Skip to main content

Layer 1 VPN Basic Mode
draft-ietf-l1vpn-basic-mode-05

Revision differences

Document history

Date Rev. By Action
2012-08-22
05 (System) post-migration administrative database adjustment to the No Objection position for Pasi Eronen
2008-05-30
05 (System) IANA Action state changed to No IC from In Progress
2008-05-30
05 (System) IANA Action state changed to In Progress
2008-05-30
05 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2008-05-30
05 Cindy Morgan IESG state changed to Approved-announcement sent
2008-05-30
05 Cindy Morgan IESG has approved the document
2008-05-30
05 Cindy Morgan Closed "Approve" ballot
2008-05-29
05 Cindy Morgan State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Cindy Morgan
2008-05-29
05 Pasi Eronen [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen
2008-05-27
05 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-05-27
05 (System) New version available: draft-ietf-l1vpn-basic-mode-05.txt
2008-05-08
05 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Charlie Kaufman.
2008-05-08
05 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2008-05-08
05 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2008-05-08
05 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2008-05-08
05 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2008-05-08
05 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2008-05-07
05 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2008-05-07
05 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2008-05-07
05 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2008-05-07
05 Ron Bonica [Ballot discuss]
2008-05-07
05 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to No Objection from Discuss by Ron Bonica
2008-05-07
05 Ron Bonica
[Ballot comment]
In Section 1, you say:

As with L3VPNs, there are protocol options to be made with auto-discovery.

Did you mean protocol choices?

In …
[Ballot comment]
In Section 1, you say:

As with L3VPNs, there are protocol options to be made with auto-discovery.

Did you mean protocol choices?

In Setion 2, you say:

Since the mechanisms specified in this document
  use GMPLS as the signaling mechanism, and since GMPLS applies to
  both SONET/SDH (TDM) and Lambda Switch Capable (LSC) interfaces, it
  results that L1VPN services include (but are not restricted) to
  Lambda Switch Capable or TDM-based equipment.

Did you mean "it follows that"?
2008-05-07
05 Ron Bonica
[Ballot discuss]
In Section 3.1, you say

Is is further REQUIRED that each L1VPN customer have its own addressing realm.

Does this mean that a …
[Ballot discuss]
In Section 3.1, you say

Is is further REQUIRED that each L1VPN customer have its own addressing realm.

Does this mean that a customer cannot use globally routable address space? If so, why?
2008-05-07
05 Ron Bonica [Ballot Position Update] New position, Discuss, has been recorded by Ron Bonica
2008-05-07
05 Ron Bonica
[Ballot comment]
In Section 1, you say:

As with L3VPNs, there are protocol options to be made with auto-discovery.

Did you mean protocol choices?

In …
[Ballot comment]
In Section 1, you say:

As with L3VPNs, there are protocol options to be made with auto-discovery.

Did you mean protocol choices?

In Setion 2, you say:

Since the mechanisms specified in this document
  use GMPLS as the signaling mechanism, and since GMPLS applies to
  both SONET/SDH (TDM) and Lambda Switch Capable (LSC) interfaces, it
  results that L1VPN services include (but are not restricted) to
  Lambda Switch Capable or TDM-based equipment.

Did you mean "it follows that"?
2008-05-07
05 Ron Bonica
[Ballot comment]
In Section 1, you say:

As with L3VPNs, there are protocol options to be made with auto-discovery.

Did you mean protocol choices?

In …
[Ballot comment]
In Section 1, you say:

As with L3VPNs, there are protocol options to be made with auto-discovery.

Did you mean protocol choices?

In Setion 2, you say:

Since the mechanisms specified in this document
  use GMPLS as the signaling mechanism, and since GMPLS applies to
  both SONET/SDH (TDM) and Lambda Switch Capable (LSC) interfaces, it
  results that L1VPN services include (but are not restricted) to
  Lambda Switch Capable or TDM-based equipment.

