Skip to main content

A Framework for Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNs)
RFC 4110

Revision differences

Document history

Date Rev. By Action
2022-12-24
00 (System) Received changes through RFC Editor sync (added Errata tag, added Verified Errata tag)
2015-10-14
00 (System) Notify list changed from , ,  to ,
2005-07-19
00 (System) Ballot writeup text was added
2005-07-19
00 (System) Last call text was added
2005-07-19
00 (System) Ballot approval text was added
2005-07-19
00 Amy Vezza State Changes to RFC Published from RFC Ed Queue by Amy Vezza
2005-07-19
00 Amy Vezza [Note]: 'RFC 4110' added by Amy Vezza
2005-07-15
00 (System) RFC published
2003-07-28
00 Thomas Narten ID renamed to draft-ietf-l3vpn-framework-00.txt
2003-07-28
00 Thomas Narten State Changes to RFC Ed Queue from Approved-announcement sent by Narten, Thomas
2003-07-22
00 (System) New version available: draft-ietf-l3vpn-framework-00.txt
2003-06-27
00 (System) IESG has approved the document
2003-05-29
00 Michael Lee State Changes to Approved-announcement sent from Approved-announcement to be sent by Lee, Michael
2003-05-23
00 Alex Zinin ready to go forward.
2003-05-23
00 Alex Zinin State Changes to Approved-announcement to be sent from IESG Evaluation  :: AD Followup by Zinin, Alex
2003-05-23
00 Alex Zinin
rfc-ed note:
----------------------------------------------
Section 4.2.1.1, 1st paragraph

Replace OLD:
  VPN configuration information could be
  entered into the network management application and distributed via …
rfc-ed note:
----------------------------------------------
Section 4.2.1.1, 1st paragraph

Replace OLD:
  VPN configuration information could be
  entered into the network management application and distributed via
  SNMP, XML, CLI, or other means to the remote sites.

With NEW:
  VPN configuration information could be
  entered into a network management application and distributed to the
  remote sites via the same means used to distribute other network
  management information.

----------------------------------------------
Section 4.3.6.2, 6th paragraph (5th item)

Replace OLD:
    An SP network which supports VPNs must do extensive IP address
    filtering at its borders to prevent spoofed packets from
    penetrating the VPNs.  An SP network which supports VPNs must do
    extensive IP address filtering at its borders to prevent spoofed
    packets from penetrating the VPNs.

With NEW:
    An SP network which supports VPNs must do extensive IP address
    filtering at its borders to prevent spoofed packets from
    penetrating the VPNs.

----------------------------------------------
Section 4.7.1, 4th paragraph

Replace OLD:
  Use of proprietary command-line interfaces is
  highly undesirable for this task, as they do not lend themselves to
  standard representations of managed objects.

With NEW:
  Use of proprietary command-line interfaces has
  the disadvantage that proprietary interfaces do not lend themselves
  to standard representations of managed objects.

----------------------------------------------
Section 5.2, 3rd paragraph

DELETE OLD:
  With layer 3 VPNs it is normal for PEs to have a physical link per
  VPN.  In this case the PEs which terminate the interworking interface
  have a tunnel per VPN.

----------------------------------------------
Intellectual Property, 1st paragraph

Replace OLD:
  The IETF has been notified of intellectual property rights claimed in
  regard to some or all of the specification contained in this
  document.  For more information consult the online list of claimed
  rights.

With NEW:
  The IETF takes no position regarding the validity or scope of any
  intellectual property or other rights that might be claimed to
  pertain to the implementation or use of the technology described in
  this document or the extent to which any license under such rights
  might or might not be available; neither does it represent that it
  has made any effort to identify any such rights.  Information on the
  IETF's procedures with respect to rights in standards-track and
  standards-related documentation can be found in BCP-11.  Copies of
  claims of rights made available for publication and any assurances of
  licenses to be made available, or the result of an attempt made to
  obtain a general license or permission for the use of such
  proprietary rights by implementors or users of this specification can
  be obtained from the IETF Secretariat.

  The IETF invites any interested party to bring to its attention any
  copyrights, patents or patent applications, or other proprietary
  rights which may cover technology that may be required to practice
  this standard.  Please address the information to the IETF Executive
  Director.

  The IETF has been notified of intellectual property rights claimed in
  regard to some or all of the specification contained in this
  document.  For more information consult the online list of claimed
  rights.
2003-05-23
00 Alex Zinin
The spec is tentatively approved subject to addressing the following editorial issues. An rfc-ed note is being prepared by the authors.

> In 4.2.1.1, "VPN …
The spec is tentatively approved subject to addressing the following editorial issues. An rfc-ed note is being prepared by the authors.

