diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5254.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5254.txt')
-rw-r--r-- | doc/rfc/rfc5254.txt | 1515 |
1 files changed, 1515 insertions, 0 deletions
diff --git a/doc/rfc/rfc5254.txt b/doc/rfc/rfc5254.txt new file mode 100644 index 0000000..d4f68c8 --- /dev/null +++ b/doc/rfc/rfc5254.txt @@ -0,0 +1,1515 @@ + + + + + + +Network Working Group N. Bitar, Ed. +Request for Comments: 5254 Verizon +Category: Informational M. Bocci, Ed. + Alcatel-Lucent + L. Martini, Ed. + Cisco Systems, Inc. + October 2008 + + +Requirements for Multi-Segment Pseudowire Emulation Edge-to-Edge (PWE3) + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Abstract + + This document describes the necessary requirements to allow a service + provider to extend the reach of pseudowires across multiple domains. + These domains can be autonomous systems under one provider + administrative control, IGP areas in one autonomous system, different + autonomous systems under the administrative control of two or more + service providers, or administratively established pseudowire + domains. + + + + + + + + + + + + + + + + + + + + + + + + + +Bitar, et al. Informational [Page 1] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Scope ......................................................3 + 1.2. Architecture ...............................................3 + 2. Terminology .....................................................6 + 2.1. Specification of Requirements ..............................6 + 3. Use Cases .......................................................7 + 3.1. Multi-Segment Pseudowire Setup Mechanisms ..................9 + 4. Multi-Segment Pseudowire Requirements ..........................10 + 4.1. All Mechanisms ............................................10 + 4.1.1. Architecture .......................................10 + 4.1.2. Resiliency .........................................11 + 4.1.3. Quality of Service .................................11 + 4.1.4. Congestion Control .................................12 + 4.1.5 Generic Requirements for MS-PW Setup Mechanisms ....13 + 4.1.6. Routing ............................................14 + 4.2. Statically Configured MS-PWs ..............................15 + 4.2.1. Architecture .......................................15 + 4.2.2. MPLS-PWs ...........................................15 + 4.2.3. Resiliency .........................................15 + 4.2.4. Quality of Service .................................16 + 4.3. Signaled PW Segments ......................................16 + 4.3.1. Architecture .......................................16 + 4.3.2. Resiliency .........................................16 + 4.3.3. Quality of Service .................................17 + 4.3.4. Routing ............................................17 + 4.3.5. Additional Requirements on Signaled MS-PW Setup + Mechanisms .........................................17 + 4.4. Signaled PW / Dynamic Route ...............................18 + 4.4.1. Architecture .......................................18 + 4.4.2. Resiliency .........................................18 + 4.4.3. Quality of Service .................................18 + 4.4.4. Routing ............................................18 + 5. Operations and Maintenance (OAM) ...............................19 + 6. Management of Multi-Segment Pseudowires ........................20 + 6.1. MIB Requirements ..........................................20 + 6.2. Management Interface Requirements .........................21 + 7. Security Considerations ........................................21 + 7.1. Inter-Provider MS-PWs .....................................21 + 7.1.1. Data-Plane Security Requirements ...................21 + 7.1.2. Control-Plane Security Requirements ................23 + 7.2. Intra-Provider MS-PWs .....................................25 + 8. Acknowledgments ................................................25 + 9. References .....................................................25 + 9.1. Normative References ......................................25 + 9.2. Informative References ....................................25 + + + + +Bitar, et al. Informational [Page 2] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +1. Introduction + +1.1. Scope + + This document specifies requirements for extending pseudowires across + more than one packet switched network (PSN) domain and/or more than + one PSN tunnel. These pseudowires are called multi-segment + pseudowires (MS-PWs). Requirements for single-segment pseudowires + (SS-PWs) that extend edge to edge across only one PSN domain are + specified in [RFC3916]. This document is not intended to invalidate + any part of [RFC3985]. + + This document specifies additional requirements that apply to MS-PWs. + These requirements do not apply to PSNs that only support SS-PWs. + +1.2. Architecture + + The following three figures describe the reference models that are + derived from [RFC3985] to support PW emulated services. + + |<-------------- Emulated Service ---------------->| + | | + | |<------- Pseudowire ------->| | + | | | | + | | |<-- PSN Tunnel -->| | | + | PW End V V V V PW End | + V Service +----+ +----+ Service V + +-----+ | | PE1|==================| PE2| | +-----+ + | |----------|............PW1.............|----------| | + | CE1 | | | | | | | | CE2 | + | |----------|............PW2.............|----------| | + +-----+ ^ | | |==================| | | ^ +-----+ + ^ | +----+ +----+ | | ^ + | | Provider Edge 1 Provider Edge 2 | | + | | | | + Customer | | Customer + Edge 1 | | Edge 2 + | | + | | + Attachment Circuit (AC) Attachment Circuit (AC) + Native service Native service + + Figure 1: PWE3 Reference Configuration + + + + + + + + +Bitar, et al. Informational [Page 3] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + Figure 1 shows the PWE3 reference architecture [RFC3985]. This + architecture applies to the case where a PSN tunnel extends between + two edges of a single PSN domain to transport a PW with endpoints at + these edges. + + Native |<--------Multi-Segment Pseudowire----->| Native + Service | PSN PSN | Service + (AC) | |<-Tunnel->| |<-Tunnel->| | (AC) + | V V 1 V V 2 V V | + | +-----+ +-----+ +---- + | + +---+ | |T-PE1|==========|S-PE1|==========|T-PE2| | +---+ + | |---------|........PW1.......... |...PW3..........|---|----| | + |CE1| | | | | | | | | |CE2| + | |---------|........PW2...........|...PW4..........