| < draft-ietf-pwe3-vccv-for-gal-01.txt | draft-ietf-pwe3-vccv-for-gal-02.txt > | |||
|---|---|---|---|---|
| Network Working Group T. Nadeau | ||||
| Internet-Draft Juniper Networks | ||||
| Intended status: Standards Track | ||||
| Expires: November 27, 2012 L. Martini | ||||
| Cisco Systems, Inc. | ||||
| May 8, 2012 | PWE3 T. Nadeau | |||
| Internet-Draft lucidvision | ||||
| Updates: 5085 (if approved) L. Martini | ||||
| Intended status: Standards Track S. Bryant | ||||
| Expires: March 6, 2015 Cisco Systems | ||||
| September 2, 2014 | ||||
| A Unified Control Channel for Pseudowires | A Unified Control Channel for Pseudowires | |||
| draft-ietf-pwe3-vccv-for-gal-01.txt | draft-ietf-pwe3-vccv-for-gal-02 | |||
| Abstract | Abstract | |||
| This document describes a unified mode of operation for Virtual | This document describes a unified mode of operation for Virtual | |||
| Circuit Connectivity Verification (VCCV), which provides a control | Circuit Connectivity Verification (VCCV), which provides a control | |||
| channel that is associated with a pseudowire (PW). VCCV applies to | channel that is associated with a pseudowire (PW). VCCV applies to | |||
| all supported access circuit and transport types currently defined | all supported access circuit and transport types currently defined | |||
| for PWs, as well as those being transported by The MPLS Transport | for PWs, as well as those being transported by the MPLS Transport | |||
| Profile. This new mode is intended to augment those described in | Profile. This new mode is intended to augment those described in | |||
| RFC5085, but this document describes new rules requiring this mode | RFC5085. It describes new rules requiring this mode to be used as | |||
| to be used as the default/mandatory mode of operation for | the default/mandatory mode of operation for VCCV. The older VCCV | |||
| VCCV. The older types will remain optional. | types will remain optional. | |||
| Status of this Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on November 4, 2012. | This Internet-Draft will expire on March 6, 2015. | |||
| Copyright Notice | Copyright Notice | |||
| VCCV 2 May 8, 2012 | ||||
| Copyright (c) 2012 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Requirements Language | Table of Contents | |||
| 1. Requirements Language and Terminology . . . . . . . . . . . . 2 | ||||
| 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | ||||
| 3. VCCV Control Channel When The Control Word is Used . . . . . 5 | ||||
| 4. VCCV Control Channel When The Control Word is Not Used . . . 6 | ||||
| 5. VCCV Capability Advertisement . . . . . . . . . . . . . . . . 7 | ||||
| 6. Manageability Considerations . . . . . . . . . . . . . . . . 7 | ||||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | ||||
| 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | ||||
| 8.1. VCCV Interface Parameters Sub-TLV . . . . . . . . . . . . 7 | ||||
| 8.2. MPLS VCCV Control Channel (CC) Type 4 . . . . . . . . . . 7 | ||||
| 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
| 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
| 10.1. Normative References . . . . . . . . . . . . . . . . . . 8 | ||||
| 10.2. Informative References . . . . . . . . . . . . . . . . . 8 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | ||||
| 1. Requirements Language and Terminology | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| document are to be interpreted as described in RFC-2119 [RFC2119]. | "OPTIONAL" in this document are to be interpreted as described in | |||
| [RFC2119]. | ||||
| Table of Contents | AC Attachment Circuit [RFC3985]. | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | ||||
| 1.2. Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | ||||
| 2. VCCV Control Channel When The Control Word is Used . . . . . . 6 | ||||
