Re: BFD for routes learned trough Route-servers in IXPs

2020-09-22 Thread Jared Mauch
> On Sep 22, 2020, at 4:46 AM, Andy Davidson wrote: > > Hi, > > Douglas Fisher wrote: >> B) There is any other alternative to that? > > Don't connect to IXPs with very very large and complicated topologies. > Connect to local IXPs where the design makes a forwarding plane failure that > ca

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-22 Thread Andy Davidson
Hi, Douglas Fisher wrote: > B) There is any other alternative to that? Don't connect to IXPs with very very large and complicated topologies. Connect to local IXPs where the design makes a forwarding plane failure that causes the problem you describe less likely. Andy

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-20 Thread Baldur Norddahl
Hello ARP timeout should be lower than MAC timeout, but usually the default is the other way around. Which is extremely stupid. To those who do not know why, let me give a simple example: Router R1 is connected to switch SW1 with a connection to server SRV: R1 <-> SW1 <-> SRV Router R2 is connect

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-17 Thread Randy Bush
> a) Check if there is anything hindering the evolution of this draft to > an RFC. was i unclear? > the draft passed wglc in 1948. it is awaiting two > implementations, as is the wont of the idr wg. randy

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-17 Thread Paul Timmins
On 9/17/20 1:51 PM, Douglas Fischer wrote: But 30 Seconds for an IXP? It does not make any sense! Those packets are stealing CPU cycles of the Control Plane of any router in the LAN. Especially given how some exchanges lock the mac address of participants. You could probably get away with ARP

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-17 Thread Douglas Fischer
If you look just to the normal situations... 1.2K vs 576K may not represent very much. But if you look tho ARP Requests Graphs on a significative topology changing on a big IXP, and also look to CPU-per-process graphs, maybe what I'm suggesting could be more explicit. I'm talking of good boxes fr

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-17 Thread Saku Ytti
On Thu, 17 Sep 2020 at 20:51, Douglas Fischer wrote: > Why should we spend CPU Cycles with 576K ARP Requests a day(2K participants, > 5 min ARP-Timeout). > Instead of 1.2K ARP Requests a day(2K participants, 4 hours ARP-Timeout)? > I would prefer to use those CPU cycles to process other things l

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-17 Thread Douglas Fischer
Well... My idea with the initial mail was: a) Check if there is anything hindering the evolution of this draft to an RFC. b) Bet in try to make possible a thing that nowadays could be considered impossible, like: "How to enable the BFD capability on a route-server with 2000 BGP Sessions withou

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-17 Thread Douglas Fischer
About this comparison between CAM-Table Timeout, and ARP-Table Timeout. I tend to partially agree with you... Ethernet is a so widely used protocol to sever scenarios. We need to consider the different needs of the type of communications. For example: I'm not a big fan of Mikrotik/RouterOS. But

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-17 Thread Robert Raszuk
> > If the traffic is that important then the public internet is the wrong > way to transport it. Nonsense. It is usually something said by those who do not know how to use Internet as a transport in a reliable way between two endpoints. In your books what is Internet good for ? Torrent and por

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-16 Thread Karsten Elfenbein
Am Mi., 16. Sept. 2020 um 02:57 Uhr schrieb Douglas Fischer : > > Time-to-time, in some IXP in the world some issue on the forwarding plane > occurs. > When it occurs, this topic comes back. > > The failures are not big enough to drop the BGP sessions between IXP > participants and route-servers.

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-16 Thread Saku Ytti
On Wed, 16 Sep 2020 at 23:15, Chriztoffer Hansen wrote: > On 16/09/2020 04:01, Ryan Hamel wrote: > > CoPP is always important, and it's not just Mikrotik's with default low > > ARP timeouts. > > > > Linux - 1 minute > > Brocade - 10 minutes > > Cumulus - 18 minutes > > BSD distros - 20 minutes >

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-16 Thread Christopher Morrow
On Wed, Sep 16, 2020 at 4:55 PM Randy Bush wrote: > > >>> So, I was searching on how to solve that and I found a draft (8th release) > >>> with the intention to solve that... > >>> https://tools.ietf.org/html/draft-ietf-idr-rs-bfd-08 > >>> > >>> If understood correctly, the effective implementatio

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-16 Thread Randy Bush
>>> So, I was searching on how to solve that and I found a draft (8th release) >>> with the intention to solve that... >>> https://tools.ietf.org/html/draft-ietf-idr-rs-bfd-08 >>> >>> If understood correctly, the effective implementation of it will depend on >>> new code on any BGP engine that will

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-16 Thread Christopher Morrow
On Tue, Sep 15, 2020 at 9:40 PM Randy Bush wrote: > > > So, I was searching on how to solve that and I found a draft (8th release) > > with the intention to solve that... > > https://tools.ietf.org/html/draft-ietf-idr-rs-bfd-08 > > > > If understood correctly, the effective implementation of it wi

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-16 Thread Nick Hilliard
Ryan Hamel wrote on 16/09/2020 03:01: Install a route optimizer that constantly pings next hops or if you want a more reliable IXP experience, don't install a route optimiser and if you do, don't make it ping next-hops. - you're not guaranteed that the icmp reply back to the route optimiser

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-16 Thread Zbyněk Pospíchal
Hi, In some IXPs, getting a BFD protected BGP sessions with their route-servers is possible. However, it is usualy optional, so there is no way how to discover know who of your MLPA peering partners has their sessions protected the same way and who don't. You can also ask peers you have a session

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-15 Thread Ryan Hamel
> "How can I check if my communication against the NextHop of the routes that I > learn from the route-servers are OK? If it is not OK, how can I remove it > from my FIB?" Install a route optimizer that constantly pings next hops, when the drop threshold is met, remove the routes. No one is goi

Re: BFD for routes learned trough Route-servers in IXPs

2020-09-15 Thread Randy Bush
> So, I was searching on how to solve that and I found a draft (8th release) > with the intention to solve that... > https://tools.ietf.org/html/draft-ietf-idr-rs-bfd-08 > > If understood correctly, the effective implementation of it will depend on > new code on any BGP engine that will want to do