Last Call Review of draft-ietf-l3sm-l3vpn-service-model-16

Request Review of draft-ietf-l3sm-l3vpn-service-model
Requested rev. no specific revision (document currently at 19)
Type Last Call Review
Team Ops Directorate (opsdir)
Deadline 2016-10-11
Requested 2016-09-28
Authors Stephane Litkowski, Luis Tomotaki, Kenichi Ogaki
Draft last updated 2016-10-05
Completed reviews Genart Last Call review of -16 by Brian Carpenter (diff)
Genart Telechat review of -17 by Brian Carpenter (diff)
Secdir Last Call review of -16 by Hilarie Orman (diff)
Opsdir Last Call review of -16 by Nevil Brownlee (diff)
Rtgdir Early review of -16 by Les Ginsberg (diff)
Yangdoctors Early review of -06 by Giles Heron (diff)
Assignment Reviewer Nevil Brownlee 
State Completed
Review review-ietf-l3sm-l3vpn-service-model-16-opsdir-lc-brownlee-2016-10-05
Reviewed rev. 16 (document currently at 19)
Review result Ready
Review completed: 2016-10-05


Hi all:

I have performed an Operations Directorate review of

  "This document defines a YANG data model that can be used for
   communication between customers and network operators and to deliver
   a Layer 3 Provider Provisioned VPN service.  The document is limited
   to the BGP PE-based VPNs as described in [RFC4026], [RFC4110] and
   [RFC4364].  This model is intended to be instantiated at management
   system to deliver the overall service.  This model is not a
   configuration model to be used directly on network elements.  This
   model provides an abstracted view of the Layer 3 IPVPN service
   configuration components.  It will be up to a management system to
   take this as an input and use specific configurations models to
   configure the different network elements to deliver the service.  How
   configuration of network elements is done is out of scope of the

This is a long document (158 pages), about half of which are its
YANG data model.  I have not looked closely at the YANG, I's sure
the authors will have checked that it compiles properly.

The most important part of the draft is section 5, "Design of the
Data Model."  This presents the model clearly, explains what all its
various parts actually do, and includes lots of examples showing
how to configure VPNs using all its many different capabilities.

The Security Considerations section only addresses the need to
authenticate client access to the YANG module itself.  However,
the model provides plenty of ways for providers to specify how
a VPN will implement whatever kinds of security its users will

Overall, technically this draft seems sound, I certainly didn't
find any problems with it.

Cheers, Nevil

 Nevil Brownlee                          Computer Science Department
 Phone: +64 9 373 7599 x88941             The University of Auckland
 FAX: +64 9 373 7453   Private Bag 92019, Auckland 1142, New Zealand