Skip to main content

A Common YANG Data Model for Attachment Circuits
draft-ietf-opsawg-teas-common-ac-15

Yes

Mahesh Jethanandani

No Objection

Erik Kline
(John Scudder)
(Murray Kucherawy)
(Warren Kumari)
(Zaheduzzaman Sarker)

Note: This ballot was opened for revision 13 and is now closed.

Mahesh Jethanandani
Yes
Deb Cooley
No Objection
Comment (2025-01-22 for -14) Not sent
Thank you to Watson Ladd for his secdir review.
Erik Kline
No Objection
Gunter Van de Velde
No Objection
Comment (2025-01-17 for -14) Sent
# Gunter Van de Velde, RTG AD, comments for draft-ietf-opsawg-teas-common-ac-14

# the referenced line numbers are derived from the idnits tool:
https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-opsawg-teas-common-ac-14.txt

# This is a well written document. I have few non-blocking editorial comments

#DETAILED COMMENTS
#=================

92	   Connectivity services are provided by networks to customers via
93	   dedicated terminating points (e.g., Service Functions (SFs), Customer
94	   Premises Equipment (CPEs), Autonomous System Border Routers (ASBRs),
95	   data centers gateways, or Internet Exchange Points).  A connectivity
96	   service is basically about ensuring data transfer received from (or
97	   destined to) a given terminating point to (or from) other terminating
98	   points that belong to the same customer/service, an interconnection
99	   node, or an ancillary node.  A set of objectives for the connectivity
100	   service may eventually be negotiated and agreed upon between a
101	   customer and a network provider.  For that data transfer to take
102	   place within the provider network, it is assumed that adequate setup
103	   is provisioned over the links that connect customer terminating
104	   points and a provider network (a Provider Edge (PE), typically) so
105	   that data can be successfully exchanged over these links.  The
106	   required setup is referred to in this document as an attachment
107	   circuits (ACs), while the underlying link is referred to as "bearer".

"
Connectivity services are provided to customers by networks via dedicated terminating 
points (e.g., Service Functions (SFs), Customer Premises Equipment (CPEs), Autonomous 
System Border Routers (ASBRs), data center gateways, or Internet Exchange Points). 
A connectivity service ensures that data transferred from (or destined to) a given 
terminating point can reach (or originate from) other terminating points belonging 
to the same customer or service, or associated with an interconnection node or 
ancillary node. Objectives for such a connectivity service may be negotiated and 
agreed upon between a customer and a network provider.

For data to traverse the provider network, it is assumed that appropriate 
provisioning is in place over the links connecting the customer’s terminating 
points to the provider network (typically, a Provider Edge (PE)), thereby 
enabling successful data exchange. This necessary provisioning is referred to 
in this document as “attachment circuits (ACs),” while the underlying link 
is referred to as the “bearer.”
"

109	   When a customer requests a new service, the service can be bound to
110	   existing attachment circuits or trigger the instantiation of new
111	   attachment circuits.  Whether these attachment circuits are specific
112	   for a given service or are shared to deliver a variety of services is
113	   deployment-specific.

"
When a customer requests a new service, that service can be associated with existing 
attachment circuits or may require the instantiation of new attachment circuits. 
Whether these attachment circuits are dedicated to a particular service or shared 
among multiple services depends on the specific deployment.
"

115	   An example of attachment circuits is depicted in Figure 1.  A
116	   Customer Edge (CE) may be a physical node or a logical entity.  A CE
117	   is seen by the network as a peer Service Attachment Point (SAP)
118	   [RFC9408].  CEs may be dedicated to one single service (e.g., Layer 3
119	   Virtual Private Network (VPN) or Layer 2 VPN) or host multiple
120	   services (e.g., Service Functions [RFC7665]).  A single AC (as seen
121	   by a network provider) may be bound to one or multiple peer SAPs
122	   (e.g., "CE1" and "CE2").  For example, and as discussed in [RFC4364],
123	   multiple CEs can be attached to a PE over the same attachment
124	   circuit.  This is typically implemented if the Layer 2 infrastructure
125	   between the CE and the network provides a multipoint service.  The
126	   same CE may terminate multiple ACs.  These ACs may be over the same
127	   or distinct bearers.

