diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6624.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6624.txt')
-rw-r--r-- | doc/rfc/rfc6624.txt | 1459 |
1 files changed, 1459 insertions, 0 deletions
diff --git a/doc/rfc/rfc6624.txt b/doc/rfc/rfc6624.txt new file mode 100644 index 0000000..f0b3fdb --- /dev/null +++ b/doc/rfc/rfc6624.txt @@ -0,0 +1,1459 @@ + + + + + + +Internet Engineering Task Force (IETF) K. Kompella +Request for Comments: 6624 Juniper Networks +Category: Informational B. Kothari +ISSN: 2070-1721 Cisco Systems + R. Cherukuri + Juniper Networks + May 2012 + + + Layer 2 Virtual Private Networks Using BGP for + Auto-Discovery and Signaling + +Abstract + + Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM + circuits have been around a long time; more recently, Ethernet VPNs, + including Virtual Private LAN Service, have become popular. + Traditional L2VPNs often required a separate Service Provider + infrastructure for each type and yet another for the Internet and IP + VPNs. In addition, L2VPN provisioning was cumbersome. This document + presents a new approach to the problem of offering L2VPN services + where the L2VPN customer's experience is virtually identical to that + offered by traditional L2VPNs, but such that a Service Provider can + maintain a single network for L2VPNs, IP VPNs, and the Internet, as + well as a common provisioning methodology for all services. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6624. + + + + + + + + + + +Kompella, et al. Informational [Page 1] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +Copyright Notice + + Copyright (c) 2012 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kompella, et al. Informational [Page 2] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Terminology ................................................6 + 1.1.1. Conventions Used in This Document ...................6 + 1.2. Advantages of Layer 2 VPNs .................................6 + 1.2.1. Separation of Administrative Responsibilities .......7 + 1.2.2. Migrating from Traditional Layer 2 VPNs .............7 + 1.2.3. Privacy of Routing ..................................7 + 1.2.4. Layer 3 Independence ................................7 + 1.2.5. PE Scaling ..........................................8 + 1.2.6. Ease of Configuration ...............................8 + 1.3. Advantages of Layer 3 VPNs .................................9 + 1.3.1. Layer 2 Independence ................................9 + 1.3.2. SP Routing as Added Value ..........................10 + 1.3.3. Class of Service ...................................10 + 1.4. Multicast Routing .........................................10 + 2. Operation of a Layer 2 VPN .....................................11 + 2.1. Network Topology ..........................................11 + 2.2. Configuration .............................................13 + 2.2.1. CE Configuration ...................................14 + 2.2.2. PE Configuration ...................................15 + 2.2.3. Adding a New Site ..................................15 + 2.2.4. Deleting a Site ....................................16 + 2.2.5. Managing CE ID Mappings ............................16 + 2.2.6. Managing Label Blocks ..............................16 + 2.3. Operations, Administration, and Maintenance (OAM) .........17 + 3. PE Information Exchange ........................................17 + 3.1. Circuit Status Vector .....................................19 + 3.2. Generalizing the VPN Topology .............................20 + 4. Layer 2 Interworking ...........................................21 + 5. Packet Transport ...............................................22 + 5.1. Layer 2 MTU ...............................................22 + 5.2. Layer 2 Frame Format ......................................22 + 5.3. IP-Only Layer 2 Interworking ..............................23 + 6. Security Considerations ........................................23 + 7. IANA Considerations ............................................23 + 8. Acknowledgments ................................................24 + 9. Contributors ...................................................24 + 10. References ....................................................24 + 10.1. Normative References .....................................24 + 10.2. Informative References ...................................25 + + + + + + + + + +Kompella, et al. Informational [Page 3] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +1. Introduction + + The earliest Virtual Private Networks (VPNs) were based on Layer 2 + circuits: X.25, Frame Relay, and ATM (see [Kosiur]). More recently, + multipoint VPNs based on Ethernet Virtual Local Area Networks (VLANs) + and Virtual Private LAN Service (VPLS) [RFC4761][RFC4762] have become + quite popular. In contrast, the VPNs described in this document are + point-to-point, and usually called Virtual Private Wire Service + (VPWS). All of these come under the classification of Layer 2 VPNs + (L2VPNs), as the customer-to-Service-Provider hand-off is at Layer 2. + + There are at least two factors that adversely affected the cost of + offering L2VPNs. The first is that the easiest way to offer an L2VPN + of a given type of Layer 2 was over an infrastructure of the same + type. This approach required that the Service Provider build a + separate infrastructure for each Layer 2 encapsulation, e.g., an ATM + infrastructure for ATM VPNs, an Ethernet infrastructure for Ethernet + VPNs, etc. In addition, a separate infrastructure was needed for the + Internet and IP VPNs [RFC4364], and possibly yet another for voice + services. Going down this path meant a proliferation of networks. + + The other is that each of these networks had different provisioning + methodologies. Furthermore, the provisioning of an L2VPN was fairly + complex. It is important to distinguish between a single Layer 2 + circuit, which connects two customer sites, and a Layer 2 VPN, which + is a set of circuits that connect sites belonging to the same + customer. The fact that two different circuits belonged to the same + VPN was typically known only to the provisioning system, not to the + switches offering the service; this complicated the setting up, and + subsequently, the troubleshooting, of an L2VPN. Also, each switch + offering the service had to be provisioned with the address of every + other switch in the same VPN, requiring, in the case of full-mesh VPN + connectivity, provisioning proportional to the square of the number + of sites. This made full-mesh L2VPN connectivity prohibitively + expensive for the Service Provider (SP) and thus also for customers. + Finally, even setting up an individual circuit often required the + provisioning of every switch along the path. + + Of late, there has been much progress in network "convergence", + whereby Layer 2 traffic, Internet traffic, and IP VPN traffic can be + carried over a single, consolidated