Internet Engineering Task ForceLuca(IETF) L. MartiniInternet Draft SamerRequest for Comments: 7275 S. SalamIntended status:Category: Standards TrackAliA. SajassiExpires: September 27, 2014ISSN: 2070-1721 CiscoMatthewM. BocciSatoru MatsushimaAlcatel-Lucent S. Matsushima SoftbankThomasTelecom T. Nadeau BrocadeMarch 27,June 2014 Inter-Chassis Communication Protocol forL2VPN PELayer 2 Virtual Private Network (L2VPN) Provider Edge (PE) Redundancydraft-ietf-pwe3-iccp-16.txt Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on September 27, 2014Abstract This document specifies aninter-chassis communication protocolInter-Chassis Communication Protocol (ICCP) that enables Provider Edge (PE) device redundancy for Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS) applications. The protocol runs within a set of two or more PEs, forming aredundancy group,Redundancy Group, for the purpose of synchronizing dataamongstamong the systems. It accommodates multi-chassis attachment circuit redundancy mechanisms as well as pseudowire redundancy mechanisms. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7275. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside thesystems. It accommodates multi-chassis attachment circuit as wellIETF Standards Process, except to format it for publication aspseudowire redundancy mechanisms.an RFC or to translate it into languages other than English. Table of Contents11. Introduction ....................................................5 2. Specification of Requirements........................ 5 2 Introduction ......................................... 5 3...................................5 3. ICCP Overview........................................ 5 3.1...................................................5 3.1. Redundancy Model&and Topology.......................... 5 3.2..............................5 3.2. ICCP Interconnect Scenarios.......................... 7 3.2.1................................7 3.2.1. Co-located Dedicated Interconnect.................... 7 3.2.2...................7 3.2.2. Co-located Shared Interconnect....................... 8 3.2.3......................8 3.2.3. Geo-redundant Dedicated Interconnect................. 8 3.2.4................8 3.2.4. Geo-redundant Shared Interconnect.................... 9 3.3...................9 3.3. ICCP Requirements.................................... 10 4.........................................10 4. ICC LDP Protocol Extension Specification............. 12 4.1.......................11 4.1. LDP ICCP Capability Advertisement.................... 13 4.2.........................12 4.2. RG Membership Management............................. 13 4.2.1..................................12 4.2.1. ICCP Connection State Machine........................ 14 4.3......................13 4.3. Redundant Object Identification...................... 17 4.4...........................17 4.4. Application Connection Management.................... 17 4.4.1.........................17 4.4.1. Application Versioning............................... 18 4.4.2.............................18 4.4.2. Application Connection State Machine................. 19 4.5...............19 4.5. Application Data Transfer............................ 22 4.6.................................22 4.6. Dedicated Redundancy Group LDPsession ............... 22 5Session ....................22 5. ICCP PE Node Failure / Isolation Detection Mechanism. 23 6...........22 6. ICCP Message Formats................................. 24 6.1...........................................23 6.1. Encoding ICC into LDP Messages...................... 24 6.1.1............................23 6.1.1. ICC Header........................................... 24 6.1.2.........................................24 6.1.2. ICC Parameter Encoding............................... 26 6.1.3.............................26 6.1.3. Redundant Object Identifier Encoding................. 27 6.2...............27 6.2. RG Connect Message................................... 28 6.2.1........................................27 6.2.1. ICC Sender Name TLV.................................. 29 6.3................................28 6.3. RG Disconnect Message................................ 29 6.4.....................................29 6.4. RG Notification Message.............................. 32 6.4.1...................................31 6.4.1. Notification Message TLVs............................ 32 6.5..........................32 6.5. RG Application Data Message.......................... 36 7...............................35 7. Application TLVs..................................... 36 7.1...............................................35 7.1. Pseudowire Redundancy (PW-RED) Application TLVs...... 36 7.1.1...........35 7.1.1. PW-RED Connect TLV................................... 36 7.1.2.................................36 7.1.2. PW-RED Disconnect TLV................................ 37 7.1.2.1..............................37 7.1.2.1. PW-RED Disconnect Cause TLV.......................... 38 7.1.3...............38 7.1.3. PW-RED Config TLV.................................... 39 7.1.3.1..................................39 7.1.3.1. Service Name TLV..................................... 41 7.1.3.2..........................41 7.1.3.2. PW ID TLV............................................ 42 7.1.3.3.................................42 7.1.3.3. Generalized PW ID TLV................................ 43 7.1.4.....................43 7.1.4. PW-RED State TLV..................................... 44 7.1.5...................................44 7.1.5. PW-RED Synchronization Request TLV................... 45 7.1.6.................45 7.1.6. PW-RED Synchronization Data TLV...................... 47 7.2 Multi-chassis....................46 7.2. Multi-Chassis LACP (mLACP) Application TLVs.......... 48 7.2.1...............48 7.2.1. mLACP Connect TLV.................................... 48 7.2.2..................................48 7.2.2. mLACP Disconnect TLV................................. 49 7.2.2.1...............................49 7.2.2.1. mLACP Disconnect Cause TLV........................... 50 7.2.3................50 7.2.3. mLACP System Config TLV.............................. 50 7.2.4............................51 7.2.4. mLACP Aggregator Config TLV.......................... 51 7.2.5........................52 7.2.5. mLACP Port Config TLV................................ 53 7.2.6..............................54 7.2.6. mLACP Port Priority TLV.............................. 55 7.2.7............................56 7.2.7. mLACP Port State TLV................................. 57 7.2.8...............................58 7.2.8. mLACP Aggregator State TLV........................... 59 7.2.9.........................60 7.2.9. mLACP Synchronization Request TLV.................... 61 7.2.10..................61 7.2.10. mLACP Synchronization Data TLV....................... 63 8....................63 8. LDP Capability Negotiation........................... 