network is in steady state and routers/switches in contention are not experiencing protocol churns.</t></list></t></list></t>

    <!--VALDATION TLV DESCRIPTION BEGINS -->
    <section anchor="ValidationTLVDecription" title="Description" toc="default">
     <t>The following diagram shows the wild-card list TLV and the following table, describe the fields</t>
     <figure title="Figure 2: Validation Scope TLV" suppress-title="false" align="left" alt="" width="" height="">
      <artwork xml:space="preserve" name="" type="" align="left" alt="" width="" height="">

        0              1               2               3               4
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |        Type   |    Length       |       Validation Type       |                 
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

       Field	        | Description
       ======================================================================	
        Type            | Type field can be newly defined as a proprietary one.
                        |
        Length	        | Length of the TLV
                        |
        Validation type | Three values for the validation as of now:
                        |   0  Both Control plane and Dataplane Validation (DEFAULT)
                        |   1  Only Control plane Validation
                        |   2  Only Data plane Validation
       </artwork>
     </figure>
    </section>
    <!--VALDATION TLV DESCRIPTION ENDS-->
    <!--VALDATION TLV PROCESSING BEGINS-->
    <section anchor="validationtlvprocessing" title="Processing" toc="default">
     <t><list style="format (%d)"><t> If the receiving BGP peer does not supports the Validation TLV, <list style="symbols"><t>it ignores the TLV while processing other information carried in sub-TLVs</t><t>Alternatively, It responds back with the error defined in <xref target="RFC4379" pageno="false" format="default"/>, </t></list></t><t>If the receiving BGP peer does supports the Validation TLV but does not supports the non-default mode (1 and 2), it does the validation as described in the standard document, that is the default mode (both control plane and dataplane validation) in <xref target="I-D.draft-ietf-bess-evpn-lsp-ping"/>.</t><t>If receiving side supports Validation TLV and all its modes, it performs the validation only in the requested mode:  <list style="symbols"><t>Both Control plane and dataplane</t><t>Only Control Plane</t><t>Only Dataplane</t></list></t></list></t>
    </section>
    <!--VALDATION TLV PROCESSING ENDS-->
    </section>
    <!--VALIDATION SCOPE TLV ENDS -->
    <!--EVI SUB TLV BEGINS -->
    <section anchor="evisubtlv" title="EVI Sub Tlv" toc="default">
     <t>The EVI Sub Tlv addresses the issues mentioned in the section <xref target="problem3" pageno="false" format="default"/>.</t>
     <t> This solution proposes a new Object/TLV which carries the EVI (Virtual Network Identifier) information, thus ensuring that following tools and/or action-sets can be supported:<list style="format (%d)"><t>Ping or path tracing to check the configuration of an EVI on a remote Vtep</t><t>Ping to check VRF configuration (mapped to an EVI) on remote Vtep,<list style="symbols"><t>even though no layer-3 configuration is enable against that VRF</t></list></t><t>Ping to check VRF configuration (mapped to an EVI) on remote Vtep,<list style="symbols"><t>For which EVPN tunnel not been provisioned yet</t></list></t></list></t>
     <t>The EVI values carried in the EVI Sub TLV can be user-defined or derived from underlaying fabric idenfier for the EVI.<list style="symbols"><t>For mpls fabric the EVI values can be MPLS labels (mapped to the VRFs), whereas,</t><t>For other encapsulations like Vxlan (GUE, Geneve, GPE), the EVI value should be the VNI (mapped to the VRFs).</t></list></t>
    <!--EVI SUB TLV DESCRIPTION BEGINS -->
    <section anchor="evisubtlvdescription" title="Description" toc="default">
     <figure title="Figure 2: Validation Scope TLV" suppress-title="false" align="left" alt="" width="" height="">
      <artwork xml:space="preserve" name="" type="" align="left" alt="" width="" height="">
       0              1               2               3               4
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |        Type   |    Length       |       EVI Identifier        |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                     EVI Identifier (continued)                |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

