1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
|
Network Working Group W. Luo
Request for Comments: 4667 Cisco Systems, Inc.
Category: Standards Track September 2006
Layer 2 Virtual Private Network (L2VPN) Extensions
for Layer 2 Tunneling Protocol (L2TP)
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
The Layer 2 Tunneling Protocol (L2TP) provides a standard method for
setting up and managing L2TP sessions to tunnel a variety of L2
protocols. One of the reference models supported by L2TP describes
the use of an L2TP session to connect two Layer 2 circuits attached
to a pair of peering L2TP Access Concentrators (LACs), which is a
basic form of Layer 2 Virtual Private Network (L2VPN). This document
defines the protocol extensions for L2TP to set up different types of
L2VPNs in a unified fashion.
Table of Contents
1. Introduction ....................................................2
1.1. Specification of Requirements ..............................2
2. Network Reference Model .........................................2
3. Forwarder Identifier ............................................3
4. Protocol Components .............................................4
4.1. Control Messages ...........................................4
4.2. Existing AVPs for L2VPN ....................................4
4.3. New AVPs for L2VPN .........................................5
4.4. AVP Interoperability .......................................7
5. Signaling Procedures ............................................7
5.1. Overview ...................................................7
5.2. Pseudowire Tie Detection ...................................8
5.3. Generic Algorithm ..........................................9
6. IANA Considerations ............................................12
Luo Standards Track [Page 1]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
7. Security Considerations ........................................12
8. Acknowledgement ................................................13
9. References .....................................................13
9.1. Normative References ......................................13
9.2. Informative References ....................................13
1. Introduction
[RFC3931] defines a dynamic tunneling mechanism to carry multiple
Layer 2 protocols besides Point-to-Point Protocol (PPP), the only
protocol supported in [RFC2661], over a packet-based network. The
baseline protocol supports various types of applications, which have
been highlighted in the different Layer 2 Tunneling Protocol (L2TP)
reference models in [RFC3931]. An L2TP Access Concentrator (LAC) is
an L2TP Control Connection Endpoint (LCCE) that cross-connects
attachment circuits and L2TP sessions. Layer 2 Virtual Private
Network (L2VPN) applications are typically in the scope of the LAC-
LAC reference model.
This document discusses the commonalities and differences among L2VPN
applications with respect to using L2TPv3 as the signaling protocol.
In this document, the acronym "L2TP" refers to L2TPv3 or L2TP in
general.
1.1. Specification of Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Network Reference Model
In the LAC-LAC reference model, a LAC serves as a cross-connect
between attachment circuits and L2TP sessions. Each L2TP session
acts as an emulated circuit, also known as pseudowire. A pseudowire
is used to bind two "forwarders" together. For different L2VPN
applications, different types of forwarders are defined.
In the L2VPN framework [L2VPNFW], a LAC is a Provider Edge (PE)
device. LAC and PE are interchangeable terms in the context of this
document. Remote systems in the LAC-LAC reference model are Customer
Edge (CE) devices.
Luo Standards Track [Page 2]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
+----+ L2 +----+ +----+ L2 +----+
| CE |------| PE |....[core network]....| PE |------| CE |
+----+ +----+ +----+ +----+
|<- emulated service ->|
|<----------------- L2 service -------------->|
L2VPN Network Reference Model
In a simple cross-connect application, an attachment circuit is a
forwarder directly bound to a pseudowire. It is a one-to-one
mapping. Traffic received from the attachment circuit on a local PE
is forwarded to the remote PE through the pseudowire. When the
remote PE receives traffic from the pseudowire, it forwards the
traffic to the corresponding attachment circuit on its end. The
forwarding decision is based on the attachment circuit or pseudowire
demultiplexing identifier.
With Virtual Private LAN Service (VPLS), a Virtual Switching Instance
(VSI) is a forwarder connected to one or more attachment circuits and
pseudowires. A single pseudowire is used to connect a pair of VSIs
on two peering PEs. Traffic received from an attachment circuit or a
pseudowire is first forwarded to the corresponding VSI based on the
attachment circuit or pseudowire demultiplexing identifier. The VSI
performs additional lookup to determine where to further forward the
traffic.