|--------| | + +---+ | | |==========| |==========| | | +---+ + ^ +-----+ +-----+ +-----+ ^ + | Provider Edge 1 ^ Provider Edge 3 | + | | | + | | | + | PW switching point | + | | + | | + |<------------------- Emulated Service ------------------->| + + Figure 2: PW Switching Reference Model + + Figure 2 extends this architecture to show a multi-segment case. + Terminating PE1 (T-PE1) and Terminating PE3 (T-PE3) provide PWE3 + service to CE1 and CE2. These PEs terminate different PSN tunnels, + PSN Tunnel 1 and PSN Tunnel 2, and may reside in different PSN or + pseudowire domains. One PSN tunnel extends from T-PE1 to S-PE1 + across PSN1, and a second PSN tunnel extends from S-PE1 to T-PE2 + across PSN2. + + PWs are used to connect the Attachment circuits (ACs) attached to + T-PE1 to the corresponding ACs attached to T-PE2. Each PW on PSN + tunnel 1 is switched to a PW in the tunnel across PSN2 at S-PE1 to + complete the multi-segment PW (MS-PW) between T-PE1 and T-PE2. S-PE1 + is therefore the PW switching point and will be referred to as the PW + switching provider edge (S-PE). PW1 and PW3 are segments of the same + MS-PW while PW2 and PW4 are segments of another pseudowire. PW + segments of the same MS-PW (e.g., PW1 and PW3) MAY be of the same PW + type or different types, and PSN tunnels (e.g., PSN Tunnel 1 and PSN + Tunnel 2) can be the same or different technology. This document + requires support for MS-PWs with segments of the same PW type only. + + + + + + +Bitar, et al. Informational [Page 4] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + An S-PE switches an MS-PW from one segment to another based on the PW + identifiers (e.g., PW label in case of MPLS PWs). In Figure 2, the + domains that PSN Tunnel 1 and PSN Tunnel 2 traverse could be IGP + areas in the same IGP network or simply PWE3 domains in a single flat + IGP network, for instance. + + |<------Multi-Segment Pseudowire------>| + | AS AS | + AC | |<----1---->| |<----2--->| | AC + | V V V V V V | + | +----+ +-----+ +----+ +----+ | + +----+ | | |=====| |=====| |=====| | | +----+ + | |-------|.....PW1..........PW2.........PW3.....|-------| | + | CE1| | | | | | | | | | | |CE2 | + +----+ | | |=====| |=====| |=====| | | +----+ + ^ +----+ +-----+ +----+ +----+ ^ + | T-PE1 S-PE2 S-PE3 T-PE4 | + | ^ ^ | + | | | | + | PW switching points | + | | + | | + |<------------------- Emulated Service --------------->| + + Figure 3: PW Switching Inter-Provider Reference Model + + Note that although Figure 2 only shows a single S-PE, a PW may + transit more than one S-PEs along its path. For instance, in the + multi-AS case shown in Figure 3, there can be an S-PE (S-PE2) at the + border of one AS (AS1) and another S-PE (S-PE3) at the border of the + other AS (AS2). An MS-PW that extends from the edge of one AS (T- + PE1) to the edge of the other AS (T-PE4) is composed of three + segments: (1) PW1, a segment in AS1, (2) PW2, a segment between the + two border routers (S-PE2 and S-PE3) that are switching PEs, and (3) + PWE3, a segment in AS2. AS1 and AS2 could belong to the same + provider (e.g., AS1 could be an access network or metro transport + network, and AS2 could be an MPLS core network) or to two different + providers (e.g., AS1 for Provider 1 and AS2 for Provider 2). + + + + + + + + + + + + + +Bitar, et al. Informational [Page 5] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +2. Terminology + + RFC 3985 [RFC3985] provides terminology for PWE3. The following + additional terminology is defined for multi-segment pseudowires: + + - PW Terminating Provider Edge (T-PE). A PE where the + customer-facing attachment circuits (ACs) are bound to a PW + forwarder. A Terminating PE is present in the first and last + segments of an MS-PW. This incorporates the functionality of a + PE as defined in RFC 3985. + + - Single-Segment Pseudowire (SS-PW). A PW setup directly between + two PE devices. Each direction of an SS-PW traverses one PSN + tunnel that connects the two PEs. + + - Multi-Segment Pseudowire (MS-PW). A static or dynamically + configured set of two or more contiguous PW segments that + behave and function as a single point-to-point PW. Each end of + an MS-PW by definition MUST terminate on a T-PE. + + - PW Segment. A single-segment or a part of a multi-segment PW, + which is set up between two PE devices, T-PEs and/or S-PEs. + + - PW Switching Provider Edge (S-PE). A PE capable of switching + the control and data planes of the preceding and succeeding PW + segments in an MS-PW. The S-PE terminates the PSN tunnels + transporting the preceding and succeeding segments of the MS- + PW. It is therefore a PW switching point for an MS-PW. A PW + switching point is never the S-PE and the T-PE for the same + MS-PW. A PW switching point runs necessary protocols to set up + and manage PW segments with other PW switching points and + terminating PEs. + +2.1. Specification of Requirements + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + + + + + + + + + + + + + +Bitar, et al. Informational [Page 6] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +3. Use Cases + + PWE3 defines the signaling and encapsulation techniques for + establishing SS-PWs between a pair of terminating PEs (T-PEs), and in + the vast majority of cases, this will be sufficient. MS-PWs may be + useful in the following situations: + + -i. Inter-Provider PWs: An Inter-Provider PW is a PW that extends + from a T-PE in one provider domain to a T-PE in another + provider domain. + + -ii. It may not be possible, desirable, or feasible to establish a + direct PW control channel between the T-PEs, residing in + different provider networks, to set up and maintain PWs. At a + minimum, a direct PW control channel establishment (e.g., + targeted LDP session) requires knowledge of and reachability + to the remote T-PE IP address. The local T-PE may not have + access to this information due to operational or security + constraints. Moreover, an SS-PW would require the existence + of a PSN tunnel between the local T-PE and the remote T-PE. + It may not be feasible or desirable to extend single, + contiguous PSN tunnels between T-PEs in one domain and T-PEs + in another domain for security and/or scalability reasons or + because the two domains may be using different PSN + technologies. + + -iii. MS-PW setup, maintenance, and forwarding procedures must + satisfy requirements placed by the constraints of a + multi-provider environment. An example is the inter-AS L2VPN + scenario where the T-PEs reside in different provider networks + (ASs) and it is the current practice to MD5-key all control + traffic exchanged between two networks. An MS-PW allows the + providers to confine MD5 key administration for the LDP + session to just the PW switching points connecting the two + domains. + + -iv. PSN Interworking: PWE3 signaling protocols and PSN types may + differ in different provider networks. The terminating PEs + may be connected to networks employing different PW signaling + and/or PSN protocols. In this case, it is not possible to use + an SS-PW. An MS-PW with the appropriate interworking + performed at the PW switching points can enable PW + connectivity between the terminating PEs in this scenario. + + + + + + + + +Bitar, et al. Informational [Page 7] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + -v. Traffic Engineered PSN Tunnels and bandwidth-managed PWs: + There is a requirement to deploy PWs edge to edge in large + service provider networks. Such networks typically encompass + hundreds or