network infrastructure based on + IP/MPLS tunnels; this is made possible by techniques such as those + described in [RFC4448], [RFC4618], [RFC4619], and [RFC4717] for Layer + 2 traffic and in [RFC4364] for IP VPN traffic. This development goes + a long way toward addressing the problem of network proliferation. + This document goes one step further and shows how a Service Provider + can offer Layer 2 VPNs using protocol and provisioning methodologies + similar to that used for VPLS [RFC4761] and IP VPNs [RFC4364], + + + +Kompella, et al. Informational [Page 4] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + thereby achieving a significant degree of operational convergence as + well. In particular, all of these methodologies include the notion + of a VPN identifier that serves to unify components of a given VPN + and the concept of auto-discovery, which simplifies the provisioning + of dense VPN topologies (for example, a full mesh). In addition, + similar techniques are used in all of the above-mentioned VPN + technologies to offer inter-AS and inter-provider VPNs (i.e., VPNs + whose sites are connected to multiple Autonomous Systems (ASes) or + Service Providers). + + Technically, the approach proposed here uses the concepts and + solution described in [RFC4761], which describes a method for VPLS, a + particular form of a Layer 2 VPN. That document, in turn, borrowed + much from [RFC4364], including the use of BGP for auto-discovery and + "demultiplexor" (see below) exchange and the concepts of Route + Distinguishers to make VPN advertisements unique and Route Targets to + control VPN topology. In addition, all three documents share the + idea that routers not directly connected to VPN customers should + carry no VPN state, restricting the provisioning of individual + connections to just the edge devices. This is achieved using tunnels + to carry the data, with a demultiplexor that identifies individual + VPN circuits. These tunnels could be based on MPLS, GRE, or any + other tunnel technology that offers a demultiplexing field; the + signaling of these tunnels is outside the scope of this document. + The specific approach taken here is to use an MPLS label as the + demultiplexor. + + Layer 2 VPNs typically require that all sites in the VPN connect to + the SP with the same Layer 2 encapsulation. To ease this + restriction, this document proposes a limited form of Layer 2 + interworking, by restricting the Layer 3 protocol to IP only (see + Section 4). + + It may be instructive to compare the approach described in [RFC4447] + and [RFC6074] (these are the IETF-approved technologies for the + functions described in this document, albeit using two separate + protocols) with the one described here. To comply with IETF + standards, it is recommended that devices implementing the solution + described in this document also implement the approach in [RFC4447] + and [RFC6074]. + + The rest of this section discusses the relative merits of Layer 2 and + Layer 3 VPNs. Section 2 describes the operation of a Layer 2 VPN. + Section 3 describes PE information exchange. Section 4 describes IP- + only Layer 2 interworking. Section 5 describes how the L2 packets + are transported across the SP network. + + + + + +Kompella, et al. Informational [Page 5] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +1.1. Terminology + + The terminology used is from [RFC4761] and [RFC4364]; it is briefly + repeated here. A "customer" is a customer of a Service Provider + seeking to interconnect their various "sites" (each an independent + network) at Layer 2 through the Service Provider's network, while + maintaining privacy of communication and address space. The device + in a customer site that connects to a Service Provider router is + termed the CE (customer edge) device; this device may be a router or + a switch. The Service Provider router to which a CE connects is + termed a PE (provider edge). A router in the Service Provider's + network that doesn't connect directly to any CE is termed P + ("provider" device). Every pair of PEs is connected by a "tunnel"; + within a tunnel, VPN data is distinguished by a "demultiplexor", + which in this document is an MPLS label. + + Each CE within a VPN is assigned a CE ID, a number that uniquely + identifies a CE within an L2VPN. More accurately, the CE ID + identifies a physical connection from the CE device to the PE, since + a CE may be connected to multiple PEs (or multiply connected to a + PE); in such a case, the CE would have a CE ID for each connection. + A CE may also be part of many L2VPNs; it would need one (or more) CE + ID(s) for each L2VPN of which it is a member. The number space for + CE IDs is scoped to a given VPN. + + In the case of inter-provider L2VPNs, there needs to be some + coordination of allocation of CE IDs. One solution is to allocate + ranges for each SP. Other solutions may be forthcoming. + + Within each physical connection from a CE to a PE, there may be + multiple virtual circuits. These will be referred to as Attachment + Circuits (ACs), following [RFC3985]. Similarly, the entity that + connects two attachment circuits across the Service Provider network + is called a pseudowire (PW). + +1.1.1. Conventions Used in This Document + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + +1.2. Advantages of Layer 2 VPNs + + A Layer 2 VPN is one where a Service Provider provides Layer 2 + connectivity to the customer. The Service Provider does not + participate in the customer's Layer 3 network, especially in the + routing, resulting in several advantages to the SP as a whole and to + PE routers in particular. + + + +Kompella, et al. Informational [Page 6] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +1.2.1. Separation of Administrative Responsibilities + + In a Layer 2 VPN, the Service Provider is responsible for Layer 2 + connectivity; the customer is responsible for Layer 3 connectivity, + which includes routing. If the customer says that host x in site A + cannot reach host y in site B, the Service Provider need only + demonstrate that site A is connected to site B. The details of how + routes for host y reach host x are the customer's responsibility. + + Another important factor is that once a PE provides Layer 2 + connectivity to its connected CE, its job is done. A misbehaving CE + can at worst flap its interface, but route flaps in the customer + network have little effect on the SP network. On the other hand, a + misbehaving CE in a Layer 3 VPN can flap its routes, leading to + instability of the PE router or even the entire SP network. Thus, + when offering a Layer 3 VPN, an SP should proactively protect itself + from Layer 3 instability in the CE network. + +1.2.2. Migrating from Traditional Layer 2 VPNs + + Since "traditional" Layer 2 VPNs (i.e., real Frame Relay circuits + connecting sites) are indistinguishable from tunnel-based VPNs from + the customer's point of view, migrating from