| 3. VCCV Control Channel When The Control Word is Not Used . . . . 6 | ||||
| 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19 | ||||
| 4.1. VCCV Interface Parameters Sub-TLV . . . . . . . . . . . . 19 | ||||
| 4.1.1. MPLS VCCV Control Channel (CC) Type 4 . . . . . . . . 19 | ||||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 24 | ||||
| 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 25 | ||||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26 | ||||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . . 26 | ||||
| 7.2. Informative References . . . . . . . . . . . . . . . . . . 26 | ||||
| 1. Introduction | AVP Attribute Value Pair [RFC3931]. | |||
| CC Control Channel (used as CC Type). | ||||
| CE Customer Edge. | ||||
| CV Connectivity Verification (used as CV Type). | ||||
| CW Control Word [RFC3985]. | ||||
| L2SS L2-Specific Sublayer [RFC3931]. | ||||
| LCCE L2TP Control Connection Endpoint [RFC3931]. | ||||
| OAM Operation and Maintenance. | ||||
| PE Provider Edge. | ||||
| PSN Packet Switched Network [RFC3985]. | ||||
| PW Pseudowire [RFC3985]. | ||||
| PW-ACH PW Associated Channel Header [RFC4385]. | ||||
| VCCV Virtual Circuit Connectivity Verification [RFC5085]. | ||||
| 2. Introduction | ||||
| There is a need for fault detection and diagnostic mechanisms that | There is a need for fault detection and diagnostic mechanisms that | |||
| can be used for end-to-end fault detection and diagnostics for a | can be used for end-to-end fault detection and diagnostics for a | |||
| Pseudowire, as a means of determining the PW's true operational | Pseudowire, as a means of determining the PW's true operational | |||
| state. Operators have indicated in [RFC4377], [RFC3916]. | state. Operators have indicated in [RFC4377], and [RFC3916] that | |||
| that such a tool is required for PW operation and maintenance. To | such a tool is required for PW operation and maintenance. To this | |||
| this end, the IETF's PWE3 Working Group defined The Virtual | end, the IETF's PWE3 Working Group defined the Virtual Circuit | |||
| Circuit Connectivity Verification Protocol (VCCV) in [RFC5085]. | Connectivity Verification Protocol (VCCV) in [RFC5085] . Since then a | |||
| Since then a number of interoperability issues have arisen with the | number of interoperability issues have arisen with the protocol as it | |||
| protocol as it is defined. | is defined. | |||
| VCCV 2 May 8, 2012 | ||||
| Over time, a variety of VCCV options or "modes" have been created to | Over time, a variety of VCCV options or "modes" have been created to | |||
| support legacy hardware, the use of the control word in some cases, | support legacy hardware, these modes use of the CW in some cases, | |||
| while in others not. The difficulty of operating these | while in others the CW is not used. The difficulty of operating | |||
| different combinations of "modes" have been detailed in an | these different combinations of "modes" have been detailed in an | |||
| implementation survey the PWE3 Working Group conducted. Many of the | implementation survey conducted by the PWE3 Working Group and | |||
| motivations of this survey are detailed in [MAN-CW]. This document | documented in [RFC7079]. The implementation survey and the PWE3 | |||
| Working Group have concluded that operators have difficulty deploying | ||||
| and the implementation survey concluded that operators have had | the VCCV OAM protocol due to the number of combinations and options | |||
| difficulty deploying the protocol given the number of combinations | for its use. | |||
| and options for its use. | ||||
| In addition to the implementation issues just described, the ITU-T | In addition to the implementation issues just described, the ITU-T | |||