> In 4.2.1.1, "VPN configuration information could be
> entered into the network management application and distributed via
> SNMP, XML, CLI, or other means to the remote sites."
>
> I think this is confusing the formats and methods for entering
> data into the application and the distribution mechanism.  A
> command-line interface doesn't distribute anything, and XML
> is a data format, not a distribution protocol.
>
> In Section 4.3.6.2, one of the sentences related to security is
> repeated:
>
>      An SP network which supports VPNs must do extensive IP address
>      filtering at its borders to prevent spoofed packets from
>      penetrating the VPNs.  An SP network which supports VPNs must do
>      extensive IP address filtering at its borders to prevent spoofed
>      packets from penetrating the VPNs.
>
> In Section 5.2:
>
>
>    With layer 3 VPNs it is normal for PEs to have a physical link per
>    VPN.  In this case the PEs which terminate the interworking interface
>    have a tunnel per VPN.
>
> Is this a typo for "With layer 2 VPNs"?

the one above is rather a question...

> > - I find it amusing/strange to read on top of page 64:
> >    NMS system.  This must be achieved using standard
> protocols such as
> >    SNMP, XML, or LDAP.  Use of proprietary command-line
> interfaces is
> >    highly undesirable for this task, as they do not lend
> themselves to
> >    standard representations of managed objects.
> >  And then a few paragraphs down on same page:
> >    employed.  Examples of how this can be achieved include
> encrypted
> >    telnet sessions for CLI-based management, IPsec
> tunnels, or SNMP V3
> >    encryption for SNMP-based management.
> >  That is, the first para strongly discourages use of CLI while the
> >  other para lists as first item how to secure CLI-based management.

> - IPR section is NOT according to the sorts of IPR
>  sections that we normally see based on RFC2026 sect 10.4
>  2 paragraphs are missing
2003-05-23
00 Alex Zinin State Changes to IESG Evaluation  :: AD Followup from IESG Evaluation by Zinin, Alex
2003-05-08
00 Alex Zinin State Changes to IESG Evaluation from IESG Evaluation  :: Revised ID Needed by Zinin, Alex
2003-05-08
00 Alex Zinin -08 seems to address IESG comments.
2003-03-22
00 Alex Zinin taking over from Scott
2003-03-22
00 Alex Zinin Shepherding AD has been changed to Zinin, Alex from Bradner, Scott
2003-03-06
00 Scott Bradner 2003-03-06 - allison's comments were on ppvpn-requirements
2003-03-06
00 Scott Bradner
2003-03-06 - allison comments
4.6.1

  For TCP traffic, L3 PPVPN devices should support Random Early
  Detection (RED) to provide graceful degradation in the …
2003-03-06 - allison comments
4.6.1

  For TCP traffic, L3 PPVPN devices should support Random Early
  Detection (RED) to provide graceful degradation in the event of
  network congestion.

It would be very inappropriate for RED to work on TCP only!  This
must mean Internet traffic.

5.5.2

The document says that it goes with ITU Y.1311.1 in supporting
endpoint markings of DSCP to be preserved and not changed through
the SP network.  This is for genuine discussion:  how do we reconcile
this with the diffserv model?  We are raising two different models in
under the big IETF tent?  It seems potentially damaging to diffserv.

6.10.4 Security Considerations
  If a tunnel traverses multiple SP networks and it passes through an
  unsecured SP, POP, NAP, or IX, then security mechanisms must be
  employed.

This refers to the security requirements for QoS brokering inter-AS,
I believe.  It would be nice if the draft did not present the reader with
this empty statement but had some substantial suggestion about how to
provide an approach to securing the process, for instance by referencing
another part of the document.
2003-03-06
00 Scott Bradner
2003-03-06 - additional nit
In section 5.3 it mentions the followin:

    o globally unique addresses obtained by the customer from IANA

remove reference …
2003-03-06 - additional nit
In section 5.3 it mentions the followin:

    o globally unique addresses obtained by the customer from IANA

remove reference to IANA
2003-03-06
00 Scott Bradner State Changes to IESG Evaluation  :: Revised ID Needed from IESG Evaluation by Bradner, Scott
2003-03-06
00 Scott Bradner
2003-03-06 - note to WG chairs

see ID tracker - a revised ID is needed

fix teh number of authors

correct text on IPR statement …
2003-03-06 - note to WG chairs

see ID tracker - a revised ID is needed

fix teh number of authors

correct text on IPR statement (see rfc 2026 sec 10.4(D))

update LDAP references

fix SNMP V3
2003-03-06
00 Scott Bradner
2003-03-06 - bert comments

- Has some 9 or 10 people on front page ??!!

- Has twice (page 18), once on page 23

  …
2003-03-06 - bert comments

- Has some 9 or 10 people on front page ??!!

