Last Call Review of draft-ietf-l3sm-l3vpn-service-model-16
review-ietf-l3sm-l3vpn-service-model-16-opsdir-lc-brownlee-2016-10-05-00
Request | Review of | draft-ietf-l3sm-l3vpn-service-model |
---|---|---|
Requested revision | No specific revision (document currently at 19) | |
Type | Last Call Review | |
Team | Ops Directorate (opsdir) | |
Deadline | 2016-10-11 | |
Requested | 2016-09-28 | |
Authors | Stephane Litkowski , Luis Tomotaki , Kenichi Ogaki | |
I-D last updated | 2016-10-05 | |
Completed reviews |
Genart Last Call review of -16
by Brian E. Carpenter
(diff)
Genart Telechat review of -17 by Brian E. Carpenter (diff) Secdir Last Call review of -16 by Hilarie Orman (diff) Opsdir Last Call review of -16 by Nevil Brownlee (diff) Rtgdir Early review of -16 by Les Ginsberg (diff) Yangdoctors Early review of -06 by Giles Heron (diff) |
|
Assignment | Reviewer | Nevil Brownlee |
State | Completed | |
Request | Last Call review on draft-ietf-l3sm-l3vpn-service-model by Ops Directorate Assigned | |
Reviewed revision | 16 (document currently at 19) | |
Result | Ready | |
Completed | 2016-10-05 |
review-ietf-l3sm-l3vpn-service-model-16-opsdir-lc-brownlee-2016-10-05-00
Hi all: I have performed an Operations Directorate review of draft-ietf-l3sm-l3vpn-service-model-16 "This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 Provider Provisioned VPN service. The document is limited to the BGP PE-based VPNs as described in [RFC4026], [RFC4110] and [RFC4364]. This model is intended to be instantiated at management system to deliver the overall service. This model is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IPVPN service configuration components. It will be up to a management system to take this as an input and use specific configurations models to configure the different network elements to deliver the service. How configuration of network elements is done is out of scope of the document." This is a long document (158 pages), about half of which are its YANG data model. I have not looked closely at the YANG, I's sure the authors will have checked that it compiles properly. The most important part of the draft is section 5, "Design of the Data Model." This presents the model clearly, explains what all its various parts actually do, and includes lots of examples showing how to configure VPNs using all its many different capabilities. The Security Considerations section only addresses the need to authenticate client access to the YANG module itself. However, the model provides plenty of ways for providers to specify how a VPN will implement whatever kinds of security its users will require. Overall, technically this draft seems sound, I certainly didn't find any problems with it. Cheers, Nevil -- --------------------------------------------------------------------- Nevil Brownlee Computer Science Department Phone: +64 9 373 7599 x88941 The University of Auckland FAX: +64 9 373 7453 Private Bag 92019, Auckland 1142, New Zealand