[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Review of draft-ietf-v6ops-nap-02.txt
Hi Tony,
On Jul 12, 2006, at 10:29 AM, Tony Hain wrote:
Clearly if the network has 50,000 devices it is no longer 'simple'.
The
mechanism works for the simple router case when the number of
devices aligns
with the context of a 'simple' network.
There still seem to be some conflicting statements in the draft about
the applicability of the route injection topology hiding mechanism.
Presumably, we are talking about an enterprise-level deployment,
because it depends on the use of an IGP, but the diagram says "simple
gateway or home gateway". I would rather it said "topology masking
router", as you have described it later.
(3) How will local nodes know to use topology-specific ULA
addresses for
local communication?
RFC 3484 policy table entry biasing FC00::/7 as preferred over
2000::/3
This response does not answer my question. I understand how this
will work iff internal nodes are given a ULA as a possible
destination address for local nodes, but I don't understand how the
local nodes will be given the ULAs. Do you anticipate the use of
split-DNS in this scenario, so that ULAs are supplied internally and
not externally?
One of the problems with NAT, at least from my perspective, is that
they require a split-DNS employment to get local name resolution.
Are we expecting that NAP will have that same property?
(4) How does this interact with multicast traffic and ND.
ND for the topology hidden unicast & general multicast traffic
would route
via the topology masking router.
It is clear from this and earlier responses that a "topology masking
router" is a special beast with some different properties than a
regular router, such as logic to forward solicited node multicast
packets to the set of potentially matching nodes, the ability to
forward subnet-local multicast to all of the nodes on the logical
subnet, etc. I think that you should describe these properties when
asserting that IGP route injection can be used for topology hiding.
Can anode on the
"logical subnet" send a link-local multicast packet on the logical
subnet
and safely assume that it will reach all of the nodes on that
subnet and no
one else? If not, how does this interact with ND?
One needs to pay attention to the distinction between 'link' and
'subnet'.
If a node is part of a logical subnet and knows it is not directly
connected
to the link attached to the hosting router (because the flag is set to
not-on-link for that prefix), then it should not assume anything
about LL
reachability of any other member of the subnet. ND will work as
defined, so
the topology hidden node will use its LL to talk to whatever router
is on
the link, then use routing to get to anything else.
This is quite a complicated topic that has been discussed in various
places, and I don't think that either of us wants to re-hash all of
those discussions here or in this document... It isn't clear to me
that this works as cleanly as you seem to think, but that is almost
certainly outside the scope of this document.
Since you later seem to indicate that these nodes won't receive RA's,
though, I'm not sure where we would clear the on-link flag. Maybe
via manual configuration when we set-up the addresses and identify
the router with which these nodes should register?
(5) Would autoconfiguration be used on the logical subnet, or would
hosts be
expected to get those addresses through other means?
They would have to use other means because they need to also inform
that
node that it is supposed to use that address rather than whatever
might be
offered for where it attaches.
Perhaps you could make it clear that this mechanism relies on manual
configuration of IP addresses, the (local topology) address of the
router with which to register, and the on-link flag on each of the
topology-hidden hosts? Should we be considering a DHCPv6 option to
provide a topology hiding prefix?
(6) What advantages (if any) does this approach have over using a
single
subnet internally and using L2 switches and VLANs to handle
internal packet
delivery? What disadvantages does it have when compared to that
approach?
That works. We specifically took it out of the initial draft
because it was
not an IP level mechanism. I put it back after hearing you were
concerned
about it. The primary disadvantage is that all traffic has to route
via the
topology hiding router, and the L2 has to have the means to create
the vlan.
I will have to look at what you've added again, because I think we
are having a misunderstanding. I am merely saying that you would use
a bridged network (no L3 topology). Your local physical topology
would be handled at L2, with the appearance of a completely flat
network at L3.
If we decide that we actually want to make this recommendation,
It is not a BCP, it is simply information.
Two comments on this:
(1) I don't think that readers make a big distinction between BCP and
Info.
(2) Even in an informational document, I don't think it is reasonable
to refer to a solution as though it is a well-understood solution
when it is not. If we want to discuss this solution, I think we need
to say enough for readers to understand how the solution actually
works. It isn't sufficient for users to just insert host routes in
current routing equipment if that equipment does not include other
features to be a "topology hiding router", right?
I'd prefer
that we remove it from this document and make this recommendation
in a
separate document that covers the scalability issues, the answers my
questions above, and any other factors that may affect the
applicability of
this solution.
A BCP should be a separate document. The full -03 round of edits
covers the
scale issue. It is not clear to me that it needs to be a primer on
IPv6 to
discuss the distinction between link and subnet and how ND works.
I don't think we need a primer on IPv6, but I do think we need some
description of the topology hiding router and its properties.
We also need to decide if we have consensus that such a solution is a
good idea, because regardless of the document classification, this
document is stating how IPv6 can provide the benefits of IPv6 NAT,
and I don't think we should state that IPv6 can be used in a certain
way to provide certain benefits unless we think: (1) it will work,
(2) any downsides of the approach are mentioned, and (3) the
downsides are not worse than the benefits.
Margaret