- Has twice (page 18), once on page 23

    The customer management function may use a combination of SNMP
    manager, directory service (e.g., LDAP [RFC1777] [RFC2251]), or
    proprietary network management system.
 
  RFC1777 is HISTORIC, so os this wise?

  In section 4.2.1.2 it even claims that LDAP [RFC1777] is standadard:

  used to distribute it.  LDAP [RFC1777] is a standard directory
  protocol which makes it possible to use a common mechanism for both

 
- I see them use "SNMPv3" but also "SNMP V3"
  That would be better done consistent with "SNMPv3"

- I find it amusing/strange to read on top of page 64:
    NMS system.  This must be achieved using standard protocols such as
    SNMP, XML, or LDAP.  Use of proprietary command-line interfaces is
    highly undesirable for this task, as they do not lend themselves to
    standard representations of managed objects.
  And then a few paragraphs down on same page:
    employed.  Examples of how this can be achieved include encrypted
    telnet sessions for CLI-based management, IPsec tunnels, or SNMP V3
    encryption for SNMP-based management.
  That is, the first para strongly discourages use of CLI while the
  other para lists as first item how to secure CLI-based management.

  Oh well..

- Is this the new form for an IPR statement??:
  Intellectual Property

  Intellectual property rights may have been claimed with regard to
  some of the techniques and mechanisms described in this framework
  document.  For more information consult the online list of claimed
  rights maintained by the IETF at http://www.ietf.org/ipr.html.

I always wonder when I read these sort of docs:

  MMMmmm... is this a FRAMEWORK ???
  Or just an overview of all sorts of different ways to do things?
2003-02-24
00 Scott Bradner 2003-02-20 - alex is ok with the current version
2003-02-24
00 Scott Bradner State Changes to IESG Evaluation from IESG Evaluation  :: Revised ID Needed by Bradner, Scott
2003-02-06
00 Scott Bradner
2003-02-06 - note from authors

As I announced on the PPVPN ML, the L3 framework design team submitted
draft-ietf-ppvpn-framework-07.txt as an update document. We believe …
2003-02-06 - note from authors

As I announced on the PPVPN ML, the L3 framework design team submitted
draft-ietf-ppvpn-framework-07.txt as an update document. We believe the
draft reflects all of your comments and our discussions about it.
We are confident that the draft is now achieved sufficient quality to
publish as an Info RFC. We are looking forward to hear your further
comments on it.

Thanks,

Muneyoshi Suzuki
2002-11-08
00 Scott Bradner 2002-11-08 - alex sent extensive comments to authors & wg chairs
2002-11-02
00 Scott Bradner
2002-11-02 - iesg discussion - comments to come
note to WG chairs

sorry - I should have seen this earlier - there are too many …
2002-11-02 - iesg discussion - comments to come
note to WG chairs

sorry - I should have seen this earlier - there are too many
authors on draft-ietf-ppvpn-framework - the current (and
for teh last 6 months) rules are a max of 5 - but most commonly
a doc of this type will have one or two editors and the rest of
the people get moved to the acknowledgements section or a new
contributor's section gets added for the other folk

see draft-ietf-mpls-generalized-cr-ldp for an example

I expect to get some specific IESG comments (I hope soon) on
teh document
2002-11-02
00 Scott Bradner by Bradner, Scott
2002-11-02
00 Scott Bradner State Changes to IESG Evaluation  :: Revised ID Needed from IESG Evaluation by Bradner, Scott
2002-10-30
00 Stephen Coya State Changes to IESG Evaluation  :: 0 from AD is watching by Coya, Steve
2002-07-30
00 Scott Bradner 2002-07-30 - message from Msrco - est - 2 months work
2002-07-30
00 Scott Bradner responsible has been changed to Working Group from IESG as a whole
2002-07-30
00 Scott Bradner
State Changes to In WG                                          …
State Changes to In WG                                            from New Version Needed (WG/Author)                    by sob
2002-07-29
00 Scott Bradner 2002-07-29 - IESG comments sent to WG chairs
2002-07-29
00 Scott Bradner A new comment added
by sob
2002-07-29
00 Scott Bradner
State Changes to New Version Needed (WG/Author)                    from Reading List              …
State Changes to New Version Needed (WG/Author)                    from Reading List                                      by sob
2002-06-21
00 Scott Bradner responsible has been changed to IESG as a whole from Working Group
2002-06-21
00 Scott Bradner 2002-06-20 - request to publish from Marco
2002-06-21
00 Scott Bradner Intended Status has been changed to Informational from None
2002-06-21
00 Scott Bradner
State Changes to Reading List                                      from In …
State Changes to Reading List                                      from In WG                                            by sob
2002-04-27
00 Scott Bradner Draft Added by Scott Bradner