1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
|
Network Working Group T. Nadeau, Ed.
Request for Comments: 5085 C. Pignataro, Ed.
Category: Standards Track Cisco Systems, Inc.
December 2007
Pseudowire Virtual Circuit Connectivity Verification (VCCV):
A Control Channel for Pseudowires
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Abstract
This document describes Virtual Circuit Connectivity Verification
(VCCV), which provides a control channel that is associated with a
pseudowire (PW), as well as the corresponding operations and
management functions (such as connectivity verification) to be used
over that control channel. VCCV applies to all supported access
circuit and transport types currently defined for PWs.
Nadeau & Pignataro Standards Track [Page 1]
^L
RFC 5085 PW VCCV December 2007
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Specification of Requirements . . . . . . . . . . . . . . 5
2. Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Overview of VCCV . . . . . . . . . . . . . . . . . . . . . . . 6
4. CC Types and CV Types . . . . . . . . . . . . . . . . . . . . 8
5. VCCV Control Channel for MPLS PWs . . . . . . . . . . . . . . 10
5.1. VCCV Control Channel Types for MPLS . . . . . . . . . . . 10
5.1.1. In-Band VCCV (Type 1) . . . . . . . . . . . . . . . . 11
5.1.2. Out-of-Band VCCV (Type 2) . . . . . . . . . . . . . . 12
5.1.3. TTL Expiry VCCV (Type 3) . . . . . . . . . . . . . . . 12
5.2. VCCV Connectivity Verification Types for MPLS . . . . . . 13
5.2.1. ICMP Ping . . . . . . . . . . . . . . . . . . . . . . 13
5.2.2. MPLS LSP Ping . . . . . . . . . . . . . . . . . . . . 13
5.3. VCCV Capability Advertisement for MPLS PWs . . . . . . . . 13
5.3.1. VCCV Capability Advertisement LDP Sub-TLV . . . . . . 14
6. VCCV Control Channel for L2TPv3/IP PWs . . . . . . . . . . . . 15
6.1. VCCV Control Channel Type for L2TPv3 . . . . . . . . . . . 16
6.2. VCCV Connectivity Verification Type for L2TPv3 . . . . . . 17
6.2.1. L2TPv3 VCCV using ICMP Ping . . . . . . . . . . . . . 17
6.3. L2TPv3 VCCV Capability Advertisement for L2TPv3 . . . . . 17
6.3.1. L2TPv3 VCCV Capability AVP . . . . . . . . . . . . . . 17
7. Capability Advertisement Selection . . . . . . . . . . . . . . 19
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19
8.1. VCCV Interface Parameters Sub-TLV . . . . . . . . . . . . 19
8.1.1. MPLS VCCV Control Channel (CC) Types . . . . . . . . . 19
8.1.2. MPLS VCCV Connectivity Verification (CV) Types . . . . 20
8.2. PW Associated Channel Type . . . . . . . . . . . . . . . . 21
8.3. L2TPv3 Assignments . . . . . . . . . . . . . . . . . . . . 21
8.3.1. Control Message Attribute Value Pairs (AVPs) . . . . . 21
8.3.2. Default L2-Specific Sublayer Bits . . . . . . . . . . 21
8.3.3. ATM-Specific Sublayer Bits . . . . . . . . . . . . . . 21
8.3.4. VCCV Capability AVP Values . . . . . . . . . . . . . . 22
9. Congestion Considerations . . . . . . . . . . . . . . . . . . 23
10. Security Considerations . . . . . . . . . . . . . . . . . . . 24
11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 25
12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26
12.1. Normative References . . . . . . . . . . . . . . . . . . . 26
12.2. Informative References . . . . . . . . . . . . . . . . . . 26
Nadeau & Pignataro Standards Track [Page 2]
^L
RFC 5085 PW VCCV December 2007
1. Introduction
There is a need for fault detection and diagnostic mechanisms that
can be used for end-to-end fault detection and diagnostics for a
Pseudowire, as a means of determining the PW's true operational
state. Operators have indicated in [RFC4377] and [RFC3916] that such
a tool is required for PW operation and maintenance. This document
defines a protocol called Virtual Circuit Connectivity Verification
(VCCV) that satisfies these requirements. VCCV is, in its simplest
description, a control channel between a pseudowire's ingress and
egress points over which connectivity verification messages can be
sent.
The Pseudowire Edge-to-Edge Emulation (PWE3) Working Group defines a
mechanism that emulates the essential attributes of a
telecommunications service (such as a T1 leased line or Frame Relay)
over a variety of Packet Switched Network (PSN) types [RFC3985].
PWE3 is intended to provide only the minimum necessary functionality
to emulate the service with the required degree of faithfulness for
the given service definition. The required functions of PWs include
encapsulating service-specific bit streams, cells, or PDUs arriving
at an ingress port and carrying them across an IP path or MPLS
tunnel. In some cases, it is necessary to perform other operations,
such as managing their timing and order, to emulate the behavior and
characteristics of the service to the required degree of
faithfulness.
From the perspective of Customer Edge (CE) devices, the PW is
characterized as an unshared link or circuit of the chosen service.
In some cases, there may be deficiencies in the PW emulation that
impact the traffic carried over a PW and therefore limit the
applicability of this technology. These limitations must be fully
described in the appropriate service-specific documentation.
For each service type, there will be one default mode of operation
that all PEs offering that service type must support. However,
optional modes have been defined to improve the faithfulness of the
emulated service, as well as to offer a means by which older
implementations may support these services.
Figure 1 depicts the architecture of a pseudowire as defined in
[RFC3985]. It further depicts where the VCCV control channel resides
within this architecture, which will be discussed in detail shortly.
Nadeau & Pignataro Standards Track [Page 3]
^L
RFC 5085 PW VCCV December 2007
|<-------------- Emulated Service ---------------->|
| |<---------- VCCV ---------->| |
| |<------- Pseudowire ------->| |
| | | |
| | |<-- PSN Tunnel -->| | |
| V V V V |
V AC +----+ +----+ AC V
+-----+ | | PE1|==================| PE2| | +-----+
| |----------|............PW1.............|----------| |
| CE1 | | | | | | | | CE2 |
| |----------|............PW2.............|----------| |
+-----+ ^ | | |==================| | | ^ +-----+
^ | +----+ +----+ | | ^
| | Provider Edge 1 Provider Edge 2 | |
| | | |
Customer | | Customer
Edge 1 | | Edge 2
| |
| |
Native service Native service
Figure 1: PWE3 VCCV Operation Reference Model
From Figure 1, Customer Edge (CE) routers CE1 and CE2 are attached to
the emulated service via Attachment Circuits (ACs), and to each of
the Provider Edge (PE) routers (PE1 and PE2, respectively). An AC
can be a Frame Relay Data Link Connection Identifier (DLCI), an ATM
Virtual Path Identifier / Virtual Channel Identifier (VPI/VCI), an
Ethernet port, etc. The PE devices provide pseudowire emulation,
enabling the CEs to communicate over the PSN. A pseudowire exists
between these PEs traversing the provider network. VCCV provides
several means of creating a control channel over the PW, between the
PE routers that attach the PW.