| and IETF have set out to enhance MPLS to make it suitable as an | and IETF have set out to enhance MPLS to make it suitable as an | |||
| optical transport protocol. The requirements for this protocol are | optical transport protocol. The requirements for this protocol are | |||
| defined as the MPLS Transport Profile (MPLS-TP). The requirements | defined as the MPLS Transport Profile (MPLS-TP). The requirements | |||
| for this protocol can be found in [RFC5654]. In order to support | for MPLS-TP can be found in [RFC5654]. In order to support VCCV when | |||
| VCCV when an MPLS-TP PSN is in use, the GAL-ACH had to be created; | an MPLS-TP PSN is in use, the GAL-ACH had to be created [RFC5586]. | |||
| this effectively resulted in another mode of operation. | This resulted in yet another mode of VCCV operation. | |||
| This document defines two modes of operation of VCCV: 1) with | This document defines two modes of operation of VCCV: 1) with a | |||
| a control word or 2) without a control word, but | control word or 2) without a control word, both with a ACH | |||
| with a ACH encapsulation making it possible to handle all of the | encapsulation making it possible to handle all of the other cases | |||
| other cases handled by the other modes of VCCV. In either case, it | handled by the other modes of VCCV. The modes of operation defined | |||
| will be mandatory to implement and use that mode under that | in this document MUST be implemented. | |||
| scenario. | ||||
| Figure 1 depicts the architecture of a pseudowire as defined in | Figure 1 depicts the architecture of a pseudowire as defined in | |||
| [RFC3985]. It further depicts where the VCCV control channel resides | [RFC3985]. It further depicts where the VCCV control channel resides | |||
| within this architecture, which will be discussed in detail shortly. | within this architecture, which will be discussed in detail later in | |||
| this document. | ||||
| |<-------------- Emulated Service ---------------->| | ||||
| | |<---------- VCCV ---------->| | | ||||
| | |<------- Pseudowire ------->| | | ||||
| | | | | | ||||
| | | |<-- PSN Tunnel -->| | | | ||||
| | V V V V | | ||||
| V AC +----+ +----+ AC V | ||||
| +-----+ | | PE1|==================| PE2| | +-----+ | ||||
| | |----------|............PW1.............|----------| | | ||||
| | CE1 | | | | | | | | CE2 | | ||||
| | |----------|............PW2.............|----------| | | ||||
| +-----+ ^ | | |==================| | | ^ +-----+ | ||||
| ^ | +----+ +----+ | | ^ | ||||
| | | Provider Edge 1 Provider Edge 2 | | | ||||
| | | | | | ||||
| Customer | | Customer | ||||
| VCCV 2 May 8, 2012 | ||||
| Edge 1 | | Edge 2 | |<-------------- Emulated Service ---------------->| | |||
| | | | | |<---------- VCCV ---------->| | | |||
| | | | | |<------- Pseudowire ------->| | | |||
| Native service Native service | | | | | | |||
| | | |<-- PSN Tunnel -->| | | | ||||
| | V V V V | | ||||
| V AC +----+ +----+ AC V | ||||
| +-----+ | | PE1|==================| PE2| | +-----+ | ||||
| | |----------|............PW1.............|----------| | | ||||
| | CE1 | | | | | | | | CE2 | | ||||
| | |----------|............PW2.............|----------| | | ||||
| +-----+ ^ | | |==================| | | ^ +-----+ | ||||
| ^ | +----+ +----+ | | ^ | ||||
| | | Provider Edge 1 Provider Edge 2 | | | ||||
| | | | | | ||||
| Customer | | Customer | ||||
| Edge 1 | | Edge 2 | ||||
| | | | ||||
| | | | ||||
| Native service Native service | ||||
| Figure 1: PWE3 VCCV Operation Reference Model | Figure 1: PWE3 VCCV Operation Reference Model | |||
| From Figure 1, Customer Edge (CE) routers CE1 and CE2 are attached to | From Figure 1, Customer Edge (CE) routers CE1 and CE2 are attached to | |||
| the emulated service via Attachment Circuits (ACs), and to each of | the emulated service via Attachment Circuits (AC), and to each of the | |||