64 9.....................................65 9. Client Applications.................................. 65 9.1............................................66 9.1. Pseudowire Redundancy Application Procedures......... 65 9.1.1..............66 9.1.1. Initial Setup........................................ 66 9.1.2......................................66 9.1.2. Pseudowire Configuration Synchronization............. 66 9.1.3...........66 9.1.3. Pseudowire Status Synchronization.................... 67 9.1.3.1..................67 9.1.3.1. Independent Mode..................................... 68 9.1.3.2..........................69 9.1.3.2. Master/Slave Mode.................................... 69 9.1.4.........................69 9.1.4. PE Node Failure or Isolation......................... 69 9.2.......................70 9.2. Attachment Circuit Redundancy Application Procedures. 70 9.2.1......70 9.2.1. Common AC Procedures................................. 70 9.2.1.1...............................70 9.2.1.1. AC Failure........................................... 70 9.2.1.2................................70 9.2.1.2. Remote PE Node Failure or Isolation.................. 70 9.2.1.3.......70 9.2.1.3. Local PE Isolation................................... 70 9.2.1.4........................71 9.2.1.4. Determining Pseudowire State......................... 71 9.2.2 Multi-chassis..............71 9.2.2. Multi-Chassis LACP (mLACP) Application Procedures.... 71 9.2.2.1..72 9.2.2.1. Initial Setup........................................ 71 9.2.2.2.............................72 9.2.2.2. mLACP Aggregator and Port Configuration.............. 73 9.2.2.3...74 9.2.2.3. mLACP Aggregator and Port Status Synchronization..... 74 9.2.2.4...........................75 9.2.2.4. Failure and Recovery................................. 76 10......................77 10. Security Considerations.............................. 77 11.......................................78 11. Manageability Considerations......................... 78 12..................................79 12. IANA Considerations.................................. 78 12.1 MESSAGE TYPE NAME SPACE .............................. 78 12.2...........................................79 12.1. Message Type Name Space ..................................79 12.2. TLVTYPE NAME SPACE .................................. 78 12.3Type Name Space ......................................79 12.3. ICC RG Parameter Type Space.......................... 79 12.4 STATUS CODE NAME SPACE ............................... 80 13..............................80 12.4. Status Code Name Space ...................................81 13. Acknowledgments...................................... 80 14...............................................81 14. References ....................................................81 14.1. Normative References................................. 80 15.....................................81 14.2. Informative References............................... 81 16 Author's Addresses ................................... 81...................................82 1.Specification of Requirements The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119. 2.Introduction Network availability is a critical metric for serviceprovidersproviders, as it has a direct bearing on their profitability. Outages translate not only to lost revenue but also to potential penalties mandated by contractual agreements with customers running mission-critical applications that require tightSLAs.Service Level Agreements (SLAs). This is true for any carrier network, and networks employing Layer 2 Virtual Private Network (L2VPN) technology are no exception.Network high-availabilityA high degree of network availability can be achieved by employingintraintra- and inter-chassis redundancy mechanisms. The focus of this document is on the latter.TheThis document defines an Inter-Chassis Communication Protocol (ICCP) that allows synchronization of state and configuration data between a set of two or more Provider Edge nodes (PEs) forming a Redundancy Group (RG). The protocol supports multi-chassis redundancy mechanisms that can be employed on either the attachment circuits orpseudowires.pseudowires (PWs). A formal definition of the termchassis"chassis" can be found in [RFC2922]. For the purpose of this document, a chassis is an L2VPN PE node. This document assumes that it is normal to run the Label Distribution Protocol (LDP) between the PEs in the RG, and that LDP components will in any case be present on the PEs to establish and maintain pseudowires. Therefore, ICCP is built as a secondary protocol running within LDP and taking advantage of the LDP session mechanismsandas well as the underlying TCP transport mechanisms and TCP-based security mechanisms already necessary for LDP operation. 2. Specification of Requirements The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 3. ICCP Overview 3.1. Redundancy Model&and Topology The focus of this document is on PE node redundancy. It is assumed that a set of two or more PE nodes are designated by the operator to forma Redundancy Group (RG).an RG. Members ofa Redundancy Groupan RG fall under a single administration(e.g.(e.g., service provider) and employ a common redundancy mechanism towards the access (attachment circuits or access pseudowires) and/or towards the core (pseudowires) for any given service instance. It is possible, however, for members of an RG to make use of disparate redundancy mechanisms for disjoint services. The PE devices may be offering any type of L2VPN service,i.e. VPWSi.e., Virtual Private Wire Service (VPWS) orVPLS.Virtual Private LAN Service (VPLS). As a matter of fact, the use of ICCP may even be applicable for Layer 3 service redundancy, but this is considered to be outside the scope of this document. The PEs in an RG offer multi-homed connectivity to either individual devices(e.g. CE, DSLAM, etc...)(e.g., Customer Edge (CE), Digital Subscriber Line Access Multiplexer (DSLAM)) or entire networks(e.g.