-
Notifications
You must be signed in to change notification settings - Fork 657
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add policy-forwarding network-instance attachment point #1224
base: master
Are you sure you want to change the base?
Conversation
No major YANG version changes in commit d203259 |
release/models/policy-forwarding/openconfig-pf-network-instances.yang
Outdated
Show resolved
Hide resolved
release/models/policy-forwarding/openconfig-pf-network-instances.yang
Outdated
Show resolved
Hide resolved
release/models/policy-forwarding/openconfig-pf-network-instances.yang
Outdated
Show resolved
Hide resolved
Last call for comments. This will merge on Jan 6th, 2025 |
description | ||
"The policy to be applied on the network-instance. Packets ingress | ||
on the referenced interface should be compared to the match | ||
criteria within the specified policy, and in the case that | ||
these criteria are met, the forwarding actions specified | ||
applied. These policies should be applied following quality of | ||
service classification, and ACL actions if such entities are | ||
referenced by the corresponding interface."; | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This description still talks about the "referenced interface".
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd like to see a precise definition of how matching is supposed to work.
In addition, I think there's a formatting issue with the references in the first comment, can it be fixed?
|
||
When attached to a network-instance, the policy-forwarding rules | ||
should be evaluated against packets in the specified | ||
network-instances."; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Similar comment to what I left in the previous PR #1150: what are the "packets in the specified network-instances"?
- does that mean that the policy applied to all interfaces associated with the network-instance on ingress (e.g. this change introduces only a new way of configuring the existing functionality), or
- are there any additional expectations w.r.t what packets should be matched (e.g packets redirected from another network-instance via a policy)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The operational use case motivating this PR is for packets ingress to the device which arrive on interfaces (including virtual interfaces) which are mapped to a network-instance.
I am not aware of an operational use case that we have for packets re-directed from another network-instance.
Change Scope
Today policy-forwarding policies can only be attached to interfaces. This change adds network-instance as an attachment point for policy-forwarding rules. This causes packets in the specified network-instance to be evaluated against the specified policy-forwarding rules and actions.
This change is backwards compatible.
Tree diff view
We are at:
/network-instances/network-instance/policy-forwarding/
vrf-policy
vrf default address-family ipv4 policy type pbr input GRE-DECAP-PBR
ip decap-group SRTE-GRE-DECAP
tunnel type gre
tunnel decap-ip 10.5.32.0