one to the other raises + few issues. Layer 3 VPNs, on the other hand, require a considerable + redesign of the customer's Layer 3 routing architecture. + Furthermore, with Layer 3 VPNs, special care has to be taken that + routes within the traditional VPN are not preferred over the Layer 3 + VPN routes (the so-called "backdoor routing" problem, whose solution + requires protocol changes that are somewhat ad hoc). + +1.2.3. Privacy of Routing + + In an L2VPN, the privacy of customer routing is a natural fallout of + the fact that the Service Provider does not participate in routing. + The SP routers need not do anything special to keep customer routes + separate from other customers or from the Internet; there is no need + for per-VPN routing tables and the additional complexity this imposes + on PE routers. + +1.2.4. Layer 3 Independence + + Since the Service Provider simply provides Layer 2 connectivity, the + customer can run any Layer 3 protocols they choose. If the SP were + participating in customer routing, it would be vital that the + customer and SP both use the same Layer 3 protocol(s) and routing + protocols. + + + + + +Kompella, et al. Informational [Page 7] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + Note that IP-only Layer 2 interworking doesn't have this benefit as + it restricts the Layer 3 to IP only. + +1.2.5. PE Scaling + + In the Layer 2 VPN scheme described below, each PE transmits a single + small chunk of information about every CE that the PE is connected to + every other PE. That means that each PE need only maintain a single + chunk of information from each CE in each VPN and keep a single + "route" to every site in every VPN. This means that both the + Forwarding Information Base and the Routing Information Base scale + well with the number of sites and number of VPNs. Furthermore, the + scaling properties are independent of the customer: the only germane + quantity is the total number of VPN sites. + + This is to be contrasted with Layer 3 VPNs, where each CE in a VPN + may have an arbitrary number of routes that need to be carried by the + SP. This leads to two issues. First, both the information stored at + each PE and the number of routes installed by the PE for a CE in a + VPN can be (in principle) unbounded, which means in practice that a + PE must restrict itself to installing routes associated with the VPNs + of which it is currently a member. Second, a CE can send a large + number of routes to its PE, which means that the PE must protect + itself against such a condition. Thus, the SP must enforce limits on + the number of routes accepted from a CE; this, in turn, requires the + PE router to offer such control. + + The scaling issues of Layer 3 VPNs come into sharp focus at a BGP + route reflector (RR). An RR cannot keep all the advertised routes in + every VPN since the number of routes will be too large. The + following solutions/extensions are needed to address this issue: + + 1. RRs could be partitioned so that each RR services a subset of + VPNs so that no single RR has to carry all the routes. + + 2. An RR could use a preconfigured list of Route Targets for its + inbound route filtering. The RR may choose to perform Route + Target Filtering, described in [RFC4684]. + +1.2.6. Ease of Configuration + + Configuring traditional Layer 2 VPNs with dense topologies was a + burden primarily because of the O(n*n) nature of the task. If there + are n CEs in a Frame Relay VPN, say full-mesh connected, n*(n-1)/2 + DLCI (Data Link Connection Identifier) Permanent Virtual Circuits + (PVCs) must be provisioned across the SP network. At each CE, (n-1) + DLCIs must be configured to reach each of the other CEs. + Furthermore, when a new CE is added, n new DLCI PVCs must be + + + +Kompella, et al. Informational [Page 8] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + provisioned; also, each existing CE must be updated with a new DLCI + to reach the new CE. Finally, each PVC requires state in every + transit switch. + + In our proposal, PVCs are tunneled across the SP network. The + tunnels used are provisioned independently of the L2VPNs, using + signaling protocols (in the case of MPLS, LDP or RSVP - Traffic + Engineering (RSVP-TE) can be used), or set up by configuration; the + number of tunnels is independent of the number of L2VPNs. This + reduces a large part of the provisioning burden. + + Furthermore, we assume that DLCIs at the CE edge are relatively cheap + and that VPN labels in the SP network are cheap. This allows the SP + to "overprovision" VPNs, for example, allocate 50 CEs to a VPN when + only 20 are needed. With this overprovisioning, adding a new CE to a + VPN requires configuring just the new CE and its associated PE; + existing CEs and their PEs need not be reconfigured. Note that if + DLCIs at the CE edge are expensive, e.g., if these DLCIs are + provisioned across a switched network, one could provision them as + and when needed, at the expense of extra configuration. This need + not still result in extra state in the SP network, i.e., an + intelligent implementation can allow overprovisioning of the pool of + VPN labels. + +1.3. Advantages of Layer 3 VPNs + + Layer 3 VPNs ([RFC4364] in particular) offer a good solution when the + customer traffic is wholly IP, customer routing is reasonably simple, + and the customer sites connect to the SP with a variety of Layer 2 + technologies. + +1.3.1. Layer 2 Independence + + One major restriction in a Layer 2 VPN is that the Layer 2 media with + which the various sites of a single VPN connect to the SP must be + uniform. On the other hand, the various sites of a Layer 3 VPN can + connect to the SP with any supported media; for example, some sites + may connect with Frame Relay circuits and others with Ethernet. + + This restriction of Layer 2 VPN is alleviated by the IP-only Layer 2 + interworking proposed in this document. This comes at the cost of + losing the Layer 3 independence. + + A corollary to this is that the number of sites that can be in a + Layer 2 VPN is determined by the number of Layer 2 circuits that the + Layer 2 technology provides. For example, if the Layer 2 technology + is Frame Relay with 2-octet DLCIs, a CE can at most connect to about + a thousand other CEs in a VPN. + + + +Kompella, et al. Informational [Page 9] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +1.3.2. SP Routing as Added Value + + Another problem with Layer 2 VPNs is that the CE router in a VPN must + be able to deal with having N routing peers, where N is the number of + sites in the VPN. This can be alleviated by manipulating the + topology of the VPN. For example, a hub-and-spoke VPN architecture + means that only one CE router (the hub) need deal with N neighbors. + However, in a Layer 3 VPN, a CE router need only deal with one + neighbor, the PE router. Thus, the SP can offer Layer 3 VPNs as a + value-added service to its customers. + + Moreover, with Layer 