diff options
Diffstat (limited to 'doc/rfc/rfc2685.txt')
-rw-r--r-- | doc/rfc/rfc2685.txt | 339 |
1 files changed, 339 insertions, 0 deletions
diff --git a/doc/rfc/rfc2685.txt b/doc/rfc/rfc2685.txt new file mode 100644 index 0000000..a14a350 --- /dev/null +++ b/doc/rfc/rfc2685.txt @@ -0,0 +1,339 @@ + + + + + + +Network Working Group B. Fox +Request for Comments: 2685 Lucent Technologies +Category: Standards Track B. Gleeson + Nortel Networks + September 1999 + + + Virtual Private Networks Identifier + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (1999). All Rights Reserved. + +Abstract + + Virtual Private IP networks may span multiple Autonomous Systems or + Service Providers. There is a requirement for the use of a globally + unique VPN identifier in order to be able to refer to a particular + VPN (see section 6.1.1 of [1]). This document proposes a format for + a globally unique VPN identifier. + +1. Introduction + + As the Public Internet expands and extends its infrastructure + globally, the determination to exploit this infrastructure has led to + widespread interest in IP based Virtual Private Networks. A VPN + emulates a private IP network over public or shared infrastructures. + Virtual Private Networks provide advantages to both the Service + Provider and its customers. For its customers, a VPN can extend the + IP capabilities of a corporate site to remote offices and/or users + with intranet, extranet, and dialup services. This connectivity + should be achieved at a lower cost to the customer with savings in + capital equipment, operations, and services. The Service Provider + is able to make better use of its infrastructure and network + administration expertise offering IP VPN connectivity and/or services + to its customers. + + There are many ways in which IP VPN services may be implemented. The + IP based VPN framework document [1] identifies four types of VPN to + be supported: Virtual Leased Lines, Virtual Private Routed Networks, + + + +Fox & Gleeson Standards Track [Page 1] + +RFC 2685 Virtual Private Networks Identifier September 1999 + + + Virtual Private Dial Networks, and Virtual Private LAN Segments. In + addition, numerous drafts and white papers outline methods to be used + by Service Providers and/or Service Provider customers to enable this + service. Solutions may be customer based or network based. Network + based solutions may provide connectivity and services at layer 2 + and/or layer 3. The devices involved in enabling the solution may be + Customer Premises Equipment (CPE), Service Provider Edge equipment, + Service Provider Core equipment, or some combination of these. + + While the various methods of VPN service implementation are being + discussed and debated, there are two points on which there is + agreement: + + Because a VPN is private, it may use a private address space which + may overlap with the address space of another VPN or the Public + Internet. + + A VPN may span multiple IP Autonomous Systems (AS) or Service + Providers. + + The first point indicates that an IP address only has meaning within + the VPN in which it exists. For this reason, it is necessary to + identify the VPN in which a particular IP address has meaning, the + "scope" of the IP address. + + The second point indicates that several methods of VPN service + implementation may be used to provide connectivity and services to a + single VPN. Different service providers may employ different + strategies based on their infrastructure and expertise. It is + desirable to be able to identify any particular VPN at any layer and + at any location in which it exists using the same VPN identifier. + +2. Global VPN Identifier + + The purpose of a VPN-ID is to identify a VPN. This identifier may be + used in various ways depending on the method of VPN service + implementation. For example, the VPN-ID may be included: + + - In a MIB to configure attributes to a VPN, or to assign a physical + or logical access interface to a particular VPN. + + - In a control or data packet, to identify the "scope" of a private + IP address and the VPN to which the data belongs. + + It is necessary to be able to identify the VPN with which a data + packet is associated. The VPN-ID may be used to make this + association, either explicitly (e.g. through inclusion of the VPN-ID + in an encapsulation header [2]) or implicitly (e.g. through inclusion + + + +Fox & Gleeson Standards Track [Page 2] + +RFC 2685 Virtual Private Networks