Figure 2 depicts how the VCCV control channel is associated with the
pseudowire protocol stack.
Nadeau & Pignataro Standards Track [Page 4]
^L
RFC 5085 PW VCCV December 2007
+-------------+ +-------------+
| Layer2 | | Layer2 |
| Emulated | < Emulated Service > | Emulated |
| Services | | Services |
+-------------+ +-------------+
| | VCCV/PW | |
|Demultiplexer| < Control Channel > |Demultiplexer|
+-------------+ +-------------+
| PSN | < PSN Tunnel > | PSN |
+-------------+ +-------------+
| Physical | | Physical |
+-----+-------+ +-----+-------+
| |
| ____ ___ ____ |
| _/ \___/ \ _/ \__ |
| / \__/ \_ |
| / \ |
+--------| MPLS or IP Network |---+
\ /
\ ___ ___ __ _/
\_/ \____/ \___/ \____/
Figure 2: PWE3 Protocol Stack Reference Model including the VCCV
Control Channel
VCCV messages are encapsulated using the PWE3 encapsulation as
described in Sections 5 and 6, so that they are handled and processed
in the same manner (or in some cases, a similar manner) as the PW
PDUs for which they provide a control channel. These VCCV messages
are exchanged only after the capability (expressed as two VCCV type
spaces, namely the VCCV Control Channel and Connectivity Verification
Types) and desire to exchange such traffic has been advertised
between the PEs (see Sections 5.3 and 6.3), and VCCV types chosen.
1.1. Specification of Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Abbreviations
AC Attachment Circuit [RFC3985].
AVP Attribute Value Pair [RFC3931].
CC Control Channel (used as CC Type).
Nadeau & Pignataro Standards Track [Page 5]
^L
RFC 5085 PW VCCV December 2007
CE Customer Edge.
CV Connectivity Verification (used as CV Type).
CW Control Word [RFC3985].
L2SS L2-Specific Sublayer [RFC3931].
LCCE L2TP Control Connection Endpoint [RFC3931].
OAM Operation and Maintenance.
PE Provider Edge.
PSN Packet Switched Network [RFC3985].
PW Pseudowire [RFC3985].
PW-ACH PW Associated Channel Header [RFC4385].
VCCV Virtual Circuit Connectivity Verification.
3. Overview of VCCV
The goal of VCCV is to verify and further diagnose the pseudowire
forwarding path. To this end, VCCV is comprised of different
components:
o a means of signaling VCCV capabilities to a peer PE,
o an encapsulation for the VCCV control channel messages that allows
the receiving PE to intercept, interpret, and process them locally
as OAM messages, and
o specifications for the operation of the various VCCV operational
modes transmitted within the VCCV messages.
When a pseudowire is first signaled using the Label Distribution
Protocol (LDP) [RFC4447] or the Layer Two Tunneling Protocol version
3 (L2TPv3) [RFC3931], a message is sent from the initiating PE to the
receiving PE requesting that a pseudowire be set up. This message
has been extended to include VCCV capability information (see
Section 4). The VCCV capability information indicates to the
receiving PE which combinations of Control Channel (CC) and
Connectivity Verification (CV) Types it is capable of receiving. If
the receiving PE agrees to establish the PW, it will return its
capabilities in the subsequent signaling message to indicate which CC
Nadeau & Pignataro Standards Track [Page 6]
^L
RFC 5085 PW VCCV December 2007
and CV Types it is capable of processing. Precedence rules for which
CC and CV Type to choose in cases where more than one is specified in
this message are defined in Section 7 of this document.
Once the PW is signaled, data for the PW will flow between the PEs
terminating the PW. At this time, the PEs can begin transmitting
VCCV messages based on the CC and CV Type combinations just
discussed. To this end, VCCV defines an encapsulation for these
messages that identifies them as belonging to the control channel for
the PW. This encapsulation is designed to both allow the control
channel to be processed functionally in the same manner as the data
traffic for the PW in order to faithfully test the data plane for the
PE, and allow the PE to intercept and process these VCCV messages
instead of forwarding them out of the AC towards the CE as if they
were data traffic. In this way, the most basic function of the VCCV
control channel is to verify connectivity of the pseudowire and the
data plane used to transport the data path for the pseudowire. It
should be noted that because of the number of combinations of
optional and mandatory data-plane encapsulations for PW data traffic,
VCCV defines a number of Control Channel (CC) and Connectivity
Verification (CV) types in order to support as many of these as
possible. While designed to support most of the existing
combinations (both mandatory and optional), VCCV does define a
default CC and CV Type combination for each PW Demultiplexer type, as
will be described in detail later in this document.
VCCV can be used both as a fault detection and/or a diagnostic tool
for pseudowires. For example, an operator can periodically invoke
VCCV on a timed, on-going basis for proactive connectivity
verification on an active pseudowire, or on an ad hoc or as-needed
basis as a means of manual connectivity verification. When invoking
VCCV, the operator triggers a combination of one of its various CC
Types and one of its various CV Types. The CV Types include LSP Ping
[RFC4379] for MPLS PWs, and ICMP Ping [RFC0792] [RFC4443] for both
MPLS and L2TPv3 PWs. We define a matrix of acceptable CC and CV Type
combinations further in this specification.
The control channel maintained by VCCV can additionally carry fault
detection status between the endpoints of the pseudowire.
Furthermore, this information can then be translated into the native
OAM status codes used by the native access technologies, such as ATM,
Frame-Relay or Ethernet. The specific details of such status
interworking is out of the scope of this document, and is only noted
here to illustrate the utility of VCCV for such purposes. Complete
details can be found in [MSG-MAP] and [RFC4447].
Nadeau & Pignataro Standards Track [Page 7]
^L
RFC 5085 PW VCCV December 2007
4. CC Types and CV Types
The VCCV Control Channel (CC) Type defines several possible types of
control channel that VCCV can support. These control channels can in
turn carry several types of protocols defined by the Connectivity
Verification (CV) Type. VCCV potentially supports multiple CV Types
concurrently, but it only supports the use of a single CC Type. The
specific type or types of VCCV packets that can be accepted and sent
by a router are indicated during capability advertisement as
described in Sections 5.3 and 6.3. The various VCCV CV Types
supported are used only when they apply to the context of the PW
demultiplexer in use. For example, the LSP Ping CV Type should only
be used when MPLS Labels are utilized as PW Demultiplexer.
Once a set of VCCV capabilities is received and advertised, a CC Type
and CV Type(s) that match both the received and transmitted
capabilities can be selected. That is, a PE router needs to only
allow Types that are both received and advertised to be selected,
performing a logical AND between the received and transmitted bitflag
fields. The specific CC Type and CV Type(s) are then chosen within
the constraints and rules specified in Section 7. Once a specific CC
Type has been chosen (i.e., it matches both the transmitted and
received VCCV CC capability), transmitted and replied to, this CC
Type MUST be the only one used until such time as the pseudowire is
re-signaled. In addition, based on these rules and the procedures
defined in Section 5.2 of [RFC4447], the pseudowire MUST be re-
signaled if a different set of capabilities types is desired. The
relevant portion of Section 5.2 of [RFC4447] is:
Interface Parameter Sub-TLV
Note that as the "interface parameter sub-TLV" is part of the
FEC, the rules of LDP make it impossible to change the
interface parameters once the pseudowire has been set up.