"
An example of attachment circuits is depicted in Figure 1. A Customer Edge (CE) 
may be realized as a physical node or a logical entity. From the network’s 
perspective, a CE is treated as a peer Service Attachment Point (SAP) [RFC9408]. 
CEs can be dedicated to a single service (e.g., Layer 3 Virtual Private Network (VPN) 
or Layer 2 VPN) or can host multiple services (e.g., Service Functions [RFC7665]). 
A single AC, as viewed by the network provider, may be bound to one or more peer 
SAPs (e.g., “CE1” and “CE2”). For instance, as discussed in [RFC4364], multiple 
CEs can attach to a PE over the same attachment circuit. This approach is 
typically deployed when the Layer 2 infrastructure between the CE and the 
network supports a multipoint service. A single CE may also terminate multiple 
ACs, which may be carried over the same bearer or over distinct bearers.
"

149	   This document specifies a common module ("ietf-ac-common") for
150	   attachment circuits (Section 5).  The model is designed with the
151	   intent to be reusable by other models and, therefore, ensure
152	   consistent AC structures among modules that manipulate ACs.  For
153	   example, the common model can be reused by service models to expose
154	   AC-as-a-Service (ACaaS) (e.g.,
155	   [I-D.ietf-opsawg-teas-attachment-circuit]), service models that
156	   require binding a service to a set of ACs (e.g., Network Slice
157	   Service [I-D.ietf-teas-ietf-network-slice-nbi-yang])), network models
158	   to provision ACs (e.g., [I-D.ietf-opsawg-ntw-attachment-circuit]),
159	   device models, etc.

"
This document specifies a common module, "ietf-ac-common," for attachment circuits 
(see Section 5). The module is designed to be reusable by other models, thereby 
ensuring consistent AC structures across modules that manipulate ACs. 
For example, the common module can be reused by service models to expose 
AC-as-a-Service (ACaaS) (e.g., [I-D.ietf-opsawg-teas-attachment-circuit]) or by 
service models that require binding a service to a set of ACs (e.g., the Network 
Slice Service [I-D.ietf-teas-ietf-network-slice-nbi-yang]). It can also be 
employed by network models to provision ACs (e.g., [I-D.ietf-opsawg-ntw-attachment-circuit]) 
and by device models, among others.
"

269	   "ietf-ac-common" is imported by "ietf-bearer-svc", "ietf-ac-svc", and
270	   "ietf-ac-ntw".  Bearers managed using "ietf-bearer-svc" may be
271	   referenced in the service ACs managed using "ietf-ac-svc".
272	   Similarly, a bearer managed using "ietf-bearer-svc" may list the set
273	   of ACs that use that bearer.  In order to ease correlation between an
274	   AC service requests and the actual AC provisioned in the network,
275	   "ietf-ac-ntw" uses the AC references exposed by "ietf-ac-svc".  To
276	   bind Layer 2 VPN or Layer 3 VPN services with ACs, "ietf-ac-glue"
277	   augments the LxSM and LxNM with AC service references exposed by
278	   "ietf-ac-svc" and AC network references exposed by "ietf-ac-ntw".

"
The "ietf-ac-common" module is imported by "ietf-bearer-svc," "ietf-ac-svc," and 
"ietf-ac-ntw." Bearers managed via "ietf-bearer-svc" may be referenced by 
service ACs managed using "ietf-ac-svc." Likewise, a bearer managed by 
"ietf-bearer-svc" may list the set of ACs that use that bearer. To facilitate 
correlation between an AC service request and the AC provisioned in the 
network, "ietf-ac-ntw" leverages the AC references exposed by "ietf-ac-svc." 
Furthermore, to bind Layer 2 VPN or Layer 3 VPN services with ACs, 
"ietf-ac-glue" augments the LxSM and LxNM with AC service references exposed 
by "ietf-ac-svc" and AC network references exposed by "ietf-ac-ntw."
"


Many thanks again for this document,

Kind Regards,
Gunter Van de Velde,
RTG AD
Jim Guichard
No Objection
Comment (2025-01-14 for -14) Not sent
Other than the following from nits no substantive comments:

  -- Possible downref: Non-RFC (?) normative reference: ref. 'ISO10589'

  ** Downref: Normative reference to an Informational RFC: RFC 7348

  == Outdated reference: A later version (-13) exists of
     draft-ietf-opsawg-ac-lxsm-lxnm-glue-12

  == Outdated reference: A later version (-15) exists of
     draft-ietf-opsawg-ntw-attachment-circuit-14