Did you mean "it follows that"?
2008-05-07
05 Ron Bonica [Ballot comment]
In Section 1, you say:

As with L3VPNs, there are protocol options to be made with auto-discovery.

Did you mean protocol choices?
2008-05-07
05 Tim Polk [Ballot comment]
Note that I support Pasi's discuss wrt security considerations.

One nit:

s 4.1, 1st sentence
s/there/their/
2008-05-07
05 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2008-05-06
05 Russ Housley
[Ballot comment]
There has been a dialogue between Sandy Murphy and Adrian Farrel that
  was begun by Sandy's SecDir Review.  The Security Considerations in …
[Ballot comment]
There has been a dialogue between Sandy Murphy and Adrian Farrel that
  was begun by Sandy's SecDir Review.  The Security Considerations in
  this document are very sparse, saying essentially that because the
  matching of customer channels to provider ports is assumed to be done
  correctly and out of band there are no security considerations.
  However, the dialogue between Sandy and Adrian shows that there is
  actually more to say.  I support the DISCUSS position that Pasi has
  entered ...
2008-05-06
05 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2008-05-06
05 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2008-05-06
05 (System) State Changes to IESG Evaluation from IESG Evaluation - Defer by system
2008-05-05
05 Pasi Eronen
[Ballot comment]
The document could perhaps use a slightly longer explanation of how
the PE, when it receives a RSVP message, determines which L1VPN it's …
[Ballot comment]
The document could perhaps use a slightly longer explanation of how
the PE, when it receives a RSVP message, determines which L1VPN it's
associated with (since apparently the RSVP messages are not
necessarily sent over the CE-PE link identified by CPI/PPI, and the
L1VPN is not uniquely identified by CE-CC-Addr/PE-CC-Addr).

Sandy's SecDir review also identified a number of places that
would benefit from some clarification of the text, and provided
editorial comments that should be taken into acccount.
2008-05-05
05 Pasi Eronen
[Ballot discuss]
As noted by Charlie Kaufman's and Sandy Murphy's SecDir reviews: the
security considerations text is very sparse. At the very least, it
should …
[Ballot discuss]
As noted by Charlie Kaufman's and Sandy Murphy's SecDir reviews: the
security considerations text is very sparse. At the very least, it
should point to the (much more extensive) security considerations in
RFC 4847 and draft-ietf-l1vpn-applicability-basic-mode-05, and briefly
describe the existing security mechanisms (e.g. GMPLS/RSVP-TE) that
can be used to address those concerns.

In Section 4.1.2, something more should be said about the L1VPN
globally unique identifiers, and in particular, who selects them and
how global uniqueness is ensured (or is uniqueness within a service
provider sufficient?), and how they're encoded (e.g. the format here
doesn't match the VPN Identifier defined in RFC 2685).

Section 4.1.2 needs a reference to a document that defines the CPI AFI
values.
2008-05-05
05 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2008-04-26
05 Samuel Weiler Request for Telechat review by SECDIR is assigned to Charlie Kaufman
2008-04-26
05 Samuel Weiler Request for Telechat review by SECDIR is assigned to Charlie Kaufman
2008-04-26
05 Samuel Weiler Assignment of request for Last Call review by SECDIR to Nicolas Williams was rejected
2008-04-25
05 (System) Removed from agenda for telechat - 2008-04-24
2008-04-23
05 Pasi Eronen State Changes to IESG Evaluation - Defer from IESG Evaluation by Pasi Eronen
2008-04-21
05 David Ward [Ballot Position Update] New position, Yes, has been recorded for David Ward
2008-04-21
05 David Ward Ballot has been issued by David Ward
2008-04-21
05 David Ward Created "Approve" ballot
2008-04-21
05 David Ward Placed on agenda for telechat - 2008-04-24 by David Ward
2008-04-21
05 David Ward State Changes to IESG Evaluation from Waiting for AD Go-Ahead by David Ward
2008-03-27
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2008-03-27
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2008-03-26
05 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-03-20
05 Samuel Weiler Assignment of request for Last Call review by SECDIR to Alexey Melnikov was rejected
2008-03-18
05 Amanda Baber IANA Last Call comments:

As described in the IANA Considerations section, we understand this document
to have NO IANA Actions.
2008-03-13
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Alexey Melnikov
2008-03-13
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Alexey Melnikov
2008-03-12
05 Amy Vezza Last call sent
2008-03-12
05 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2008-03-11
05 David Ward Last Call was requested by David Ward
2008-03-11
05 David Ward Removed from agenda for telechat - 2008-03-27 by David Ward
2008-03-11
05 David Ward State Changes to Last Call Requested from IESG Evaluation by David Ward
2008-03-11
05 (System) Ballot writeup text was added
2008-03-11
05 (System) Last call text was added
2008-03-11
05 (System) Ballot approval text was added
2008-03-04
05 David Ward State Changes to IESG Evaluation from Publication Requested by David Ward
2008-03-04
05 David Ward
Proto-write-up for draft-ietf-l1vpn-ospf-auto-discovery-05

Intended status : Standards Track

Recommend that this I-D is progressed in parallel with three other
I-Ds:
- draft-ietf-l1vpn-applicability-basic-mode
- draft-ietf-l1vpn-basic-mode
- …
Proto-write-up for draft-ietf-l1vpn-ospf-auto-discovery-05

Intended status : Standards Track

Recommend that this I-D is progressed in parallel with three other
I-Ds:
- draft-ietf-l1vpn-applicability-basic-mode
- draft-ietf-l1vpn-basic-mode
- draft-ietf-l1vpn-bgp-auto-discovery

(1.a)  Who is the Document Shepherd for this document?  Has the
      Document Shepherd personally reviewed this version of the
      document and, in particular, does he or she believe this
      version is ready for forwarding to the IESG for publication?

Adrian Farrel is the document shepherd.
He has personally reviewed the I-D and believes it is ready for
forwarding to the IESG for publication.

(1.b)  Has the document had adequate review both from key WG members
      and from key non-WG members?  Does the Document Shepherd have
      any concerns about the depth or breadth of the reviews that
      have been performed?

I-D had good level of discussions in WG at early stages.

The draft was introduced to the OSPF WG and presented at an OSPF WG
meeting as it was being developed. This led to constructive feedback
that was incorporated in the I-D.

WG last call was shared with the OSPF WG and this led to additional
review comments.

(1.c)  Does the Document Shepherd have concerns that the document
      needs more review from a particular or broader perspective,
      e.g., security, operational complexity, someone familiar with
      AAA, internationalization or XML?

No concerns.

(1.d)  Does the Document Shepherd have any specific concerns or
      issues with this document that the Responsible Area Director
      and/or the IESG should be aware of?  For example, perhaps he
      or she is uncomfortable with certain parts of the document, or
      has concerns whether there really is a need for it.  In any
      event, if the WG has discussed those issues and has indicated
      that it still wishes to advance the document, detail those
      concerns here.  Has an IPR disclosure related to this document
      been filed?  If so, please include a reference to the
      disclosure and summarize the WG discussion and conclusion on
      this issue.

The document is sound.

(1.e)  How solid is the WG consensus behind this document?  Does it
      represent the strong concurrence of a few individuals, with
      others being silent, or does the WG as a whole understand and
      agree with it?

There were no problems with consensus for this document.

However, there was strong debate about whether an IGP should be used
for this function or whether it was better to use BGP (see the write-up
for draft-ietf-l1vpn-bgp-auto-discovery). The conclusion of this debate
was that:
- Using OSPF has advantages in the eyes of optical equipment vendors
since they already implement OSPF-TE, but do not have BGP
implementations.
- There are some potential scaling issues for OSPF. This point is now
explicitly stated in the I-D, with the caveat that this OSPF
deployment is limited to within the optical domain and so does not
have wider implications for OSPF in the Internet. An alternate
deployment using multiple instances to reduce the scaling impact is
also presented.