| the Provider Edge (PE) routers (PE1 and PE2, respectively). An AC | Provider Edge (PE) routers (PE1 and PE2, respectively). An AC can be | |||
| can be a Frame Relay Data Link Connection Identifier (DLCI), an ATM | a Frame Relay Data Link Connection Identifier (DLCI), an ATM Virtual | |||
| Virtual Path Identifier / Virtual Channel Identifier (VPI/VCI), an | Path Identifier / Virtual Channel Identifier (VPI/VCI), an Ethernet | |||
| Ethernet port, etc. The PE devices provide pseudowire emulation, | port, or any other attachment type for which a PW is defined. The PE | |||
| enabling the CEs to communicate over the PSN. A pseudowire exists | devices provide pseudowire emulation, enabling the CEs to communicate | |||
| between these PEs traversing the provider network. VCCV provides | over the PSN. A pseudowire exists between these PEs traversing the | |||
| several means of creating a control channel over the PW, between the | provider network. VCCV provides several means of creating a control | |||
| PE routers that attach the PW. | channel over the PW, between the PE routers that attach the PW. | |||
| Figure 2 depicts how the VCCV control channel is associated with the | Figure 2 depicts how the VCCV control channel is associated with the | |||
| pseudowire protocol stack. | pseudowire protocol stack. | |||
| +-------------+ +-------------+ | +-------------+ +-------------+ | |||
| | Layer2 | | Layer2 | | | Layer2 | | Layer2 | | |||
| | Emulated | < Emulated Service > | Emulated | | | Emulated | < Emulated Service > | Emulated | | |||
| | Services | | Services | | | Services | | Services | | |||
| +-------------+ +-------------+ | +-------------+ +-------------+ | |||
| | | VCCV/PW | | | | | VCCV/PW | | | |||
| |Demultiplexer| < Control Channel > |Demultiplexer| | |Demultiplexer| < Control Channel > |Demultiplexer| | |||
| +-------------+ +-------------+ | +-------------+ +-------------+ | |||
| | PSN | < PSN Tunnel > | PSN | | | PSN | < PSN Tunnel > | PSN | | |||
| +-------------+ +-------------+ | +-------------+ +-------------+ | |||
| | Physical | | Physical | | | Physical | | Physical | | |||
| +-----+-------+ +-----+-------+ | +-----+-------+ +-----+-------+ | |||
| | | | | | | |||
| | ____ ___ ____ | | | ____ ___ ____ | | |||
| | _/ \___/ \ _/ \__ | | | _/ \___/ \ _/ \__ | | |||
| | / \__/ \_ | | | / \__/ \_ | | |||
| | / \ | | | / \ | | |||
| +--------| MPLS/MPLS-TP or IP Network |---+ | +--------| MPLS/MPLS-TP or IP Network |---+ | |||
| \ / | \ / | |||
| \ ___ ___ __ _/ | \ ___ ___ __ _/ | |||
| \_/ \____/ \___/ \____/ | \_/ \____/ \___/ \____/ | |||
| Figure 2: PWE3 Protocol Stack Reference Model including the VCCV | Figure 2: PWE3 Protocol Stack Reference Model including the VCCV | |||
| Control Channel | Control Channel | |||
| VCCV messages are encapsulated using the PWE3 encapsulation as | VCCV messages are encapsulated using the PWE3 encapsulation as | |||
| described in Sections 2 and 3, so that they are handled and processed | described in Section 3 and Section 4, so that they are handled and | |||
| VCCV 2 May 8, 2012 | processed in the same manner (or in some cases, a similar manner) the | |||
| PW PDUs for which they provide a control channel. These VCCV | ||||
| in the same manner (or in some cases, a similar manner) as the PW | messages are exchanged only after the capability (the VCCV Control | |||
| PDUs for which they provide a control channel. These VCCV messages | Channel and Connectivity Verification types) and the desire to | |||
| are exchanged only after the capability (expressed as two VCCV type | exchange VCCV traffic has been advertised between the PEs (see | |||