  == Outdated reference: A later version (-19) exists of
     draft-ietf-opsawg-teas-attachment-circuit-18
Orie Steele
No Objection
Comment (2025-01-17 for -14) Sent
# Orie Steele, ART AD, comments for draft-ietf-opsawg-teas-common-ac-14 
CC @OR13

* line numbers:
  - https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-opsawg-teas-common-ac-14.txt&submitcheck=True

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments

### md5

```
573	                +--:(md5)
574	                |  +-- md5-keychain?       key-chain:key-chain-ref
```

I assume there is no other choice?

https://www.rfc-editor.org/rfc/rfc8177.html#section-5

```
Similarly, the MD5 and SHA-1 algorithms have been proven to be
insecure ([Dobb96a], [Dobb96b], and [SHA-SEC-CON]), and usage is NOT
RECOMMENDED.  Usage should be confined to deployments where it is
required for backward compatibility.
```

## Nits

### this identity can _be_ used...

```
310	      type in an AC.  For example, this identity can used to indicate
```


### is _used_ to control...

```
321	   'l2-tunnel-type':  Uses to control the Layer 2 tunnel selection for
```
Paul Wouters
No Objection
Comment (2025-01-21 for -14) Sent
One minor comment / question:

Why the groupings split on addr family split, eg ipv4-static-rtg-entry and ipv6-static-rtg-entry ?
This causes a lot of almost identical duplication ? Couldn't the values just take (v4 or v6) ?
Roman Danyliw
No Objection
Comment (2025-01-20 for -14) Not sent
Thank you to Behcet Sarikaya for the GENART review.
Éric Vyncke
No Objection
Comment (2025-01-13 for -14) Sent
# Éric Vyncke, INT AD, comments for draft-ietf-opsawg-teas-common-ac-14
CC @evyncke

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits.

Special thanks to Reza Rokui for the shepherd's detailed write-up including the WG consensus *but* the justification of the intended status is rather light: being "valuable" is not enough to be a "standard".

I hope that this review helps to improve the document,

Regards,

-éric

## COMMENTS (non-blocking)

Thanks for using SVG graphics, it makes reading the HTML rendering much easier and nicer.

### Abstract

Should 'model' be used rather than 'module' in `The document specifies a common attachment circuits (ACs) YANG module` in order to be consistent with the title ? I understand that a model can consist of a single module.

### Section 1

Should `ancillary node` be better explained as it can mean multiple things depending on the context?

Figure 1, when the text writes `The same CE may terminate multiple ACs.` it would help if the text mentioned CE3 & CE4 and the associated bearer (assuming that `b*` is for a bearer).

### Section 2

When defining "bearer", please associate  the previously defined terms (CE, CPE) with `customer node`.

### Section 3

Not really about this I-D, but I find the use of `ietf-ac-glue` rather than 'ietf-ac-bind' a little too trivial especially when the text is about `To bind Layer 2 VPN` ;-)

### Section 4

Thanks for splitting the whole tree in parts, it helps.

### Section 4.1

It is rather unclear what `server` means in this document, even if I can guess some controllers in the SP domain.

### Section 4.3

Should there be a `*l3*-tunnel-type` in addition to `*l2*-tunnel-type` ?

Should the layer of the next hop be specified in `local-defined-next-hop`?

Should there be reference to `UNI`and `NNI`?

About figure 5 explanations about ipv6-connection, should there be a possibility for multiple IPv6 addresses per service ? Should there be SLAAC for dynamic address allocation ?

Should there a choice on how to authenticate OSPFv3 either RFC 4552 or RFC 7166 ?

### Section 5

In the vxlan grouping, the modules writes `"Specifies the VXLAN access mode. By default, the peer mode is set to 'static-mode'.";` but I see nothing in the YANG module to set a default (unsure whether it is possible though).

## NITS (non-blocking / cosmetic)

s/Layer 2 VPN/layer-2 VPN/ ? same for layer 3 of course

****
John Scudder Former IESG member
No Objection
No Objection (for -14) Not sent

                            
Murray Kucherawy Former IESG member
No Objection
No Objection (for -14) Not sent

                            
Warren Kumari Former IESG member
No Objection
No Objection (for -14) Not sent

                            
Zaheduzzaman Sarker Former IESG member
No Objection
No Objection (for -14) Not sent