The WG decided that it would be best to have both an OSPF and a BGP
solution proceed at this stage.

(1.f)  Has anyone threatened an appeal or otherwise indicated extreme
      discontent?  If so, please summarise the areas of conflict in
      separate email messages to the Responsible Area Director.  (It
      should be in a separate email because this questionnaire is
      entered into the ID Tracker.)

No threats. No discontent.

(1.g)  Has the Document Shepherd personally verified that the
      document satisfies all ID nits?  (See
      http://www.ietf.org/ID-Checklist.html and
      http://tools.ietf.org/tools/idnits/).  Boilerplate checks are
      not enough; this check needs to be thorough.  Has the document
      met all formal review criteria it needs to, such as the MIB
      Doctor, media type and URI type reviews?

All checks made.

(1.h)  Has the document split its references into normative and
      informative?  Are there normative references to documents that
      are not ready for advancement or are otherwise in an unclear
      state?  If such normative references exist, what is the
      strategy for their completion?  Are there normative references
      that are downward references, as described in [RFC3967]?  If
      so, list these downward references to support the Area
      Director in the Last Call procedure for them [RFC3967].

References split.
No downrefs.

(1.i)  Has the Document Shepherd verified that the document IANA
      consideration section exists and is consistent with the body
      of the document?  If the document specifies protocol
      extensions, are reservations requested in appropriate IANA
      registries?  Are the IANA registries clearly identified?  If
      the document creates a new registry, does it define the
      proposed initial contents of the registry and an allocation
      procedure for future registrations?  Does it suggest a
      reasonable name for the new registry?  See [RFC2434].  If the
      document describes an Expert Review process has Shepherd
      conferred with the Responsible Area Director so that the IESG
      can appoint the needed Expert during the IESG Evaluation?

This is a Standards Track I-D that makes a request for one new codepoint
from an existing registry. The registry and request are clearly
explained in the IANA Considerations section.

(1.j)  Has the Document Shepherd verified that sections of the
      document that are written in a formal language, such as XML
      code, BNF rules, MIB definitions, etc., validate correctly in
      an automated checker?

No such sections.

(1.k)  The IESG approval announcement includes a Document
      Announcement Write-Up.  Please provide such a Document
      Announcement Write-Up.  Recent examples can be found in the
      "Action" announcements for approved documents.  The approval
      announcement contains the following sections:

      Technical Summary
          Relevant content can frequently be found in the abstract
          and/or introduction of the document.  If not, this may be
          an indication that there are deficiencies in the abstract
          or introduction.

This document defines an Open Shortest Path First (OSPF) based
Layer-1 Virtual Private Network (L1VPN) auto-discovery mechanism.
This mechanism enables provider edge (PE) devices using OSPF to
dynamically learn about existence of each other, and attributes of
configured customer edge (CE) links and their associations with
L1VPNs.  This document builds on L1VPN framework and requirements,
and provides a L1VPN basic mode auto-discovery mechanism.

      Working Group Summary
          Was there anything in WG process that is worth noting?  For
          example, was there controversy about particular points or
          were there decisions where the consensus was particularly
          rough?

See the discussion above wrt the BGP/OSPF choice.

      Document Quality
          Are there existing implementations of the protocol?  Have a
          significant number of vendors indicated their plan to
          implement the specification?  Are there any reviewers that
          merit special mention as having done a thorough review,
          e.g., one that resulted in important changes or a
          conclusion that the document had no substantive issues?  If
          there was a MIB Doctor, Media Type or other expert review,
          what was its course (briefly)?  In the case of a Media Type
          review, on what date was the request posted?

OSPF-TE is widely implemented and deployed for optical networks. This
document makes a very simple extension to that work and so is simple to
add to existing implementations.

Although L1VPNs are not currently deployed, various experiments and
interop demos have been conducted. Most of these have focused on
signaling with manual configuration rather than autodiscovery, but at
least one implementation with OSPF autodiscovery is known of, and this
has been used to show a proof-of-concept.