2 VPNs, it is up to a customer to build and + operate the whole network. With Layer 3 VPNs, a customer is just + responsible for building and operating routing within each site, + which is likely to be much simpler than building and operating + routing for the whole VPN. That, in turn, makes Layer 3 VPNs more + suitable for customers who don't have sufficient routing expertise, + again allowing the SP to provide added value. + + As mentioned later, multicast routing and forwarding is another + value-added service that an SP can offer. + +1.3.3. Class of Service + + Class-of-Service (CoS) issues have been addressed for Layer 3 VPNs. + Since the PE router has visibility into the network Layer (IP), the + PE router can take on the tasks of CoS classification and routing. + This restriction on Layer 2 VPNs is again eased in the case of IP- + only Layer 2 interworking, as the PE router has visibility into the + network Layer (IP). + +1.4. Multicast Routing + + There are two aspects to multicast routing that we will consider. On + the protocol front, supporting IP multicast in a Layer 3 VPN requires + PE routers to participate in the multicast routing instance of the + customer and thus keep some related state information. + + In the Layer 2 VPN case, the CE routers run native multicast routing + directly. The SP network just provides pipes to connect the CE + routers; PEs are unaware whether the CEs run multicast or not and + thus do not have to participate in multicast protocols or keep + multicast state information. + + On the forwarding front, in a Layer 3 VPN, CE routers do not + replicate multicast packets; thus, the CE-PE link carries only one + copy of a multicast packet. Whether replication occurs at the + ingress PE or somewhere within the SP network depends on the + + + +Kompella, et al. Informational [Page 10] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + sophistication of the Layer 3 VPN multicast solution. The simple + solution where a PE replicates packets for each of its CEs may place + considerable burden on the PE. More complex solutions may require + VPN multicast state in the SP network but may significantly reduce + the traffic in the SP network by delaying packet replication until + needed. + + In a Layer 2 VPN, packet replication occurs at the CE. This has the + advantage of distributing the burden of replication among the CEs + rather than focusing it on the PE to which they are attached and thus + will scale better. However, the CE-PE link will need to carry + multiple copies of multicast packets. However, in the case of + Virtual Private LAN Service (a specific type of L2VPN; see + [RFC4761]), the CE-PE link need transport only one copy of a + multicast packet. + + Thus, just as in the case of unicast routing, the SP has the choice + to offer a value-added service (multicast routing and forwarding) at + some cost (multicast state and packet replication) using a Layer 3 + VPN or to keep it simple and use a Layer 2 VPN. + +2. Operation of a Layer 2 VPN + + The following simple example of a customer with four sites connected + to three PE routers in a Service Provider network will hopefully + illustrate the various aspects of the operation of a Layer 2 VPN. + For simplicity, we assume that a full-mesh topology is desired. + + In what follows, Frame Relay serves as the Layer 2 media, and each CE + has multiple DLCIs to its PE, each connecting to another CE in the + VPN. If the Layer 2 media were ATM, then each CE would have multiple + VPIs/VCIs (Virtual Path Identifiers/Virtual Channel Identifiers) to + connect to other CEs. For Point-to-Point Protocol (PPP) and Cisco + High-Level Data Link Control (HDLC), each CE would have multiple + physical interfaces to connect to other CEs. In the case of IP-only + Layer 2 interworking, each CE could have a mix of one or more of the + above Layer 2 media to connect to other CEs. + +2.1. Network Topology + + Consider a Service Provider network with edge routers PE0, PE1, and + PE2. Assume that PE0 and PE1 are IGP neighbors, and PE2 is more than + one hop away from PE0. + + Suppose that a customer C has four sites S0, S1, S2, and S3, that C + wants to connect via the Service Provider's network using Frame + Relay. Site S0 has CE0 and CE1 both connected to PE0. Site S1 has + CE2 connected to PE0. Site S2 has CE3 connected to PE1 and CE4 + + + +Kompella, et al. Informational [Page 11] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + connected to PE2. Site S3 has CE5 connected to PE2. (See Figure 1 + below.) Suppose further that C wants to "overprovision" each current + site, in expectation that the number of sites will grow to at least + 10 in the near future. However, CE4 is only provisioned with nine + DLCIs. (Note that the signaling mechanism discussed in Section 3.2 + of [RFC4761] will allow a site to grow in terms of connectivity to + other sites at a later point of time at the cost of additional + signaling, i.e., overprovisioning is not a must but a + recommendation). + + Finally, suppose that the CEs have been provisioned with DLCIs as per + the following: + + CE# | Provisioned DLCIs + -------------------------------------------------------- + 0 | 100 through 109 + 1 | 200 through 209 + 2 | 100 through 109 + 3 | 200 through 209 + 4 | 107, 209, 265, 301, 414, 555, 654, 777, and 888 + 5 | 417 through 426 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kompella, et al. Informational [Page 12] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + S0 S3 + .............. .............. + . . . . + . +-----+ . . . + . | CE0 |-----------+ . +-----+ . + . +-----+ . | . | CE5 | . + . . | . +--+--+ . + . +-----+ . | . | . + . | CE1 |-------+ | .......|...... + . +-----+ . | | / + . . | | / + .............. | | / + | | SP Network / + .....|...|.............................../..... + . | | / . + . +-+---+-+ +-------+ / . + . | PE0 |-------| P |-- | . + . +-+---+-+ +-------+ \ | . + . / \ \ +---+---+ . + . | -----+ --| PE2 | . + . | | +---+---+ . + . | +---+---+ / . + . | | PE1 | / . + . | +---+---+ / . + . | \ / . + ...|.............|.............../............. + | | / + | | / + | | / + S1 | | S2 / + .............. | ........