summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4762.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4762.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4762.txt')
-rw-r--r--doc/rfc/rfc4762.txt1739
1 files changed, 1739 insertions, 0 deletions
diff --git a/doc/rfc/rfc4762.txt b/doc/rfc/rfc4762.txt
new file mode 100644
index 0000000..5da458a
--- /dev/null
+++ b/doc/rfc/rfc4762.txt
@@ -0,0 +1,1739 @@
+
+
+
+
+
+
+Network Working Group M. Lasserre, Ed.
+Request for Comments: 4762 V. Kompella, Ed.
+Category: Standards Track Alcatel-Lucent
+ January 2007
+
+
+ Virtual Private LAN Service (VPLS) Using
+ Label Distribution Protocol (LDP) Signaling
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The IETF Trust (2007).
+
+IESG Note
+
+ The L2VPN Working Group produced two separate documents, RFC 4761 and
+ this document, that perform similar functions using different
+ signaling protocols. Be aware that each method is commonly referred
+ to as "VPLS" even though they are distinct and incompatible with one
+ another.
+
+Abstract
+
+ This document describes a Virtual Private LAN Service (VPLS) solution
+ using pseudowires, a service previously implemented over other
+ tunneling technologies and known as Transparent LAN Services (TLS).
+ A VPLS creates an emulated LAN segment for a given set of users;
+ i.e., it creates a Layer 2 broadcast domain that is fully capable of
+ learning and forwarding on Ethernet MAC addresses and that is closed
+ to a given set of users. Multiple VPLS services can be supported
+ from a single Provider Edge (PE) node.
+
+ This document describes the control plane functions of signaling
+ pseudowire labels using Label Distribution Protocol (LDP), extending
+ RFC 4447. It is agnostic to discovery protocols. The data plane
+ functions of forwarding are also described, focusing in particular on
+ the learning of MAC addresses. The encapsulation of VPLS packets is
+ described by RFC 4448.
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 1]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Terminology .....................................................3
+ 2.1. Conventions ................................................4
+ 3. Acronyms ........................................................4
+ 4. Topological Model for VPLS ......................................5
+ 4.1. Flooding and Forwarding ....................................6
+ 4.2. Address Learning ...........................................6
+ 4.3. Tunnel Topology ............................................7
+ 4.4. Loop free VPLS .............................................7
+ 5. Discovery .......................................................7
+ 6. Control Plane ...................................................7
+ 6.1. LDP-Based Signaling of Demultiplexers ......................8
+ 6.1.1. Using the Generalized PWid FEC Element ..............8
+ 6.2. MAC Address Withdrawal .....................................9
+ 6.2.1. MAC List TLV ........................................9
+ 6.2.2. Address Withdraw Message Containing MAC List TLV ...11
+ 7. Data Forwarding on an Ethernet PW ..............................11
+ 7.1. VPLS Encapsulation Actions ................................11
+ 7.2. VPLS Learning Actions .....................................12
+ 8. Data Forwarding on an Ethernet VLAN PW .........................13
+ 8.1. VPLS Encapsulation Actions ................................13
+ 9. Operation of a VPLS ............................................14
+ 9.1. MAC Address Aging .........................................15
+ 10. A Hierarchical VPLS Model .....................................16
+ 10.1. Hierarchical Connectivity ................................16
+ 10.1.1. Spoke Connectivity for Bridging-Capable Devices ...17
+ 10.1.2. Advantages of Spoke Connectivity ..................18
+ 10.1.3. Spoke Connectivity for Non-Bridging Devices .......19
+ 10.2. Redundant Spoke Connections ..............................21
+ 10.2.1. Dual-Homed MTU-s ..................................21
+ 10.2.2. Failure Detection and Recovery ....................22
+ 10.3. Multi-domain VPLS Service ................................23
+ 11. Hierarchical VPLS Model Using Ethernet Access Network .........23
+ 11.1. Scalability ..............................................24
+ 11.2. Dual Homing and Failure Recovery .........................24
+ 12. Contributors ..................................................25
+ 13. Acknowledgements ..............................................25
+ 14. Security Considerations .......................................26
+ 15. IANA Considerations ...........................................26
+ 16. References ....................................................27
+ 16.1. Normative References .....................................27
+ 16.2. Informative References ...................................27
+ Appendix A. VPLS Signaling using the PWid FEC Element .............29
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 2]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+1. Introduction
+
+ Ethernet has become the predominant technology for Local Area Network
+ (LAN) connectivity and is gaining acceptance as an access technology,
+ specifically in Metropolitan and Wide Area Networks (MAN and WAN,
+ respectively). The primary motivation behind Virtual Private LAN
+ Services (VPLS) is to provide connectivity between geographically
+ dispersed customer sites across MANs and WANs, as if they were
+ connected using a LAN. The intended application for the end-user can
+ be divided into the following two categories:
+
+ - Connectivity between customer routers: LAN routing application
+
+ - Connectivity between customer Ethernet switches: LAN switching
+ application
+
+ Broadcast and multicast services are available over traditional LANs.
+ Sites that belong to the same broadcast domain and that are connected
+ via an MPLS network expect broadcast, multicast, and unicast traffic
+ to be forwarded to the proper location(s). This requires MAC address
+ learning/aging on a per-pseudowire basis, and packet replication
+ across pseudowires for multicast/broadcast traffic and for flooding
+ of unknown unicast destination traffic.
+
+ [RFC4448] defines how to carry Layer 2 (L2) frames over point-to-
+ point pseudowires (PW). This document describes extensions to
+ [RFC4447] for transporting Ethernet/802.3 and VLAN [802.1Q] traffic
+ across multiple sites that belong to the same L2 broadcast domain or
+ VPLS. Note that the same model can be applied to other 802.1
+ technologies. It describes a simple and scalable way to offer
+ Virtual LAN services, including the appropriate flooding of
+ broadcast, multicast, and unknown unicast destination traffic over
+ MPLS, without the need for address resolution servers or other
+ external servers, as discussed in [L2VPN-REQ].
+
+ The following discussion applies to devices that are VPLS capable and
+ have a means of tunneling labeled packets amongst each other. The
+ resulting set of interconnected devices forms a private MPLS VPN.
+
+2. Terminology
+
+ Q-in-Q 802.1ad Provider Bridge extensions also known
+ as stackable VLANs or Q-in-Q.
+
+ Qualified learning Learning mode in which each customer VLAN is
+ mapped to its own VPLS instance.
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 3]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ Service delimiter Information used to identify a specific customer
+ service instance. This is typically encoded in
+ the encapsulation header of customer frames
+ (e.g., VLAN Id).
+
+ Tagged frame Frame with an 802.1Q VLAN identifier.
+
+ Unqualified learning Learning mode where all the VLANs of a single
+ customer are mapped to a single VPLS.