The CC and CV Type indicator fields are defined as 8-bit bitmasks
used to indicate the specific CC or CV Type or Types (i.e., none,
one, or more) of control channel packets that may be sent on the VCCV
control channel. These values represent the numerical value
corresponding to the actual bit being set in the bitfield. The
definition of each CC and CV Type is dependent on the PW type
context, either MPLS or L2TPv3, within which it is defined.
Nadeau & Pignataro Standards Track [Page 8]
^L
RFC 5085 PW VCCV December 2007
Control Channel (CC) Types:
The defined values for CC Types for MPLS PWs are:
MPLS Control Channel (CC) Types:
Bit (Value) Description
============ ==========================================
Bit 0 (0x01) - Type 1: PWE3 Control Word with 0001b as
first nibble (PW-ACH, see [RFC4385])
Bit 1 (0x02) - Type 2: MPLS Router Alert Label
Bit 2 (0x04) - Type 3: MPLS PW Label with TTL == 1
Bit 3 (0x08) - Reserved
Bit 4 (0x10) - Reserved
Bit 5 (0x20) - Reserved
Bit 6 (0x40) - Reserved
Bit 7 (0x80) - Reserved
The defined values for CC Types for L2TPv3 PWs are:
L2TPv3 Control Channel (CC) Types:
Bit (Value) Description
============ ==========================================
Bit 0 (0x01) - L2-Specific Sublayer with V-bit set
Bit 1 (0x02) - Reserved
Bit 2 (0x04) - Reserved
Bit 3 (0x08) - Reserved
Bit 4 (0x10) - Reserved
Bit 5 (0x20) - Reserved
Bit 6 (0x40) - Reserved
Bit 7 (0x80) - Reserved
Connectivity Verification (CV) Types:
The defined values for CV Types for MPLS PWs are:
MPLS Connectivity Verification (CV) Types:
Bit (Value) Description
============ ==========================================
Bit 0 (0x01) - ICMP Ping
Bit 1 (0x02) - LSP Ping
Bit 2 (0x04) - Reserved
Bit 3 (0x08) - Reserved
Bit 4 (0x10) - Reserved
Bit 5 (0x20) - Reserved
Nadeau & Pignataro Standards Track [Page 9]
^L
RFC 5085 PW VCCV December 2007
Bit 6 (0x40) - Reserved
Bit 7 (0x80) - Reserved
The defined values for CV Types for L2TPv3 PWs are:
L2TPv3 Connectivity Verification (CV) Types:
Bit (Value) Description
============ ==========================================
Bit 0 (0x01) - ICMP Ping
Bit 1 (0x02) - Reserved
Bit 2 (0x04) - Reserved
Bit 3 (0x08) - Reserved
Bit 4 (0x10) - Reserved
Bit 5 (0x20) - Reserved
Bit 6 (0x40) - Reserved
Bit 7 (0x80) - Reserved
If none of the types above are supported, the entire CC and CV Type
Indicator fields SHOULD be transmitted as 0x00 (i.e., all bits in the
bitfield set to 0) to indicate this to the peer.
If no capability is signaled, then the peer MUST assume that the peer
has no VCCV capability and follow the procedures specified in this
document for this case.
5. VCCV Control Channel for MPLS PWs
When MPLS is used to transport PW packets, VCCV packets are carried
over the MPLS LSP as defined in this section. In order to apply IP
monitoring tools to a PW, an operator may configure VCCV as a control
channel for the PW between the PE's endpoints [RFC3985]. Packets
sent across this channel from the source PE towards the destination
PE either as in-band traffic with the PW's data, or out-of-band. In
all cases, the control channel traffic is not forwarded past the PE
endpoints towards the Customer Edge (CE) devices; instead, VCCV
messages are intercepted at the PE endpoints for exception
processing.
5.1. VCCV Control Channel Types for MPLS
As already described in Section 4, the capability of which control
channel types (CC Type) are supported is advertised by a PE. Once
the receiving PE has chosen a CC Type mode to use, it MUST continue
using this mode until such time as the PW is re-signaled. Thus, if a
new CC Type is desired, the PW must be torn-down and re-established.
Nadeau & Pignataro Standards Track [Page 10]
^L
RFC 5085 PW VCCV December 2007
Ideally, such a control channel would be completely in-band (i.e.,
following the same data-plane faith as PW data). When a control word
is present on the PW, it is possible to indicate the control channel
by setting a bit in the control word header (see Section 5.1.1).
Section 5.1.1 through Section 5.1.3 describe each of the currently
defined VCCV Control Channel Types (CC Types).
5.1.1. In-Band VCCV (Type 1)
CC Type 1 is also referred to as "PWE3 Control Word with 0001b as
first nibble". It uses the PW Associated Channel Header (PW-ACH);
see Section 5 of [RFC4385].
The PW set-up protocol [RFC4447] determines whether a PW uses a
control word. When a control word is used, and that CW uses the
"Generic PW MPLS Control Word" format (see Section 3 of [RFC4385]), a
Control Channel for use of VCCV messages can be created by using the
PW Associated Channel CW format (see Section 5 of [RFC4385]).
The PW Associated Channel for VCCV control channel traffic is defined
in [RFC4385] as shown in Figure 3:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0 0 0 1|Version| Reserved | Channel Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: PW Associated Channel Header
The first nibble is set to 0001b to indicate a channel associated
with a pseudowire (see Section 5 of [RFC4385] and Section 3.6 of
[RFC4446]). The Version and the Reserved fields are set to 0, and
the Channel Type is set to 0x0021 for IPv4 and 0x0057 for IPv6
payloads.
For example, Figure 4 shows how the Ethernet [RFC4448] PW-ACH would
be received containing an LSP Ping payload corresponding to a choice
of CC Type of 0x01 and a CV Type of 0x02:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0 0 0 1|0 0 0 0|0 0 0 0 0 0 0 0| 0x21 (IPv4) or 0x57 (IPv6) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: PW Associated Channel Header for VCCV
Nadeau & Pignataro Standards Track [Page 11]
^L
RFC 5085 PW VCCV December 2007
It should be noted that although some PW types are not required to
carry the control word, this type of VCCV can only be used for those
PW types that do employ the control word when it is in use. Further,
this CC Type can only be used if the PW CW follows the "Generic PW
MPLS Control Word" format. This mode of VCCV operation MUST be
supported when the control word is present.
5.1.2. Out-of-Band VCCV (Type 2)
CC Type 2 is also referred to as "MPLS Router Alert Label".