thousands of aggregation devices at the edge, each + of which would be a PE. Furthermore, there is a requirement + that these PWs have explicit bandwidth guarantees. To satisfy + these requirements, the PWs will be tunneled over PSN + TE-tunnels with bandwidth constraints. A single-segment + pseudowire architecture would require that a full mesh of PSN + TE-tunnels be provisioned to allow PWs to be established + between all PEs. Inter-provider PWs riding traffic engineered + tunnels further add to the number of tunnels that would have + to be supported by the PEs and the core network as the total + number of PEs increases. + + In this environment, there is a requirement either to support + a sparse mesh of PSN TE-tunnels and PW signaling adjacencies, + or to partition the network into a number of smaller PWE3 + domains. In either case, a PW would have to pass through more + than one PSN tunnel hop along its path. An objective is to + reduce the number of tunnels that must be supported, and thus + the complexity and scalability problem that may arise. + + -vi. Pseudowires in access/metro networks: Service providers wish + to extend PW technology to access and metro networks in order + to reduce maintenance complexity and operational costs. + Today's access and metro networks are either legacy (Time + Division Multiplexed (TDM), Synchronous Optical + Network/Synchronous Digital Hierarchy (SONET/SDH), or Frame + Relay/Asynchronous Transfer Mode (ATM)), Ethernet, or IP + based. + + Due to these architectures, circuits (e.g., Ethernet Virtual + Circuits (EVCs), ATM VCs, TDM circuits) in the access/metro + are traditionally handled as attachment circuits, in their + native format, to the edge of the IP-MPLS network where the PW + starts. This combination requires multiple separate access + networks and complicates end-to-end control, provisioning, and + maintenance. In addition, when a TDM or SONET/SDH access + network is replaced with a packet-based infrastructure, + expenses may be lowered due to moving statistical multiplexing + closer to the end-user and converging multiple services onto a + single access network. + + Access networks have a number of properties that impact the + application of PWs. For example, there exist access + mechanisms where the PSN is not of an IETF specified type, but + uses mechanisms compatible with those of PWE3 at the PW layer. + + + +Bitar, et al. Informational [Page 8] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + Here, use case (iv) may apply. In addition, many networks + consist of hundreds or thousands of access devices. There is + therefore a desire to support a sparse mesh of PW signaling + adjacencies and PSN tunnels. Use case (v) may therefore + apply. Finally, access networks also tend to differ from core + networks in that the access PW setup and maintenance mechanism + may only be a subset of that used in the core. + + Using the MS-PWs, access and metro network elements need only + maintain PW signaling adjacencies with the PEs to which they + directly connect. They do not need PW signaling adjacencies + with every other access and metro network device. PEs in the + PSN backbone, in turn, maintain PW signaling adjacencies among + each other. In addition, a PSN tunnel is set up between an + access element and the PE to which it connects. Another PSN + tunnel needs to be established between every PE pair in the + PSN backbone. An MS-PW may be set up from one access network + element to another access element with three segments: (1) + access-element - PSN-PE, (2) PSN-PE to PSN-PE, and (3) PSN-PE + to access element. In this MS-PW setup, access elements are + T-PEs while PSN-PEs are S-PEs. It should be noted that the + PSN backbone can be also segmented into PWE3 domains resulting + in more segments per PW. + +3.1. Multi-Segment Pseudowire Setup Mechanisms + + This requirements document assumes that the above use cases are + realized using one or more of the following mechanisms: + + -i. Static Configuration: The switching points (S-PEs), in + addition to the T-PEs, are manually provisioned for each + segment. + + -ii. Pre-Determined Route: The PW is established along an + administratively determined route using an end-to-end + signaling protocol with automated stitching at the S-PEs. + + -iii. Signaled Dynamic Route: The PW is established along a + dynamically determined route using an end-to-end signaling + protocol with automated stitching at the S-PEs. The route is + selected with the aid of one or more dynamic routing + protocols. + + Note that we define the PW route to be the set of S-PEs through which + an MS-PW will pass between a given pair of T-PEs. PSN tunnels along + that route can be explicitly specified or locally selected at the + S-PEs and T-PEs. The routing of the PSN tunnels themselves is + outside the scope of the requirements specified in this document. + + + +Bitar, et al. Informational [Page 9] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +4. Multi-Segment Pseudowire Requirements + + The following sections detail the requirements that the above use + cases put on the MS-PW setup mechanisms. + +4.1. All Mechanisms + + The following generic requirements apply to the three MS-PW setup + mechanisms defined in the previous section. + +4.1.1. Architecture + + -i. If MS-PWs are tunneled across a PSN that only supports SS-PWs, + then only the requirements of [RFC3916] apply to that PSN. + The fact that the overlay is carrying MS-PWs MUST be + transparent to the routers in the PSN. + + -ii. The PWs MUST remain transparent to the P-routers. A P-router + is not an S-PE or an T-PE from the MS-PW architecture + viewpoint. P-routers provide transparent PSN transport for + PWs and MUST not have any knowledge of the PWs traversing + them. + + -iii. The MS-PWs MUST use the same encapsulation modes specified for + SS-PWs. + + -iv. The MS-PWs MUST be composed of SS-PWs. + + -v. An MS-PW MUST be able to pass across PSNs of all technologies + supported by PWE3 for SS-PWs. When crossing from one PSN + technology to another, an S-PE must provide the necessary PSN + interworking functions in that case. + + -vi. Both directions of a PW segment MUST terminate on the same + S-PE/T-PE. + + -vii. S-PEs MAY only support switching PWs of the same PW type. In + this case, the PW type is transparent to the S-PE in the + forwarding plane, except for functions needed to provide for + interworking between different PSN technologies. + + -viii. Solutions MAY provide a way to prioritize the setup and + maintenance process among PWs. + + + + + + + + +Bitar, et al. Informational [Page 10] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +4.1.2. Resiliency + + Mechanisms to protect an MS-PW when an element on the existing path + of an MS-PW fails MUST be provided. These mechanisms will depend on + the MS-PW setup. The following are the generic resiliency + requirements that apply to all MS-PW setup mechanisms: + + -i. Configuration and establishment of a