| spaces, namely the VCCV Control Channel and Connectivity Verification | Sections 5.3 and 6.3 of [RFC5085]), and VCCV type to use have been | |||
| Types) and desire to exchange such traffic has been advertised | chosen. | |||
| between the PEs (see Sections 5.3 and 6.3), and VCCV types chosen. | ||||
| 1.2. Acronyms | ||||
| AC Attachment Circuit [RFC3985]. | ||||
| AVP Attribute Value Pair [RFC3931]. | ||||
| CC Control Channel (used as CC Type). | ||||
| CE Customer Edge. | ||||
| CV Connectivity Verification (used as CV Type). | ||||
| CW Control Word [RFC3985]. | ||||
| L2SS L2-Specific Sublayer [RFC3931]. | ||||
| LCCE L2TP Control Connection Endpoint [RFC3931]. | [EDITOR'S NOTE - Why are we talking about 6.3 which is L2TPv3 related | |||
| in a text on GAL?] | ||||
| OAM Operation and Maintenance. | 3. VCCV Control Channel When The Control Word is Used | |||
| PE Provider Edge. | When the PWE3 Control Word is used to encapsulate pseudowire traffic, | |||
| the rules described for encapsulating VCCV CC Type 1 as specified in | ||||
| section 9.5.1 of [RFC6073] and section 5.1.1 of [RFC5085] MUST be | ||||
| used. In this case the advertised CC Type is 1, and Associated | ||||
| Channel Types of 21, 07, or 57 are allowed. | ||||
| PSN Packet Switched Network [RFC3985]. | 4. VCCV Control Channel When The Control Word is Not Used | |||
| PW Pseudowire [RFC3985]. | When the PWE3 Control Word is not used a new CC Type 4 is defined as | |||
| follows: | ||||
| PW-ACH PW Associated Channel Header [RFC4385]. | 0 1 | |||
| 2 3 | ||||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
| VCCV Virtual Circuit Connectivity Verification [RFC5085]. | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | PW LSE | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | GAL LSE | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| |0 0 0 1|Version| Reserved | Associated Channel Type | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | | | ||||
| ~ VCCV Message Body ~ | ||||
| | | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| 2. VCCV Control Channel When The Control Word is Used | EDITOR's note = when we wrote RFC3985 I seem to remember that TTL=1 | |||
| was problematic do we want to specify TTL=1 in the text below? | ||||
| When the PWE3 Control Word is used to encapsulate pseudowire | EDITOR's note = not sure if it should be MUST or SHOULD in the text | |||
| traffic, the rules described for encapsulating VCCV CC Type 1 as | below. | |||
| specified in section 9.5.1 [RFC6073] and section 5.1.1 of [RFC5085] | ||||
| MUST be used. In this case the advertised CC Type is 1, and | ||||
| Associated Channel Types of 21, 07, or 57 are allowed. | ||||
| VCCV 2 May 8, 2012 | When the PW is a single segment PW, the TTL field of the PW Label | |||
| Stack Entry (LSE) SHOULD be set to 1. In the case of multi-segment | ||||
| pseudo-wires, the PW LSE TTL SHOULD be set to the value needed to | ||||
| reach the intended destination PE as described in [RFC6073]. | ||||
| 3. VCCV Control Channel When The Control Word is Not Used | The GAL LSE MUST contain the GAL reserved label as defined in | |||
| [RFC5586]. | ||||
| When the PWE3 Control Word is not used a new CC Type 4 is | As defined in [RFC4385] and [RFC4446] the first nibble of the next | |||
| defined as follows. | field is set to 0001b to indicate an ACH associated with a pseudowire | |||
| instead of PW data. The Version and the Reserved fields MUST be set | ||||
| to 0, and the Channel Type is set to 0x0021 for IPv4, 0x0057 for IPv6 | ||||
| payloads [RFC5085] or 0x0007 for BFD payloads [RFC5885]. | ||||
| 0 1 2 3 | The Associated Channel Type defines how the "VCCV Message Body" field | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | is to be interpreted by the receiver. | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | PW Label | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | GAL | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| |0 0 0 1|Version| Reserved | Associated Channel Type | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | | | ||||