(e.g., access network). Figure 1 below depicts the model. +=================+ | |Mutli-homedMulti-homed +----+ | +-----+ | Node ------------> | CE |-------|--| PE1 ||<------|---Pseudowire-->| | |--+ -|--| ||<------|---Pseudowire-->| +----+ | / | +-----+ | | / | || | |/ | || ICCP |--> Towards Core +-------------+ / | || | | | /| | +-----+ | | Access |/ +----|--| PE2 ||<------|---Pseudowire-->| | Network |-------|--| ||<------|---Pseudowire-->| | | | +-----+ | | | | | +-------------+ | Redundancy | ^ | Group | | +=================+ | Multi-homed Network Figure 1: GenericMulti-chassisMulti-Chassis Redundancy Model In the topologyofshown in Figure 1, the redundancy mechanism employed towards the access node/network can be one of a multitude of technologies,e.g.e.g., it could be IEEE 802.1AX Link Aggregation Groups with the Link Aggregation Control Protocol(LACP),(LACP) orSONET APS.Synchronous Optical Network Automatic Protection Switching (SONET APS). The specifics of the mechanism areout ofoutside the scope of this document. However, it is assumed that the PEs in the RG are required to communicateamongstwith each other in order for the access redundancy mechanism to operate correctly. As such, it is requiredto runthat an inter-chassis communication protocol among the PEs in the RG be run in order to synchronize configuration and/or running state data. Furthermore, the presence of the inter-chassis communication channel allows simplification of the pseudowire redundancy mechanism. This is primarily because it allows the PEs within an RG to run some arbitration algorithm to elect which pseudowire(s) should be in active or standby mode for a given service instance. The PEs can then advertise the outcome of the arbitration to the remote-end PE(s), as opposed to having to embed ahand-shakehandshake procedure into the pseudowire redundancy status communicationmechanism, andmechanism as well as every other possible Layer 2 status communication mechanism. 3.2. ICCP Interconnect Scenarios When referring to'interconnect'"interconnect" in this section, we are concerned with the links or networks over which Inter-Chassis Communication Protocol messages are transported, and not normal data traffic between PEs. The PEswhichthat are members of an RG may be either physically co-located or geo-redundant. Furthermore, the physical interconnect between the PEs over which ICCP is to run may compriseofeither dedicated back-to-back links or a shared connection through the packet switched network(PSN); for(PSN), e.g., MPLS core network. This gives rise to a matrix of four interconnect scenarios, as describednext.in the following subsections. 3.2.1. Co-located Dedicated Interconnect In this scenario, the PEs within an RG are co-located in the same physical location,e.g.e.g., point of presence (POP) or central office (CO). Furthermore, dedicated links provide the interconnect for ICCP among the PEs. +=================+ +-----------------+ |CO | | | | +-----+ | | | | | PE1 |________|_____| | | | | | | | | +-----+ | | | | || | | | | || ICCP | | Core | | || | | Network | | +-----+ | | | | | PE2 |________|_____| | | | | | | | | +-----+ | | | | | | | +=================+ +-----------------+ Figure 2: ICCP Co-located PEs Dedicated Interconnect Scenario Given that the PEs are connected back-to-back in this case, it is possible to rely on Layer 2 redundancy mechanisms to guarantee the robustness of the ICCP interconnect. For example, if the interconnect comprisesofIEEE 802.3 Ethernet links, it is possible to provide link redundancy by means of IEEE 802.1AX Link Aggregation Groups. 3.2.2. Co-located Shared Interconnect In this scenario, the PEs within an RG are co-located in the same physical location (POP, CO). However, unlike the previous scenario, there are no dedicated links between the PEs. The interconnect for ICCP is provided through the core network to which the PEs are connected. Figure 3 depicts this model. +=================+ +-----------------+ |CO | | | | +-----+ | | | | | PE1 |________|_____| | | | |<=================+ | | +-----+ ICCP | | || | | | | || | | | | || Core | | | | || Network | | +-----+ | | || | | | PE2 |________|_____| || | | | |<=================+ | | +-----+ | | | | | | | +=================+ +-----------------+ Figure 3: ICCP Co-located PEs Shared Interconnect Scenario Given that the PEs in the RG are connected over thepacket switched network (PSN), thenPSN, PSN Layer mechanisms can be leveraged to ensure the resiliency of the interconnect against connectivity failures. For example, it is possible to employ RSVPLSPsLabel Switched Paths (LSPs) with FastRe-RouteReroute (FRR) and/or end-to-end backup LSPs. 3.2.3. Geo-redundant Dedicated Interconnect In this variation, the PEs withina Redundancy Groupan RG are located in different physical locations to provide geographic redundancy. This may be desirable, for example, to protect against natural disasters or the like. A dedicated interconnect is provided to link thePEs, whichPEs. This is a costly option, especially when considering the possibility of providing multiple such links for interconnect robustness. The resiliency mechanisms for the interconnect are similar to those highlighted in the co-located interconnect counterpart. +=================+ +-----------------+ |CO 1 | | | | +-----+ | | | | | PE1 |________|_____| | | | | | | | | +-----+ | | | +=====||==========+ | | || ICCP | Core | +=====||==========+ | Network | | +-----+ | | | | | PE2 |________|_____| | | | | | | | | +-----+ | | | |CO 2 | | | +=================+ +-----------------+ Figure 4: ICCP Geo-redundant PEs Dedicated Interconnect Scenario 3.2.4. Geo-redundant Shared Interconnect In this scenario, the PEs of an RG are located in different physical locations and the interconnect for ICCP is provided over the PSN network to which the PEs are connected. This interconnect option is more likely to be the one used forgeo-redundancygeo-redundancy, as it is more economically appealing compared to the geo-redundant dedicatedinterconnect.interconnect option. The resiliency mechanisms that can be employed to guarantee the robustness of the ICCP transport are PSN Layermechanismsmechanisms, ashas beendescribed inthe "Co-located Shared Interconnect" sectionSection 3.2.2 above. +=================+ +-----------------+ |CO 1 | | | | +-----+ | | | | | PE1 |________|_____| | | | |<=================+ | | +-----+ ICCP | | || | +=================+ | || | | || Core | +=================+ | || Network | | +-----+ | | || | | | PE2 |________|_____| || | | | |<=================+ | | +-----+ | | | |CO 2 | | | +=================+ +-----------------+ Figure 5: ICCP Geo-redundant PEs Shared Interconnect Scenario 3.3. ICCP Requirements The requirements for theInter-chassisInter-Chassis Communication Protocol are as follows:-i.i. ICCP MUSTProvideprovide a control channel for communication between PEs in a Redundancy Group (RG). PE nodes may beco- locatedco-located or remote (refer to"Interconnect Scenarios" sectionSection 3.2 above). Client applicationswhichthat make use of ICCP services MUST only use this channel to communicate control information and notdata-traffic.data traffic. Assuchsuch, the protocol SHOULDcater forprovide relatively low bandwidth,low-delaylow delay, and highly reliable message transfer.