backup PW to a primary PW + SHOULD be supported. Mechanisms to perform a switchover from + a primary PW to a backup PW upon failure detection SHOULD be + provided. + + -ii. The ability to configure an end-to-end backup PW path for a + primary PW path SHOULD be supported. The primary and backup + paths may be statically configured, statically specified for + signaling, or dynamically selected via dynamic routing + depending on the MS-PW establishment mechanism. Backup and + primary paths should have the ability to traverse separate + S-PEs. The backup path MAY be signaled at configuration time + or after failure. + + -iii. The ability to configure a primary PW and a backup PW with a + different T-PE from the primary SHOULD be supported. + + -iv. Automatic Mechanisms to perform a fast switchover from a + primary PW to a backup PW upon failure detection SHOULD be + provided. + + -v. A mechanism to automatically revert to a primary PW from a + backup PW MAY be provided. When provided, it MUST be + configurable. + +4.1.3. Quality of Service + + Pseudowires are intended to support emulated services (e.g., TDM and + ATM) that may have strict per-connection quality-of-service (QoS) + requirements. This may include either absolute or relative + guarantees on packet loss, delay, and jitter. These guarantees are, + in part, delivered by reserving sufficient network resources (e.g., + bandwidth), and by providing appropriate per-packet treatment (e.g., + scheduling priority and drop precedence) throughout the network. + + For SS-PWs, a traffic engineered PSN tunnel (i.e., MPLS-TE) may be + used to ensure that sufficient resources are reserved in the + P-routers to provide QoS to PWs on the tunnel. In this case, T-PEs + MUST have the ability to automatically request the PSN tunnel + resources in the direction of traffic (e.g., admission control of PWs + onto the PSN tunnel and accounting for reserved bandwidth and + + + +Bitar, et al. Informational [Page 11] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + available bandwidth on the tunnel). In cases where the tunnel + supports multiple classes of service (CoS) (e.g., E-LSP), bandwidth + management is required per CoS. + + For MS-PWs, each S-PE maps a PW segment to a PSN tunnel. Solutions + MUST enable S-PEs and T-PEs to automatically bind a PW segment to a + PSN tunnel based on CoS and bandwidth requirements when these + attributes are specified for a PW. Solutions SHOULD also provide the + capability of binding a PW segment to a tunnel as a matter of policy + configuration. S-PEs and T-PEs must be capable of automatically + requesting PSN tunnel resources per CoS. + + S-PEs and T-PEs MUST be able to associate a CoS marking (e.g., EXP + field value for MPLS PWs) with PW PDUs. CoS marking in the PW PDUs + affects packet treatment. The CoS marking depends on the PSN + technology. Thus, solutions must enable the configuration of + necessary mapping for CoS marking when the MS-PW crosses from one PSN + technology to another. Similarly, different administrative domains + may use different CoS values to imply the same CoS treatment. + Solutions MUST provide the ability to define CoS marking maps on + S-PEs at administrative domain boundaries to translate from one CoS + value to another as a PW PDU crosses from one domain to the next. + + [RFC3985] requires PWs to respond to path congestion by reducing + their transmission rate. Alternatively, RFC 3985 permits PWs that do + not have a congestion control mechanism to transmit using explicitly + reserved capacity along a provisioned path. Because MS-PWs are a + type of PW, this requirement extends to them as well. RFC 3985 + applied to MS-PWs consequently requires that MS-PWs employ a + congestion control mechanism that is effective across an MS path, or + requires an explicit provisioning action that reserves sufficient + capacity in all domains along the MS path before the MS-PW begins + transmission. S-PEs are therefore REQUIRED to reject attempts to + establish MS-PW segments for PW types that either do not utilize an + appropriate congestion control scheme or when resources that are + sufficient to support the transmission rate of the PW cannot be + reserved along the path. + +4.1.4. Congestion Control + + [RFC3985] requires all PWs to respond to congestion, in order to + conform to [RFC2914]. In the absence of a well-defined congestion + control mechanism, [RFC3985] permits PWs to be carried across paths + that have been provisioned such that the traffic caused by PWs has no + harmful effect on concurrent traffic that shares the path, even under + congestion. These requirements extend to the MS-PWs defined in this + document. + + + + +Bitar, et al. Informational [Page 12] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + Path provisioning is frequently performed through QoS reservation + protocols or network management protocols. In the case of SS-PWs, + which remain within a single administrative domain, a number of + existing protocols can provide this provisioning functionality. MS- + PWs, however, may transmit across network domains that are under the + control of multiple entities. QoS provisioning across such paths is + inherently more difficult, due to the required inter-domain + interactions. It is important to note that these difficulties do not + invalidate the requirement to provision path capacity for MS-PW use. + Each domain MUST individually implement a method to control + congestion. This can be by QoS reservation, or other congestion + control method. MS-PWs MUST NOT transmit across unprovisioned, best + effort, paths in the absence of other congestion control schemes, as + required by [RFC3985]. + + Solutions MUST enable S-PEs and T-PEs on the path of an MS-PW to + notify other S-PEs and T-PEs on that path of congestion, when it + occurs. Congestion may be indicated by queue length, packet loss + rate, or bandwidth measurement (among others) crossing a respective + threshold. The action taken by a T-PE that receives a notification + of congestion along the path of one of its PWs could be to re-route + the MS-PW to an alternative path, including an alternative T-PE if + available. If a PE, or an S-PE has knowledge that a particular link + or tunnel is experiencing congestion, it MUST not set up any new + MS-PW that utilize that link or tunnel. Some PW types, such as TDM + PWs, are more sensitive to congestion than others. The reaction to a + congestion notification MAY vary per PW type. + +4.1.5. Additional Generic Requirements for MS-PW Setup Mechanisms + + The MS-PW setup mechanisms MUST accommodate the service provider's + practices, especially in relation to security, confidentiality of SP + information, and traffic engineering. Security and confidentiality + are especially important when the MS-PWs are set up across autonomous + systems in different administrative domains. The following are + generic requirements that apply to the three MS-PW setup mechanisms + defined earlier: + + -i. The ability to statically select S-PEs and PSN tunnels on a PW + path MUST be provided. Static selection of S-PEs is by + definition a requirement for the static configuration and + signaled/static route setup mechanisms. This requirement + satisfies the need for forcing an MS-PW to traverse specific + S-PEs to enforce service provider security and administrative + policies. + + -ii. Solutions SHOULD minimize the amount of configuration needed + to set up an MS-PW. + + + +Bitar, et al. Informational [Page 13] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + -iii. Solutions should support different PW setup mechanisms on the + same T-PE, S-PE, and PSN network. + + -iv. Solutions MUST allow T-PEs to simultaneously support use of + SS-PW signaling mechanisms as specified in [RFC4447], as well + as MS-PW signaling mechanisms. + + -v. Solutions MUST ensure that an MS-PW will be set up when a path + that satisfies the PW constraints for bandwidth, CoS, and + other possible attributes does exist in the network. + + -vi. Solutions must clearly define the setup procedures for each + mechanism so that an MS-PW setup on T-PEs can be interpreted + as successful only when all PW segments are successfully set + up. + + -vii. Admission control to the PSN tunnel needs to be performed + against available resources, when applicable. This process + MUST be performed at each PW segment comprising the MS-PW. PW + admission control into a PSN tunnel MUST be configurable. + + -viii. In case the PSN tunnel lacks the resources necessary to + accommodate the new PW, an attempt to signal a new PSN tunnel, + or increase the capacity of the existing PSN tunnel MAY be + made. If the expanded PSN tunnel fails to set up, the PW MUST + fail to set up. + + -ix. The setup mechanisms must allow the setup of a PW segment + between two directly connected S-PEs without the existence of + a PSN tunnel. This requirement allows a PW segment to be set + up between two (Autonomous System Border Routers (ASBRs) when + the MS-PW crosses AS boundaries without the need for + configuring and setting up a PSN tunnel. In this case, + admission control must be done, when enabled, on the link + between the S-PEs. + +4.1.6. Routing + + An objective of MS-PWs is to provide support for the following + connectivity: + + -i. MS-PWs MUST be able to traverse multiple service provider + administrative domains. + + -ii. MS-PWs MUST be able to traverse multiple autonomous systems + within the same administrative domain. + + + + + +Bitar, et al. Informational [Page 14] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + -iii. MS-PWs MUST be able to traverse multiple autonomous systems + belonging to different administrative domains. + + -iv. MS-PWs MUST be able to support any hybrid combination of the + aforementioned connectivity scenarios, including both PW + transit and termination in a domain. + +4.2. Statically Configured MS-PWs + + When the MS-PW segments are statically configured, the following + requirements apply in addition to the generic requirements previously + defined. + +4.2.1. Architecture + + There are no additional requirements on the architecture. + +4.2.2. MPLS-PWs + + Solutions should allow for the static configuration of MPLS labels + for MPLS-PW segments and the cross-connection of these labels to + preceding and succeeding segments. This is especially useful when an + MS-PW crosses provider boundaries and two providers do not want to + run any PW signaling protocol between them. A T-PE or S-PE that + allows the configuration of static labels for MS-PW segments should + also simultaneously allow for dynamic label assignments for other + MS-PW segments. It should be noted that when two interconnected + S-PEs do not have signaling peering for the purpose of setting up + MS-PW segments, they should have in-band PW Operations and + Maintenance (OAM) capabilities that relay PW or attachment circuit + defect notifications between the adjacent S-PEs. + +4.2.3. Resiliency + + The solution should allow for the protection of a PW segment, a + contiguous set of PW segments, as well as the end-to-end path. The + primary and protection segments must share the same segment + endpoints. Solutions should allow for having the backup paths set up + prior to the failure or as a result of failure. The choice should be + made by configuration. When resources are limited and cannot satisfy + all PWs, the PWs with the higher setup priorities should be given + preference when compared with the setup priorities of other PWs being + set up or the holding priorities of existing PWs. + + Solutions should strive to minimize traffic loss between T-PEs. + + + + + + +Bitar, et al. Informational [Page 15] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +4.2.4. Quality of Service + + The CoS and bandwidth of the MS-PW must be configurable at T-PEs and + S-PEs. + +4.3. Signaled PW Segments + + When the MS-PW segments are dynamically signaled, the following + requirements apply in addition to the generic requirements previously + defined. The signaled MS-PW segments can be on the path of a + statically configured MS-PW, signaled/statically routed MS-PW, or + signaled/dynamically routed MS-PW. + + There are four different mechanisms that are defined to setup SS-PWs: + + -i. Static set up of the SS-PW (MPLS or L2TPv3 forwarding) + + -ii. LDP using PWid Forwarding Equivalence Class (FEC) 128 + + -iii. LDP using the generalized PW FEC 129 + + -iv. L2TPv3 + + The MS-PW setup mechanism MUST be able to support PW segments + signaled with any of the above protocols; however, the specification + of which combinations of SS-PW signaling protocols are supported by a + specific implementation is outside the scope of this document. + + For the signaled/statically routed and signaled/dynamically routed + MS-PW setup mechanisms, the following requirements apply in addition + to the generic requirements previously defined. + +4.3.1. Architecture + + There are no additional requirements on the architecture. + +4.3.2. Resiliency + + Solutions should allow for the signaling of a protection path for a + PW segment, sequence of segments, or end-to-end path. The protection + and primary paths for the protected segment(s) share the same + respective segments endpoints. When admission control is enabled, + systems must be careful not to double account for bandwidth + allocation at merged points (e.g., tunnels). Solutions should allow + for having the backup paths set up prior to the failure or as a + result of failure. The choice should be made by configuration at the + endpoints of the protected path. When resources are limited and + cannot satisfy all PWs, the PWs with the higher setup priorities + + + +Bitar, et al. Informational [Page 16] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + should be given preference when compared with the setup priorities of + other PWs being set up or the holding priorities of existing PWs. + Procedures must allow for the