| ~ VCCV Message Body ~ | ||||
| | | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| The PW Label must set the TTL field to 1. In the case | 5. VCCV Capability Advertisement | |||
| of multi-segment pseudo-wires, the PW Label TTL MUST be set to the | ||||
| correct value to reach the intended destination PE as described | ||||
| in [RFC6073]. | ||||
| The GAL field MUST contain the reserved label as defined in | The capability advertisement MUST match the c-bit setting that is | |||
| [RFC5586]. | advertised in the PW FEC element. If the c-bit is set, indicating | |||
| the use of the control word, type 1 MUST be advertised and type 4 | ||||
| MUST NOT be advertised. If the c-bit is not set, indicating that the | ||||
| control word is not in use, type 4 MUST be advertised, and type 1 | ||||
| MUST NOT be advertised. | ||||
| The first nibble of the next field is set to 0001b to indicate | A PE supporting Type 4 MAY advertise other CC types as defined in | |||
| an ACH associated with a pseudowire (see Section 5 of [RFC4385] | [RFC5085] . If the remote PE also supports Type 4, then Type 4 MUST | |||
| and Section 3.6 of [RFC4446]) instead of PW data. The Version and | be used superseding the Capability Advertisement Selection rules of | |||
| the Reserved fields MUST be set to 0, and the Channel Type is | section 7 from [RFC5085] . If a remote PE does not support Type 4, | |||
| set to 0x0021 for IPv4, 0x0057 for IPv6 payloads [RFC5085] or | then the rules from section 7 of [RFC5085] apply. If a CW is in use, | |||
| 0x0007 for BFD payloads [RFC5885]. | then Type 4 is not applicable, and therefore the normal capability | |||
| advertisement selection rules of section 7 from [RFC5085] apply. | ||||
| The "VCCV Message Body" field is defined based on the Associated | 6. Manageability Considerations | |||
| Channel Type and defined therein. | ||||
| 4. VCCV Capability Advertisement | Editor's note - this is a placeholder - I am not sure if it sis | |||
| needed | ||||
| The capability advertisement MUST match that c-bit setting | 7. Security Considerations | |||
| that is advertised in the PW FEC element. If the c-bit is set, | ||||
| indicating the use of the control word, type 1 MUST be advertised | ||||
| and type 4 MUST NOT be advertised. If the c-bit is not set, | ||||
| indicating that the control word is not in use, type 4 MUST | ||||
| be advertised, and type 1 MUST NOT be advertised. | ||||
| VCCV 2 May 8, 2012 | This document does not by itself raise any new security | |||
| considerations beyond those described in [RFC5085]. | ||||
| A PE supporting Type 4 MAY advertise other CC types | 8. IANA Considerations | |||
| as defined in RFC5085. If the remote PE also supports Type | ||||
| 4, then Type 4 MUST be used superceding the Capability | ||||
| Advertisement Selection rules of section 7 from RFC5085. | ||||
| If a remote PE does not support Type 4, then the rules | ||||
| from section 7 of RFC5085 apply. If a CW is in use, then | ||||
| Type 4 is not applicable, and therefore the normal | ||||
| capability advertisement selection rules of section 7 | ||||
| from RFC5085 apply. | ||||
| 4. IANA Considerations | 8.1. VCCV Interface Parameters Sub-TLV | |||
| 4.1. VCCV Interface Parameters Sub-TLV | EDITOR'S NOTE ASFAICS this section can be deleted. | |||
| The VCCV Interface Parameters Sub-TLV codepoint is defined in | The VCCV Interface Parameters Sub-TLV code point is defined in | |||
| [RFC4446]. IANA has created and will maintain registries for the CC | [RFC4446]. IANA has created and will maintain registries for the CC | |||