A VCCV control channel can alternatively be created by using the MPLS
router alert label [RFC3032] immediately above the PW label. It
should be noted that this approach could result in a different Equal
Cost Multi-Path (ECMP) hashing behavior than pseudowire PDUs, and
thus result in the VCCV control channel traffic taking a path which
differs from that of the actual data traffic under test. Please see
Section 2 of [RFC4928].
CC Type 2 can be used whether the PW is set-up with a Control Word
present or not.
This is the preferred mode of VCCV operation when the Control Word is
not present.
If the Control Word is in use on this PW, it MUST also be included
before the VCCV message. This is done to avoid the different ECMP
hashing behavior. In this case, the CW uses the PW-ACH format
described in Section 5.1.1 (see Figures 3 and 4). If the Control
Word is not in use on this PW, the VCCV message follows the PW Label
directly.
5.1.3. TTL Expiry VCCV (Type 3)
CC Type 3 is also referred to as "MPLS PW Label with TTL == 1".
The TTL of the PW label can be set to 1 to force the packet to be
processed within the destination router's control plane. This
approach could also result in a different ECMP hashing behavior and
VCCV messages taking a different path than the PW data traffic.
CC Type 3 can be used whether the PW is set-up with a Control Word
present or not.
If the Control Word is in use on this PW, it MUST also be included
before the VCCV message. This is done to avoid the different ECMP
hashing behavior. In this case, the CW uses the PW-ACH format
Nadeau & Pignataro Standards Track [Page 12]
^L
RFC 5085 PW VCCV December 2007
described in Section 5.1.1 (see Figures 3 and 4). If the Control
Word is not in use on this PW, the VCCV message follows the PW Label
directly.
5.2. VCCV Connectivity Verification Types for MPLS
5.2.1. ICMP Ping
When this optional connectivity verification mode is used, an ICMP
Echo packet using the encoding specified in [RFC0792] (ICMPv4) or
[RFC4443] (ICMPv6) achieves connectivity verification.
Implementations MUST use ICMPv4 [RFC0792] if the signaling for VCCV
used IPv4 addresses, or ICMPv6 [RFC4443] if IPv6 addresses were used.
If the pseudowire is set up statically, then the encoding MUST use
that which was used for the pseudowire in the configuration.
5.2.2. MPLS LSP Ping
The LSP Ping header MUST be used in accordance with [RFC4379] and
MUST also contain the target FEC Stack containing the sub-TLV of sub-
Type 8 for the "L2 VPN endpoint", 9 for "FEC 128 Pseudowire
(deprecated)", 10 for "FEC 128 Pseudowire", or 11 for the "FEC 129
Pseudowire". The sub-TLV value indicates the PW to be verified.
5.3. VCCV Capability Advertisement for MPLS PWs
To permit the indication of the type or types of PW control
channel(s) and connectivity verification mode or modes over a
particular PW, a VCCV parameter is defined in Section 5.3.1 that is
used as part of the PW establishment signaling. When a PE signals a
PW and desires PW OAM for that PW, it MUST indicate this during PW
establishment using the messages defined in Section 5.3.1.
Specifically, the PE MUST include the VCCV interface parameter sub-
TLV (0x0C) assigned in [RFC4446] in the PW set-up message [RFC4447].
The decision of the type of VCCV control channel is left completely
to the receiving control entity, although the set of choices is given
by the sender in that it indicates the control channels and
connectivity verification type or types that it can understand. The
receiver SHOULD choose a single Control Channel Type from the match
between the choices sent and received, based on the capability
advertisement selection specified in Section 7, and it MUST continue
to use this type for the duration of the life of the control channel.
Changing Control Channel Types after one has been established to be
in use could potentially cause problems at the receiving end and
could also lead to interoperability issues; thus, it is NOT
RECOMMENDED.
Nadeau & Pignataro Standards Track [Page 13]
^L
RFC 5085 PW VCCV December 2007
When a PE sends a label mapping message for a PW, it uses the VCCV
parameter to indicate the type of OAM control channels and
connectivity verification type or types it is willing to receive and
can send on that PW. A remote PE MUST NOT send VCCV messages before
the capability of supporting the control channel(s) (and connectivity
verification type(s) to be used over them) is signaled. Then, it can
do so only on a control channel and using the connectivity
verification type(s) from the ones indicated.
If a PE receives VCCV messages prior to advertising capability for
this message, it MUST discard these messages and not reply to them.
In this case, the PE SHOULD increment an error counter and optionally
issue a system and/or SNMP notification to indicate to the system
administrator that this condition exists.
When LDP is used as the PW signaling protocol, the requesting PE
indicates its configured VCCV capability or capabilities to the
remote PE by including the VCCV parameter with appropriate options in
the VCCV interface parameter sub-TLV field of the PW ID FEC TLV (FEC
128) or in the interface parameter sub-TLV of the Generalized PW ID
FEC TLV (FEC 129). These options indicate which control channel and
connectivity verification types it supports. The requesting PE MAY
indicate that it supports multiple control channel options, and in
doing so, it agrees to support any and all indicated types if
transmitted to it. However, it MUST do so in accordance with the
rules stipulated in Section 5.3.1 (VCCV Capability Advertisement Sub-
TLV.)
Local policy may direct the PE to support certain OAM capability and
to indicate it. The absence of the VCCV parameter indicates that no
OAM functions are supported by the requesting PE, and thus the
receiving PE MUST NOT send any VCCV control channel traffic to it.
The reception of a VCCV parameter with no options set MUST be ignored
as if one is not transmitted at all.
The receiving PE similarly indicates its supported control channel
types in the label mapping message. These may or may not be the same
as the ones that were sent to it. The sender should examine the set
that is returned to understand which control channels it may
establish with the remote peer, as specified in Sections 4 and 7.
Similarly, it MUST NOT send control channel traffic to the remote PE
for which the remote PE has not indicated it supports.
5.3.1. VCCV Capability Advertisement LDP Sub-TLV
[RFC4447] defines an Interface Parameter Sub-TLV field in the LDP PW
ID FEC (FEC 128) and an Interface Parameters TLV in the LDP
Generalized PW ID FEC (FEC 129) to signal different capabilities for
Nadeau & Pignataro Standards Track [Page 14]
^L
RFC 5085 PW VCCV December 2007
specific PWs. An optional sub-TLV parameter is defined to indicate
the capability of supporting none, one, or more control channel and
connectivity verification types for VCCV. This is the VCCV parameter
field. If FEC 128 is used, the VCCV parameter field is carried in
the Interface Parameter sub-TLV field. If FEC 129 is used, it is
carried as an Interface Parameter sub-TLV in the Interface Parameters
TLV.
The VCCV parameter ID is defined as follows in [RFC4446]:
Parameter ID Length Description
0x0c 4 VCCV
The format of the VCCV parameter field is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0x0c | 0x04 | CC Types | CV Types |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The Control Channel Type field (CC Type) defines a bitmask used to
indicate the type of control channel(s) (i.e., none, one, or more)
that a router is capable of receiving control channel traffic on. If
more than one control channel is specified, the router agrees to
accept control traffic over either control channel; however, see the
rules specified in Sections 4 and 7 for more details. If none of the
types are supported, a CC Type Indicator of 0x00 SHOULD be
transmitted to indicate this to the peer. However, if no capability
is signaled, then the PE MUST assume that its peer is incapable of
receiving any of the VCCV CC Types and MUST NOT send any OAM control
channel traffic to it. Note that the CC and CV Types definitions are
consistent regardless of the PW's transport or access circuit type.