-ii.ii. ICCP MUST accommodate multiple client applications(e.g.(e.g., multi-chassis LACP, PW redundancy, SONETAPS, etc...).APS). This implies that the messages SHOULD be extensible(e.g. TLV- based)(e.g., TLV-based), and the protocol SHOULD provide a robust application registration and versioning scheme.-iii.iii. ICCP MUST provide reliable message transport and in-order delivery between nodes inaan RG with secure authentication mechanisms built into the protocol. The redundancy applications that are clients of ICCP expect reliable messagetransfer,transfer and as such will assume that the protocol takes care offlow-controlflow control and retransmissions. Furthermore, given that the applications will rely on ICCP to communicate data used to synchronizestate-machinesstate machines on disparate nodes, it is critical that ICCP guarantees in-order message delivery. Loss of messages or out-of-sequence messages would have adverseside-effects toeffects on the operation of the client applications.-iv.iv. ICCP MUST provide a common mechanism to actively monitor the health of PEs in an RG. This mechanism will be used to detect PE node failure (or isolation from the MPLS network in the case of sharedinterconnect),interconnect) and inform the client applications. The applications requirethis tothat the mechanism trigger failover according to the procedures of theemployedredundancy protocol employed on theACattachment circuit (AC) and PW. The solution SHOULD achieve sub-second detection of loss of remote node(~ 50 - 150(~50-150 msec) in order to give the client applications (redundancy mechanisms) enough reaction time to achieve sub-second service restorationtime.s -v.times. v. ICCP SHOULD provide asynchronous event-driven state update, independent of periodic messages, for immediate notification of client applications' state changes. In other words, the transmission of messages carrying application data SHOULD be on-demand rather than timer-based to minimize inter-chassis state synchronization delay.-vi.vi. ICCP MUST accommodate multi-link and multi-hopinterconnectinterconnects between nodes. When the devices within an RG are located in different physical locations, the physical interconnect between them will compriseofa network rather than a link. As such, ICCP MUST accommodate the case where the interconnect involves multiple hops. Furthermore, it is possible to have multiple (redundant) paths or interconnects between a given pair of devices. This is true for both the co-located and geo-redundant scenarios. ICCP MUST handle this as well.-vii.vii. ICCP MUST ensure transport security between devices in an RG. This is especially important in the scenario where the members of an RG are located in different physical locations and connected over a shared network(e.g.(e.g., PSN). In particular, ICCP MUST NOT accept connections arbitrarily from any device; otherwise, the state of client applications might be compromised. Furthermore, even if an ICCP connection request appears to come from an eligible device, its source address may have been spoofed. Therefore, some means of preventing source address spoofing MUST be in place.-viii.viii. ICCP MUST allow the operator to statically configure members of an RG. Auto-discovery may be considered in the future.-ix.ix. ICCP SHOULD allow for flexible RG membership. It is expected that only two nodesperin an RG will cover most of the redundancy applications for common deployments. ICCP SHOULD NOT preclude supporting more than two nodes in an RG by virtue of design. Furthermore, ICCP MUST allow a single node to be a member of multiple RGs simultaneously. 4. ICC LDP Protocol Extension Specification To address the requirements identified in the previous section, ICCP is modeled to compriseofthree layers:-i.i. Application Layer: This provides the interface to the various redundancy applications that make use of the services of ICCP. ICCP is concerned with defining common connection management procedures and the formats of the messages exchanged at this layer; however, beyond that, it does not impose any restrictions on the procedures orstate-machinesstate machines of the clients, as these are deemedapplication-specificapplication specific and lie outside the scope of ICCP. This guarantees implementationinter-operabilityinteroperability without placing any unnecessary constraints on internal design specifics.-ii. Inter Chassisii. Inter-Chassis Communication (ICC) Layer: This layer implements the common set of serviceswhichthat ICCP offers to the client applications. It handles protocol versioning, RG membership, Redundant Object identification, PE nodeidentificationidentification, and ICCP connection management.-iii.iii. Transport Layer: This layer provides the actual ICCP message transport. It is responsible for addressing, route resolution,flow-control,flow control, reliable and in-order message delivery, connectivityresiliency/redundancy and finallyresiliency/redundancy, and, finally, PE node failure detection. The Transport layer maydifferdiffer, depending on the Physical Layer of theinter-connect.interconnect. 4.1. LDP ICCP Capability Advertisement When an RG is enabled on a particular PE, an LDP sessionMUST be createdto every remote PE in thatRG,RG MUST be created, if one does not already exist.Then, theThe capability of supporting ICCP MUST then be advertised to all of those LDP peers in that RG. This is achieved by using the methods described in [RFC5561] and advertising theICCP LDP"ICCP capabilityTLV.TLV". If an LDP peer supports the dynamic capability advertisement, this can be done by sending a new capability message with theS bitS-bit set for theICCP"ICCP capabilityTLVTLV" when the first RG is enabled on the PE. If the peer does not support dynamic capabilityadvertisement,advertisements, then theICCP TLV"ICCP TLV" MUST be included in the LDP initialization procedures in the capability parameter [RFC5561]. 