        Type: 1 Octet: Type field can be newly defined as a proprietary one.
        Length: 1 Octet: Defines the length of the Value field.
        Value: 6 Octets: EVI identifier.
       </artwork>
     </figure>
     <t>This TLV aligns generically with any Overlay OAM-ping, agnostic to a fabric used in the deployment (Vxlan, MPLS, GUE, Geneve, GPE). This TLV can be integrated into OAM tools of any underlying fabric. For example, the EVI identifier for MPLS will be 4-octets. Hence length field will carry '4' as the length.</t>
     <t>NOTE: Nil FEC described in <xref target="RFC8029" pageno="false" format="default"/>, can also be leveraged for the ping when the underneath fabric is MPLS.</t>
    </section>
    <!--EVI SUB TLV DESCRIPTION ENDS -->
    </section>
    <!--EVI SUB TLV ENDS -->
    </section>
    <!-- SOLUTION ENDS -->
    <!-- BACKWARD COMPATIBILITY BEGINS -->
    <section anchor="bkwd_compat" title="Backward Compatibility" toc="default">
     <t> Backward Compatibility for non-support nodes is as per the following standards already defined in <xref target="RFC7606" pageno="false" format="default"/>, that, BGP speaker should discard the unsupported TLV types </t>
    </section>
    <!-- BACKWARD COMPATIBILITY ENDS -->
    <!--SECURITY CONSIDERATIONS BEGIN -->
    <section anchor="sec_cons" title="Security Considerations" toc="default">
     <t>This document inherits all the security considerations discussed in <xref target="I-D.draft-ietf-bess-evpn-lsp-ping"/>.</t>
    </section>
    <!--SECURITY CONSIDERATIONS ENDS -->
    <!--IANA CONSIDERATIONS BEGIN -->
    <section anchor="iana_considerations" title="IANA Considerations" toc="default">
      <t>This document inherits all the IANA considerations discussed in <xref target="I-D.draft-ietf-bess-evpn-lsp-ping"/>.</t>
    </section>
    <!--IANA CONSIDERATIONS ENDS -->
    <!--ACKNOWLEDGEMENTS BEGIN -->
    <section anchor="acknowledge" title="Acknowledgements" toc="default">
    </section>
    <!--ACKNOWLEDGEMENTS ENDS -->
  </middle>
  <back>
    <references title="Normative References">
      <reference anchor="RFC2119" quote-title="true">
        <front>
          <title abbrev="RFC Key Words">Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner" fullname="Scott Bradner">
            <organization>Harvard University</organization>
          </author>
          <date year="1997" month="March"/>
          <area>General</area>
          <keyword>keyword</keyword>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <format type="TXT" octets="4723" target="http://www.rfc-editor.org/rfc/rfc2119.txt"/>
        <format type="HTML" octets="17970" target="http://xml.resource.org/public/rfc/html/rfc2119.html"/>
        <format type="XML" octets="5777" target="http://xml.resource.org/public/rfc/xml/rfc2119.xml"/>
      </reference>
    </references>
    <references title="Informative References">
      <reference anchor="I-D.draft-tissa-nvo3-oam-fm" quote-title="true">
        <front>
          <title>NVO3 Fault Managemen</title>
          <author initials="T." surname="Senevirathne" fullname="T.Senevirathne">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-tissa-nvo3-oam-fm-04"/>
        <format type="HTML" octets="49406" target="https://datatracker.ietf.org/doc/html/draft-tissa-nvo3-oam-fm-04"/>
      </reference>
      <reference anchor="RFC7348" quote-title="true">
        <front>
          <title>Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks</title>
          <author initials="M." surname="Mahalingam" fullname="M. Mahalingam">
            <organization/>
          </author>
          <date year="2014" month="August"/>
        </front>
        <seriesInfo name="RFC" value="7348"/>
        <format type="TXT" octets="49406" target="http://www.rfc-editor.org/rfc/rfc7348.txt"/>
      </reference>
      <reference anchor="RFC7432" quote-title="true">
        <front>
          <title>BGP MPLS-Based Ethernet VPN</title>
          <author initials="A." surname="Sajassi" fullname="A.Sajassi">
            <organization/>
          </author>
          <date year="2015" month="February"/>
        </front>
        <seriesInfo name="RFC" value="7432"/>
        <format type="TXT" octets="49406" target="http://www.rfc-editor.org/rfc/rfc7432.txt"/>
      </reference>
      <reference anchor="RFC9014" quote-title="true">
        <front>
          <title>Interconnect Solution for Ethernet VPN (EVPN) Overlay Networks</title>
          <author initials="J." surname="Rabadan" fullname="J.Rabadan">
            <organization/>
          </author>
          <date year="2021" month="May"/>
        </front>
        <seriesInfo name="RFC" value="9014"/>
        <format type="TXT" octets="49406" target="http://www.rfc-editor.org/rfc/rfc9014.txt"/>
      </reference>
      <reference anchor="RFC4379" quote-title="true">
       <front>
          <title>Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures</title>
          <author initials="K." surname="Kompella" fullname="K. Kompella">
            <organization/>
          </author>
          <date year="2006" month="February"/>
        </front>
        <seriesInfo name="RFC" value="4379"/>
        <format type="HTML" octets="49406" target="https://www.rfc-editor.org/rfc/rfc4379.html"/>
      </reference>
      <reference anchor="RFC8029" quote-title="true">
       <front>
          <title>Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures</title>
          <author initials="K." surname="Kompella" fullname="K. Kompella">
            <organization/>
          </author>
          <date year="2006" month="February"/>
        </front>
        <seriesInfo name="RFC" value="8029"/>
        <format type="HTML" octets="49406" target="https://www.rfc-editor.org/rfc/rfc8029.html"/>
      </reference>
      <reference anchor="RFC7606" quote-title="true">
       <front>
          <title>Revised Error Handling for BGP UPDATE Messages</title>
          <author initials="E." surname="Chen" fullname="E.Chen">
            <organization/>
          </author>
          <date year="2015" month="August"/>
        </front>
        <seriesInfo name="RFC" value="7606"/>
        <format type="HTML" octets="49406" target="https://www.rfc-editor.org/rfc/rfc7606.html"/>
      </reference>
      <reference anchor="I-D.draft-ietf-bess-evpn-lsp-ping" quote-title="true">
       <front>
          <title>LSP-Ping Mechanisms for EVPN and PBB-EVPN</title>
          <author initials="P." surname="Jain" fullname="P.Jain">
            <organization/>
          </author>
          <date year="2022" month="February"/>
        </front>
        <seriesInfo name="Internet-Draft" value="8029"/>
        <format type="TXT" octets="49406" target="https://www.ietf.org/archive/id/draft-ietf-bess-evpn-lsp-ping-07.txt"/>
      </reference>
    </references>
  </back>
</rfc>