The CC and CV Type values are defined in Section 4.
6. VCCV Control Channel for L2TPv3/IP PWs
When L2TPv3 is used to set up a PW over an IP PSN, VCCV packets are
carried over the L2TPv3 session as defined in this section. L2TPv3
provides a "Hello" keepalive mechanism for the L2TPv3 control plane
that operates in-band over IP or UDP (see Section 4.4 of [RFC3931]).
This built-in Hello facility provides dead peer and path detection
only for the group of sessions associated with the L2TP Control
Connection. VCCV, however, allows individual L2TP sessions to be
tested. This provides a more granular mechanism which can be used to
troubleshoot potential problems within the data plane of L2TP
endpoints themselves, or to provide additional connection status of
individual pseudowires.
Nadeau & Pignataro Standards Track [Page 15]
^L
RFC 5085 PW VCCV December 2007
The capability of which Control Channel Type (CC Type) to use is
advertised by a PE to indicate which of the potentially various
control channel types are supported. Once the receiving PE has
chosen a mode to use, it MUST continue using this mode until such
time as the PW is re-signaled. Thus, if a new CC Type is desired,
the PW must be torn down and re-established.
An LCCE sends VCCV messages on an L2TPv3-signaled pseudowire for
fault detection and diagnostic of the L2TPv3 session. The VCCV
message travels in-band with the Session and follows the exact same
path as the user data for the session, because the IP header and
L2TPv3 Session header are identical. The egress LCCE of the L2TPv3
session intercepts and processes the VCCV message, and verifies the
signaling and forwarding state of the pseudowire on reception of the
VCCV message. It is to be noted that the VCCV mechanism for L2TPv3
is primarily targeted at verifying the pseudowire forwarding and
signaling state at the egress LCCE. It also helps when L2TPv3
Control Connection and Session paths are not identical.
6.1. VCCV Control Channel Type for L2TPv3
In order to carry VCCV messages within an L2TPv3 session data packet,
the PW MUST be established such that an L2-Specific Sublayer (L2SS)
that defines the V-bit is present. This document defines the V-bit
for the Default L2-Specific Sublayer [RFC3931] and the ATM-Specific
Sublayer [RFC4454] using the Bit 0 position (see Sections 8.3.2 and
8.3.3). The L2-Specific Sublayer presence and type (either the
Default or a PW-Specific L2SS) is signaled via the L2-Specific
Sublayer AVP, Attribute Type 69, as defined in [RFC3931]. The V-bit
within the L2-Specific Sublayer is used to identify that a VCCV
message follows, and when the V-bit is set the L2SS has the format
shown in Figure 5:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1|0 0 0|Version| Reserved | Channel Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 5: L2-Specific Sublayer Format when the V-bit (bit 0) is set
The VCCV messages are distinguished from user data by the V-bit. The
V-bit is set to 1, indicating that a VCCV session message follows.
The next three bits MUST be set to 0 when sending and ignored upon
receipt. The remaining fields comprising 28 bits (i.e., Version,
Reserved, and Channel Type) follow the same definition, format, and
number registry from Section 5 of [RFC4385].
Nadeau & Pignataro Standards Track [Page 16]
^L
RFC 5085 PW VCCV December 2007
The Version and Reserved fields are set to 0. For the CV Type
currently defined of ICMP Ping (0x01), the Channel Type can indicate
IPv4 (0x0021) or IPv6 (0x0057) (see [RFC4385]) as the VCCV payload
directly following the L2SS.
6.2. VCCV Connectivity Verification Type for L2TPv3
The VCCV message over L2TPv3 directly follows the L2-Specific
Sublayer with the V-bit set. It MUST contain an ICMP Echo packet as
described in Section 6.2.1.
6.2.1. L2TPv3 VCCV using ICMP Ping
When this connectivity verification mode is used, an ICMP Echo packet
using the encoding specified in [RFC0792] for (ICMPv4) or [RFC4443]
(for ICMPv6) achieves connectivity verification. Implementations
MUST use ICMPv4 [RFC0792] if the signaling for the L2TPv3 PW used
IPv4 addresses, or ICMPv6 [RFC4443] if IPv6 addresses were used. If
the pseudowire is set-up statically, then the encoding MUST use that
which was used for the pseudowire in the configuration.
The ICMP Ping packet directly follows the L2SS with the V-bit set.
In the ICMP Echo request, the IP Header fields MUST have the
following values: the destination IP address is set to the remote
LCCE's IP address for the tunnel endpoint, the source IP address is
set to the local LCCE's IP address for the tunnel endpoint, and the
TTL or Hop Limit is set to 1.
6.3. L2TPv3 VCCV Capability Advertisement for L2TPv3
A new optional AVP is defined in Section 6.3.1 to indicate the VCCV
capabilities during session establishment. An LCCE MUST signal its
desire to use connectivity verification for a particular L2TPv3
session and its VCCV capabilities using the VCCV Capability AVP.
An LCCE MUST NOT send VCCV packets on an L2TPv3 session unless it has
received VCCV capability by means of the VCCV Capability AVP from the
remote end. If an LCCE receives VCCV packets and it is not VCCV
capable or it has not sent VCCV capability indication to the remote
end, it MUST discard these messages. It should also increment an
error counter. In this case the LCCE MAY optionally issue a system
and/or SNMP notification.
6.3.1. L2TPv3 VCCV Capability AVP
The "VCCV Capability AVP", Attribute Type 96, specifies the VCCV
capabilities as a pair of bitflags for the Control Channel (CC) and
Connectivity Verification (CV) Types. This AVP is exchanged during
Nadeau & Pignataro Standards Track [Page 17]
^L
RFC 5085 PW VCCV December 2007
session establishment (in ICRQ (Incoming-Call-Request), ICRP
(Incoming-Call-Reply), OCRQ (Outgoing-Call-Request), or OCRP
(Outgoing-Call-Reply) messages). The value field has the following
format:
VCCV Capability AVP (ICRQ, ICRP, OCRQ, OCRP)
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| CC Types | CV Types |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
CC Types:
The Control Channel (CC) Types field defines a bitmask used to
indicate the type of control channel(s) that may be used to
receive OAM traffic on for the given Session. The router agrees
to accept VCCV traffic at any time over any of the signaled VCCV
control channel types. CC Type values are defined in Section 4.
Although there is only one value defined in this document, the CC
Types field is included for forward compatibility should further
CC Types need to be defined in the future.
A CC Type of 0x01 may only be requested when there is an L2-
Specific Sublayer that defines the V-bit present. If a CC Type of
0x01 is requested without requesting an L2-Specific Sublayer AVP
with an L2SS type that defines the V-bit, the session MUST be
disconnected with a Call-Disconnect-Notify (CDN) message.