| Types and CV Types (bitmasks in the VCCV Parameter ID). The CC Type | Types and CV Types (bit masks in the VCCV Parameter ID). The CC Type | |||
| and CV Type new registries (see Sections 8.1.1 and 8.1.2, | and CV Type new registries (see Sections 8.1.1 and 8.1.2, | |||
| respectively) have been created in the Pseudo Wires Name Spaces, | respectively of[RFC5085] ) have been created in the Pseudo Wires Name | |||
| reachable from [IANA.pwe3-parameters]. The allocations must be done | Spaces, . The allocations must be done using the "IETF Review" policy | |||
| using the "IETF Consensus" policy defined in [RFC5226]. | defined in [RFC5226]. | |||
| 4.1.1. MPLS VCCV Control Channel (CC) Type 4 | ||||
| IANA is requested to augment the registry of "MPLS VCCV Control | ||||
| Channel Types" with the new type defined below. As defined in | ||||
| RFC5058, this new bitfield is to be assigned by IANA using | ||||
| the "IETF Consensus" policy defined in [RFC5226]. A VCCV | ||||
| Control Channel Type description and a reference to an RFC approved | ||||
| by the IESG are required for any assignment from this registry. | ||||
| MPLS Control Channel (CC) Types: | ||||
| Bit (Value) Description | ||||
| ============ ========================================== | ||||
| Bit 3 (0x08) - Type 4 | ||||
| The most significant (high order) bit is labeled Bit 7, and the least | 8.2. MPLS VCCV Control Channel (CC) Type 4 | |||
| significant (low order) bit is labeled Bit 0, see parenthetical | ||||
| "Value". | ||||
| 5. Security Considerations | IANA is requested to assign a new bit from the MPLS VCCV Control | |||
| Channel (CC) Types registry in the PWE3-parameters name space in | ||||
| order to identify VCCV type 4. It is recommended that Bit 3 be | ||||
| assigned to this purpose which would have a value of 0x08. | ||||
| This document does not by itself raise any particular security | MPLS VCCV Control Channel (CC) Types | |||
| considerations that differ from those described in RFC5085. | ||||
| VCCV 2 May 8, 2012 | Bit (Value) Description Reference | |||
| ============ =========== ==================== | ||||
| Bit X (0x0Y) Type 4 [This Specification] | ||||
| 6. Acknowledgements | 9. Acknowledgements | |||
| 7. References | 10. References | |||
| 7.1. Normative References | 10.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC3931] Lau, J., Townsley, M., and I. Goyret, "Layer Two Tunneling | [RFC3931] Lau, J., Townsley, M., and I. Goyret, "Layer Two Tunneling | |||
| Protocol - Version 3 (L2TPv3)", RFC 3931, March 2005. | Protocol - Version 3 (L2TPv3)", RFC 3931, March 2005. | |||
| [RFC4385] Bryant, S., Swallow, G., Martini, L., and D. McPherson, | [RFC4385] Bryant, S., Swallow, G., Martini, L., and D. McPherson, | |||
| "Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for | "Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for | |||
| Use over an MPLS PSN", RFC 4385, February 2006. | Use over an MPLS PSN", RFC 4385, February 2006. | |||
| [RFC4446] Martini, L., "IANA Allocations for Pseudowire Edge to Edge | [RFC4446] Martini, L., "IANA Allocations for Pseudowire Edge to Edge | |||
| Emulation (PWE3)", BCP 116, RFC 4446, April 2006. | Emulation (PWE3)", BCP 116, RFC 4446, April 2006. | |||
| [RFC5085] Nadeau, T. and C. Pignataro, "Pseudowire Virtual Circuit | [RFC5085] Nadeau, T. and C. Pignataro, "Pseudowire Virtual Circuit | |||
| Connectivity Verification (VCCV): A Control Channel for | Connectivity Verification (VCCV): A Control Channel for | |||
| Pseudowires", RFC 5085, December 2007. | Pseudowires", RFC 5085, December 2007. | |||
| [RFC5586] Bocci, M., Ed., Vigoureux, M., Ed., and S. Bryant, Ed., | [RFC5586] Bocci, M., Vigoureux, M., and S. Bryant, "MPLS Generic | |||
| "MPLS Generic Associated Channel", RFC 5586, June 2009. | Associated Channel", RFC 5586, June 2009. | |||