+
+ Untagged frame Frame without an 802.1Q VLAN identifier.
+
+2.1. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in RFC 2119 [RFC2119].
+
+3. Acronyms
+
+ AC Attachment Circuit
+
+ BPDU Bridge Protocol Data Unit
+
+ CE Customer Edge device
+
+ FEC Forwarding Equivalence Class
+
+ FIB Forwarding Information Base
+
+ GRE Generic Routing Encapsulation
+
+ IPsec IP security
+
+ L2TP Layer Two Tunneling Protocol
+
+ LAN Local Area Network
+
+ LDP Label Distribution Protocol
+
+ MTU-s Multi-Tenant Unit switch
+
+ PE Provider Edge device
+
+ PW Pseudowire
+
+ STP Spanning Tree Protocol
+
+
+
+
+Lasserre & Kompella Standards Track [Page 4]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ VLAN Virtual LAN
+
+ VLAN tag VLAN Identifier
+
+4. Topological Model for VPLS
+
+ An interface participating in a VPLS must be able to flood, forward,
+ and filter Ethernet frames. Figure 1, below, shows the topological
+ model of a VPLS. The set of PE devices interconnected via PWs
+ appears as a single emulated LAN to customer X. Each PE will form
+ remote MAC address to PW associations and associate directly attached
+ MAC addresses to local customer facing ports. This is modeled on
+ standard IEEE 802.1 MAC address learning.
+
+ +-----+ +-----+
+ | CE1 +---+ ........................... +---| CE2 |
+ +-----+ | . . | +-----+
+ Site 1 | +----+ +----+ | Site 2
+ +---| PE | Cloud | PE |---+
+ +----+ +----+
+ . .
+ . +----+ .
+ ..........| PE |...........
+ +----+ ^
+ | |
+ | +-- Emulated LAN
+ +-----+
+ | CE3 |
+ +-----+
+ Site 3
+
+ Figure 1: Topological Model of a VPLS for
+ Customer X with three sites
+
+ We note here again that while this document shows specific examples
+ using MPLS transport tunnels, other tunnels that can be used by PWs
+ (as mentioned in [RFC4447]) -- e.g., GRE, L2TP, IPsec -- can also be
+ used, as long as the originating PE can be identified, since this is
+ used in the MAC learning process.
+
+ The scope of the VPLS lies within the PEs in the service provider
+ network, highlighting the fact that apart from customer service
+ delineation, the form of access to a customer site is not relevant to
+ the VPLS [L2VPN-REQ]. In other words, the attachment circuit (AC)
+ connected to the customer could be a physical Ethernet port, a
+ logical (tagged) Ethernet port, an ATM PVC carrying Ethernet frames,
+ etc., or even an Ethernet PW.
+
+
+
+
+Lasserre & Kompella Standards Track [Page 5]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ The PE is typically an edge router capable of running the LDP
+ signaling protocol and/or routing protocols to set up PWs. In
+ addition, it is capable of setting up transport tunnels to other PEs
+ and delivering traffic over PWs.
+
+4.1. Flooding and Forwarding
+
+ One of attributes of an Ethernet service is that frames sent to
+ broadcast addresses and to unknown destination MAC addresses are
+ flooded to all ports. To achieve flooding within the service
+ provider network, all unknown unicast, broadcast and multicast frames
+ are flooded over the corresponding PWs to all PE nodes participating
+ in the VPLS, as well as to all ACs.
+
+ Note that multicast frames are a special case and do not necessarily
+ have to be sent to all VPN members. For simplicity, the default
+ approach of broadcasting multicast frames is used.
+
+ To forward a frame, a PE MUST be able to associate a destination MAC
+ address with a PW. It is unreasonable and perhaps impossible to
+ require that PEs statically configure an association of every
+ possible destination MAC address with a PW. Therefore, VPLS-capable
+ PEs SHOULD have the capability to dynamically learn MAC addresses on
+ both ACs and PWs and to forward and replicate packets across both ACs
+ and PWs.
+
+4.2. Address Learning
+
+ Unlike BGP VPNs [RFC4364], reachability information is not advertised
+ and distributed via a control plane. Reachability is obtained by
+ standard learning bridge functions in the data plane.
+
+ When a packet arrives on a PW, if the source MAC address is unknown,
+ it needs to be associated with the PW, so that outbound packets to
+ that MAC address can be delivered over the associated PW. Likewise,
+ when a packet arrives on an AC, if the source MAC address is unknown,
+ it needs to be associated with the AC, so that outbound packets to
+ that MAC address can be delivered over the associated AC.
+
+ Standard learning, filtering, and forwarding actions, as defined in
+ [802.1D-ORIG], [802.1D-REV], and [802.1Q], are required when a PW or
+ AC state changes.
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 6]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+4.3. Tunnel Topology
+
+ PE routers are assumed to have the capability to establish transport
+ tunnels. Tunnels are set up between PEs to aggregate traffic. PWs
+ are signaled to demultiplex encapsulated Ethernet frames from
+ multiple VPLS instances that traverse the transport tunnels.
+
+ In an Ethernet L2VPN, it becomes the responsibility of the service
+ provider to create the loop-free topology. For the sake of
+ simplicity, we define that the topology of a VPLS is a full mesh of
+ PWs.
+
+4.4. Loop free VPLS
+
+ If the topology of the VPLS is not restricted to a full mesh, then it
+ may be that for two PEs not directly connected via PWs, they would
+ have to use an intermediary PE to relay packets. This topology would
+ require the use of some loop-breaking protocol, like a spanning tree
+ protocol.
+
+ Instead, a full mesh of PWs is established between PEs. Since every
+ PE is now directly connected to every other PE in the VPLS via a PW,
+ there is no longer any need to relay packets, and we can instantiate
+ a simpler loop-breaking rule: the "split horizon" rule, whereby a PE
+ MUST NOT forward traffic from one PW to another in the same VPLS
+ mesh.
+
+ Note that customers are allowed to run a Spanning Tree Protocol (STP)
+ (e.g., as defined in [802.1D-REV]), such as when a customer has "back
+ door" links used to provide redundancy in the case of a failure
+ within the VPLS. In such a case, STP Bridge PDUs (BPDUs) are simply
+ tunneled through the provider cloud.
+
+5. Discovery
+
+ The capability to manually configure the addresses of the remote PEs
+ is REQUIRED. However, the use of manual configuration is not
+ necessary if an auto-discovery procedure is used. A number of auto-
+ discovery procedures are compatible with this document
+ ([RADIUS-DISC], [BGP-DISC]).
+
+6. Control Plane
+
+ This document describes the control plane functions of signaling of
+ PW labels. Some foundational work in the area of support for multi-
+ homing is laid. The extensions to provide multi-homing support
+ should work independently of the basic VPLS operation, and they are
+ not described here.