If no CC Type is supported, a CC Type Indicator of 0x00 SHOULD be
sent.
CV Types:
The Connectivity Verification (CV) Types field defines a bitmask
used to indicate the specific type or types (i.e., none, one, or
more) of control packets that may be sent on the specified VCCV
control channel. CV Type values are defined in Section 4.
If no VCCV Capability AVP is signaled, then the LCCE MUST assume that
the peer is incapable of receiving VCCV and MUST NOT send any OAM
control channel traffic to it.
Nadeau & Pignataro Standards Track [Page 18]
^L
RFC 5085 PW VCCV December 2007
All L2TP AVPs have an M (Mandatory) bit, H (Hidden) bit, Length, and
Vendor ID. The Vendor ID for the VCCV Capability AVP MUST be 0,
indicating that this is an IETF-defined AVP. This AVP MAY be hidden
(the H bit MAY be 0 or 1). The M bit for this AVP SHOULD be set to
0. The Length (before hiding) of this AVP is 8.
7. Capability Advertisement Selection
When a PE receives a VCCV capability advertisement, the advertisement
may potentially contain more than one CC or CV Type. Only matching
capabilities can be selected. When multiple capabilities match, only
one CC Type MUST be used.
In particular, as already specified, once a valid CC Type is used by
a PE (traffic sent using that encapsulation), the PE MUST NOT send
any traffic down another CC Type control channel.
For cases where multiple CC Types are advertised, the following
precedence rules apply when choosing the single CC Type to use:
1. Type 1: PWE3 Control Word with 0001b as first nibble
2. Type 2: MPLS Router Alert Label
3. Type 3: MPLS PW Label with TTL == 1
For MPLS PWs, the CV Type of LSP Ping (0x02) is the default, and the
CV Type of ICMP Ping (0x01) is optional.
8. IANA Considerations
8.1. VCCV Interface Parameters Sub-TLV
The VCCV Interface Parameters Sub-TLV codepoint is defined in
[RFC4446]. IANA has created and will maintain registries for the CC
Types and CV Types (bitmasks in the VCCV Parameter ID). The CC Type
and CV Type new registries (see Sections 8.1.1 and 8.1.2,
respectively) have been created in the Pseudo Wires Name Spaces,
reachable from [IANA.pwe3-parameters]. The allocations must be done
using the "IETF Consensus" policy defined in [RFC2434].
8.1.1. MPLS VCCV Control Channel (CC) Types
IANA has set up a registry of "MPLS VCCV Control Channel Types".
These are 8 bitfields. CC Type values 0x01, 0x02, and 0x04 are
specified in Section 4 of this document. The remaining bitfield
values (0x08, 0x10, 0x20, 0x40, and 0x80) are to be assigned by IANA
using the "IETF Consensus" policy defined in [RFC2434]. A VCCV
Nadeau & Pignataro Standards Track [Page 19]
^L
RFC 5085 PW VCCV December 2007
Control Channel Type description and a reference to an RFC approved
by the IESG are required for any assignment from this registry.
MPLS Control Channel (CC) Types:
Bit (Value) Description
============ ==========================================
Bit 0 (0x01) - Type 1: PWE3 Control Word with 0001b as
first nibble (PW-ACH, see [RFC4385])
Bit 1 (0x02) - Type 2: MPLS Router Alert Label
Bit 2 (0x04) - Type 3: MPLS PW Label with TTL == 1
Bit 3 (0x08) - Reserved
Bit 4 (0x10) - Reserved
Bit 5 (0x20) - Reserved
Bit 6 (0x40) - Reserved
Bit 7 (0x80) - Reserved
The most significant (high order) bit is labeled Bit 7, and the least
significant (low order) bit is labeled Bit 0, see parenthetical
"Value".
8.1.2. MPLS VCCV Connectivity Verification (CV) Types
IANA has set up a registry of "MPLS VCCV Control Verification Types".
These are 8 bitfields. CV Type values 0x01 and 0x02 are specified in
Section 4 of this document. The remaining bitfield values (0x04,
0x08, 0x10, 0x20, 0x40, and 0x80) are to be assigned by IANA using
the "IETF Consensus" policy defined in [RFC2434]. A VCCV Control
Verification Type description and a reference to an RFC approved by
the IESG are required for any assignment from this registry.
MPLS Connectivity Verification (CV) Types:
Bit (Value) Description
============ ==========================================
Bit 0 (0x01) - ICMP Ping
Bit 1 (0x02) - LSP Ping
Bit 2 (0x04) - Reserved
Bit 3 (0x08) - Reserved
Bit 4 (0x10) - Reserved
Bit 5 (0x20) - Reserved
Bit 6 (0x40) - Reserved
Bit 7 (0x80) - Reserved
The most significant (high order) bit is labeled Bit 7, and the least
significant (low order) bit is labeled Bit 0, see parenthetical
"Value".
Nadeau & Pignataro Standards Track [Page 20]
^L
RFC 5085 PW VCCV December 2007
8.2. PW Associated Channel Type
The PW Associated Channel Types used by VCCV as defined in Sections
5.1.1 and 6.1 rely on previously allocated numbers from the
Pseudowire Associated Channel Types Registry [RFC4385] in the Pseudo
Wires Name Spaces reachable from [IANA.pwe3-parameters]. In
particular, 0x21 (Internet Protocol version 4) MUST be used whenever
an IPv4 payload follows the Pseudowire Associated Channel Header, or
0x57 MUST be used when an IPv6 payload follows the Pseudowire
Associated Channel Header.
8.3. L2TPv3 Assignments
Section 8.3.1 through Section 8.3.3 are registrations of new L2TP
values for registries already managed by IANA. Section 8.3.4 is a
new registry that has been added to the existing L2TP name spaces,
and will be maintained by IANA accordingly. The Layer Two Tunneling
Protocol "L2TP" Name Spaces are reachable from
[IANA.l2tp-parameters].
8.3.1. Control Message Attribute Value Pairs (AVPs)
An additional AVP Attribute is specified in Section 6.3.1. It was
defined by IANA as described in Section 2.2 of [RFC3438].
Attribute
Type Description
--------- ----------------------------------
96 VCCV Capability AVP
8.3.2. Default L2-Specific Sublayer Bits
The Default L2-Specific Sublayer contains 8 bits in the low-order
portion of the header. This document defines one reserved bit in the
Default L2-Specific Sublayer in Section 6.1, which was assigned by
IANA following IETF Consensus [RFC2434].
Default L2-Specific Sublayer bits - per [RFC3931]
---------------------------------
Bit 0 - V (VCCV) bit
8.3.3. ATM-Specific Sublayer Bits
The ATM-Specific Sublayer contains 8 bits in the low-order portion of
the header. This document defines one reserved bit in the ATM-
Specific Sublayer in Section 6.1, which was assigned by IANA
following IETF Consensus [RFC2434].
Nadeau & Pignataro Standards Track [Page 21]
^L
RFC 5085 PW VCCV December 2007
ATM-Specific Sublayer bits - per [RFC4454]
--------------------------
Bit 0 - V (VCCV) bit
8.3.4. VCCV Capability AVP Values
This is a new registry that IANA maintains in the L2TP Name Spaces.