| [RFC5885] Nadeau, T., Ed., and C. Pignataro, Ed., "Bidirectional | ||||
| Forwarding Detection (BFD) for the Pseudowire Virtual | ||||
| Circuit Connectivity Verification (VCCV)", RFC 5885, | ||||
| June 2010. | ||||
| [RFC5654] Niven-Jenkins, B., Brungard, D., and M. Betts, | ||||
| "Requirements of an MPLS Transport Profile", RFC 5654, | ||||
| September 2009 | ||||
| [RFC6073] Martini, L., Metz, C., Nadeau, T., Bocci, M., and | ||||
| M. Aissaoui, "Segmented Pseudowire", RFC 6073, | ||||
| January 2011. | ||||
| 12.2. Informative References | ||||
| [IANA.l2tp-parameters] | [RFC5654] Niven-Jenkins, B., Brungard, D., Betts, M., Sprecher, N., | |||
| Internet Assigned Numbers Authority, "Layer Two Tunneling | and S. Ueno, "Requirements of an MPLS Transport Profile", | |||
| Protocol "L2TP"", April 2007, | RFC 5654, September 2009. | |||
| <http://www.iana.org/assignments/l2tp-parameters>. | ||||
| VCCV 2 May 8, 2012 | [RFC5885] Nadeau, T. and C. Pignataro, "Bidirectional Forwarding | |||
| Detection (BFD) for the Pseudowire Virtual Circuit | ||||
| Connectivity Verification (VCCV)", RFC 5885, June 2010. | ||||
| [IANA.pwe3-parameters] | [RFC6073] Martini, L., Metz, C., Nadeau, T., Bocci, M., and M. | |||
| Internet Assigned Numbers Authority, "Pseudo Wires Name | Aissaoui, "Segmented Pseudowire", RFC 6073, January 2011. | |||
| Spaces", June 2007, | ||||
| <http://www.iana.org/assignments/pwe3-parameters>. | ||||
| [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing | 10.2. Informative References | |||
| an IANA Considerations Section in RFCs", BCP 26, | ||||
| RFC 5226, May 2008. | ||||
| [RFC3916] Xiao, X., McPherson, D., and P. Pate, "Requirements for | [RFC3916] Xiao, X., McPherson, D., and P. Pate, "Requirements for | |||
| Pseudo-Wire Emulation Edge-to-Edge (PWE3)", RFC 3916, | Pseudo-Wire Emulation Edge-to-Edge (PWE3)", RFC 3916, | |||
| September 2004. | September 2004. | |||
| [RFC3985] Bryant, S. and P. Pate, "Pseudo Wire Emulation Edge-to- | [RFC3985] Bryant, S. and P. Pate, "Pseudo Wire Emulation Edge-to- | |||
| Edge (PWE3) Architecture", RFC 3985, March 2005. | Edge (PWE3) Architecture", RFC 3985, March 2005. | |||
| [RFC4377] Nadeau, T., Morrow, M., Swallow, G., Allan, D., and S. | [RFC4377] Nadeau, T., Morrow, M., Swallow, G., Allan, D., and S. | |||
| Matsushima, "Operations and Management (OAM) Requirements | Matsushima, "Operations and Management (OAM) Requirements | |||
| for Multi-Protocol Label Switched (MPLS) Networks", | for Multi-Protocol Label Switched (MPLS) Networks", RFC | |||
| RFC 4377, February 2006. | 4377, February 2006. | |||
| [MAN-CW] Del Regno, N., Nadeau, T., Manral, V., Ward, D., | [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an | |||
| "Mandatory Use of Control Word for PWE3 Encapsulations", | IANA Considerations Section in RFCs", BCP 26, RFC 5226, | |||
| "Work in progress", October 2010. | May 2008. | |||
| 8. Authors' Addresses | [RFC7079] Del Regno, N. and A. Malis, "The Pseudowire (PW) and | |||
| Virtual Circuit Connectivity Verification (VCCV) | ||||
| Implementation Survey Results", RFC 7079, November 2013. | ||||
| Authors' Addresses | ||||
| Thomas D. Nadeau | Thomas D. Nadeau | |||
| Juniper Networks | lucidvision | |||
| Email: tnadeau@juniper.net | ||||
| Email: tnadeau@lucidvision.com | ||||
| Luca Martini | Luca Martini | |||
| Cisco Systems, Inc. | Cisco Systems | |||
| 9155 East Nichols Avenue, Suite 400 | ||||
| Englewood, CO, 80112 USA | ||||
| EMail: lmartini@cisco.com | Email: lmartini@cisco.com | |||
| Stewart Bryant | ||||
| Cisco Systems | ||||
| Email: stbryant@cisco.com | ||||
| End of changes. 66 change blocks. | ||||
| 274 lines changed or deleted | 258 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||