|........../...... + . . | . | | . + . +-----+ . | . +--+--+ +--+--+ . + . | CE2 |-----+ . | CE3 | | CE4 | . + . +-----+ . . +-----+ +-----+ . + . . . . + .............. .......................... + + Figure 1: Example Network Topology + +2.2. Configuration + + The following sub-sections detail the configuration that is needed to + provision the above VPN. For the purpose of exposition, we assume + that the customer will connect to the SP with Frame Relay circuits. + + + + + + +Kompella, et al. Informational [Page 13] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + While we focus primarily on the configuration that an SP has to do, + we touch upon the configuration requirements of CEs as well. The + main point of contact in CE-PE configuration is that both must agree + on the DLCIs that will be used on the interface connecting them. + + If the PE-CE connection is Frame Relay, it is recommended to run Link + Management Interface (LMI) between the PE and CE. For the case of + ATM VCs, Operations, Administration, and Maintenance (OAM) cells may + be used. For PPP and Cisco HDLC, keepalives may be used directly + between CEs; however, in this case, PEs would not have visibility as + to the liveness of customers circuits. + + In the case of IP-only Layer 2 interworking, if CE1, attached to PE0, + connects to CE3, attached to PE1, via an L2VPN circuit, the Layer 2 + media between CE1 and PE0 is independent of the Layer 2 media between + CE3 and PE1. Each side will run its own Layer-2-specific link + management protocol, e.g., LMI, Link Control Protocol (LCP), etc. + PE0 will inform PE1 about the status of its local circuit to CE1 via + the circuit status vector TLV defined in Section 3.1. Similarly, PE1 + will inform PE0 about the status of its local circuit to CE3. + +2.2.1. CE Configuration + + Each CE that belongs to a VPN is given a "CE ID". CE IDs must be + unique in the context of a VPN. For the example, we assume that the + CE ID for CE-k is k. + + Each CE is configured to communicate with its corresponding PE with + the set of DLCIs given above, for example, CE0 is configured with + DLCIs 100 through 109. In general, a CE is configured with a list of + circuits, all with the same Layer 2 encapsulation type, e.g., DLCIs, + VCIs, physical PPP interface, etc. (IP-only Layer 2 interworking + allows a mix of Layer 2 encapsulation types.) The size of this list/ + set determines the number of remote CEs with which a given CE can + communicate. Denote the size of this list/set as the CE's range. A + CE's range must be at least the number of remote CEs that the CE will + connect to in a given VPN; if the range exceeds this, then the CE is + overprovisioned, in anticipation of growth of the VPN. + + Each CE also "knows" which DLCI connects it to every other CE. The + methodology followed in this example is to use the CE ID of the other + CE as an index into the DLCI list this CE has (with zero-based + indexing, i.e., 0 is the first index). For example, CE0 is connected + to CE3 through its fourth DLCI, 103; CE4 is connected to CE2 by the + third DLCI in its list, namely 265. This is just the methodology + used in the description here; the actual methodology used to pick the + DLCI to be used is a local matter. The key factor is that CE-k may + communicate with CE-m using a different DLCI from the DLCI that CE-m + + + +Kompella, et al. Informational [Page 14] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + uses to communicate to CE-k, i.e., the SP network effectively acts as + a giant Frame Relay switch. This is very important, as it decouples + the DLCIs used at each CE site, making for much simpler provisioning. + +2.2.2. PE Configuration + + Each PE is configured with the VPNs in which it participates. Each + VPN is associated with one or more Route Target communities [RFC4360] + that serve to define the topology of the VPN. For each VPN, the PE + must determine a Route Distinguisher (RD) to use; this may either be + configured or chosen by the PE. RDs do not have to be unique across + the VPN. For each CE attached to the PE in a given VPN, the PE must + know the set of virtual circuits (DLCI, VCI/VPI, or VLAN) connecting + it to the CE and a CE ID identifying the CE within the VPN. CE IDs + must be unique in the context of a given VPN. + +2.2.3. Adding a New Site + + The first step in adding a new site to a VPN is to pick a new CE ID. + If all current members of the VPN are overprovisioned, i.e., their + range includes the new CE ID, adding the new site is a purely local + task. Otherwise, the sites whose range doesn't include the new CE ID + and that wish to communicate directly with the new CE must have their + ranges increased by allocating additional local circuits to + incorporate the new CE ID. + + The next step is ensuring that the new site has the required + connectivity. This usually requires adding a new virtual circuit + between the PE and CE; in most cases, this configuration is limited + to the PE in question. + + The rest of the configuration is a local matter between the new CE + and the PE to which it is attached. At this point, the PE can signal + to other PEs that it has a new site in the VPN by advertising a BGP + Layer 2 route, and traffic connectivity will be set up. + + It bears repeating that the key to making additions easy is + overprovisioning and the algorithm for mapping a CE ID to a DLCI that + is used for connecting to the corresponding CE. However, what is + being overprovisioned is the number of DLCIs/VCIs that connect the CE + to the PE. This is a local matter between the PE and CE; it does not + affect other PEs or CEs. + + + + + + + + + +Kompella, et al. Informational [Page 15] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +2.2.4. Deleting a Site + + Deleting a site consists first of removing the CE ID of the site from + the configuration of the PE to which the site is attached. The PE + will then signal to other PEs that it no longer has access to that + site by withdrawing its previously advertised BGP Layer 2 route. + Connectivity to the deleted site will cease. + + The next steps are bookkeeping: decommissioning the attachment + circuit from the PE to the CE that corresponds to the site being + removed and noting that the CE ID is now free for future allocation. + Note that each PE is now (further) overprovisioned; one may choose to + actively "reap" CE IDs if desired. + +2.2.5. Managing CE ID Mappings + + In the data plane, an attachment circuit, identified say by a DLCI, + is mapped to a label via the control plane abstraction of a CE ID. + At the egress PE, the label is mapped back to an attachment circuit + via the same CE ID. It is up to the VPN administrator + + o to provision attachment circuits (e.g., DLCIs); + + o to allocate CE IDs; and + + o to keep a clear mapping of CE IDs to attachment circuits (and + reflect this in PE configurations). + + The PEs manage the mappings between attachment circuits and labels, + i.e., the data plane mappings. + + Note that in the N-to-one modes listed in Table 1, a single + attachment circuit may correspond to several Layer 2 virtual + circuits. Nevertheless, there is a one-to-one mapping between an + attachment circuit and a CE ID (and thus a label). + +2.2.6. Managing Label Blocks + + Label blocks and label values are managed by the PEs. As sites get + added and removed, labels are allocated and released. The easiest + way to manage these is to use fixed-size label blocks rather than + variable-size blocks, although the signaling described here supports + either. If an implementation uses fixed-size blocks, then allocating + a label for a new site may requiring allocating a new block; + similarly, freeing a label may require