IANA created and maintains a registry for the CC Types and CV Types
bitmasks in the VCCV Capability AVP, defined in Section 6.3.1. The
allocations must be done using the "IETF Consensus" policy defined in
[RFC2434]. A VCCV CC or CV Type description and a reference to an
RFC approved by the IESG are required for any assignment from this
registry.
IANA has reserved the following bits in this registry:
VCCV Capability AVP (Attribute Type 96) Values
---------------------------------------------------
L2TPv3 Control Channel (CC) Types:
Bit (Value) Description
============ ==========================================
Bit 0 (0x01) - L2-Specific Sublayer with V-bit set
Bit 1 (0x02) - Reserved
Bit 2 (0x04) - Reserved
Bit 3 (0x08) - Reserved
Bit 4 (0x10) - Reserved
Bit 5 (0x20) - Reserved
Bit 6 (0x40) - Reserved
Bit 7 (0x80) - Reserved
L2TPv3 Connectivity Verification (CV) Types:
Bit (Value) Description
============ ==========================================
Bit 0 (0x01) - ICMP Ping
Bit 1 (0x02) - Reserved
Bit 2 (0x04) - Reserved
Bit 3 (0x08) - Reserved
Bit 4 (0x10) - Reserved
Bit 5 (0x20) - Reserved
Bit 6 (0x40) - Reserved
Bit 7 (0x80) - Reserved
Nadeau & Pignataro Standards Track [Page 22]
^L
RFC 5085 PW VCCV December 2007
The most significant (high order) bit is labeled Bit 7, and the least
significant (low order) bit is labeled Bit 0, see parenthetical
"Value".
9. Congestion Considerations
The bandwidth resources used by VCCV are recommended to be minimal
compared to those of the associated PW. The bandwidth required for
the VCCV channel is taken outside any allocation for PW data traffic,
and can be configurable. When doing resource reservation or network
planning, the bandwidth requirements for both PW data and VCCV
traffic need to be taken into account.
VCCV applications (i.e., Connectivity Verification (CV) Types) MUST
consider congestion and bandwidth usage implications and provide
details on bandwidth or packet frequency management. VCCV
applications can have built-in bandwidth management in their
protocols. Other VCCV applications can have their bandwidth
configuration-limited, and rate-limiting them can be harmful as it
could translate to incorrectly declaring connectivity failures. For
all other VCCV applications, outgoing VCCV messages SHOULD be rate-
limited to prevent aggressive connectivity verification consuming
excessive bandwidth, causing congestion, becoming denial-of-service
attacks, or generating an excessive packet rate at the CE-bound PE.
If these conditions cannot be followed, an adaptive loss-based scheme
SHOULD be applied to congestion-control outgoing VCCV traffic, so
that it competes fairly with TCP within an order of magnitude. One
method of determining an acceptable bandwidth for VCCV is described
in [RFC3448] (TFRC); other methods exist. For example, bandwidth or
packet frequency management can include any of the following: a
negotiation of transmission interval/rate, a throttled transmission
rate on "congestion detected" situations, a slow-start after shutdown
due to congestion and until basic connectivity is verified, and other
mechanisms.
The ICMP and MPLS LSP PING applications SHOULD be rate-limited to
below 5% of the bit-rate of the associated PW. For this purpose, the
considered bit-rate of a pseudowire is dependent on the PW type. For
pseudowires that carry constant bit-rate traffic (e.g., TDM PWs) the
full bit-rate of the PW is used. For pseudowires that carry variable
bit-rate traffic (e.g., Ethernet PWs), the mean or sustained bit-rate
of the PW is used.
Nadeau & Pignataro Standards Track [Page 23]
^L
RFC 5085 PW VCCV December 2007
As described in Section 10, incoming VCCV messages can be rate-
limited as a protection against denial-of-service attacks. This
throttling or policing of incoming VCCV messages should not be more
stringent than the bandwidth allocated to the VCCV channel to prevent
false indications of connectivity failure.
10. Security Considerations
Routers that implement VCCV create a Control Channel (CC) associated
with a pseudowire. This control channel can be signaled (e.g., using
LDP or L2TPv3 depending on the PWE3) or statically configured. Over
this control channel, VCCV Connectivity Verification (CV) messages
are sent. Therefore, three different areas are of concern from a
security standpoint.
The first area of concern relates to control plane parameter and
status message attacks, that is, attacks that concern the signaling
of VCCV capabilities. MPLS PW Control Plane security is discussed in
Section 8.2 of [RFC4447]. L2TPv3 PW Control Plane security is
discussed in Section 8.1 of [RFC3931]. The addition of the
connectivity verification negotiation extensions does not change the
security aspects of Section 8.2 of [RFC4447], or Section 8.1 of
[RFC3931]. Implementation of IP source address filters may also aid
in deterring these types of attacks.
A second area of concern centers on data-plane attacks, that is,
attacks on the associated channel itself. Routers that implement the
VCCV mechanisms are subject to additional data-plane denial-of-
service attacks as follows:
An intruder could intercept or inject VCCV packets effectively
providing false positives or false negatives.
An intruder could deliberately flood a peer router with VCCV
messages to deny services to others.
A misconfigured or misbehaving device could inadvertently flood a
peer router with VCCV messages which could result in denial of
services. In particular, if a router has either implicitly or
explicitly indicated that it cannot support one or all of the
types of VCCV, but is sent those messages in sufficient quantity,
it could result in a denial of service.
To protect against these potential (deliberate or unintentional)
attacks, multiple mitigation techniques can be employed:
VCCV message throttling mechanisms can be used, especially in
distributed implementations which have a centralized control-plane
Nadeau & Pignataro Standards Track [Page 24]
^L
RFC 5085 PW VCCV December 2007
processor with various line cards attached by some control-plane
data path. In these architectures, VCCV messages may be processed
on the central processor after being forwarded there by the
receiving line card. In this case, the path between the line card
and the control processor may become saturated if appropriate VCCV
traffic throttling is not employed, which could lead to a complete
denial of service to users of the particular line card. Such
filtering is also useful for preventing the processing of unwanted
VCCV messages, such as those which are sent on unwanted (and
perhaps unadvertised) control channel types or VCCV types.
Section 8.1 of [RFC4447] discusses methods to protect the data
plane of MPLS PWs from data-plane attacks. However the
implementation of the connectivity verification protocol expands
the range of possible data-plane attacks. For this reason
implementations MUST provide a method to secure the data plane.
This can be in the form of encryption of the data by running IPsec
on MPLS packets encapsulated according to [RFC4023], or by
providing the ability to architect the MPLS network in such a way
that no external MPLS packets can be injected (private MPLS
network).
For L2TPv3, data packet spoofing considerations are outlined in
Section 8.2 of [RFC3931]. While the L2TPv3 Session ID provides
traffic separation, the optional Cookie field provides additional
protection to thwart spoofing attacks. To maximize protection
against a variety of data-plane attacks, a 64-bit Cookie can be
used. L2TPv3 can also be run over IPsec as detailed in Section
4.1.3 of [RFC3931].
