This is a very useful feature for large L2 networks and I support the publication of this document.
I have below nits/suggestions on the document. 1. Figure 1: Example Topology of L1 with L2 Borders The diagram is not legible. The connections between L1 routers can be removed from the diagram and a description can be added that R1 layer routers are all connected to R2 layer and so on. >From the diagram it appears that there is connectivity between R10 and R11 and R11 and R12. If so that link can flood L2 domains and L2 is not fully disjoint. I would suggest to remove the R10->R11 link to show a pure clos topology in L1. 2. 4.1 Flood reflection TLV "On a given router, the same value of the Flood Reflection Cluster ID MUST be advertised across all interfaces advertising the Flood Reflection TLV in IIHs. " Do we really need this restriction of one single cluster-id on a router? I am imagining, this cluster-id mechanism can be used to segregate a single fabric into two or more clusters if the fabric size becomes too huge. The usecase itself is described out of scope for this document elsewhere which is fine but too restrictive statements like above would discourage further enhancements so may be worth considering these restrictions to be removed. 3. 4.2. Flood Reflection Discovery Sub-TLV " A router receiving multiple Flood Reflection Discovery sub-TLVs in TLV 242 MUST use the values in the first sub- TLV" first sub-TLV is not deterministic as multiple TLV 242 can come is different fragments. Suggest to change as below. " A router receiving multiple Flood Reflection Discovery sub-TLVs in TLV 242 MUST use the values in the first sub- TLV of the lowest numbered fragment" 4. "flood reflection tunnel endpoint" and "L1 shortcut" terminology should be added to the glossary. These terms are used in sec 4.3 and reader may not get the context of these terms. 5. section 4.3 do we need the F bit? Looks like this info can be derived from the C bit in Flood Reflection Discovery Sub-TLV. The ones with C bit set are possible shortcut endpoints. The ones with C bit cleared are the flood reflector tunnel endpoints. 6. The tunnel encapsulation attribute has use outside of flood reflector (such as RFC 8663). I am more in favor of getting rid of the F bit from this sub-TLV as to avoid the confusions that may arise when it is used in the absence of flood reflectors. 7. " A flood reflector receiving multiple Flood Reflection Discovery Tunnel Type sub-sub-TLVs in Flood Reflection Discovery sub-TLV with F flag set SHOULD use one or more of the specified tunnel endpoints to automatically establish one or more tunnels that will serve as flood reflection adjacency(-ies)." A flood reflector should establish tunnels with clients only and not with other flood reflectors. also the cluster id needs to match. This text as well as next para needs revision. 8. sec 4.4 "The Flood Reflection Adjacency sub-TLV SHOULD NOT appear more than once in a given TLV. A router receiving multiple Flood Reflection Adjacency sub-TLVs in a TLV MUST use the values in the first sub-TLV and it SHOULD adequately log such violations subject to rate limiting." IMO should talk abt possibility of same TLV 22 in multiple fragments and MUST use first sub-TLV from lowest numbered fragment. 9. "If the clients have a direct L2 adjacency they SHOULD use it instead of instantiating a new tunnel." above statement seems to contradict statement below in sec 4.5 " A router acting as a flood reflector MUST NOT have any traditional L2 adjacencies. " Juniper Business Use Only From: Lsr <lsr-boun...@ietf.org> On Behalf Of Acee Lindem (acee) Sent: Friday, December 3, 2021 9:22 PM To: Antoni Przygienda <p...@juniper.net> Cc: lsr@ietf.org Subject: [Lsr] WG Last Call for "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-06 [External Email. Be cautious of content] Speaking as WG member: I have already supported publication. I have a couple comments: 1. Can you add "leave" to the glossary in section 2? 2. Section 5.2 is a bit hard to read. I have some suggested changes in my editorial comments but it would be good to expand the cases into smaller chunks and make state the overall goals ahead rather than after the details. Your call though. 1. In section 7, would an IS-IS router really set the overload-bit in L1 but not L2? I've also attached some suggested editorial changes. Some of these are very subjective and I won't feel bad if you don't include them all. Thanks, Acee
_______________________________________________ Lsr mailing list Lsr@ietf.org https://www.ietf.org/mailman/listinfo/lsr