4.2. RG Membership Management ICCP defines a mechanism that enables PE nodes to manage their RG membership. When a PE is configured to be a member of an RG, it will first advertise the ICCP capability to its peers. Subsequently, the PE sends anRG Connect"RG Connect" message to the peers that have also advertised ICCP capability. The PE then waits for the peers to send their ownRG Connect"RG Connect" messages, if they haven't done so already. For a given RG, the ICCP connection between two devices is considered to be operational only when both devices have sent and received ICCPRG Connect"RG Connect" messages for that RG. If a PE that has sent a particularRG Connect"RG Connect" message doesn't receive a corresponding RG Connect (or a Notification message rejecting the connection) from a destination, it will remain in a state of expecting the correspondingRG Connect"RG Connect" message (or Notification message). The RG will not become operational until the correspondingRG Connect Message"RG Connect" message has been received. If a PE that has sent anRG Connect"RG Connect" message receives a Notification message rejecting the connection, with a NAK TLV(section(Negative Acknowledgement TLV) (Section 6.4.1), it will stop attempting to bring up the ICCP connection immediately. A device MUST reject an incomingRG Connect"RG Connect" message if at least one of the following conditions is satisfied:-i.i. the PE is not a member of the RG;-ii.ii. the maximum number of simultaneous ICCP connections that the PE can handle is exceeded. Otherwise, the PE MUST bring up the connection by responding to the incomingRG Connect"RG Connect" message with an appropriate RG Connect. A PE sends anRG Disconnect"RG Disconnect" message to tear down the ICCP connection for a given RG. This is a unilateral operation and doesn't require any acknowledgement from the other PEs. Note that the ICCP connection for an RG MUST be operational before any client application can make use of ICCP services in that RG. 4.2.1. ICCP Connection State Machine A PE maintains an ICCP ConnectionState Machinestate machine instance for every ICCP connection with a remote peer in the RG. This state machine is separate from any Application ConnectionState Machine (sectionstate machine (Section 4.4.2). The ICCP ConnectionState Machinestate machine reacts only toRG Connect, RG Disconnect"RG Connect", "RG Disconnect", andRG Notification"RG Notification" messages that do not contain anyApplication TLVs."Application TLVs". Actions and state transitions in the Application Connection state machines have no effect on the ICCP ConnectionState Machine.state machine. The ICCP Connection state machine is defined to have sixstatesstates, as follows:-NON EXISTENT:- NONEXISTENT: This state is the starting point for the statemachine.Itmachine. It indicates that no ICCP connection exists and that there's no LDP session established between the PEs.-INITIALIZED:- INITIALIZED: This state indicates that an LDP session exists between the PEs but LDP ICCPCapabilitiy havecapability information has not yet been exchanged between them.-CAPSENT:- CAPSENT: This state indicates that an LDP session exists between the PEs and that the local PE hasavertizedadvertised LDP ICCPCapabilitycapability to its peer.-CAPREC:- CAPREC: This state indicates that an LDP session exists between the PEs and that the local PE has both received andavertizedadvertised LDP ICCPCapabilitycapability from/to its peer.-CONNECTING:- CONNECTING: This state indicates that the local PE has initiated an ICCP connection to itspeer,peer and is awaiting its response.-OPERATIONAL:- OPERATIONAL: This state indicates that the ICCP connection is operational. The state transition table and state transition diagram follow. ICCP Connection State Transition Table STATE EVENT NEW STATENON EXISTENT-------------------------------------------------------------------- NONEXISTENT LDP session established INITIALIZED INITIALIZED Transmit LDP ICCPCapabilitycapability CAPSENT Receive LDP ICCPCapabilitycapability CAPREC Action: Transmit LDP ICCPCapabilitycapability LDP session torn downNON EXISTENTNONEXISTENT CAPSENT Receive LDP ICCPCapabilitycapability CAPREC LDP session torn downNON EXISTENTNONEXISTENT CAPREC Transmit RG ConnectMessagemessage CONNECTING Receive acceptable RG ConnectMessagemessage OPERATIONAL Action: Transmit RG ConnectMessagemessage Receive any other ICCPMessagemessage CAPREC Action: Transmit NAK TLV in RG NotificationMessagemessage LDP session torn downNON EXISTENTNONEXISTENT CONNECTING Receive acceptable RG ConnectMessagemessage OPERATIONAL Receive any other ICCPMessagemessage CAPREC Action: Transmit NAK TLV in RG NotificationMessagemessage LDP session torn downNON EXISTENTNONEXISTENT OPERATIONAL Receive acceptable RG DisconnectMessagemessage CAPREC Transmit RG DisconnectMessagemessage CAPREC LDP session torn downNON EXISTENTNONEXISTENT ICCP Connection State Transition Diagram +------------+ | |+------------------>|NON EXISTENT|+------------------>|NONEXISTENT | LDP session torn down | | |<--------------------------+ | +------------+ | | LDP session | ^ LDP session | | established | | torn down | | V | | | +-----------+ | LDP | | | Tx LDP ICCP | session| |INITIALIZED| capability | torn | +---| |---------------+ | down | Rx other | +-----------+ | | | ICCP msg/ |Rx LDP ICCP | | | Tx NAK TLV | capability/ | | | +---+ |Tx LDP ICCP capability | | | | | | | | | V | V V | | +-----------+ Rx LDP ICCP +--------+ | +---| | capability | | | |CAPREC |<----------------------|CAPSENT |---------->+ +---| |-------------------+ | | | | +-----------+ | +--------+ | | ^ ^ | | Tx | | | | | RG | | |Rx RG Disconnect msg | | Connect| | | or |Rx RG Connectmsg /msg/ |Msgmsg | | |Tx RG Disconnect msg | Tx RG Connect msg | | | | V | | | | +------------+ | | | +--------------------| | | | | |OPERATIONAL |------------>+ | | | | | | |Rx other ICCP msg/ +------------+ | | | Tx NAK TLV ^ | | | | | | +----------+ Rx RG Connect msg | | | | |---------------------+ | +----->|CONNECTING| | | |----------------------------------------->+ +----------+ 4.3. Redundant Object Identification ICCP offers its client applications a uniform mechanism for identifying links, ports, forwardingconstructs andconstructs, and, moregenerallygenerally, objects(e.g.