With Virtual Private Wire Service (VPWS), attachment circuits are
grouped into "colored pools". Each pool is a forwarder and is
connected through a network of point-to-point cross-connects. The
data forwarding perspective is identical to the cross-connect
application. However, constructing colored pools involves more
complicated signaling procedures.
3. Forwarder Identifier
A forwarder identifier is assigned to each forwarder on a given PE
and is unique in the context of the PE. It is defined as the
concatenation of an Attachment Group Identifier (AGI) and an
Attachment Individual Identifier (AII), denoted as <AGI, AII>. The
AGI is used to group a set of forwarders together for signaling
purposes. An AII is used to distinguish forwarders within a group.
AII can be unique on a per-platform or per-group basis.
As far as the signaling procedures are concerned, a forwarder
identifier is an arbitrary string of bytes. It is up to
implementations to decide the values for AGI and AII.
Luo Standards Track [Page 3]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
When connecting two forwarders together, both MUST have the same AGI
as part of their forwarder identifiers. The AII of the source
forwarder is known as the Source AII (SAII), and the AII of the
target forwarder is known as the Target AII (TAII). Therefore, the
source forwarder and target forwarder can be denoted as <AGI, SAII>
and <AGI, TAII>, respectively.
4. Protocol Components
4.1. Control Messages
L2TP defines two sets of session management procedures: incoming call
and outgoing call. Even though it is entirely possible to use the
outgoing call procedures for signaling L2VPNs, the incoming call
procedures have some advantages in terms of the relevance of the
semantics. [PWE3L2TP] gives more details on why the incoming call
procedures are more appropriate for setting up pseudowires.
The signaling procedures for L2VPNs described in the following
sections are based on the Control Connection Management and the
Incoming Call procedures, defined in Sections 3.3 and 3.4.1 of
[RFC3931], respectively. L2TP control message types are defined in
Section 3.1 of [RFC3931]. This document references the following
L2TP control messages:
Start-Control-Connection-Request (SCCRQ)
Start-Control-Connection-Reply (SCCRP)
Incoming-Call-Request (ICRQ)
Incoming-Call-Reply (ICRP)
Incoming-Call-Connected (ICCN)
Set-Link-Info (SLI)
4.2. Existing AVPs for L2VPN
The following Attribute Value Pairs (AVPs), defined in Sections
5.4.3, 5.4.4, and 5.4.5 of [RFC3931], are used for signaling L2VPNs.
Router ID
The Router ID sent in SCCRQ and SCCRP during control connection
setup establishes the unique identity of each PE.
Pseudowire Capabilities List
The Pseudowire Capabilities List sent in the SCCRQ and SCCRP
indicates the pseudowire types supported by the sending PE. It
merely serves as an advertisement to the receiving PE. Its
content should not affect the control connection setup.
Luo Standards Track [Page 4]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
Before a local PE initiates a session of a particular pseudowire
type to a remote PE, it MUST examine whether the remote PE has
advertised this pseudowire type in this AVP and SHOULD NOT attempt
to initiate the session if the intended pseudowire type is not
supported by the remote PE.
Pseudowire Type
The Pseudowire Type sent in ICRQ signals the intended pseudowire
type to the receiving PE. The receiving PE checks it against its
local pseudowire capabilities list. If it finds a match, it
responds with an ICRP without a Pseudowire Type AVP, which
implicitly acknowledges its acceptance of the intended pseudowire.
If it does not find a match, it MUST respond with a Call-
Disconnect-Notify (CDN), with an "unsupported pseudowire type"
result code.
L2-Specific Sublayer
The L2-Specific Sublayer can be sent in ICRQ, ICRP, and ICCN. If
the receiving PE supports the specified L2-Specific Sublayer, it
MUST include the identified L2-Specific Sublayer in its data
packets sent to the sending PE. Otherwise, it MUST reject the
connection by sending a CDN to the sending PE.
Circuit Status
The Circuit Status is sent in both ICRQ and ICRP to inform the
receiving PE about the circuit status on the sending PE. It can
also be sent in ICCN and SLI to update the status.
Remote End Identifier
The TAII value is encoded in the Remote End ID AVP and sent in
ICRQ along with the optional AGI to instruct the receiving PE to
bind the proposed pseudowire to the forwarder that matches the
specified forwarder identifier.
