YANG Data Model for MPLS-based L2VPN
draft-ietf-bess-l2vpn-yang-06
BESS Working Group H. Shah, Ed.
Internet-Draft Ciena Corporation
Intended status: Standards Track P. Brissette, Ed.
Expires: January 1, 2018 Cisco Systems, Inc.
I. Chen, Ed.
Jabil
I. Hussain, Ed.
Infinera Corporation
B. Wen, Ed.
Comcast
K. Tiruveedhula, Ed.
Juniper Networks
June 30, 2017
YANG Data Model for MPLS-based L2VPN
draft-ietf-bess-l2vpn-yang-06.txt
Abstract
This document describes a YANG data model for Layer 2 VPN (L2VPN)
services over MPLS networks. These services include point-to-point
Virtual Private Wire Service (VPWS) and multipoint Virtual Private
LAN service (VPLS) that uses LDP and BGP signaled Pseudowires. It is
expected that this model will be used by the management tools run by
the network operators in order to manage and monitor the network
resources that they use to deliver L2VPN services.
This document also describes the YANG data model for the Pseudowires.
The independent definition of the Pseudowires facilitates its use in
Ethernet Segment and EVPN data models defined in separate document.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 1, 2018.
Shah, Ed., et al. Expires January 1, 2018 [Page 1]
Internet-Draft YANG Data Model for L2VPN June 2017
Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Specification of Requirements . . . . . . . . . . . . . . . . 4
3. L2VPN YANG Model . . . . . . . . . . . . . . . . . . . . . . 4
3.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 4
3.2. Open issues and next steps . . . . . . . . . . . . . . . 7
3.3. Pseudowire Common . . . . . . . . . . . . . . . . . . . . 8
3.3.1. Pseudowire . . . . . . . . . . . . . . . . . . . . . 8
3.3.2. pw-templates . . . . . . . . . . . . . . . . . . . . 8
3.4. L2VPN Common . . . . . . . . . . . . . . . . . . . . . . 8
3.4.1. redundancy-group-templates . . . . . . . . . . . . . 8
3.5. L2VPN instance . . . . . . . . . . . . . . . . . . . . . 8
3.5.1. common attributes . . . . . . . . . . . . . . . . . . 8
3.5.2. PW list . . . . . . . . . . . . . . . . . . . . . . . 8
3.5.3. List of endpoints . . . . . . . . . . . . . . . . . . 9
3.5.4. point-to-point or multipoint service . . . . . . . . 10
3.6. Operational State . . . . . . . . . . . . . . . . . . . . 10
3.7. Yang tree . . . . . . . . . . . . . . . . . . . . . . . . 10
4. YANG Module . . . . . . . . . . . . . . . . . . . . . . . . . 13
5. Security Considerations . . . . . . . . . . . . . . . . . . . 40
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 41
7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 41
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 41
8.1. Normative References . . . . . . . . . . . . . . . . . . 41
Show full document text