(e.g., interfaces, pseudowires,VLANs, etc...)VLANs) that are being protected in a redundant setup. These are referred to as Redundant Objects(RO).(ROs). An example of an RO is a multi-chassislink-aggregationlink- aggregation group that spans two PEs. ICCP introduces a 64-bit opaque identifier to uniquely identify ROs in an RG. This identifier, referred to as the Redundant Object ID (ROID), MUST match between RG members for the protected object inquestion. Thatquestion; this allows separate systems in an RG to use a common handle to reference the protectedentityentity, irrespective of its nature(e.g.(e.g., physical or virtual) and in a manner that is agnostic to implementation specifics. Client applications that need to synchronize state pertaining to a particular RO SHOULD embed the corresponding ROID in their TLVs. 4.4. Application Connection Management ICCP provides a common set of procedures by which applications on one PE can connect to their counterparts on another PE, for the purpose of inter-chassis communication in the context of a given RG. The prerequisite for establishing anapplication connectionApplication Connection is to have an operational ICCP RG connection between the two endpoints. It is assumed that the association of applications with RGs is known a priori,e.g.e.g., by means of device configuration. ICCP then sends anApplication-specific"Application ConnectTLVTLV" (carried inRG Connectan "RG Connect" message), on behalf of each client application, to each remote PE within the RG. The client may piggyback application-specific information in thatConnect TLV, which"Connect TLV", which, forexampleexample, can be used to negotiate parameters or attributes prior to bringing up the actualapplication connection.Application Connection. The procedures for bringing up theapplication connectionApplication Connection are similar to those of the ICCP connection:An application connectionan Application Connection between two nodes is up only when both nodes have sent and receivedRG Connect Messages"RG Connect" messages with the properApplication-specific"Application ConnectTLVs.TLVs". A PE MUST send a NotificationMessagemessage to reject anapplication connectionApplication Connection request if one of the following conditions is encountered:-i.i. the application doesn't exist or is not configured for that RG;-ii.ii. theapplication connectionApplication Connection count exceeds the PE's capabilities. When a PE receives such a rejection notification, it MUST stop attempting to bring up theapplication connectionApplication Connection until it receives a newapplication connectionApplication Connection request from the remote PE. This is done by responding to the incomingRG Connect"RG Connect" message (carrying anApplication-specific"Application ConnectTLV)TLV") with an appropriateRG Connect"RG Connect" message (carrying a correspondingApplication-specific"Application ConnectTLV).TLV"). When an application is stopped on a device or it is no longer associated with an RG, it MUST signal ICCP to trigger sending anApplication-specific"Application DisconnectTLVTLV" (in theRG Disconnect"RG Disconnect" message). This is a unilateral notification to the other PEs within anRG,RG and as such doesn't trigger any response. 4.4.1. Application Versioning Duringapplication connection setup time,Application Connection setup, a given application on one PE can negotiate with its counterpart on a peer PE the proper application version to use for communication. If no common version is agreed upon, then theapplication connectionApplication Connection is not brought up. This is achieved through the following set of rules: - If an application receives anApplication-specific"Application ConnectTLVTLV" with a version number that is higher than its own, it MUST send a Notification message with aNAK TLV"NAK TLV" indicating status code "Incompatible Protocol Version" and supplying the version that is locally supported by the PE. - If an application receives anApplication-specific"Application ConnectTLVTLV" with a version number that is lower than its own, it MAY respond with an RG Connect that has anApplication-specific"Application ConnectTLVTLV" using the same version that was received. Alternatively, the application MAY respond with a Notification message to reject the request using the "Incompatible Protocol Version"code,code andsupplyingsupply the version that is supported.The aboveThis allows an application to operate in eitherbackwards compatiblebackwards-compatible or incompatible mode. - If an application receives anApplication-specific"Application ConnectTLVTLV" with a version that is equal to its own, then the application MUST honor or reject the request based on whether the application is configured for the RG in question, and whether or not theapplication connectionApplication Connection count has been exceeded. 4.4.2. Application Connection State Machine A PE maintainsanone Application ConnectionState Machinestate machine instance per ICCP application for every ICCP connection with a remote PE in the RG. Each application's state machine reacts only to theRG Connect, RG Disconnect"RG Connect", "RG Disconnect", andRG Notification"RG Notification" messages that contain anApplication TLV"Application TLV" specifying that particular application. The Application Connection state machine has sixstatesstates, as follows:-NON EXISTENT:- NONEXISTENT: This state indicates that the Application Connection does notexistexist, since there is no ICCP connection between the PEs.-RESET:- RESET: This state indicates that an ICCP connection is operational between thePEs,PEs but that the Application Connection has not been initialized yet or has been resent.-CONNSENT:- CONNSENT: This state indicates that the local PE has requested initiation of an Application Connection with itspeer,peer but has not received a response yet.-CONNREC:- CONNREC: This state indicates that the local PE has received a request to initiate an Application Connection from its peer but has not responded yet.