+
+
+
+Lasserre & Kompella Standards Track [Page 7]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+6.1. LDP-Based Signaling of Demultiplexers
+
+ A full mesh of LDP sessions is used to establish the mesh of PWs.
+ The requirement for a full mesh of PWs may result in a large number
+ of targeted LDP sessions. Section 10 discusses the option of setting
+ up hierarchical topologies in order to minimize the size of the VPLS
+ full mesh.
+
+ Once an LDP session has been formed between two PEs, all PWs between
+ these two PEs are signaled over this session.
+
+ In [RFC4447], two types of FECs are described: the PWid FEC Element
+ (FEC type 128) and the Generalized PWid FEC Element (FEC type 129).
+ The original FEC element used for VPLS was compatible with the PWid
+ FEC Element. The text for signaling using the PWid FEC Element has
+ been moved to Appendix A. What we describe below replaces that with
+ a more generalized L2VPN descriptor, the Generalized PWid FEC
+ Element.
+
+6.1.1. Using the Generalized PWid FEC Element
+
+ [RFC4447] describes a generalized FEC structure that is be used for
+ VPLS signaling in the following manner. We describe the assignment
+ of the Generalized PWid FEC Element fields in the context of VPLS
+ signaling.
+
+ Control bit (C): This bit is used to signal the use of the control
+ word as specified in [RFC4447].
+
+ PW type: The allowed PW types are Ethernet (0x0005) and Ethernet
+ tagged mode (0x004), as specified in [RFC4446].
+
+ PW info length: As specified in [RFC4447].
+
+ Attachment Group Identifier (AGI), Length, Value: The unique name of
+ this VPLS. The AGI identifies a type of name, and Length denotes the
+ length of Value, which is the name of the VPLS. We use the term AGI
+ interchangeably with VPLS identifier.
+
+ Target Attachment Individual Identifier (TAII), Source Attachment
+ Individual Identifier (SAII): These are null because the mesh of PWs
+ in a VPLS terminates on MAC learning tables, rather than on
+ individual attachment circuits. The use of non-null TAII and SAII is
+ reserved for future enhancements.
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 8]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ Interface Parameters: The relevant interface parameters are:
+
+ - MTU: The MTU (Maximum Transmission Unit) of the VPLS MUST be the
+ same across all the PWs in the mesh.
+
+ - Optional Description String: Same as [RFC4447].
+
+ - Requested VLAN ID: If the PW type is Ethernet tagged mode, this
+ parameter may be used to signal the insertion of the appropriate
+ VLAN ID, as defined in [RFC4448].
+
+6.2. MAC Address Withdrawal
+
+ It MAY be desirable to remove or unlearn MAC addresses that have been
+ dynamically learned for faster convergence. This is accomplished by
+ sending an LDP Address Withdraw Message with the list of MAC
+ addresses to be removed to all other PEs over the corresponding LDP
+ sessions.
+
+ We introduce an optional MAC List TLV in LDP to specify a list of MAC
+ addresses that can be removed or unlearned using the LDP Address
+ Withdraw Message.
+
+ The Address Withdraw message with MAC List TLVs MAY be supported in
+ order to expedite removal of MAC addresses as the result of a
+ topology change (e.g., failure of the primary link for a dual-homed
+ VPLS-capable switch).
+
+ In order to minimize the impact on LDP convergence time, when the MAC
+ list TLV contains a large number of MAC addresses, it may be
+ preferable to send a MAC address withdrawal message with an empty
+ list.
+
+6.2.1. MAC List TLV
+
+ MAC addresses to be unlearned can be signaled using an LDP Address
+ Withdraw Message that contains a new TLV, the MAC List TLV. Its
+ format is described below. The encoding of a MAC List TLV address is
+ the 6-octet MAC address specified by IEEE 802 documents [802.1D-ORIG]
+ [802.1D-REV].
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 9]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |U|F| Type | Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MAC address #1 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MAC address #1 | MAC Address #2 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MAC address #2 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ ~ ... ~
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MAC address #n |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MAC address #n |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ U bit: Unknown bit. This bit MUST be set to 1. If the MAC address
+ format is not understood, then the TLV is not understood and MUST be
+ ignored.
+
+ F bit: Forward bit. This bit MUST be set to 0. Since the LDP
+ mechanism used here is targeted, the TLV MUST NOT be forwarded.
+
+ Type: Type field. This field MUST be set to 0x0404. This identifies
+ the TLV type as MAC List TLV.
+
+ Length: Length field. This field specifies the total length in
+ octets of the MAC addresses in the TLV. The length MUST be a
+ multiple of 6.
+
+ MAC Address: The MAC address(es) being removed.
+
+ The MAC Address Withdraw Message contains a FEC TLV (to identify the
+ VPLS affected), a MAC Address TLV, and optional parameters. No
+ optional parameters have been defined for the MAC Address Withdraw
+ signaling. Note that if a PE receives a MAC Address Withdraw Message
+ and does not understand it, it MUST ignore the message. In this
+ case, instead of flushing its MAC address table, it will continue to
+ use stale information, unless:
+
+ - it receives a packet with a known MAC address association, but
+ from a different PW, in which case it replaces the old
+ association; or
+
+ - it ages out the old association.
+
+
+
+
+Lasserre & Kompella Standards Track [Page 10]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ The MAC Address Withdraw message only helps speed up convergence, so
+ PEs that do not understand the message can continue to participate in
+ the VPLS.
+
+6.2.2. Address Withdraw Message Containing MAC List TLV
+
+ The processing for MAC List TLV received in an Address Withdraw
+ Message is:
+
+ For each MAC address in the TLV:
+
+ - Remove the association between the MAC address and the AC or PW
+ over which this message is received.
+
+ For a MAC Address Withdraw message with empty list:
+
+ - Remove all the MAC addresses associated with the VPLS instance
+ (specified by the FEC TLV) except the MAC addresses learned over
+ the PW associated with this signaling session over which the
+ message was received.
+
+ The scope of a MAC List TLV is the VPLS specified in the FEC TLV in
+ the MAC Address Withdraw Message. The number of MAC addresses can be
+ deduced from the length field in the TLV.
+
+7. Data Forwarding on an Ethernet PW
+
+ This section describes the data plane behavior on an Ethernet PW used
+ in a VPLS. While the encapsulation is similar to that described in
+ [RFC4448], the functions of stripping the service-delimiting tag and
+ using a "normalized" Ethernet frame are described.
+
+7.1. VPLS Encapsulation Actions
+
+ In a VPLS, a customer Ethernet frame without preamble is encapsulated
+ with a header as defined in [RFC4448]. A customer Ethernet frame is
+ defined as follows:
+
+ - If the frame, as it arrives at the PE, has an encapsulation that
+ is used by the local PE as a service delimiter, i.e., to identify
+ the customer and/or the particular service of that customer, then
+ that encapsulation may be stripped before the frame is sent into
+ the VPLS. As the frame exits the VPLS, the frame may have a
+ service-delimiting encapsulation inserted.