4.3. New AVPs for L2VPN
Attachment Group Identifier
The AGI AVP, Attribute Type 89, is an identifier used to associate
a forwarder to a logical group. The AGI AVP is used in
conjunction with the Local End ID AVP and Remote End ID AVP, which
encode the SAII and TAII, respectively, to identify a specific
forwarder. When the AGI AVP is omitted in the control messages or
contains a zero-length value, the forwarders are considered to use
Luo Standards Track [Page 5]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
the default AGI. Note that there is only one designated default
AGI value for all forwarders.
The Attribute Value field for this AVP has the following format:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|M|H|0|0|0|0| Length | 0 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 89 | AGI (variable length) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The AGI field is a variable-length field. This AVP MAY be present
in ICRQ.
This AVP MAY be hidden (the H bit MAY be 0 or 1). The hiding of
AVP attribute values is defined in Section 5.3 of [RFC3931]. The
M bit for this AVP SHOULD be set to 0. The Length (before hiding)
of this AVP is 6 octets plus the length of the AGI field.
Local End ID
The Local End ID AVP, Attribute Type 90, encodes the SAII value.
The SAII may also be used in conjunction with the TAII to detect
pseudowire ties. When it is omitted in the control messages, it
is assumed that it has the same value as the TAII.
The Attribute Value field for this AVP has the following format:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|M|H|0|0|0|0| Length | 0 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 90 | SAII (variable length) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The SAII field is a variable-length field. This AVP MAY be
present in ICRQ.
This AVP MAY be hidden (the H bit MAY be 0 or 1). The M bit for
this AVP SHOULD be set to 0. The Length (before hiding) of this
AVP is 6 octets plus the length of the SAII field.
Interface Maximum Transmission Unit
The Interface Maximum Transmission Unit (MTU) AVP, Attribute Type
Luo Standards Track [Page 6]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
91, indicates the MTU in octets of a packet that can be sent out
from the CE-facing interface. The MTU values of a given
pseudowire, if advertised in both directions, MUST be identical.
If they do not match, the pseudowire SHOULD NOT be established.
When this AVP is omitted in the control messages in either
direction, it is assumed that the remote PE has the same interface
MTU as the local PE for the pseudowire being signaled.
The Attribute Value field for this AVP has the following format:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|M|H|0|0|0|0| Length | 0 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 91 | Interface MTU |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The Interface MTU field is a 2-octet integer value. This AVP MAY
be present in ICRQ and ICRP. When a PE receives an Interface MTU
AVP with an MTU value different from its own, it MAY respond with
a CDN with a new result code indicating the disconnect cause.
23 - Mismatching interface MTU
This AVP MAY be hidden (the H bit MAY be 0 or 1). The M bit for
this AVP SHOULD be set to 0. The Length (before hiding) of this
AVP is 8 octets.
4.4. AVP Interoperability
To ensure interoperability, the mandatory (M) bit settings of the
existing AVPs used in L2VPN applications should be the same as those
specified in [RFC3931]. The generic M-bit processing is described in
Section 5.2 of [RFC3931]. Setting the M-bit of the new AVPs to 1
will impair interoperability.
5. Signaling Procedures
5.1. Overview
Assume that a PE assigns a forwarder identifier to one of its local
forwarders and that it knows it needs to set up a pseudowire to a
remote forwarder on a remote PE that has a certain Forwarder ID.
This knowledge can be obtained either through manual configuration or
some auto-discovery procedure.
Before establishing the intended pseudowire, each pair of peering PEs
Luo Standards Track [Page 7]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
exchanges control connection messages to establish a control
connection. Each advertises its supported pseudowire types, as
defined in [PWE3IANA], in the Pseudowire Capabilities List AVP.
After the control connection is established, the local PE examines
whether the remote PE supports the pseudowire type it intends to set
up. Only if the remote PE supports the intended pseudowire type
should it initiate a pseudowire connection request.
When the local PE receives an ICRQ for a pseudowire connection, it
examines the forwarder identifiers encoded in the AGI, SAII, and TAII
in order to determine the following:
- Whether it has a local forwarder with the forwarder identifier
value specified in the ICRQ.
- Whether the remote forwarder with the forwarder identifier
specified in the ICRQ is allowed to connect with this local
forwarder.