Note that there is nothing to prevent the development of an identical
set of extensions to ISIS-TE. This has been put to the WG as an option
on several occasions, but there have been no volunteers to write an I-D
and no indication of any intent to implement. This should not be a
surprise as, although there are many implementations of ISIS-TE and a
very few of GMPLS ISIS, there are no known GMPLS ISIS implementations
for optical equipment. Nothing precludes a future development of
suitable ISIS extensions being developed in the future either in the
L1VPN WG or the ISIS WG.
2008-03-04
05 David Ward Placed on agenda for telechat - 2008-03-20 by David Ward
2008-02-25
05 Amy Vezza
Proto-write-up for draft-ietf-l1vpn-basic-mode-04

Intended status : Standards Track

Recommend that this I-D is progressed in parallel with three other
I-Ds:
- draft-ietf-l1vpn-applicability-basic-mode
- draft-ietf-l1vpn-bgp-auto-discovery
- …
Proto-write-up for draft-ietf-l1vpn-basic-mode-04

Intended status : Standards Track

Recommend that this I-D is progressed in parallel with three other
I-Ds:
- draft-ietf-l1vpn-applicability-basic-mode
- draft-ietf-l1vpn-bgp-auto-discovery
- draft-ietf-l1vpn-ospf-auto-discovery

> (1.a) Who is the Document Shepherd for this document? Has the
> Document Shepherd personally reviewed this version of the
> document and, in particular, does he or she believe this
> version is ready for forwarding to the IESG for publication?

Adrian Farrel is the document shepherd.
He has personally reviewed the I-D and believes it is ready for
forwarding to the IESG for publication.

> (1.b) Has the document had adequate review both from key WG members
> and from key non-WG members? Does the Document Shepherd have
> any concerns about the depth or breadth of the reviews that
> have been performed?

Authors are key in the field.

Draft acknowledges contributions from all the WG chairs.

WG review by key implementers has been OK with feedback on the list and
in WG meetings. WG last call was quiet, but this reflects the fact that
most of the work had already been done, and the protocol extensions are
not extensive.

> (1.c) Does the Document Shepherd have concerns that the document
> needs more review from a particular or broader perspective,
> e.g., security, operational complexity, someone familiar with
> AAA, internationalization or XML?

No concerns.

> (1.d) Does the Document Shepherd have any specific concerns or
> issues with this document that the Responsible Area Director
> and/or the IESG should be aware of? For example, perhaps he
> or she is uncomfortable with certain parts of the document, or
> has concerns whether there really is a need for it. In any
> event, if the WG has discussed those issues and has indicated
> that it still wishes to advance the document, detail those
> concerns here. Has an IPR disclosure related to this document
> been filed? If so, please include a reference to the
> disclosure and summarize the WG discussion and conclusion on
> this issue.

The document is sound.

> (1.e) How solid is the WG consensus behind this document? Does it
> represent the strong concurrence of a few individuals, with
> others being silent, or does the WG as a whole understand and
> agree with it?

There were no problems with consensus for this document.

> (1.f) Has anyone threatened an appeal or otherwise indicated extreme
> discontent? If so, please summarise the areas of conflict in
> separate email messages to the Responsible Area Director. (It
> should be in a separate email because this questionnaire is
> entered into the ID Tracker.)

No threats. No discontent.

> (1.g) Has the Document Shepherd personally verified that the
> document satisfies all ID nits? (See
> http://www.ietf.org/ID-Checklist.html and
> http://tools.ietf.org/tools/idnits/). Boilerplate checks are
> not enough; this check needs to be thorough. Has the document
> met all formal review criteria it needs to, such as the MIB
> Doctor, media type and URI type reviews?

All checks made.

> (1.h) Has the document split its references into normative and
> informative? Are there normative references to documents that
> are not ready for advancement or are otherwise in an unclear
> state? If such normative references exist, what is the
> strategy for their completion? Are there normative references
> that are downward references, as described in [RFC3967]? If
> so, list these downward references to support the Area
> Director in the Last Call procedure for them [RFC3967].

