A Framework for Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNs)
RFC 4110
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2022-12-24
|
00 | (System) | Received changes through RFC Editor sync (added Errata tag, added Verified Errata tag) |
2015-10-14
|
00 | (System) | Notify list changed from , , to , |
2005-07-19
|
00 | (System) | Ballot writeup text was added |
2005-07-19
|
00 | (System) | Last call text was added |
2005-07-19
|
00 | (System) | Ballot approval text was added |
2005-07-19
|
00 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2005-07-19
|
00 | Amy Vezza | [Note]: 'RFC 4110' added by Amy Vezza |
2005-07-15
|
00 | (System) | RFC published |
2003-07-28
|
00 | Thomas Narten | ID renamed to draft-ietf-l3vpn-framework-00.txt |
2003-07-28
|
00 | Thomas Narten | State Changes to RFC Ed Queue from Approved-announcement sent by Narten, Thomas |
2003-07-22
|
00 | (System) | New version available: draft-ietf-l3vpn-framework-00.txt |
2003-06-27
|
00 | (System) | IESG has approved the document |
2003-05-29
|
00 | Michael Lee | State Changes to Approved-announcement sent from Approved-announcement to be sent by Lee, Michael |
2003-05-23
|
00 | Alex Zinin | ready to go forward. |
2003-05-23
|
00 | Alex Zinin | State Changes to Approved-announcement to be sent from IESG Evaluation :: AD Followup by Zinin, Alex |
2003-05-23
|
00 | Alex Zinin | rfc-ed note: ---------------------------------------------- Section 4.2.1.1, 1st paragraph Replace OLD: VPN configuration information could be entered into the network management application and distributed via … rfc-ed note: ---------------------------------------------- Section 4.2.1.1, 1st paragraph Replace OLD: VPN configuration information could be entered into the network management application and distributed via SNMP, XML, CLI, or other means to the remote sites. With NEW: VPN configuration information could be entered into a network management application and distributed to the remote sites via the same means used to distribute other network management information. ---------------------------------------------- Section 4.3.6.2, 6th paragraph (5th item) Replace OLD: An SP network which supports VPNs must do extensive IP address filtering at its borders to prevent spoofed packets from penetrating the VPNs. An SP network which supports VPNs must do extensive IP address filtering at its borders to prevent spoofed packets from penetrating the VPNs. With NEW: An SP network which supports VPNs must do extensive IP address filtering at its borders to prevent spoofed packets from penetrating the VPNs. ---------------------------------------------- Section 4.7.1, 4th paragraph Replace OLD: Use of proprietary command-line interfaces is highly undesirable for this task, as they do not lend themselves to standard representations of managed objects. With NEW: Use of proprietary command-line interfaces has the disadvantage that proprietary interfaces do not lend themselves to standard representations of managed objects. ---------------------------------------------- Section 5.2, 3rd paragraph DELETE OLD: With layer 3 VPNs it is normal for PEs to have a physical link per VPN. In this case the PEs which terminate the interworking interface have a tunnel per VPN. ---------------------------------------------- Intellectual Property, 1st paragraph Replace OLD: The IETF has been notified of intellectual property rights claimed in regard to some or all of the specification contained in this document. For more information consult the online list of claimed rights. With NEW: The IETF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on the IETF's procedures with respect to rights in standards-track and standards-related documentation can be found in BCP-11. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementors or users of this specification can be obtained from the IETF Secretariat. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights which may cover technology that may be required to practice this standard. Please address the information to the IETF Executive Director. The IETF has been notified of intellectual property rights claimed in regard to some or all of the specification contained in this document. For more information consult the online list of claimed rights. |
2003-05-23
|