primary and backup paths to be diverse. + +4.3.3. Quality of Service + + When the T-PE attempts to signal an MS-PW, the following capability + is required: + + -i. Signaling must be able to identify the CoS associated with an + MS-PW. + + -ii. Signaling must be able to carry the traffic parameters for an + MS-PW per CoS. Traffic parameters should be based on existing + INTSERV definitions and must be used for admission control + when admission control is enabled. + + -iii. The PW signaling MUST enable separate traffic parameter values + to be specified for the forward and reverse directions of the + PW. + + -iv. PW traffic parameter representations MUST be the same for all + types of MS-PWs. + + -v. The signaling protocol must be able to accommodate a method to + prioritize the PW setup and maintenance operation among PWs. + +4.3.4. Routing + + See the requirements for "Resiliency" above. + +4.3.5. Additional Requirements on Signaled MS-PW Setup Mechanisms + + The following are further requirements on signaled MS-PW setup + mechanisms: + + -i. The signaling procedures MUST be defined such that the setup + of an MS-PW is considered successful if all segments of the + MS-PW are successfully set up. + + -ii. The MS-PW path MUST have the ability to be dynamically set up + between the T-PEs by provisioning only the T-PEs. + + + + + + + + + +Bitar, et al. Informational [Page 17] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + -iii. Dynamic MS-PW setup requires that a unique identifier be + associated with a PW and be carried in the signaling message. + That identifier must contain sufficient information to + determine the path to the remote T-PE through intermediate + S-PEs. + + -iv. In a single-provider domain, it is natural to have the T-PE + identified by one of its IP addresses. This may also apply + when an MS-PW is set up across multiple domains operated by + the same provider. However, some service providers have + security and confidentiality policies that prevent them from + advertising reachability to routers in their networks to other + providers (reachability to an ASBR is an exception). Thus, + procedures MUST be provided to allow dynamic set up of MS-PWs + under these conditions. + +4.4. Signaled PW / Dynamic Route + + The following requirements apply, in addition to those in Sections + 4.1 and 4.3, when both dynamic signaling and dynamic routing are + used. + +4.4.1. Architecture + + There are no additional architectural requirements. + +4.4.2. Resiliency + + The PW routing function MUST support dynamic re-routing around + failure points when segments are set up using the dynamic setup + method. + +4.4.3. Quality of Service + + There are no additional QoS requirements. + +4.4.4. Routing + + The following are requirements associated with dynamic route + selection for an MS-PW: + + -i. Routing must enable S-PEs and T-PEs to discover S-PEs on the + path to a destination T-PE. + + -ii. The MS-PW routing function MUST have the ability to + automatically select the S-PEs along the MS-PW path. Some of + the S-PEs MAY be statically selected and carried in the + signaling to constrain the route selection process. + + + +Bitar, et al. Informational [Page 18] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + -iii. The PW routing function MUST support re-routing around + failures that occur between the statically configured segment + endpoints. This may be done by choosing another PSN tunnel + between the two segment endpoints or setting up an alternative + tunnel. + + -iv. Routing protocols must be able to advertise reachability + information of attachment circuit (AC) endpoints. This + reachability information must be consistent with the AC + identifiers carried in signaling. + +5. Operations and Maintenance (OAM) + + OAM mechanisms for the attachment circuits are defined in the + specifications for PW emulated specific technologies (e.g., ITU-T + I.610 [i610] for ATM). These mechanisms enable, among other things, + defects in the network to be detected, localized, and diagnosed. + They also enable communication of PW defect states on the PW + attachment circuit. Note that this document uses the term OAM as + Operations and Management as per ITU-T I.610. + + The interworking of OAM mechanisms for SS-PWs between ACs and PWs is + defined in [PWE3-OAM]. These enable defect states to be propagated + across a PWE3 network following the failure and recovery from faults. + + OAM mechanisms for MS-PWs MUST provide at least the same capabilities + as those for SS-PWs. In addition, it should be possible to support + both segment and end-to-end OAM mechanisms for both defect + notifications and connectivity verification in order to allow defects + to be localized in a multi-segment network. That is, PW OAM segments + can be T-PE to T-PE, T-PE to S-PE, or S-PE to S-PE. + + The following requirements apply to OAM for MS-PWs: + + -i. Mechanisms for PW segment failure detection and notification + to other segments of an MS-PW MUST be provided. + + -ii. MS-PW OAM SHOULD be supported end-to-end across the network. + + -iii. Single ended monitoring SHOULD be supported for both + directions of the MS-PW. + + -iv. SS-PW OAM mechanisms (e.g., [RFC5085]) SHOULD be extended to + support MS-PWs on both an end-to-end basis and segment basis. + + -v. All PE routers along the MS-PW MUST agree on a common PW OAM + mechanism to use for the MS-PW. + + + + +Bitar, et al. Informational [Page 19] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + -vi. At the S-PE, defects on an PSN tunnel MUST be propagated to + all PWs that utilize that particular PSN tunnel. + + -vii. The directionality of defect notifications MUST be maintained + across the S-PE. + + -viii. The S-PE SHOULD be able to behave as a segment endpoint for PW + OAM mechanisms. + + -ix. The S-PE MUST be able to pass T-PE to T-PE PW OAM messages + transparently. + + -x. Performance OAM is required for both MS-PWs and SS-PWs to + measure round-trip delay, one-way delay, jitter, and packet + loss ratio. + +6. Management of Multi-Segment Pseudowires + + Each PWE3 approach that uses MS-PWs SHOULD provide some mechanisms + for network operators to manage the emulated service. Management + mechanisms for MS-PWs MUST provide at least the same capabilities as + those for SS-PWs, as defined in [RFC3916]. + + It SHOULD also be possible to manage the additional attributes for + MS-PWs. Since the operator that initiates the establishment of an + MS-PW may reside in a different PSN domain from the S-PEs and one of + the T-PEs along the path of the MS-PW, mechanisms for the remote + management of the MS-PW SHOULD be provided. + + The following additional requirements apply: + +6.1. MIB Requirements + + -i. MIB Tables MUST be designed to facilitate configuration and + provisioning of the MS-PW at the S-PEs and T-PEs. + + -ii. The MIB(s) MUST facilitate inter-PSN configuration and + monitoring of the ACs. + + + + + + + + + + + + + +Bitar, et al. Informational [Page 20] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +6.2. Management Interface Requirements + + -i. Mechanisms MUST be provided to enable remote management of an + MS-PW at an S-PE or T-PE. It SHOULD be possible for these + mechanisms to operate across PSN domains. An example of a + commonly available mechanism is the command line interface + (CLI) over a telnet session. + + -ii. For security or other reasons, it SHOULD be possible to + disable the remote management of an MS-PW. + +7. Security Considerations + + This document specifies the requirements both for MS-PWs that can be + set up across domain boundaries administered by one or more service + providers (inter-provider MS-PWs), and for MS-PWs that are only set + up across one provider (intra-provider MS-PWs). + +7.1. Inter-Provider MS-PWs + + The security requirements for MS-PW setup across domains administered + by one service provider are the same as those described under + security considerations in [RFC4447] and [RFC3916]. These + requirements also apply to inter-provider MS-PWs. + + In addition, [RFC4111] identifies user and provider requirements for + L2 VPNs that apply to MS-PWs described in this document. In this + section, the focus is on the additional security requirements for + inter-provider operation of MS-PWs in both the control plane and data + plane, and some of these requirements may overlap with those in + [RFC4111]. + +7.1.1. Data-Plane Security Requirements + + By security in the "data plane", we mean protection against the + following possibilities: + + -i. Packets from within an MS-PW traveling to a PE or an AC to + which the PW is not intended to be connected, other than in a + manner consistent with the policies of the MS-PW. + + -ii. Packets from outside an MS-PW entering the MS-PW, other than + in a manner consistent with the policies of the MS-PW. + + MS-PWs that cross service provider (SP) domain boundaries may connect + one T-PE in a SP domain to a T-PE in another provider domain. They + may also transit other provider domains even if the two T-PEs are + under the control of one SP. Under these scenarios, there is a + + + +Bitar, et al. Informational [Page 21] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + chance that one or more PDUs could be falsely inserted into an MS-PW + at any of the originating, terminating, or transit domains. Such + false injection can be the result of a malicious attack or fault in + the S-PE. Solutions MAY provide mechanisms for ensuring the + end-to-end authenticity of MS-PW PDUs. + + The data plane security requirements at a service provider border for + MS-PWs are similar to those for inter-provider BGP/MPLS IP Virtual + Private Networks [RFC4364]. In particular, an S-PE or T-PE SHOULD + discard a packet received from a particular neighbor over the service + provider border unless one of the following two conditions holds: + + -i. Any MPLS label processed at the receiving S-PE or T-PE, such + the PSN tunnel label or the PW label has a label value that + the receiving system has distributed to that neighbor; or + + -ii. Any MPLS label processed at the receiving S-PE or T-PE, such + as the PSN tunnel label or the PW label has a label value that + the receiving S-PE or T-PE has previously distributed to the + peer S-PE or T-PE beyond that neighbor (i.e., when it is known + that the path from the system to which the label was + distributed to the receiving system is via that neighbor). + + One of the domains crossed by an MS-PW may decide to selectively + mirror the PDUs of an MS-PW for eavesdropping purposes. It may also + decide to selectively hijack the PDUs of an MS-PW by directing the + PDUs away from their destination. In either case, the privacy of an + MS-PW can be violated. + + Some types of PWs make assumptions about the security of the + underlying PSN. The minimal security provided by an MPLS PSN might + not be sufficient to meet the security requirements expected by the + applications using the MS-PW. This document does not place any + requirements on protecting the privacy of an MS-PW PDU via + encryption. However, encryption may be required at a higher layer in + the protocol stack, based on the application or network requirements. + + The data plane of an S-PE at a domain boundary MUST be able to police + incoming MS-PW traffic to the MS-PW traffic parameters or to an + administratively configured profile. The option to enable/disable + policing MUST be provided to the network administrator. This is to + ensure that an MS-PW or a group of MS-PWs do not grab more resources + than they are allocated. In addition, the data plane of an S-PE MUST + be able to police OAM messages to a pre-configured traffic profile or + to filter out these messages upon administrative configuration. + + + + + + +Bitar, et al. Informational [Page 22] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + An ingress S-PE MUST ensure that an MS-PW receives the CoS treatment + configured or signaled for that MS-PW at the S-PE. Specifically, an + S-PE MUST guard against packets marked in the exp bits or IP-header + Differentiated Services (DS) field (depending on the PSN) for a + better CoS than they should receive. + + An ingress S-PE MUST be able to define per-interface or + interface-group (a group may correspond to interfaces to a peer- + provider) label space for MPLS-PWs. An S-PE MUST be configurable not + to accept labeled packets from another provider unless the bottom + label is a PW-label assigned by the S-PE on the interface on which + the packet arrived. + + Data plane security considerations for SS-PWs specified in [RFC3985] + also apply to MS-PWs. + +7.1.2. Control-Plane Security Requirements + + An MS-PW connects two attachment circuits. It is important to make + sure that PW connections are not arbitrarily accepted from anywhere, + or else a local attachment circuit might get connected to an + arbitrary remote attachment circuit. The fault in the connection can + start at a remote T-PE or an S-PE. + + Where a PW segment crosses a border between one provider and another + provider, the PW segment endpoints (S-PEs) SHOULD be on ASBRs + interconnecting the two providers. Directly interconnecting the + S-PEs using a physically secure link, and enabling signaling and + routing authentication between the S-PEs, eliminates the possibility + of receiving an MS-PW signaling message or packet from an untrusted + peer. Other configurations are possible. For example, P routers for + the PSN tunnel between the adjacent S-PEs/T-PEs may reside on the + ASBRs. In which case, the S-PEs/T-PEs MUST satisfy themselves of the + security and privacy of the path. + + The configuration and maintenance protocol MUST provide a strong + authentication and control protocol data protection mechanism. This + option MUST be implemented, but it should be deployed according to + the specific PSN environment requirements. Furthermore, + authentication using a signature for each individual MS-PW setup + message MUST be available, in addition to an overall control protocol + session authentication and message validation. + + Since S-PEs in different provider networks SHOULD reside at each end + of a physically secure link, or be interconnected by a limited number + of trusted PSN tunnels, each S-PE will have a trust relationship with + only a limited number of S-PEs in other ASs. Thus, it is expected + that current security mechanisms based on manual key management will + + + +Bitar, et al. Informational [Page 23] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + be sufficient. If deployment situations arise that require large + scale connection to S-PEs in other ASs, then a mechanism based on RFC + 4107 [RFC4107] MUST be developed. + + Peer authentication protects against IP address spoofing but does not + prevent one peer (S-PE or T-PE) from connecting to the wrong + attachment circuit. Under a single administrative authority, this + may be the result of a misconfiguration. When the MS-PW crosses + multiple provider domains, this may be the result of a malicious act + by a service provider or a security hole in that provider network. + Static manual configuration of MS-PWs at S-PEs and T-PEs provides a + greater degree of security. If an identification of both ends of an + MS-PW is configured and carried in the signaling message, an S-PE can + verify the signaling message against the configuration. To support + dynamic signaling of MS-PWs, whereby only endpoints are provisioned + and S-PEs are dynamically discovered, mechanisms SHOULD be provided + to configure such information on a server and to use that information + during a connection attempt for validation. + + An incoming MS-PW request/reply MUST NOT be accepted unless its IP + source address is known to be the source of an "eligible" peer. An + eligible peer is an S-PE or a T-PE with which the originating S-PE or + T-PE has a trust relationship. The number of such trusted T-PEs or + S-PEs is bounded and not anticipated to create a scaling issue for + the control plane authentication mechanisms. + + If a peering adjacency has to be established prior to exchanging + setup requests/responses, peering MUST only be done with eligible + peers. The set of eligible peers could be pre-configured (either as + a list of IP addresses, or as a list of address/mask combinations) or + automatically generated from the local PW configuration information. + + Furthermore, the restriction of peering sessions to specific + interfaces MUST also be provided. The S-PE and T-PE MUST drop the + unaccepted signaling messages in the data path to avoid a + Denial-of-Service (DoS) attack on the control plane. + + Even if a connection request appears to come from an eligible peer, + its source address may have been spoofed. Thus, means of preventing + source address spoofing must be in place. For example, if eligible + peers are in the same network, source address filtering at the border + routers of that network could eliminate the possibility of source + address spoofing. + + + + + + + + +Bitar, et al. Informational [Page 24] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + S-PEs that connect one provider domain to another provider domain + MUST have the capability to rate-limit signaling traffic in order to + prevent DoS attacks on the control plane. Furthermore, detection and + disposition of malformed packets and defense against various forms of + attacks that can be protocol-specific MUST be provided. + +7.2. Intra-Provider MS-PWs + + Security requirements for pseudowires are provided in [RFC3916]. + These requirements also apply to MS-PWs. + + MS-PWs are intended to enable many more PEs to provide PWE3 services + in a given service provider network than traditional SS-PWs, + particularly in access and metro environments where the PE may be + situated closer to the ultimate endpoint of the service. In order to + limit the impact of a compromise of one T-PE in a service provider + network, the data path security requirements for inter-provider + MS-PWs also apply to intra-provider MS-PWs in such cases. + +8. Acknowledgments + + The editors gratefully acknowledge the following contributors: + Dimitri Papadimitriou (Alcatel-Lucent), Peter Busschbach + (Alcatel-Lucent), Sasha Vainshtein (Axerra), Richard Spencer (British + Telecom), Simon Delord (France Telecom), Deborah Brungard (AT&T), + David McDysan (Verizon), Rahul Aggarwal (Juniper), Du Ke (ZTE), + Cagatay Buyukkoc (ZTE), and Stewart Bryant (Cisco). + +9. References + +9.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC3916] Xiao, X., Ed., McPherson, D., Ed., and P. Pate, Ed., + "Requirements for Pseudo-Wire Emulation Edge-to-Edge + (PWE3)", RFC 3916, September 2004. + + [RFC3985] Bryant, S., Ed., and P. Pate, Ed., "Pseudo Wire Emulation + Edge-to-Edge (PWE3) Architecture", RFC 3985, March 2005. + +9.2. Informative References + + [i610] Recommendation I.610 "B-ISDN operation and maintenance + principles and functions", February 1999. + + + + + +Bitar, et al. Informational [Page 25] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + + [RFC5085] Nadeau, T., Ed., and C. Pignataro, Ed., "Pseudowire + Virtual Circuit Connectivity Verification (VCCV): A + Control Channel for Pseudowires", RFC 5085, December 2007. + + [RFC4447] Martini, L., Ed., Rosen, E., El-Aawar, N., Smith, T., and + G. Heron, "Pseudowire Setup and Maintenance Using the + Label Distribution Protocol (LDP)", RFC 4447, April 2006. + + [RFC4111] Fang, L., Ed., "Security Framework for Provider- + Provisioned Virtual Private Networks (PPVPNs)", RFC 4111, + July 2005. + + [PWE3-OAM] Nadeau, T., Ed., Morrow, M., Ed., Busschbach, P., Ed., + Alissaoui, M.,Ed., D. Allen, Ed., "Pseudo Wire (PW) OAM + Message Mapping", Work in Progress, March 2005. + + [RFC2914] Floyd, S., "Congestion Control Principles", BCP 41, RFC + 2914, September 2000. + + [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private + Networks (VPNs)", RFC 4364, February 2006. + + [RFC4107] Bellovin, S. and R. Housley, "Guidelines for Cryptographic + Key Management", BCP 107, RFC 4107, June 2005. + +Authors' Addresses + + Nabil Bitar + Verizon + 117 West Street + Waltham, MA 02145 + EMail: nabil.n.bitar@verizon.com + + + Matthew Bocci + Alcatel-Lucent Telecom Ltd, + Voyager Place + Shoppenhangers Road + Maidenhead + Berks, UK + EMail: matthew.bocci@alcatel-lucent.co.uk + + + Luca Martini + Cisco Systems, Inc. + 9155 East Nichols Avenue, Suite 400 + Englewood, CO, 80112 + EMail: lmartini@cisco.com + + + +Bitar, et al. Informational [Page 26] + +RFC 5254 Requirements for Multi-Segment PWE3 October 2008 + + +Full Copyright Statement + + Copyright (C) The IETF Trust (2008). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND + THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS + OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF + THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + + + + + + + + + + + +Bitar, et al. Informational [Page 27] + |