RFC Editor Note:
3rd paragraph of Section 10:
OLD:
Protection mechanisms must also address the spoofing of tunneled PW
data. The validation of traffic addressed to the PW Demultiplexer
end-point is paramount in ensuring integrity of PW encapsulation.
Security protocols such as IPSec [RFC2401] may be used by the PW
Demultiplexer Layer in order to maintain the integrity of the PW by
authenticating data between the PW Demultiplexer End-points.
NEW:
Protection mechanisms must also address the spoofing of tunneled PW
data. The validation of traffic addressed to the PW Demultiplexer
end-point is paramount in ensuring integrity of PW encapsulation.
Security protocols such as IPSec [RFC2401] may be used by the PW
Demultiplexer Layer in order to provide authentication and data
integrity of data between the PW Demultiplexer End-points.