freeing a block. + + + + + + +Kompella, et al. Informational [Page 16] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + If the implementation requires fixed-size blocks, there is probably a + default block size, but the implementation SHOULD allow the + administrator to choose a size. Larger label block sizes mean more + potential "wasted" labels but less signaling overhead, a trade-off + that the administrator might want to control. + + Also, as sites get added and deleted, a PE may receive packets with a + label that reflects a site that has been deleted locally but not yet + processed by remote PEs or that reflects a new site added remotely + but not processed locally. In either of these cases, the PE SHOULD + silently discard the packet; it may choose to log the event once for + each such label, but not for every such packet. + +2.3. Operations, Administration, and Maintenance (OAM) + + Many Layer 2 mediums have OAM mechanisms. For example, the PPP has + Echo Request and Echo Reply messages; Frame Relay has the Local + Management Interface. Among other things, OAM is used for + troubleshooting and as keepalives. + + There are two ways to carry OAM information across Layer 2 VPNs. The + first is to convey OAM packets as any other Layer 2 packets across + the VPN. This is the most general method; it maintains full Layer 2 + transparency and preserves all OAM information. The other method + applies only to the link liveness aspect of OAM; it consists of + transmitting the status of each attachment circuit across the control + plane using the circuit status vector (Section 3.1). This method is + the only one applicable to Layer 2 Interworking VPNs (Section 4), + since OAM packets are not IP frames and thus cannot be transmitted + across such Layer 2 VPNs. + +3. PE Information Exchange + + When a PE is configured with all the required information for a CE, + it advertises to other PEs the fact that it is participating in a VPN + via BGP messages, as per [RFC4761], Section 3. BGP was chosen as the + means for exchanging L2VPN information for two reasons: it offers + mechanisms for both auto-discovery and signaling, and it allows for + operational convergence, as explained in Section 1. A bonus for + using BGP is a robust inter-AS solution for L2VPNs. + + There are two modifications to the formatting of messages. The first + is that the set of Encaps Types carried in the L2-info extended + community has been expanded to include those from Table 1. The value + of the Encaps Type field identifies the Layer 2 encapsulation, e.g., + ATM, Frame Relay, etc. + + + + + +Kompella, et al. Informational [Page 17] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + +-----------+-------------------------------------------+-----------+ + | Encaps | Description | Reference | + | Type | | | + +-----------+-------------------------------------------+-----------+ + | 0 | Reserved | - | + | | | | + | 1 | Frame Relay | RFC 4446 | + | | | | + | 2 | ATM AAL5 SDU VCC transport | RFC 4446 | + | | | | + | 3 | ATM transparent cell transport | RFC 4816 | + | | | | + | 4 | Ethernet (VLAN) Tagged Mode | RFC 4448 | + | | | | + | 5 | Ethernet Raw Mode | RFC 4448 | + | | | | + | 6 | Cisco HDLC | RFC 4618 | + | | | | + | 7 | PPP | RFC 4618 | + | | | | + | 8 | SONET/SDH Circuit Emulation Service | RFC 4842 | + | | | | + | 9 | ATM n-to-one VCC cell transport | RFC 4717 | + | | | | + | 10 | ATM n-to-one VPC cell transport | RFC 4717 | + | | | | + | 11 | IP Layer 2 Transport | RFC 3032 | + | | | | + | 15 | Frame Relay Port mode | RFC 4619 | + | | | | + | 17 | Structure-agnostic E1 over packet | RFC 4553 | + | | | | + | 18 | Structure-agnostic T1 (DS1) over packet | RFC 4553 | + | | | | + | 19 | VPLS | RFC 4761 | + | | | | + | 20 | Structure-agnostic T3 (DS3) over packet | RFC 4553 | + | | | | + | 21 | Nx64kbit/s Basic Service using | RFC 5086 | + | | Structure-aware | | + | | | | + | 25 | Frame Relay DLCI | RFC 4619 | + | | | | + | 40 | Structure-agnostic E3 over packet | RFC 4553 | + | | | | + | 41 (1) | Octet-aligned payload for | RFC 4553 | + | | Structure-agnostic DS1 circuits | | + | | | | + + + +Kompella, et al. Informational [Page 18] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + | 42 (2) | E1 Nx64kbit/s with CAS using | RFC 5086 | + | | Structure-aware | | + | | | | + | 43 | DS1 (ESF) Nx64kbit/s with CAS using | RFC 5086 | + | | Structure-aware | | + | | | | + | 44 | DS1 (SF) Nx64kbit/s with CAS using | RFC 5086 | + | | Structure-aware | | + +-----------+-------------------------------------------+-----------+ + + Table 1: Encaps Types + + Note (1): Allocation of a separate code point for Encaps Type + eliminates the need for Time Division Multiplexer (TDM) payload size. + + Note (2): Having separate code points for Encaps Types 42-44 allows + specifying the trunk framing (i.e., E1, T1 ESF, or T1 SF) with + Channel Associated Signaling (CAS). + + The second is the introduction of TLVs (Type-Length-Value triplets) + in the VPLS NLRI (Network Layer Reachability Information). L2VPN + TLVs can be added to extend the information carried in the NLRI, + using the format shown in Figure 2. In L2VPN TLVs, Type is 1 octet, + and Length is 2 octets and represents the size of the Value field in + bits. L2VPN TLVs, if present, occur as the last element of a VPLS + NLRI. The length of the NLRI includes the total length of the TLVs, + including their headers. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | Value | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Value (continued, if needed) ... | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 2: Format of TLVs + +3.1. Circuit Status Vector + + This sub-TLV carries the status of an L2VPN PVC between a pair of + PEs. Note that an L2VPN PVC is bidirectional, composed of two + simplex connections going in opposite directions. A simplex + connection consists of three segments: 1) the local access circuit + between the source CE and the ingress PE, 2) the tunnel Label + Switched Path (LSP) between the ingress and egress PEs, and 3) the + access circuit between the egress PE and the destination CE. + + + + +Kompella, et al. Informational [Page 19] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + To monitor the status of a PVC, a PE needs to monitor the status of + both simplex connections. Since it knows the status of its access + circuit and the status of the tunnel towards the remote PE, it can + inform the remote PE of these two. Similarly, the remote PE can + inform the status of its access circuit to its local CE and the + status of the tunnel to the first PE. Combining the local and the + remote information, a PE can determine the status of a PVC. + + The basic unit of advertisement in L2VPN for a given CE is a label + block. Each label within a label block corresponds to a PVC on the + CE. The local status information for all PVCs corresponding to a + label block is advertised along with the NLRI for the label block + using the status vector TLV. The Type field of this TLV is 1. The + Length field of the TLV specifies the length of the value field in + bits. The Value field of this TLV is a bit-vector, each bit of which + indicates the status of the PVC associated with the corresponding + label in the label block. Bit value 0 corresponds to the PVC + associated with the first label in the label block and indicates that + the local circuit and the tunnel LSP to the remote PE is up, while a + value of 1 indicates that either or both of them are down. The Value + field is padded to the nearest octet boundary. + + A PE can determine the status of a PVC from one of its CEs to a + remote CE as follows. Say PE A has CE n in VPN X, and PE A gets an + advertisement from PE B for remote CE m also in VPN X; this + advertisement includes a label block and a circuit status vector. To + determine which label to use for CE m, PE A must determine the index + corresponding to CE m in the label block that PE B advertised. The + status of the PVC between CE n and CE m can be obtained by looking at + the bit in the circuit status vector corresponding to this index. + + +----------+-----------------------+ + | TLV Type | Description | + +----------+-----------------------+ + | 1 | Circuit Status Vector | + +----------+-----------------------+ + + Table 2: TLV Types + +3.2. Generalizing the VPN Topology + + In the above, we assumed for simplicity that the VPN was a full mesh. + To allow for more general VPN topologies, a mechanism based on + filtering of BGP extended communities can be used. + + + + + + + +Kompella, et al. Informational [Page 20] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +4. Layer 2 Interworking + + As defined so far in this document, all CE-PE connections for a given + Layer 2 VPN must use the same Layer 2 encapsulation, e.g., they must + all be Frame Relay. This is often a burdensome restriction. One + answer is to use an existing Layer 2 interworking mechanism, for + example, Frame Relay-ATM interworking. + + In this document, we take a different approach: we postulate that the + network Layer is IP and base Layer 2 interworking on that. Thus, one + can choose between pure Layer 2 VPNs, with a stringent Layer 2 + restriction but with Layer 3 independence, or Layer 2 interworking + VPNs, where there is no restriction on Layer 2, but Layer 3 must be + IP. Of course, a PE may choose to implement Frame Relay-ATM + interworking. For example, an ATM Layer 2 VPN could have some CEs + connect via Frame Relay links, if their PE could translate Frame + Relay to ATM transparently to the rest of the VPN. This would be + private to the CE-PE connection, and such a course is outside the + scope of this document. + + For Layer 2 interworking as defined here, when an IP packet arrives + at a PE, its Layer 2 address is noted, then all Layer 2 overhead is + stripped, leaving just the IP packet. Next, a VPN label is added, + and the packet is encapsulated in the PE-PE tunnel (as required by + the tunnel technology). Finally, the packet is forwarded. Note that + the forwarding decision is made on the basis of the Layer 2 + information, not the IP header. At the egress, the VPN label + determines to which CE the packet must be sent and over which virtual + circuit; from this, the egress PE can also determine the Layer 2 + encapsulation to place on the packet once the VPN label is stripped. + + An added benefit of restricting interworking to IP only as the Layer + 3 technology is that the provider's network can provide IP Diffserv + or any other IP-based QoS mechanism to the L2VPN customer. The + ingress PE can set up IP/TCP/UDP-based classifiers to do Diffserv + marking and other functions like policing and shaping on the L2 + circuits of the VPN customer. Note the division of labor: the CE + determines the destination CE and encodes that in the Layer 2 + address. The ingress PE thus determines the egress PE and VPN label + based on the Layer 2 address supplied by the CE, but the ingress PE + can choose the tunnel to reach the egress PE (in the case that there + are different tunnels for each CoS/Diffserv code point) or the CoS + bits to place in the tunnel (in the case where a single tunnel + carries multiple CoS/Diffserv code points) based on its own + classification of the packet. + + + + + + +Kompella, et al. Informational [Page 21] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +5. Packet Transport + + When a packet arrives at a PE from a CE in a Layer 2 VPN, the Layer 2 + address of the packet identifies to which remote attachment circuit + (and thus remote CE) the packet is destined. The procedure outlined + above installs a route that maps the Layer 2 address to a tunnel + (which identifies the PE to which the destination CE is attached) and + a VPN label (which identifies the destination AC). If the egress PE + is the same as the ingress PE, no tunnel or VPN label is needed. + + The packet may then be modified (depending on the Layer 2 + encapsulation). In case of IP-only Layer 2 interworking, the Layer 2 + header is completely stripped off up to the IP header. Then, a VPN + label and tunnel encapsulation are added as specified by the route + described above, and the packet is sent to the egress PE. + + If the egress PE is the same as the ingress, the packet "arrives" + with no labels. Otherwise, the packet arrives with the VPN label, + which is used to determine which CE is the destination CE. The + packet is restored to a fully formed Layer 2 packet and then sent to + the CE. + +5.1. Layer 2 MTU + + This document requires that the Layer 2 MTU configured on all the + access circuits connecting CEs to PEs in an L2VPN be the same. This + can be ensured by passing the configured Layer 2 MTU in the Layer2- + info extended community when advertising L2VPN label blocks. On + receiving an L2VPN label block from remote PEs in a VPN, the MTU + value carried in the Layer2-info extended community should be + compared against the configured value for the VPN. If they don't + match, then the label block should be ignored. + + The MTU on the Layer 2 access links MUST be chosen such that the size + of the L2 frames plus the L2VPN header does not exceed the MTU of the + SP network. Layer 2 frames that exceed the MTU after encapsulation + MUST be dropped. For the case of IP-only Layer 2 interworking, the + IP MTU on the Layer 2 access link must be chosen such that the size + of the IP packet and the L2VPN header does not exceed the MTU of the + SP network. + +5.2. Layer 2 Frame Format + + The modification to the Layer 2 frame depends on the Layer 2 type. + This document requires that the encapsulation methods used in + transporting Layer 2 frames over tunnels be the same as described in + [RFC4448], [RFC4618], [RFC4619], and [RFC4717], except in the case of + IP-only Layer 2 Interworking, which is described next. + + + +Kompella, et al. Informational [Page 22] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + +5.3. IP-Only Layer 2 Interworking + + +-----------------------------------+ + | PSN Transport | VPN | IP | VPN label is the + | Header | Label | Packet | demultiplexing field + +-----------------------------------+ + + Figure 3: Format of IP-Only Layer 2 Interworking Packet + + At the ingress PE, an L2 frame's L2 header is completely stripped off + and is carried over as an IP packet within the SP network (Figure 3). + The forwarding decision is still based on the L2 address of the + incoming L2 frame. At the egress PE, the IP packet is encapsulated + back in an L2 frame and transported over to the destination CE. The + forwarding decision at the egress PE is based on the VPN label as + before. The L2 technology between egress PE and CE is independent of + the L2 technology between ingress PE and CE. + +6. Security Considerations + + RFC 4761 [RFC4761], on which this document is based, has a detailed + discussion of security considerations. As in RFC 4761, the focus + here is the privacy of customer VPN data (as opposed to + confidentiality, integrity, or authentication of said data); to + achieve the latter, one can use the methods suggested in RFC 4761. + The techniques described in RFC 4761 for securing the control plane + and protecting the forwarding path apply equally to L2VPNs, as do the + remarks regarding multi-AS operation. The mitigation strategies and + the analogies with RFC 4364 [RFC4364] also apply here. + + RFC 4761 perhaps should have discussed Denial-of-Service attacks + based on the fact that VPLS PEs have to learn Media Access Control + (MAC) addresses and replicate packets (for flooding and multicast). + However, those considerations don't apply here, as neither of those + actions are required of PEs implementing the procedures in this + document. + +7. IANA Considerations + + IANA has created two new registries: the first is for the one-octet + Encaps Type field of the L2-info extended community. The name of the + registry is "BGP Layer 2 Encapsulation Types"; the values already + allocated are in Table 1 of Section 3. The allocation policy for new + entries up to and including value 127 is "Expert Review" [RFC5226]. + The allocation policy for values 128 through 251 is "First Come First + Served". The values from 252 through 255 are for "Experimental Use". + + + + + +Kompella, et al. Informational [Page 23] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + The second registry is for the one-octet Type field of the TLVs of + the VPLS NLRI. The name of the registry is "BGP L2 TLV Types"; the + sole allocated value is in Table 2 of Section 3. The allocation + policy for new entries up to and including value 127 is "Expert + Review". The allocation policy for values 128 through 251 is "First + Come First Served". The values from 252 through 255 are for + "Experimental Use". + +8. Acknowledgments + + The authors would like to thank Chaitanya Kodeboyina, Dennis + Ferguson, Der-Hwa Gan, Dave Katz, Nischal Sheth, John Stewart, and + Paul Traina for the enlightening discussions that helped shape the + ideas presented here. The authors also thank Ross Callon for his + valuable comments. + + The idea of using extended communities for more general connectivity + of a Layer 2 VPN was a contribution by Yakov Rekhter, who also gave + many useful comments on the text. Many thanks to him. + +9. Contributors + + The following individuals contributed to this document. + + Manoj Leelanivas, Juniper Networks + Quaizar Vohra, Juniper Networks + Javier Achirica, Consultant + Ronald Bonica, Juniper Networks + Dave Cooper, Global Crossing + Chris Liljenstolpe, Telstra + Eduard Metz, KPN Dutch Telecom + Hamid Ould-Brahim, Nortel + Chandramouli Sargor + Himanshu Shah, Ciena + Vijay Srinivasan + Zhaohui Zhang, Juniper Networks + +10. References + +10.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC4360] Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended + Communities Attribute", RFC 4360, February 2006. + + + + + +Kompella, et al. Informational [Page 24] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private + Networks (VPNs)", RFC 4364, February 2006. + + [RFC4446] Martini, L., "IANA Allocations for Pseudowire Edge to Edge + Emulation (PWE3)", BCP 116, RFC 4446, April 2006. + + [RFC4448] Martini, L., Rosen, E., El-Aawar, N., and G. Heron, + "Encapsulation Methods for Transport of Ethernet over MPLS + Networks", RFC 4448, April 2006. + + [RFC4618] Martini, L., Rosen, E., Heron, G., and A. Malis, + "Encapsulation Methods for Transport of PPP/High-Level + Data Link Control (HDLC) over MPLS Networks", RFC 4618, + September 2006. + + [RFC4619] Martini, L., Kawa, C., and A. Malis, "Encapsulation + Methods for Transport of Frame Relay over Multiprotocol + Label Switching (MPLS) Networks", RFC 4619, + September 2006. + + [RFC4717] Martini, L., Jayakumar, J., Bocci, M., El-Aawar, N., + Brayley, J., and G. Koleyni, "Encapsulation Methods for + Transport of Asynchronous Transfer Mode (ATM) over MPLS + Networks", RFC 4717, December 2006. + + [RFC4761] Kompella, K. and Y. Rekhter, "Virtual Private LAN Service + (VPLS) Using BGP for Auto-Discovery and Signaling", + RFC 4761, January 2007. + + [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an + IANA Considerations Section in RFCs", BCP 26, RFC 5226, + May 2008. + +10.2. Informative References + + [Kosiur] Kosiur, D., "Building and Managing Virtual Private + Networks", Wiley Computer Publishing, 1998. + + [RFC3985] Bryant, S. and P. Pate, "Pseudo Wire Emulation Edge-to- + Edge (PWE3) Architecture", RFC 3985, March 2005. + + [RFC4447] Martini, L., Rosen, E., El-Aawar, N., Smith, T., and G. + Heron, "Pseudowire Setup and Maintenance Using the Label + Distribution Protocol (LDP)", RFC 4447, April 2006. + + + + + + + +Kompella, et al. Informational [Page 25] + +RFC 6624 BGP Auto-Discovery and Signaling for L2VPN May 2012 + + + [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, + R., Patel, K., and J. Guichard, "Constrained Route + Distribution for Border Gateway Protocol/MultiProtocol + Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual + Private Networks (VPNs)", RFC 4684, November 2006. + + [RFC4762] Lasserre, M. and V. Kompella, "Virtual Private LAN Service + (VPLS) Using Label Distribution Protocol (LDP) Signaling", + RFC 4762, January 2007. + + [RFC6074] Rosen, E., Davie, B., Radoaca, V., and W. Luo, + "Provisioning, Auto-Discovery, and Signaling in Layer 2 + Virtual Private Networks (L2VPNs)", RFC 6074, + January 2011. + +Authors' Addresses + + Kireeti Kompella + Juniper Networks + 1194 N. Mathilda Ave. + Sunnyvale, CA 94089 + USA + + EMail: kireeti@juniper.net + + + Bhupesh Kothari + Cisco Systems + 3750 Cisco Way + San Jose, CA 95134 + USA + + EMail: bhupesh@cisco.com + + + Rao Cherukuri + Juniper Networks + 1194 N. Mathilda Ave. + Sunnyvale, CA 94089 + USA + + EMail: cherukuri@juniper.net + + + + + + + + + +Kompella, et al. Informational [Page 26] + |