If both conditions are met, it sends an ICRP to the remote PE to
accept the connection request. If either of the two conditions
fails, it sends a CDN to the remote PE to reject the connection
request.
The local PE can optionally include a result code in the CDN to
indicate the disconnect cause. The possible result codes are
24 - Attempt to connect to non-existent forwarder
25 - Attempt to connect to unauthorized forwarder
5.2. Pseudowire Tie Detection
Conceivably in the network reference models, as either PE may
initiate a pseudowire to another PE at any time, the PEs could end up
initiating a pseudowire to each other simultaneously. In order to
avoid setting up duplicated pseudowires between two forwarders, each
PE must be able to independently detect such a pseudowire tie. The
following procedures need to be followed to detect a tie:
If both TAII and SAII are present in the ICRQ, the receiving PE
compares the TAII and SAII against the SAII and TAII previously sent
to the sending PE. If the received TAII matches the sent SAII and
the received SAII matches the sent TAII, a tie is detected.
If only the TAII is present in the ICRQ, the SAII is assumed to have
the same value as the TAII. The receiving PE compares the received
TAII with the SAII that it previously sent to the sending PE. If the
Luo Standards Track [Page 8]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
SAII in that ICRQ is also omitted, then the value encoded in the sent
TAII is used for comparison. If they match, a tie is detected.
If the AGI is present, it is first prepended to the TAII and SAII
values before the tie detection occurs.
Once a tie is discovered, the PE uses the standard L2TP tie breaking
procedure, as described in Section 5.4.4 of [RFC3931], to disconnect
the duplicated pseudowire.
5.3. Generic Algorithm
The following uses a generic algorithm to illustrate the protocol
interactions when constructing an L2VPN using L2TP signaling.
Each PE first forms a list, SOURCE_FORWARDERS, consisting of all
local forwarders of a given VPN. Then it puts all local forwarders
that need to be interconnected and all remote forwarders of the same
VPN into another list, TARGET_FORWARDERS. The formation of the
network topology depends on the content in the SOURCE_FORWARDERS and
TARGET_FORWARDERS lists. These two lists can be constructed by
manual configuration or some auto-discovery procedure.
The algorithm is used to set up a full mesh of interconnections
between SOURCE_FORWARDERS and TARGET_FORWARDERS. An L2VPN is formed
when the algorithm is finished in every participating PE of this
L2VPN.
1. Pick the next forwarder, from SOURCE_FORWARDERS. If no
forwarder is available for processing, the processing is
complete.
2. Pick the next forwarder, from TARGET_FORWARDERS. If no
forwarder is available for processing, go back to step 1.
3. If the two forwarders are associated with different Router
IDs, a pseudowire must be established between them. Proceed
to step 6.
4. Compare the <AGI, AII> values of the two forwarders. If
they match, the source and target forwarders are the same,
so no more action is necessary. Go back to step 2.
5. As the source and target forwarders both reside on the local
PE, no pseudowire is needed. The PE simply creates a local
cross-connect between the two forwarders. Go back to step 2.
6. As the source and target forwarders reside on different PEs,
Luo Standards Track [Page 9]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
a pseudowire must be established between them. The PE first
examines whether the source forwarder has already established a
pseudowire to the target forwarder. If so, go back to step 2.
7. If no pseudowire is already established between the source and
target forwarders, the local PE obtains the address of the
remote PE and establishes a control connection to the remote
PE if one does not already exist.
8. The local PE sends an ICRQ to the remote PE. The AGI, TAII,
and SAII values are encoded in the AGI AVP, the Remote End ID
AVP, and the Local End ID AVP, respectively.
9. If the local PE receives a response corresponding to the
ICRQ it just sent, proceed to step 10. Otherwise, if the
local PE receives an ICRQ from the same remote PE, proceed
to step 11.
10. The local PE receives a response from the remote PE. If
it is a CDN, go back to step 2. If it's an ICRP, the local
PE binds the source forwarder to the pseudowire and sends
an ICCN to the remote PE. Go back to step 2.
11. If the local PE receives an ICRQ from the same remote PE,
it needs to perform session tie detection, as described in
Section 5.2. If a session tie is detected, the PE performs
tie breaking.
