%% You should probably cite draft-ietf-l2sm-l2vpn-service-model instead of this I-D. @techreport{wen-l2sm-l2vpn-service-model-04, number = {draft-wen-l2sm-l2vpn-service-model-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-wen-l2sm-l2vpn-service-model/04/}, author = {Bin Wen and Giuseppe Fioccola and Chongfeng Xie and Luay Jalil}, title = {{A YANG Data Model for L2VPN Service Delivery}}, pagetotal = 116, year = 2017, month = feb, day = 15, abstract = {This document defines a YANG data model that can be used to configure a Layer 2 Provider Provisioned VPN service. This model is intended to be instantiated at management system to deliver the overall service. This model is not a configuration model to be used directly on network elements, but provides an abstracted view of the Layer 2 VPN service configuration components. It is up to a management system to take this as an input and use specific configurations models to configure the different network elements to deliver the service. How configuration of network elements is done is out of scope of the document. The data model in this document includes support for point-to-point Virtual Private Wire Services (VPWS) and multipoint Virtual Private LAN services (VPLS) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFC4761 and RFC6624.}, }