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 11]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ - If the frame, as it arrives at the PE, has an encapsulation that
+ is not service delimiting, then it is a customer frame whose
+ encapsulation should not be modified by the VPLS. This covers,
+ for example, a frame that carries customer-specific VLAN tags that
+ the service provider neither knows about nor wants to modify.
+
+ As an application of these rules, a customer frame may arrive at a
+ customer-facing port with a VLAN tag that identifies the customer's
+ VPLS instance. That tag would be stripped before it is encapsulated
+ in the VPLS. At egress, the frame may be tagged again, if a
+ service-delimiting tag is used, or it may be untagged if none is
+ used.
+
+ Likewise, if a customer frame arrives at a customer-facing port over
+ an ATM or Frame Relay VC that identifies the customer's VPLS
+ instance, then the ATM or FR encapsulation is removed before the
+ frame is passed into the VPLS.
+
+ Contrariwise, if a customer frame arrives at a customer-facing port
+ with a VLAN tag that identifies a VLAN domain in the customer L2
+ network, then the tag is not modified or stripped, as it belongs with
+ the rest of the customer frame.
+
+ By following the above rules, the Ethernet frame that traverses a
+ VPLS is always a customer Ethernet frame. Note that the two actions,
+ at ingress and egress, of dealing with service delimiters are local
+ actions that neither PE has to signal to the other. They allow, for
+ example, a mix-and-match of VLAN tagged and untagged services at
+ either end, and they do not carry across a VPLS a VLAN tag that has
+ local significance only. The service delimiter may be an MPLS label
+ also, whereby an Ethernet PW given by [RFC4448] can serve as the
+ access side connection into a PE. An RFC1483 Bridged PVC
+ encapsulation could also serve as a service delimiter. By limiting
+ the scope of locally significant encapsulations to the edge,
+ hierarchical VPLS models can be developed that provide the capability
+ to network-engineer scalable VPLS deployments, as described below.
+
+7.2. VPLS Learning Actions
+
+ Learning is done based on the customer Ethernet frame as defined
+ above. The Forwarding Information Base (FIB) keeps track of the
+ mapping of customer Ethernet frame addressing and the appropriate PW
+ to use. We define two modes of learning: qualified and unqualified
+ learning. Qualified learning is the default mode and MUST be
+ supported. Support of unqualified learning is OPTIONAL.
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 12]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ In unqualified learning, all the VLANs of a single customer are
+ handled by a single VPLS, which means they all share a single
+ broadcast domain and a single MAC address space. This means that MAC
+ addresses need to be unique and non-overlapping among customer VLANs,
+ or else they cannot be differentiated within the VPLS instance, and
+ this can result in loss of customer frames. An application of
+ unqualified learning is port-based VPLS service for a given customer
+ (e.g., customer with non-multiplexed AC where all the traffic on a
+ physical port, which may include multiple customer VLANs, is mapped
+ to a single VPLS instance).
+
+ In qualified learning, each customer VLAN is assigned to its own VPLS
+ instance, which means each customer VLAN has its own broadcast domain
+ and MAC address space. Therefore, in qualified learning, MAC
+ addresses among customer VLANs may overlap with each other, but they
+ will be handled correctly since each customer VLAN has its own FIB;
+ i.e., each customer VLAN has its own MAC address space. Since VPLS
+ broadcasts multicast frames by default, qualified learning offers the
+ advantage of limiting the broadcast scope to a given customer VLAN.
+ Qualified learning can result in large FIB table sizes, because the
+ logical MAC address is now a VLAN tag + MAC address.
+
+ For STP to work in qualified learning mode, a VPLS PE must be able to
+ forward STP BPDUs over the proper VPLS instance. In a hierarchical
+ VPLS case (see details in Section 10), service delimiting tags
+ (Q-in-Q or [RFC4448]) can be added such that PEs can unambiguously
+ identify all customer traffic, including STP BPDUs. In a basic VPLS
+ case, upstream switches must insert such service delimiting tags.
+ When an access port is shared among multiple customers, a reserved
+ VLAN per customer domain must be used to carry STP traffic. The STP
+ frames are encapsulated with a unique provider tag per customer (as
+ the regular customer traffic), and a PEs looks up the provider tag to
+ send such frames across the proper VPLS instance.
+
+8. Data Forwarding on an Ethernet VLAN PW
+
+ This section describes the data plane behavior on an Ethernet VLAN PW
+ in a VPLS. While the encapsulation is similar to that described in
+ [RFC4448], the functions of imposing tags and using a "normalized"
+ Ethernet frame are described. The learning behavior is the same as
+ for Ethernet PWs.
+
+8.1. VPLS Encapsulation Actions
+
+ In a VPLS, a customer Ethernet frame without preamble is encapsulated
+ with a header as defined in [RFC4448]. A customer Ethernet frame is
+ defined as follows:
+
+
+
+
+Lasserre & Kompella Standards Track [Page 13]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ - If the frame, as it arrives at the PE, has an encapsulation that
+ is part of the customer frame and is also used by the local PE as
+ a service delimiter, i.e., to identify the customer and/or the
+ particular service of that customer, then that encapsulation is
+ preserved as the frame is sent into the VPLS, unless the Requested
+ VLAN ID optional parameter was signaled. In that case, the VLAN
+ tag is overwritten before the frame is sent out on the PW.
+
+ - If the frame, as it arrives at the PE, has an encapsulation that
+ does not have the required VLAN tag, a null tag is imposed if the
+ Requested VLAN ID optional parameter was not signaled.
+
+ As an application of these rules, a customer frame may arrive at a
+ customer-facing port with a VLAN tag that identifies the customer's
+ VPLS instance and also identifies a customer VLAN. That tag would be
+ preserved as it is encapsulated in the VPLS.
+
+ The Ethernet VLAN PW provides a simple way to preserve customer
+ 802.1p bits.
+
+ A VPLS MAY have both Ethernet and Ethernet VLAN PWs. However, if a
+ PE is not able to support both PWs simultaneously, it SHOULD send a
+ Label Release on the PW messages that it cannot support with a status
+ code "Unknown FEC" as given in [RFC3036].
+
+9. Operation of a VPLS
+
+ We show here, in Figure 2, below, an example of how a VPLS works.
+ The following discussion uses the figure below, where a VPLS has been
+ set up between PE1, PE2, and PE3. The VPLS connects a customer with
+ 4 sites labeled A1, A2, A3, and A4 through CE1, CE2, CE3, and CE4,
+ respectively.