12. If the local PE loses the tie breaker, it sends a CDN with
the result code that indicates that the disconnection is due to
losing the tie breaker. Proceed to step 14.
13. If the local PE wins the tie breaker, it ignores the remote
PE's ICRQ, but acknowledges receipt of the control message
and continues waiting for the response from the remote PE.
Go to step 10.
14. The local PE determines whether it should accept the
connection request, as described in Section 5.1.
If it accepts the ICRQ, it sends an ICRP to the remote PE.
15. The local PE receives a response from the remote PE. If
it is a CDN, go back to step 2. If it is an ICCN, the local
PE binds the source forwarder to the pseudowire, go back
to step 2.
The following diagram illustrates the above procedure:
Luo Standards Track [Page 10]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
---------> Pick Next
| Source Forwarder
| |
| |
| v N
| Found Source Forwarder? ----------> End
| |
| Y |
| v
| Pick Next <--------------------------------
| Target Forwarder |
| | |
| | |
| N v |
-------- Found Target Forwarder? |
| |
Y | |
v Y Y |
Same Router ID? ------> Same Forwarder ID? ------|
| | |
N | N | |
| v |
| Create Local -------|
v Cross-connect |
Pseudowire Already Y |
Established Between -------------------------------|
Source and Target? |
| |
N | |
v |
Local Initiates Pseudowire |
Connection Request to Remote |
| |
| |
v |
-------> Local Wait for Message |
| ----- from Remote -------------- |
| | | |
| | | |
| v v |
| Local Receives Pseudowire Local Receives Pseudowire |
| Connection Request Connection Response |
| from Remote from Remote |
| | | |
| | | |
| v v N |
| Perform Pseudowire Connection Accepted? --------|
| Tie Detection | |
Luo Standards Track [Page 11]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
| | Y | |
| | v |
| | Local Binds Source ---------|
| | Forwarder to Pseudowire |
| | |
| v N N |
| Tie Detected? -----> Accept Remote -----> Reject ------|
| | Connection Request? Remote Request |
| Y | ^ | |
| v | | Y |
| Perform Tie Breaking | ------> Local Binds ----
| | | Source Forwarder
| | | to Pseudowire
| v N |
| Won Tie Breaking? ------> Disconnect
| | Local Connection
| Y |
| v
------ Ignore Remote
Connection Request
6. IANA Considerations
The IANA registry procedure in this document follows that in Section
10 of [RFC3931]. The IANA has assigned the following new values for
existing registries managed by IANA.
This document defines three new L2TP control message Attribute Value
Pairs (AVPs) that have been assigned by the IANA. These are
described in Section 4.3 and are summarized below:
89 - Attachment Group Identifier
90 - Local End Identifier
91 - Interface Maximum Transmission Unit
Sections 4.3 and 5.1 define three new result codes for the CDN
message that have been assigned by the IANA:
23 - Mismatching interface MTU
24 - Attempt to connect to non-existent forwarder
25 - Attempt to connect to unauthorized forwarder
7. Security Considerations
This specification does not introduce any additional security
considerations beyond those discussed in [RFC3931] and [L2VPNFW].
Luo Standards Track [Page 12]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
8. Acknowledgement
The author would like to thank Mark Townsley and Carlos Pignataro for
their valuable input.
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3931] Lau, J., Townsley, M., and I. Goyret, "Layer Two Tunneling
Protocol - Version 3 (L2TPv3)", RFC 3931, March 2005.
9.2. Informative References
[PWE3IANA] Martini, L., "IANA Allocations for Pseudowire Edge to Edge
Emulation (PWE3)", BCP 116, RFC 4446, April 2006.
[L2VPNFW] Andersson L., Ed. and E. Rosen, Ed., "Framework for Layer
2 Virtual Private Networks (L2VPNs)", RFC 4664, September
2006.
[PWE3L2TP] W. Townsley, "Pseudowires and L2TPv3", Work in Progress.
[RFC2661] Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn,
G., and B. Palter, "Layer Two Tunneling Protocol "L2TP"",
RFC 2661, August 1999.
Author's Address
Wei Luo
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
EMail: luo@cisco.com
Luo Standards Track [Page 13]
^L
RFC 4667 L2VPN Extensions for L2TP September 2006
Full Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Luo Standards Track [Page 14]
^L
|