00 | Alex Zinin | The spec is tentatively approved subject to addressing the following editorial issues. An rfc-ed note is being prepared by the authors. > In 4.2.1.1, "VPN … The spec is tentatively approved subject to addressing the following editorial issues. An rfc-ed note is being prepared by the authors. > In 4.2.1.1, "VPN configuration information could be > entered into the network management application and distributed via > SNMP, XML, CLI, or other means to the remote sites." > > I think this is confusing the formats and methods for entering > data into the application and the distribution mechanism. A > command-line interface doesn't distribute anything, and XML > is a data format, not a distribution protocol. > > In Section 4.3.6.2, one of the sentences related to security is > repeated: > > An SP network which supports VPNs must do extensive IP address > filtering at its borders to prevent spoofed packets from > penetrating the VPNs. An SP network which supports VPNs must do > extensive IP address filtering at its borders to prevent spoofed > packets from penetrating the VPNs. > > In Section 5.2: > > > With layer 3 VPNs it is normal for PEs to have a physical link per > VPN. In this case the PEs which terminate the interworking interface > have a tunnel per VPN. > > Is this a typo for "With layer 2 VPNs"? the one above is rather a question... > > - I find it amusing/strange to read on top of page 64: > > NMS system. This must be achieved using standard > protocols such as > > SNMP, XML, or LDAP. Use of proprietary command-line > interfaces is > > highly undesirable for this task, as they do not lend > themselves to > > standard representations of managed objects. > > And then a few paragraphs down on same page: > > employed. Examples of how this can be achieved include > encrypted > > telnet sessions for CLI-based management, IPsec > tunnels, or SNMP V3 > > encryption for SNMP-based management. > > That is, the first para strongly discourages use of CLI while the > > other para lists as first item how to secure CLI-based management. > - IPR section is NOT according to the sorts of IPR > sections that we normally see based on RFC2026 sect 10.4 > 2 paragraphs are missing |
2003-05-23
|
00 | Alex Zinin | State Changes to IESG Evaluation :: AD Followup from IESG Evaluation by Zinin, Alex |
2003-05-08
|
00 | Alex Zinin | State Changes to IESG Evaluation from IESG Evaluation :: Revised ID Needed by Zinin, Alex |
2003-05-08
|
00 | Alex Zinin | -08 seems to address IESG comments. |
2003-03-22
|
00 | Alex Zinin | taking over from Scott |
2003-03-22
|
00 | Alex Zinin | Shepherding AD has been changed to Zinin, Alex from Bradner, Scott |
2003-03-06
|
00 | Scott Bradner | 2003-03-06 - allison's comments were on ppvpn-requirements |
2003-03-06
|
00 | Scott Bradner | 2003-03-06 - allison comments 4.6.1 For TCP traffic, L3 PPVPN devices should support Random Early Detection (RED) to provide graceful degradation in the … 2003-03-06 - allison comments 4.6.1 For TCP traffic, L3 PPVPN devices should support Random Early Detection (RED) to provide graceful degradation in the event of network congestion. It would be very inappropriate for RED to work on TCP only! This must mean Internet traffic. 5.5.2 The document says that it goes with ITU Y.1311.1 in supporting endpoint markings of DSCP to be preserved and not changed through the SP network. This is for genuine discussion: how do we reconcile this with the diffserv model? We are raising two different models in under the big IETF tent? It seems potentially damaging to diffserv. 6.10.4 Security Considerations If a tunnel traverses multiple SP networks and it passes through an unsecured SP, POP, NAP, or IX, then security mechanisms must be employed. This refers to the security requirements for QoS brokering inter-AS, I believe. It would be nice if the draft did not present the reader with this empty statement but had some substantial suggestion about how to provide an approach to securing the process, for instance by referencing another part of the document. |
2003-03-06
|
00 | Scott Bradner | 2003-03-06 - additional nit In section 5.3 it mentions the followin: o globally unique addresses obtained by the customer from IANA remove reference … 2003-03-06 - additional nit In section 5.3 it mentions the followin: o globally unique addresses obtained by the customer from IANA remove reference to IANA |
2003-03-06
|
00 | Scott Bradner | State Changes to IESG Evaluation :: Revised ID Needed from IESG Evaluation by Bradner, Scott |
2003-03-06
|
00 | Scott Bradner | 2003-03-06 - note to WG chairs see ID tracker - a revised ID is needed fix teh number of authors correct text on IPR statement … 2003-03-06 - note to WG chairs see ID tracker - a revised ID is needed fix teh number of authors correct text on IPR statement (see rfc 2026 sec 10.4(D)) update LDAP references fix SNMP V3 |
2003-03-06
|