A third and last area of concern relates to the processing of the
actual contents of VCCV messages, i.e., LSP Ping and ICMP messages.
Therefore, the corresponding security considerations for these
protocols (LSP Ping [RFC4379], ICMPv4 Ping [RFC0792], and ICMPv6 Ping
[RFC4443]) apply as well.
11. Acknowledgements
The authors would like to thank Hari Rakotoranto, Michel Khouderchah,
Bertrand Duvivier, Vanson Lim, Chris Metz, W. Mark Townsley, Eric
Rosen, Dan Tappan, Danny McPherson, Luca Martini, Don O'Connor, Neil
Harrison, Danny Prairie, Mustapha Aissaoui, and Vasile Radoaca for
their valuable comments and suggestions.
Nadeau & Pignataro Standards Track [Page 25]
^L
RFC 5085 PW VCCV December 2007
12. References
12.1. Normative References
[RFC0792] Postel, J., "Internet Control Message Protocol", STD 5,
RFC 792, September 1981.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3032] Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y.,
Farinacci, D., Li, T., and A. Conta, "MPLS Label Stack
Encoding", RFC 3032, January 2001.
[RFC3931] Lau, J., Townsley, M., and I. Goyret, "Layer Two Tunneling
Protocol - Version 3 (L2TPv3)", RFC 3931, March 2005.
[RFC4379] Kompella, K. and G. Swallow, "Detecting Multi-Protocol
Label Switched (MPLS) Data Plane Failures", RFC 4379,
February 2006.
[RFC4385] Bryant, S., Swallow, G., Martini, L., and D. McPherson,
"Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for
Use over an MPLS PSN", RFC 4385, February 2006.
[RFC4443] Conta, A., Deering, S., and M. Gupta, "Internet Control
Message Protocol (ICMPv6) for the Internet Protocol
Version 6 (IPv6) Specification", RFC 4443, March 2006.
[RFC4446] Martini, L., "IANA Allocations for Pseudowire Edge to Edge
Emulation (PWE3)", BCP 116, RFC 4446, April 2006.
[RFC4447] Martini, L., Rosen, E., El-Aawar, N., Smith, T., and G.
Heron, "Pseudowire Setup and Maintenance Using the Label
Distribution Protocol (LDP)", RFC 4447, April 2006.
12.2. Informative References
[IANA.l2tp-parameters]
Internet Assigned Numbers Authority, "Layer Two Tunneling
Protocol "L2TP"", April 2007,
<http://www.iana.org/assignments/l2tp-parameters>.
[IANA.pwe3-parameters]
Internet Assigned Numbers Authority, "Pseudo Wires Name
Spaces", June 2007,
<http://www.iana.org/assignments/pwe3-parameters>.
Nadeau & Pignataro Standards Track [Page 26]
^L
RFC 5085 PW VCCV December 2007
[MSG-MAP] Nadeau, T., "Pseudo Wire (PW) OAM Message Mapping",
Work in Progress, March 2007.
[RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 2434,
October 1998.
[RFC3438] Townsley, W., "Layer Two Tunneling Protocol (L2TP)
Internet Assigned Numbers Authority (IANA) Considerations
Update", BCP 68, RFC 3438, December 2002.
[RFC3448] Handley, M., Floyd, S., Padhye, J., and J. Widmer, "TCP
Friendly Rate Control (TFRC): Protocol Specification",
RFC 3448, January 2003.
[RFC3916] Xiao, X., McPherson, D., and P. Pate, "Requirements for
Pseudo-Wire Emulation Edge-to-Edge (PWE3)", RFC 3916,
September 2004.
[RFC3985] Bryant, S. and P. Pate, "Pseudo Wire Emulation Edge-to-
Edge (PWE3) Architecture", RFC 3985, March 2005.
[RFC4023] Worster, T., Rekhter, Y., and E. Rosen, "Encapsulating
MPLS in IP or Generic Routing Encapsulation (GRE)",
RFC 4023, March 2005.
[RFC4377] Nadeau, T., Morrow, M., Swallow, G., Allan, D., and S.
Matsushima, "Operations and Management (OAM) Requirements
for Multi-Protocol Label Switched (MPLS) Networks",
RFC 4377, February 2006.
[RFC4448] Martini, L., Rosen, E., El-Aawar, N., and G. Heron,
"Encapsulation Methods for Transport of Ethernet over MPLS
Networks", RFC 4448, April 2006.
[RFC4454] Singh, S., Townsley, M., and C. Pignataro, "Asynchronous
Transfer Mode (ATM) over Layer 2 Tunneling Protocol
Version 3 (L2TPv3)", RFC 4454, May 2006.
[RFC4928] Swallow, G., Bryant, S., and L. Andersson, "Avoiding Equal
Cost Multipath Treatment in MPLS Networks", BCP 128,
RFC 4928, June 2007.
Nadeau & Pignataro Standards Track [Page 27]
^L
RFC 5085 PW VCCV December 2007
Appendix A. Contributors' Addresses
George Swallow
Cisco Systems, Inc.
300 Beaver Brook Road
Boxborough, MA 01719
USA
EMail: swallow@cisco.com
Monique Morrow
Cisco Systems, Inc.
Glatt-com
CH-8301 Glattzentrum
Switzerland
EMail: mmorrow@cisco.com
Yuichi Ikejiri
NTT Communication Corporation
1-1-6, Uchisaiwai-cho, Chiyoda-ku
Tokyo 100-8019
Shinjuku-ku
JAPAN
EMail: y.ikejiri@ntt.com
Kenji Kumaki
KDDI Corporation
KDDI Bldg. 2-3-2
Nishishinjuku
Tokyo 163-8003
JAPAN
EMail: ke-kumaki@kddi.com
Peter B. Busschbach
Alcatel-Lucent
67 Whippany Road
Whippany, NJ, 07981
USA
EMail: busschbach@alcatel-lucent.com
Nadeau & Pignataro Standards Track [Page 28]
^L
RFC 5085 PW VCCV December 2007
Rahul Aggarwal
Juniper Networks
1194 North Mathilda Ave.
Sunnyvale, CA 94089
USA
EMail: rahul@juniper.net
Luca Martini
Cisco Systems, Inc.
9155 East Nichols Avenue, Suite 400
Englewood, CO, 80112
USA
EMail: lmartini@cisco.com
Authors' Addresses
Thomas D. Nadeau (editor)
Cisco Systems, Inc.
300 Beaver Brook Road
Boxborough, MA 01719
USA
EMail: tnadeau@lucidvision.com
Carlos Pignataro (editor)
Cisco Systems, Inc.
7200 Kit Creek Road
PO Box 14987
Research Triangle Park, NC 27709
USA
EMail: cpignata@cisco.com
Nadeau & Pignataro Standards Track [Page 29]
^L
RFC 5085 PW VCCV December 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Nadeau & Pignataro Standards Track [Page 30]
^L
|