-CONNECTING:- CONNECTING: This state indicates that the local PE has transmitted to its peer anApplication Connection"Application Connection" message with the A-bit set to1,1 and is awaiting the peer'sresponse -OPERATIONAL:response. - OPERATIONAL: This state indicates that the Application Connection is operational. The state transition table and state transition diagram follow. ICCP Application Connection State Transition Table STATE EVENT NEW STATENON EXISTENT------------------------------------------------------------------- NONEXISTENT ICCP connection established RESET RESET ICCP connection torn downNON EXISTENTNONEXISTENT Transmit Application Connect TLV CONNSENT Receive Application Connect TLV CONNREC Receive any other Application TLV RESET Action: Transmit NAK TLV CONNSENT Receive NAK TLV RESET Receive Application Connect TLV OPERATIONAL with A-bit=1 Action: Transmit Application Connect TLV with A-bit=1 Receive any other Application TLV RESET Action: Transmit NAK TLV ICCP connection torn downNON EXISTENTNONEXISTENT CONNREC Transmit NAK TLV RESET Transmit Application Connect TLV CONNECTING with A-bit=1 Receive Application Connect TLV CONNREC Receive any Application TLV except RESET Connect Action: Transmit NAK TLV ICCP connection torn downNON EXISTENTNONEXISTENT CONNECTING Receive Application Connect TLV OPERATIONAL with A-bit=1 Receive any other Application TLV RESET Action: Transmit NAK TLV ICCP connection torn downNON EXISTENTNONEXISTENT OPERATIONAL Receive Application Disconnect TLV RESET TransmitApplicatonApplication Disconnect TLV RESET ICCP connection torn downNON EXISTENTNONEXISTENT ICCP Application Connection State Transition Diagram +------------+ | |+---------------->|NON EXISTENT|+---------------->|NONEXISTENT | ICCP connection torn down | | |<--------------------------+ | +------------+ | | ICCP connection| ^ ICCP connection | | established | | torn down | | | | | | V | Rx other App TLV/ | | +-----------+<-----+ Tx NAK TLV | ICCP | Rx App | | | | connect| Connect TLV | RESET |------+ | torn | +-------------| |---------------+ | down | | +-----------+ Tx App | | | | ^ ^ ^ ^ Connect TLV| | | | Tx NAK | | | | | | | | or | | | | | | | | Rxnonnon- | | | | | | | | Connect | | | | | | | V TLV/Tx NAK | | |Rx NAK TLV V | | +-----------+ | | | |or +--------+ | +-| |---+ | | +---------| | | |CONNREC | | | Rx other |CONNSENT|---------->+ +-| |-+ | | App TLV/ | | | | +-----------+ | | | Tx NAK +--------+ | | ^---+ | | |Rx App Connect | | Rx App | | |TLV(A=1) /(A=1)/ | | Connect TLV | |Rx App Disconn | Tx App | | | |or | Connect TLV | | Tx App Connect | |Tx App Disconn V (A=1) | | TLV (A=1) | | +------------+ | | | +------| | | | Rx other App | |OPERATIONAL |------------>+ |TLV / TxTLV/Tx NAK | | | | | +------+ +------------+ | | | ^ Rx App Connect | | +----------+ | TLV (A=1) | | | |---------------------+ | +--->|CONNECTING| | | |----------------------------------------->+ +----------+ 4.5. Application Data Transfer When an application has information to transfer overICCPICCP, it triggers the transmission of anApplication Data"Application Data" message. ICCP guaranteesin- orderin-order andloss-lesslossless delivery of data. An application may reject a message or a set of one or more TLVs within a message by using the NotificationMessagemessage withNAK TLV.a "NAK TLV". Furthermore, an application may implement its own ACK mechanism, if deemed required, by defining an application-specific TLV to be transported in anApplication Data"Application Data" message. Note that this document does not define a common ACK mechanism for applications. It is left up to the application to define the procedures to handle the situation where a PE receives aNAK TLV"NAK TLV" in response to a transmittedApplication Data"Application Data" message. Depending on the specifics of the application, it may be favorable to have thePE, whichPE that sent theNAK,NAK explicitly request retransmission of data. On the other hand, for certain applications it may be more suitable to have the original sender of theApplication Data"Application Data" message handle retransmissions in response to a NAK. ICCP supports both models. 4.6. Dedicated Redundancy Group LDPsessionSession For certain ICCP applications, it isrequired to exchangerequired that a fairly large amount of RG information be exchanged in a very short period of time. In order to better distribute the load in amultiple processormultiple-processor system, and to avoidhead of linehead-of-line blocking to other LDP applications,it may be required to initiateinitiating a separate TCP/IP session between the two LDPspeakers.speakers may be required. This procedure isOPTIONAL,OPTIONAL and does not change the operation of LDP or ICCP. A PE that requires a separate LDP session will advertise a separate LDP adjacency with a non-zero label space identifier. This will cause the remote peer to open a separate LDP session for this label space. No labels need to be advertised in this label space, as it is only used for one or a set of ICCP RGs. All relevant LDP and ICCP procedures still apply as described inthe relevant documents.[RFC5036] and this document. 5. ICCP PE Node Failure / Isolation Detection Mechanism ICCP provides its client applications a notification when a remote PE that is a member of the RG is no longer reachable. In the case of a dedicated interconnect, this indicates that the remote PE node hasfailed. Whereas,failed, whereas in the case of a sharedinterconnect,interconnect this indicates thateitherthe remote PE node has either failed orthat it hasbecome isolated from the MPLS network. This information is used by the client applications to trigger failover according to the procedures of theemployedredundancy protocol employed on the AC and PW. To that end, ICCP does not define its own Keep-Alive mechanism for the purpose of monitoring the health of remote PEnodes,nodes but rather reuses existing fault detection mechanisms. The following mechanisms may be used by ICCP to detect PE node failure: -BFDBidirectional Forwarding Detection (BFD) Run a BFD session [RFC5880] between the PEs that are members of a given RG, and use that to detect PE node failure. This assumes that resiliency mechanisms are in place to protect connectivity to the remote PE nodes, and hence loss of BFD periodic messages from a given PE node can only mean that the node itself has failed. - IP Reachability Monitoring It is possible for a PE to monitorIP layerIP-layer connectivity to other members of an RG that are participating in IGP/BGP. When connectivity to a given PE is lost, the local PE interprets that to mean loss of the remote PE node. This technique assumes that resiliency mechanisms are in place to protect the route to the remote PE nodes, and hence loss of IP reachability to a given node can only mean that the node itself has failed. It is worth noting here that loss of the LDP session with a PE in an RG is not a reliable indicator that the remote PE itself is down. It is possible, fore.g.example, that the remote PEencounterscould encounter a local event thatleadswould lead to resetting the LDP session, while the PE noderemainswould remain operational forpurpose oftrafficforwarding.forwarding purposes. 