00 | Scott Bradner | 2003-03-06 - bert comments - Has some 9 or 10 people on front page ??!! - Has twice (page 18), once on page 23 … 2003-03-06 - bert comments - Has some 9 or 10 people on front page ??!! - Has twice (page 18), once on page 23 The customer management function may use a combination of SNMP manager, directory service (e.g., LDAP [RFC1777] [RFC2251]), or proprietary network management system. RFC1777 is HISTORIC, so os this wise? In section 4.2.1.2 it even claims that LDAP [RFC1777] is standadard: used to distribute it. LDAP [RFC1777] is a standard directory protocol which makes it possible to use a common mechanism for both - I see them use "SNMPv3" but also "SNMP V3" That would be better done consistent with "SNMPv3" - I find it amusing/strange to read on top of page 64: NMS system. This must be achieved using standard protocols such as SNMP, XML, or LDAP. Use of proprietary command-line interfaces is highly undesirable for this task, as they do not lend themselves to standard representations of managed objects. And then a few paragraphs down on same page: employed. Examples of how this can be achieved include encrypted telnet sessions for CLI-based management, IPsec tunnels, or SNMP V3 encryption for SNMP-based management. That is, the first para strongly discourages use of CLI while the other para lists as first item how to secure CLI-based management. Oh well.. - Is this the new form for an IPR statement??: Intellectual Property Intellectual property rights may have been claimed with regard to some of the techniques and mechanisms described in this framework document. For more information consult the online list of claimed rights maintained by the IETF at http://www.ietf.org/ipr.html. I always wonder when I read these sort of docs: MMMmmm... is this a FRAMEWORK ??? Or just an overview of all sorts of different ways to do things? |
2003-02-24
|
00 | Scott Bradner | 2003-02-20 - alex is ok with the current version |
2003-02-24
|
00 | Scott Bradner | State Changes to IESG Evaluation from IESG Evaluation :: Revised ID Needed by Bradner, Scott |
2003-02-06
|
00 | Scott Bradner | 2003-02-06 - note from authors As I announced on the PPVPN ML, the L3 framework design team submitted draft-ietf-ppvpn-framework-07.txt as an update document. We believe … 2003-02-06 - note from authors As I announced on the PPVPN ML, the L3 framework design team submitted draft-ietf-ppvpn-framework-07.txt as an update document. We believe the draft reflects all of your comments and our discussions about it. We are confident that the draft is now achieved sufficient quality to publish as an Info RFC. We are looking forward to hear your further comments on it. Thanks, Muneyoshi Suzuki |
2002-11-08
|
00 | Scott Bradner | 2002-11-08 - alex sent extensive comments to authors & wg chairs |
2002-11-02
|
00 | Scott Bradner | 2002-11-02 - iesg discussion - comments to come note to WG chairs sorry - I should have seen this earlier - there are too many … 2002-11-02 - iesg discussion - comments to come note to WG chairs sorry - I should have seen this earlier - there are too many authors on draft-ietf-ppvpn-framework - the current (and for teh last 6 months) rules are a max of 5 - but most commonly a doc of this type will have one or two editors and the rest of the people get moved to the acknowledgements section or a new contributor's section gets added for the other folk see draft-ietf-mpls-generalized-cr-ldp for an example I expect to get some specific IESG comments (I hope soon) on teh document |
2002-11-02
|
00 | Scott Bradner | by Bradner, Scott |
2002-11-02
|
00 | Scott Bradner | State Changes to IESG Evaluation :: Revised ID Needed from IESG Evaluation by Bradner, Scott |
2002-10-30
|
00 | Stephen Coya | State Changes to IESG Evaluation :: 0 from AD is watching by Coya, Steve |
2002-07-30
|
00 | Scott Bradner | 2002-07-30 - message from Msrco - est - 2 months work |
2002-07-30
|
00 | Scott Bradner | responsible has been changed to Working Group from IESG as a whole |
2002-07-30
|
00 | Scott Bradner | State Changes to In WG … State Changes to In WG from New Version Needed (WG/Author) by sob |
2002-07-29
|
00 | Scott Bradner | 2002-07-29 - IESG comments sent to WG chairs |
2002-07-29
|
00 | Scott Bradner | A new comment added by sob |
2002-07-29
|
00 | Scott Bradner | State Changes to New Version Needed (WG/Author) from Reading List … State Changes to New Version Needed (WG/Author) from Reading List by sob |
2002-06-21
|
00 | Scott Bradner | responsible has been changed to IESG as a whole from Working Group |
2002-06-21
|
00 | Scott Bradner | 2002-06-20 - request to publish from Marco |
2002-06-21
|
00 | Scott Bradner | Intended Status has been changed to Informational from None |
2002-06-21
|
00 | Scott Bradner | State Changes to Reading List from In … State Changes to Reading List from In WG by sob |
2002-04-27
|
00 | Scott Bradner | Draft Added by Scott Bradner |