datatracker.ietf.org
Sign in
Version 5.7.4, 2014-11-12
Report a bug

Service Requirements for Layer 2 Provider-Provisioned Virtual Private Networks
RFC 4665

Document type: RFC - Informational (September 2006; No errata)
Document stream: IETF
Last updated: 2013-03-02
Other versions: plain text, pdf, html

IETF State: (None)
Consensus: Unknown
Document shepherd: No shepherd assigned

IESG State: RFC 4665 (Informational)
Responsible AD: Mark Townsley
Send notices to: l2vpn-chairs@tools.ietf.org, waldemar@nxp.com, yetik_serbest@labs.sbc.com

Network Working Group                                   W. Augustyn, Ed.
Request for Comments: 4665                               Y. Serbest, Ed.
Category: Informational                                             AT&T
                                                          September 2006

                   Service Requirements for Layer 2
             Provider-Provisioned Virtual Private Networks

Status of This Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   This document provides requirements for Layer 2 Provider-Provisioned
   Virtual Private Networks (L2VPNs).  It first provides taxonomy and
   terminology and states generic and general service requirements.  It
   covers point-to-point VPNs, referred to as Virtual Private Wire
   Service (VPWS), as well as multipoint-to-multipoint VPNs, also known
   as Virtual Private LAN Service (VPLS).  Detailed requirements are
   expressed from both a customer as well as a service provider
   perspectives.

Augustyn & Serbest           Informational                      [Page 1]
RFC 4665            Service Requirements for L2VPNs       September 2006

Table of Contents

   1. Introduction ....................................................4
      1.1. Scope of This Document .....................................4
      1.2. Outline ....................................................5
   2. Conventions used in this document ...............................5
   3. Contributing Authors ............................................5
   4. Definitions and Taxonomy ........................................5
      4.1. Definitions ................................................5
      4.2. Taxonomy of L2VPN Types ....................................6
      4.3. VPWS .......................................................6
      4.4. VPLS .......................................................7
   5. Service Requirements Common to Customers and Service Providers ..7
      5.1. Scope of emulation .........................................8
      5.2. Traffic Types ..............................................8
      5.3. Topology ...................................................8
      5.4. Isolated Exchange of Data and Forwarding Information .......9
      5.5. Security ...................................................9
           5.5.1. User Data Security .................................10
           5.5.2. Access Control .....................................10
      5.6. Addressing ................................................11
      5.7. Quality of Service ........................................11
           5.7.1. QoS Standards ......................................11
           5.7.2. Service Models .....................................11
      5.8. Service Level Specifications ..............................12
      5.9. Protection and Restoration ................................12
      5.10. CE-to-PE and PE-to-PE Link Requirements ..................12
      5.11. Management ...............................................12
      5.12. Interoperability .........................................12
      5.13. Inter-working ............................................13
   6. Customer Requirements ..........................................13
      6.1. Service Provider Independence .............................13
      6.2. Layer 3 Support ...........................................13
      6.3. Quality of Service and Traffic Parameters .................14
      6.4. Service Level Specification ...............................14
      6.5. Security ..................................................14
           6.5.1. Isolation ..........................................14
           6.5.2. Access Control .....................................14
           6.5.3. Value-Added Security Services ......................15
      6.6. Network Access ............................................15
           6.6.1. Physical/Link Layer Technology .....................15
           6.6.2. Access Connectivity ................................15
      6.7. Customer Traffic ..........................................17
           6.7.1. Unicast, Unknown Unicast, Multicast, and
                  Broadcast forwarding ...............................17
           6.7.2. Packet Re-ordering .................................17
           6.7.3. Minimum MTU ........................................17
           6.7.4. End-point VLAN Tag Translation .....................18

Augustyn & Serbest           Informational                      [Page 2]
RFC 4665            Service Requirements for L2VPNs       September 2006

[include full document text]