+
+ Initially, the VPLS is set up so that PE1, PE2, and PE3 have a full
+ mesh of Ethernet PWs. The VPLS instance is assigned an identifier
+ (AGI). For the above example, say PE1 signals PW label 102 to PE2
+ and 103 to PE3, and PE2 signals PW label 201 to PE1 and 203 to PE3.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 14]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ -----
+ / A1 \
+ ---- ----CE1 |
+ / \ -------- ------- / | |
+ | A2 CE2- / \ / PE1 \ /
+ \ / \ / \---/ \ -----
+ ---- ---PE2 |
+ | Service Provider Network |
+ \ / \ /
+ ----- PE3 / \ /
+ |Agg|_/ -------- -------
+ -| |
+ ---- / ----- ----
+ / \/ \ / \ CE = Customer Edge Router
+ | A3 CE3 -CE4 A4 | PE = Provider Edge Router
+ \ / \ / Agg = Layer 2 Aggregation
+ ---- ----
+
+ Figure 2: Example of a VPLS
+
+ Assume a packet from A1 is bound for A2. When it leaves CE1, say it
+ has a source MAC address of M1 and a destination MAC of M2. If PE1
+ does not know where M2 is, it will flood the packet; i.e., send it to
+ PE2 and PE3. When PE2 receives the packet, it will have a PW label
+ of 201. PE2 can conclude that the source MAC address M1 is behind
+ PE1, since it distributed the label 201 to PE1. It can therefore
+ associate MAC address M1 with PW label 102.
+
+9.1. MAC Address Aging
+
+ PEs that learn remote MAC addresses SHOULD have an aging mechanism to
+ remove unused entries associated with a PW label. This is important
+ both for conservation of memory and for administrative purposes. For
+ example, if a customer site A, is shut down, eventually the other PEs
+ should unlearn A's MAC address.
+
+ The aging timer for MAC address M SHOULD be reset when a packet with
+ source MAC address M is received.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 15]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+10. A Hierarchical VPLS Model
+
+ The solution described above requires a full mesh of tunnel LSPs
+ between all the PE routers that participate in the VPLS service. For
+ each VPLS service, n*(n-1)/2 PWs must be set up between the PE
+ routers. While this creates signaling overhead, the real detriment
+ to large scale deployment is the packet replication requirements for
+ each provisioned PWs on a PE router. Hierarchical connectivity,
+ described in this document, reduces signaling and replication
+ overhead to allow large-scale deployment.
+
+ In many cases, service providers place smaller edge devices in
+ multi-tenant buildings and aggregate them into a PE in a large
+ Central Office (CO) facility. In some instances, standard IEEE
+ 802.1q (Dot 1Q) tagging techniques may be used to facilitate mapping
+ CE interfaces to VPLS access circuits at a PE.
+
+ It is often beneficial to extend the VPLS service tunneling
+ techniques into the access switch domain. This can be accomplished
+ by treating the access device as a PE and provisioning PWs between it
+ and every other edge, as a basic VPLS. An alternative is to utilize
+ [RFC4448] PWs or Q-in-Q logical interfaces between the access device
+ and selected VPLS enabled PE routers. Q-in-Q encapsulation is
+ another form of L2 tunneling technique, which can be used in
+ conjunction with MPLS signaling, as will be described later. The
+ following two sections focus on this alternative approach. The VPLS
+ core PWs (hub) are augmented with access PWs (spoke) to form a two-
+ tier hierarchical VPLS (H-VPLS).
+
+ Spoke PWs may be implemented using any L2 tunneling mechanism, and by
+ expanding the scope of the first tier to include non-bridging VPLS PE
+ routers. The non-bridging PE router would extend a spoke PW from a
+ Layer-2 switch that connects to it, through the service core network,
+ to a bridging VPLS PE router supporting hub PWs. We also describe
+ how VPLS-challenged nodes and low-end CEs without MPLS capabilities
+ may participate in a hierarchical VPLS.
+
+ For rest of this discussion we refer to a bridging capable access
+ device as MTU-s and a non-bridging capable PE as PE-r. We refer to a
+ routing and bridging capable device as PE-rs.
+
+10.1. Hierarchical Connectivity
+
+ This section describes the hub and spoke connectivity model and
+ describes the requirements of the bridging capable and non-bridging
+ MTU-s devices for supporting the spoke connections.
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 16]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+10.1.1. Spoke Connectivity for Bridging-Capable Devices
+
+ In Figure 3, below, three customer sites are connected to an MTU-s
+ through CE-1, CE-2, and CE-3. The MTU-s has a single connection
+ (PW-1) to PE1-rs. The PE-rs devices are connected in a basic VPLS
+ full mesh. For each VPLS service, a single spoke PW is set up
+ between the MTU-s and the PE-rs based on [RFC4447]. Unlike
+ traditional PWs that terminate on a physical (or a VLAN-tagged
+ logical) port, a spoke PW terminates on a virtual switch instance
+ (VSI; see [L2FRAME]) on the MTU-s and the PE-rs devices.
+
+ PE2-rs
+ +--------+
+ | |
+ | -- |
+ | / \ |
+ CE-1 | \S / |
+ \ | -- |
+ \ +--------+
+ \ MTU-s PE1-rs / |
+ +--------+ +--------+ / |
+ | | | | / |
+ | -- | PW-1 | -- |---/ |
+ | / \--|- - - - - - - - - - - | / \ | |
+ | \S / | | \S / | |
+ | -- | | -- |---\ |
+ +--------+ +--------+ \ |
+ / \ |
+ ---- +--------+
+ |Agg | | |
+ ---- | -- |
+ / \ | / \ |
+ CE-2 CE-3 | \S / |
+ | -- |
+ +--------+
+ PE3-rs
+ Agg = Layer-2 Aggregation
+ --
+ / \
+ \S / = Virtual Switch Instance
+ --
+
+ Figure 3: An example of a hierarchical VPLS model
+
+ The MTU-s and the PE-rs treat each spoke connection like an AC of the
+ VPLS service. The PW label is used to associate the traffic from the
+ spoke to a VPLS instance.
+
+
+
+
+Lasserre & Kompella Standards Track [Page 17]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+10.1.1.1. MTU-s Operation
+
+ An MTU-s is defined as a device that supports layer-2 switching
+ functionality and does all the normal bridging functions of learning
+ and replication on all its ports, including the spoke, which is
+ treated as a virtual port. Packets to unknown destinations are
+ replicated to all ports in the service including the spoke. Once the
+ MAC address is learned, traffic between CE1 and CE2 will be switched
+ locally by the MTU-s, saving the capacity of the spoke to the PE-rs.
+ Similarly traffic between CE1 or CE2 and any remote destination is
+ switched directly onto the spoke and sent to the PE-rs over the
+ point-to-point PW.
+
+ Since the MTU-s is bridging capable, only a single PW is required per
+ VPLS instance for any number of access connections in the same VPLS
+ service. This further reduces the signaling overhead between the
+ MTU-s and PE-rs.