Identifier September 1999 + + + of the VPN-ID in a ATM signalling exchange [3]). The appropriateness + of using the VPN-ID in other contexts needs to be carefully + evaluated. + + There is another very important function that may be served by the + VPN identifier. The VPN identifier may be used to define the "VPN + authority" who is responsible for coordinating the connectivity and + services employed by that VPN. The VPN authority may be the Private + Network administrator or the primary Service Provider. The VPN + authority will administer and serve as the main point of contact for + the VPN. The authority may outsource some functions and + connectivity, set up contractual agreements with the different + Service Providers involved, and coordinate configuration, + performance, and fault management. + + These functions require a VPN that is global in scope and usable in + various solutions. To be a truly global VPN identifier, the format + cannot force assumptions about the shared network(s). Conversely, the + format should not be defined in such a way as to prohibit use of + features of the shared network. It is necessary to note that the + same VPN may be identified at different layers of the same shared + network, e.g. ATM and IP layers. The same VPN-ID format and value + should apply at both layers. + + The methods of VPN-ID usage are beyond the scope of this memo. + +3. Global VPN Identifier Format Requirements + + The VPN Identifier format should meet the following requirements: + + - Provide a globally unique VPN Identifier usable across + multiple Service Providers. + - Enable support of a non-IP dependent VPN-ID for use in + layer 2 VPNs. + - Identify the VPN Authority within the VPN Identifier. + + +4. Global VPN Identifier Format + + The global VPN Identifier format is: + + 3 octet VPN authority Organizationally Unique Identifier [4] + + followed by + + 4 octet VPN index identifying VPN according to OUI + + + + + +Fox & Gleeson Standards Track [Page 3] + +RFC 2685 Virtual Private Networks Identifier September 1999 + + + 0 1 2 3 4 5 6 7 8 + +-+-+-+-+-+-+-+-+ + | VPN OUI (MSB) | + +-+-+-+-+-+-+-+-+ + | VPN OUI | + +-+-+-+-+-+-+-+-+ + | VPN OUI (LSB) | + +-+-+-+-+-+-+-+-+ + |VPN Index (MSB)| + +-+-+-+-+-+-+-+-+ + | VPN Index | + +-+-+-+-+-+-+-+-+ + | VPN Index | + +-+-+-+-+-+-+-+-+ + |VPN Index (LSB)| + +-+-+-+-+-+-+-+-+ + + The VPN OUI (IEEE 802-1990 Organizationally Unique Identifier) [4] + identifies the VPN authority. The VPN authority will serve as the + primary VPN administrator. The VPN authority may be the + company/organization to which the VPN belongs or a Service Provider + that provides the underlying infrastructure using its own and/or + other providers' shared networks. The 4 octet VPN Index identifies a + particular VPN serviced by the VPN authority. + +5. Security Considerations + + This document defines the format of the global VPN identifier without + specifying usage. However, the association of particular + characteristics and capabilities with a VPN identifier necessitates + use of standard security procedures with any specified usage. + Misconfiguration or deliberate forging of VPN identifier may result + different breaches in security including the interconnection of + different VPNs. + +6. References + + [1] Gleeson, Heinanen, Lin, Armitage, Malis, "A Framework for IP + Based Virtual Private Networks", Work in Progress. + + [2] Grossman, D. and J. Heinanen, "Multiprotocol Encapsulation over + ATM Adaptation Layer 5", RFC 2684, September 1999. + + [3] "MPOA v1.1 Addendum on VPN Support", ATM Forum, af-mpoa-0129.000, + August, 1999, Bernhard Petri, editor, final ballot document. + + [4] http://standards.ieee.org/regauth/oui/index.html + + + + +Fox & Gleeson Standards Track [Page 4] + +RFC 2685 Virtual Private Networks Identifier September 1999 + + +7. Authors' Addresses + + Barbara A. Fox + Lucent Technologies + 300 Baker Ave, Suite 100 + Concord, MA 01742-2168 + + Phone: +1-978-287-2843 + EMail: barbarafox@lucent.com + + + Bryan Gleeson + Nortel Networks + 4500 Great America Parkway, + Santa Clara, CA 95054 + + Phone: +1-408-855-3711 + EMail: bgleeson@shastanets.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Fox & Gleeson Standards Track [Page 5] + +RFC 2685 Virtual Private Networks Identifier September 1999 + + +8. Full Copyright Statement + + Copyright (C) The Internet Society (1999). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Fox & Gleeson Standards Track [Page 6] + |