References split.
No downrefs.

> (1.i) Has the Document Shepherd verified that the document IANA
> consideration section exists and is consistent with the body
> of the document? If the document specifies protocol
> extensions, are reservations requested in appropriate IANA
> registries? Are the IANA registries clearly identified? If
> the document creates a new registry, does it define the
> proposed initial contents of the registry and an allocation
> procedure for future registrations? Does it suggest a
> reasonable name for the new registry? See [RFC2434]. If the
> document describes an Expert Review process has Shepherd
> conferred with the Responsible Area Director so that the IESG
> can appoint the needed Expert during the IESG Evaluation?

This is a Standards Track I-D, but makes no requests for IANA action.
A null IANA section is present.

> (1.j) Has the Document Shepherd verified that sections of the
> document that are written in a formal language, such as XML
> code, BNF rules, MIB definitions, etc., validate correctly in
> an automated checker?

No such sections.

> (1.k) The IESG approval announcement includes a Document
> Announcement Write-Up. Please provide such a Document
> Announcement Write-Up. Recent examples can be found in the
> "Action" announcements for approved documents. The approval
> announcement contains the following sections:
>
> Technical Summary
> Relevant content can frequently be found in the abstract
> and/or introduction of the document. If not, this may be
> an indication that there are deficiencies in the abstract
> or introduction.

This document describes the Basic Mode of Layer 1 VPNs (L1VPN BM).
L1VPN Basic mode is a port-based VPN. In L1VPN Basic Mode (BM), the
basic unit of service is a Label Switched Path (LSP) between a pair
of customer ports within a given VPN port-topology. This document
defines the operational model using either provisioning or a VPN
auto-discovery mechanism, and the signaling extensions for the L1VPN
BM.

> Working Group Summary
> Was there anything in WG process that is worth noting? For
> example, was there controversy about particular points or
> were there decisions where the consensus was particularly
> rough?

Nothing of note.
There was some juggling of definitions between this I-D and the two
autodiscovery I-Ds (draft-ietf-l1vpn-bgp-auto-discovery, draft-ietf-
l1vpn-ospf-auto-discovery) as they all three need to encode the same
data elements. The end result was that this I-D contains the encoding
expressed in a protocol-neutral away.

> Document Quality
> Are there existing implementations of the protocol? Have a
> significant number of vendors indicated their plan to
> implement the specification? Are there any reviewers that
> merit special mention as having done a thorough review,
> e.g., one that resulted in important changes or a
> conclusion that the document had no substantive issues? If
> there was a MIB Doctor, Media Type or other expert review,
> what was its course (briefly)? In the case of a Media Type
> review, on what date was the request posted?

The protocol described in this I-D is largely specified in RFC 4208
which is itself almost entirely a restatement of RFC 3473. RFC 3473 is
widely implemented and well enough deployed. RFC 4208 has been deployed
in a small number of cases, and specific interoperability has been
shown in private labs and at an interoperability event.

The signaling mechanisms to build a L1VPN service have been shown
experimentally by several vendors. In some cases this has required
configuration of the PITs, and in other cases it has used auto-
discovery, but that distinction is not germane to this I-D. Interop
demos of L1VPN services have been performed, and several service
providers are actively looking at the technology and the business case.
2008-02-25
05 Amy Vezza Draft Added by Amy Vezza in state Publication Requested
2008-02-21
04 (System) New version available: draft-ietf-l1vpn-basic-mode-04.txt
2008-02-20
03 (System) New version available: draft-ietf-l1vpn-basic-mode-03.txt
2007-07-10
02 (System) New version available: draft-ietf-l1vpn-basic-mode-02.txt
2006-10-25
01 (System) New version available: draft-ietf-l1vpn-basic-mode-01.txt
2006-05-08
00 (System) New version available: draft-ietf-l1vpn-basic-mode-00.txt