+
+ If the MTU-s is directly connected to the PE-rs, other encapsulation
+ techniques, such as Q-in-Q, can be used for the spoke.
+
+10.1.1.2. PE-rs Operation
+
+ A PE-rs is a device that supports all the bridging functions for VPLS
+ service and supports the routing and MPLS encapsulation; i.e., it
+ supports all the functions described for a basic VPLS, as described
+ above.
+
+ The operation of PE-rs is independent of the type of device at the
+ other end of the spoke. Thus, the spoke from the MTU-s is treated as
+ a virtual port, and the PE-rs will switch traffic between the spoke
+ PW, hub PWs, and ACs once it has learned the MAC addresses.
+
+10.1.2. Advantages of Spoke Connectivity
+
+ Spoke connectivity offers several scaling and operational advantages
+ for creating large-scale VPLS implementations, while retaining the
+ ability to offer all the functionality of the VPLS service.
+
+ - Eliminates the need for a full mesh of tunnels and full mesh of
+ PWs per service between all devices participating in the VPLS
+ service.
+
+ - Minimizes signaling overhead, since fewer PWs are required for the
+ VPLS service.
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 18]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ - Segments VPLS nodal discovery. MTU-s needs to be aware of only
+ the PE-rs node, although it is participating in the VPLS service
+ that spans multiple devices. On the other hand, every VPLS PE-rs
+ must be aware of every other VPLS PE-rs and all of its locally
+ connected MTU-s and PE-r devices.
+
+ - Addition of other sites requires configuration of the new MTU-s
+ but does not require any provisioning of the existing MTU-s
+ devices on that service.
+
+ - Hierarchical connections can be used to create VPLS service that
+ spans multiple service provider domains. This is explained in a
+ later section.
+
+ Note that as more devices participate in the VPLS, there are more
+ devices that require the capability for learning and replication.
+
+10.1.3. Spoke Connectivity for Non-Bridging Devices
+
+ In some cases, a bridging PE-rs may not be deployed, or a PE-r might
+ already have been deployed. In this section, we explain how a PE-r
+ that does not support any of the VPLS bridging functionality can
+ participate in the VPLS service.
+
+ In Figure 4, three customer sites are connected through CE-1, CE-2,
+ and CE-3 to the VPLS through PE-r. For every attachment circuit that
+ participates in the VPLS service, PE-r creates a point-to-point PW
+ that terminates on the VSI of PE1-rs.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 19]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ PE2-rs
+ +--------+
+ | |
+ | -- |
+ | / \ |
+ CE-1 | \S / |
+ \ | -- |
+ \ +--------+
+ \ PE-r PE1-rs / |
+ +--------+ +--------+ / |
+ |\ | | | / |
+ | \ | PW-1 | -- |---/ |
+ | ------|- - - - - - - - - - - | / \ | |
+ | -----|- - - - - - - - - - - | \S / | |
+ | / | | -- |---\ |
+ +--------+ +--------+ \ |
+ / \ |
+ ---- +--------+
+ | Agg| | |
+ ---- | -- |
+ / \ | / \ |
+ CE-2 CE-3 | \S / |
+ | -- |
+ +--------+
+ PE3-rs
+
+ Figure 4: An example of a hierarchical VPLS
+ with non-bridging spokes
+
+ The PE-r is defined as a device that supports routing but does not
+ support any bridging functions. However, it is capable of setting up
+ PWs between itself and the PE-rs. For every port that is supported
+ in the VPLS service, a PW is set up from the PE-r to the PE-rs. Once
+ the PWs are set up, there is no learning or replication function
+ required on the part of the PE-r. All traffic received on any of the
+ ACs is transmitted on the PW. Similarly, all traffic received on a
+ PW is transmitted to the AC where the PW terminates. Thus, traffic
+ from CE1 destined for CE2 is switched at PE1-rs and not at PE-r.
+
+ Note that in the case where PE-r devices use Provider VLANs (P-VLAN)
+ as demultiplexers instead of PWs, PE1-rs can treat them as such and
+ map these "circuits" into a VPLS domain to provide bridging support
+ between them.
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 20]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ This approach adds more overhead than the bridging-capable (MTU-s)
+ spoke approach, since a PW is required for every AC that participates
+ in the service versus a single PW required per service (regardless of
+ ACs) when an MTU-s is used. However, this approach offers the
+ advantage of offering a VPLS service in conjunction with a routed
+ internet service without requiring the addition of new MTU-s.
+
+10.2. Redundant Spoke Connections
+
+ An obvious weakness of the hub and spoke approach described thus far
+ is that the MTU-s has a single connection to the PE-rs. In case of
+ failure of the connection or the PE-rs, the MTU-s suffers total loss
+ of connectivity.
+
+ In this section, we describe how the redundant connections can be
+ provided to avoid total loss of connectivity from the MTU-s. The
+ mechanism described is identical for both, MTU-s and PE-r devices.
+
+10.2.1. Dual-Homed MTU-s
+
+ To protect from connection failure of the PW or the failure of the
+ PE-rs, the MTU-s or the PE-r is dual-homed into two PE-rs devices.
+ The PE-rs devices must be part of the same VPLS service instance.
+
+ In Figure 5, two customer sites are connected through CE-1 and CE-2
+ to an MTU-s. The MTU-s sets up two PWs (one each to PE1-rs and
+ PE3-rs) for each VPLS instance. One of the two PWs is designated as
+ primary and is the one that is actively used under normal conditions,
+ whereas the second PW is designated as secondary and is held in a
+ standby state. The MTU-s negotiates the PW labels for both the
+ primary and secondary PWs, but does not use the secondary PW unless
+ the primary PW fails. How a spoke is designated primary or secondary
+ is outside the scope of this document. For example, a spanning tree
+ instance running between only the MTU-s and the two PE-rs nodes is
+ one possible method. Another method could be configuration.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 21]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ PE2-rs
+ +--------+
+ | |
+ | -- |
+ | / \ |
+ CE-1 | \S / |
+ \ | -- |
+ \ +--------+
+ \ MTU-s PE1-rs / |
+ +--------+ +--------+ / |
+ | | | | / |
+ | -- | Primary PW | -- |---/ |
+ | / \ |- - - - - - - - - - - | / \ | |
+ | \S / | | \S / | |
+ | -- | | -- |---\ |
+ +--------+ +--------+ \ |
+ / \ \ |
+ / \ +--------+
+ / \ | |
+ CE-2 \ | -- |
+ \ Secondary PW | / \ |
+ - - - - - - - - - - - - - - - - - | \S / |
+ | -- |
+ +--------+
+ PE3-rs
+ Figure 5: An example of a dual-homed MTU-s
+
+10.2.2. Failure Detection and Recovery
+
+ The MTU-s should control the usage of the spokes to the PE-rs
+ devices. If the spokes are PWs, then LDP signaling is used to
+ negotiate the PW labels, and the hello messages used for the LDP
+ session could be used to detect failure of the primary PW. The use
+ of other mechanisms that could provide faster detection failures is
+ outside the scope of this document.
+
+ Upon failure of the primary PW, MTU-s immediately switches to the
+ secondary PW. At this point, the PE3-rs that terminates the
+ secondary PW starts learning MAC addresses on the spoke PW. All
+ other PE-rs nodes in the network think that CE-1 and CE-2 are behind
+ PE1-rs and may continue to send traffic to PE1-rs until they learn
+ that the devices are now behind PE3-rs. The unlearning process can
+ take a long time and may adversely affect the connectivity of
+ higher-level protocols from CE1 and CE2. To enable faster
+ convergence, the PE3-rs where the secondary PW got activated may send
+ out a flush message (as explained in Section 6.2), using the MAC List
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 22]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ TLV, as defined in Section 6, to all PE-rs nodes. Upon receiving the
+ message, PE-rs nodes flush the MAC addresses associated with that
+ VPLS instance.
+
+10.3. Multi-domain VPLS Service
+
+ Hierarchy can also be used to create a large-scale VPLS service
+ within a single domain or a service that spans multiple domains
+ without requiring full mesh connectivity between all VPLS-capable
+ devices. Two fully meshed VPLS networks are connected together using
+ a single LSP tunnel between the VPLS "border" devices. A single
+ spoke PW per VPLS service is set up to connect the two domains
+ together.
+
+ When more than two domains need to be connected, a full mesh of
+ inter-domain spokes is created between border PEs. Forwarding rules
+ over this mesh are identical to the rules defined in Section 4.
+
+ This creates a three-tier hierarchical model that consists of a hub-
+ and-spoke topology between MTU-s and PE-rs devices, a full-mesh
+ topology between PE-rs, and a full mesh of inter-domain spokes
+ between border PE-rs devices.
+
+ This document does not specify how redundant border PEs per domain
+ per VPLS instance can be supported.
+
+11. Hierarchical VPLS Model Using Ethernet Access Network
+
+ In this section, the hierarchical model is expanded to include an
+ Ethernet access network. This model retains the hierarchical
+ architecture discussed previously in that it leverages the full-mesh
+ topology among PE-rs devices; however, no restriction is imposed on
+ the topology of the Ethernet access network (e.g., the topology
+ between MTU-s and PE-rs devices is not restricted to hub and spoke).
+
+ The motivation for an Ethernet access network is that Ethernet-based
+ networks are currently deployed by some service providers to offer
+ VPLS services to their customers. Therefore, it is important to
+ provide a mechanism that allows these networks to integrate with an
+ IP or MPLS core to provide scalable VPLS services.
+
+ One approach of tunneling a customer's Ethernet traffic via an
+ Ethernet access network is to add an additional VLAN tag to the
+ customer's data (which may be either tagged or untagged). The
+ additional tag is referred to as Provider's VLAN (P-VLAN). Inside
+ the provider's network each P-VLAN designates a customer or more
+ specifically a VPLS instance for that customer. Therefore, there is
+ a one-to-one correspondence between a P-VLAN and a VPLS instance. In
+
+
+
+Lasserre & Kompella Standards Track [Page 23]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ this model, the MTU-s needs to have the capability of adding the
+ additional P-VLAN tag to non-multiplexed ACs where customer VLANs are
+ not used as service delimiters. This functionality is described in
+ [802.1ad].
+
+ If customer VLANs need to be treated as service delimiters (e.g., the
+ AC is a multiplexed port), then the MTU-s needs to have the
+ additional capability of translating a customer VLAN (C-VLAN) to a
+ P-VLAN, or to push an additional P-VLAN tag, in order to resolve
+ overlapping VLAN tags used by different customers. Therefore, the
+ MTU-s in this model can be considered a typical bridge with this
+ additional capability. This functionality is described in [802.1ad].
+
+ The PE-rs needs to be able to perform bridging functionality over the
+ standard Ethernet ports toward the access network, as well as over
+ the PWs toward the network core. In this model, the PE-rs may need
+ to run STP towards the access network, in addition to split-horizon
+ over the MPLS core. The PE-rs needs to map a P-VLAN to a VPLS-
+ instance and its associated PWs, and vice versa.
+
+ The details regarding bridge operation for MTU-s and PE-rs (e.g.,
+ encapsulation format for Q-in-Q messages, customer's Ethernet control
+ protocol handling, etc.) are outside the scope of this document and
+ are covered in [802.1ad]. However, the relevant part is the
+ interaction between the bridge module and the MPLS/IP PWs in the
+ PE-rs, which behaves just as in a regular VPLS.
+
+11.1. Scalability
+
+ Since each P-VLAN corresponds to a VPLS instance, the total number of
+ VPLS instances supported is limited to 4K. The P-VLAN serves as a
+ local service delimiter within the provider's network that is
+ stripped as it gets mapped to a PW in a VPLS instance. Therefore,
+ the 4K limit applies only within an Ethernet access network (Ethernet
+ island) and not to the entire network. The SP network consists of a
+ core MPLS/IP network that connects many Ethernet islands. Therefore,
+ the number of VPLS instances can scale accordingly with the number of
+ Ethernet islands (a metro region can be represented by one or more
+ islands).
+
+11.2. Dual Homing and Failure Recovery
+
+ In this model, an MTU-s can be dual homed to different devices
+ (aggregators and/or PE-rs devices). The failure protection for
+ access network nodes and links can be provided through running STP in
+ each island. The STP of each island is independent of other islands
+ and do not interact with others. If an island has more than one
+ PE-rs, then a dedicated full-mesh of PWs is used among these PE-rs
+
+
+
+Lasserre & Kompella Standards Track [Page 24]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ devices for carrying the SP BPDU packets for that island. On a
+ per-P-VLAN basis, STP will designate a single PE-rs to be used for
+ carrying the traffic across the core. The loop-free protection
+ through the core is performed using split-horizon, and the failure
+ protection in the core is performed through standard IP/MPLS re-
+ routing.
+
+12. Contributors
+
+ Loa Andersson, TLA
+ Ron Haberman, Alcatel-Lucent
+ Juha Heinanen, Independent
+ Giles Heron, Tellabs
+ Sunil Khandekar, Alcatel-Lucent
+ Luca Martini, Cisco
+ Pascal Menezes, Independent
+ Rob Nath, Alcatel-Lucent
+ Eric Puetz, AT&T
+ Vasile Radoaca, Independent
+ Ali Sajassi, Cisco
+ Yetik Serbest, AT&T
+ Nick Slabakov, Juniper
+ Andrew Smith, Consultant
+ Tom Soon, AT&T
+ Nick Tingle, Alcatel-Lucent
+
+13. Acknowledgments
+
+ We wish to thank Joe Regan, Kireeti Kompella, Anoop Ghanwani, Joel
+ Halpern, Bill Hong, Rick Wilder, Jim Guichard, Steve Phillips, Norm
+ Finn, Matt Squire, Muneyoshi Suzuki, Waldemar Augustyn, Eric Rosen,
+ Yakov Rekhter, Sasha Vainshtein, and Du Wenhua for their valuable
+ feedback.
+
+ We would also like to thank Rajiv Papneja (ISOCORE), Winston Liu
+ (Ixia), and Charlie Hundall for identifying issues with the draft in
+ the course of the interoperability tests.
+
+ We would also like to thank Ina Minei, Bob Thomas, Eric Gray and
+ Dimitri Papadimitriou for their thorough technical review of the
+ document.
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 25]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+14. Security Considerations
+
+ A more comprehensive description of the security issues involved in
+ L2VPNs is covered in [RFC4111]. An unguarded VPLS service is
+ vulnerable to some security issues that pose risks to the customer
+ and provider networks. Most of the security issues can be avoided
+ through implementation of appropriate guards. A couple of them can
+ be prevented through existing protocols.
+
+ - Data plane aspects
+
+ - Traffic isolation between VPLS domains is guaranteed by the
+ use of per VPLS L2 FIB table and the use of per VPLS PWs.
+
+ - The customer traffic, which consists of Ethernet frames, is
+ carried unchanged over VPLS. If security is required, the
+ customer traffic SHOULD be encrypted and/or authenticated
+ before entering the service provider network.
+
+ - Preventing broadcast storms can be achieved by using routers
+ as CPE devices or by rate policing the amount of broadcast
+ traffic that customers can send.
+
+ - Control plane aspects
+
+ - LDP security (authentication) methods as described in
+ [RFC3036] SHOULD be applied. This would prevent
+ unauthenticated messages from disrupting a PE in a VPLS.
+
+ - Denial of service attacks
+
+ - Some means to limit the number of MAC addresses (per site per
+ VPLS) that a PE can learn SHOULD be implemented.
+
+15. IANA Considerations
+
+ The type field in the MAC List TLV is defined as 0x404 in Section
+ 6.2.1.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 26]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+16. References
+
+16.1. Normative References
+
+ [RFC4447] Martini, L., Rosen, E., El-Aawar, N., Smith, T., and
+ G. Heron, "Pseudowire Setup and Maintenance Using the
+ Label Distribution Protocol (LDP)", RFC 4447, April
+ 2006.
+
+ [RFC4448] Martini, L., Rosen, E., El-Aawar, N., and G. Heron,
+ "Encapsulation Methods for Transport of Ethernet over
+ MPLS Networks", RFC 4448, April 2006.
+
+ [802.1D-ORIG] Original 802.1D - ISO/IEC 10038, ANSI/IEEE Std
+ 802.1D-1993 "MAC Bridges".
+
+ [802.1D-REV] 802.1D - "Information technology - Telecommunications
+ and information exchange between systems - Local and
+ metropolitan area networks - Common specifications -
+ Part 3: Media Access Control (MAC) Bridges: Revision.
+ This is a revision of ISO/IEC 10038: 1993, 802.1j-1992
+ and 802.6k-1992. It incorporates P802.11c, P802.1p
+ and P802.12e." ISO/IEC 15802-3: 1998.
+
+ [802.1Q] 802.1Q - ANSI/IEEE Draft Standard P802.1Q/D11, "IEEE
+ Standards for Local and Metropolitan Area Networks:
+ Virtual Bridged Local Area Networks", July 1998.
+
+ [RFC3036] Andersson, L., Doolan, P., Feldman, N., Fredette, A.,
+ and B. Thomas, "LDP Specification", RFC 3036, January
+ 2001.
+
+ [RFC4446] Martini, L., "IANA Allocations for Pseudowire Edge to
+ Edge Emulation (PWE3)", BCP 116, RFC 4446, April 2006.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+16.2. Informative References
+
+ [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
+ Networks (VPNs)", RFC 4364, February 2006.
+
+ [RADIUS-DISC] Heinanen, J., Weber, G., Ed., Townsley, W., Booth, S.,
+ and W. Luo, "Using Radius for PE-Based VPN Discovery",
+ Work in Progress, October 2005.
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 27]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+ [BGP-DISC] Ould-Brahim, H., Ed., Rosen, E., Ed., and Y. Rekhter,
+ Ed., "Using BGP as an Auto-Discovery Mechanism for
+ Network-based VPNs", Work in Progress, September 2006.
+
+ [L2FRAME] Andersson, L. and E. Rosen, "Framework for Layer 2
+ Virtual Private Networks (L2VPNs)", RFC 4664,
+ September 2006.
+
+ [L2VPN-REQ] Augustyn, W. and Y. Serbest, "Service Requirements for
+ Layer 2 Provider-Provisioned Virtual Private
+ Networks", RFC 4665, September 2006.
+
+ [RFC4111] Fang, L., "Security Framework for Provider-Provisioned
+ Virtual Private Networks (PPVPNs)", RFC 4111, July
+ 2005.
+
+ [802.1ad] "IEEE standard for Provider Bridges", Work in
+ Progress, December 2002.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 28]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+Appendix A. VPLS Signaling using the PWid FEC Element
+
+ This section is being retained because live deployments use this
+ version of the signaling for VPLS.
+
+ The VPLS signaling information is carried in a Label Mapping message
+ sent in downstream unsolicited mode, which contains the following
+ PWid FEC TLV.
+
+ PW, C, PW Info Length, Group ID, and Interface parameters are as
+ defined in [RFC4447].
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | PW TLV |C| PW Type |PW info Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Group ID |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | PWID |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Interface parameters |
+ ~ ~
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ We use the Ethernet PW type to identify PWs that carry Ethernet
+ traffic for multipoint connectivity.
+
+ In a VPLS, we use a VCID (which, when using the PWid FEC, has been
+ substituted with a more general identifier (AGI), to address
+ extending the scope of a VPLS) to identify an emulated LAN segment.
+ Note that the VCID as specified in [RFC4447] is a service identifier,
+ identifying a service emulating a point-to-point virtual circuit. In
+ a VPLS, the VCID is a single service identifier, so it has global
+ significance across all PEs involved in the VPLS instance.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 29]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+Authors' Addresses
+
+ Marc Lasserre
+ Alcatel-Lucent
+ EMail: mlasserre@alcatel-lucent.com
+
+ Vach Kompella
+ Alcatel-Lucent
+ EMail: vach.kompella@alcatel-lucent.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 30]
+
+RFC 4762 Virtual Private LAN Service over LDP January 2007
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2007).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Lasserre & Kompella Standards Track [Page 31]
+