6. ICCP Message Formats This section defines the messages exchanged at the Application and ICC layers. 6.1. Encoding ICC into LDP Messages ICCP requires reliable, in-order,state-fullstateful message delivery, as well as capability negotiation between PEs.TheLDPprotocoloffers all of thesefeatures,features and is already in wide use in the applications that would also require the ICCP protocol extensions. For these reasons, ICCP takes advantage of thealready definedalready-defined LDP protocol infrastructure.[RFC5036][RFC5036], Section 3.5 defines a generic LDP message structure. A new set of LDP message types is defined to communicate the ICCP information. LDP message types in the range0x7000x0700 to0x70F0x070F will be used for ICCP. Message typesarehave been allocated byIANA, and requested in the IANA section below.IANA; see Section 12 below for details. 6.1.1. ICC Header Every ICCP message comprisesofanICC specificICC-specific LDP Header followed by message data. The format of the ICC Header is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U| Message Type | Message Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Message ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Type=0x0005Type = 0x0005 (ICC RG ID) | Length=4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ICC RG ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | Mandatory ICC Parameters | ~ ~ + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | Optional ICC Parameters | ~ ~ + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - U-bit Unknown message bit. Upon receipt of an unknown message, if U is clear (=0), a notification is returned to the message originator; if U is set (=1), the unknown message is silently ignored.The followingSubsequent sectionswhichthat define messages specify a value for the U-bit. - Message Type Identifies the type of the ICCPmessage, mustmessage. Must be in the rangeof0x0700 to 0x070F. - Message LengthTwo octet2-octet integer specifying the total length of this message in octets, excluding theU-bit, Message Type"U-bit", "Message Type", andLength"Length" fields. - Message IDFour octet4-octet value used to identify this message. Used by the sending PE to facilitate identifyingRG Notification"RG Notification" messages that may apply to this message. A PE sending anRG Notification"RG Notification" message in response to this message SHOULD include this Message ID in the "NAK TLV" of theRG Notification"RG Notification" message; see Section6.4 "RG Notification Message".6.4. - ICC RG ID TLV A TLV of type 0x0005, length 4, containing4 octetsa 4-octet unsigned integer designating the Redundancy Group of which the sending device ismember of.a member. RG ID value 0x00000000 is reserved by the protocol. - Mandatory ICC ParametersVariable lengthVariable-length set of required message parameters. Some messages have no required parameters. For messages that have required parameters, the required parameters MUST appear in the order specified by the individual message specifications in the sections that follow. - Optional ICC ParametersVariable lengthVariable-length set of optional message parameters. Many messages have no optional parameters. For messages that have optional parameters, the optional parameters may appear in any order. 6.1.2. ICC Parameter Encoding The generic format of an ICC parameteris:is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TLV(s) | ~ ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - U-bit Unknown TLV bit. Upon receipt of an unknown TLV, if U is clear (=0), a notification MUST be returned to the message originator and the entire message MUST be ignored; if U is set (=1), the unknown TLV MUST be silently ignored and the rest of the message processed as if the unknown TLV did not exist.TheSubsequent sectionsfollowingthat define TLVs specify a value for the U-bit. - F-bit Forward unknown TLV bit. This bit applies only when the U-bit is set and the LDP message containing the unknown TLV is to be forwarded. If F is clear (=0), the unknown TLV is not forwarded with thecontainingLDP message; if F is set (=1), the unknown TLV is forwarded with thecontainingLDP message.TheSubsequent sectionsfollowingthat define TLVs specify a value for the F-bit. By setting both the U- and F-bits, a TLV can be propagated as opaque data through nodes that do not recognize the TLV. - TypeFourteen14 bits indicating the ICC Parameter type. - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - TLV(s): A set of 0 or moreTLVs, thatTLVs. Contents will vary according to the message type. 6.1.3. Redundant Object Identifier Encoding The Redundant Object Identifier (ROID) is a generic opaque handle that uniquely identifies a Redundant Object(e.g.(e.g., link, bundle,VLAN, etc...) whichVLAN) that is being protected in an RG. It is encoded as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ROID | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+where:where the ROID is an8 octets8-octet field encoded as an unsigned integer. The ROID value of 0 is reserved. The ROID is carried withinapplication specificapplication-specific TLVs. 6.2. RG Connect Message TheRG Connect Message"RG Connect" message is used to establish the ICCP RG connection in addition to individual ApplicationconnectionsConnections between PEs in an RG. AnRG Connect"RG Connect" message with no"Application-specific connect"Application Connect TLV" signals establishment of the ICCP RGconnection. Whereas,connection, whereas anRG Connect"RG Connect" message with a valid"Application-specific connect"Application Connect TLV" signals the establishment of an Applicationconnection,Connection in addition to the ICCP RG connection if the latter is not already established. An implementation MAY send a dedicatedRG Connect"RG Connect" message to set up the ICCP RG connection and a separateRG Connect"RG Connect" messageperfor each client application. However, all implementations MUST support the receipt of anRG Connect"RG Connect" message that triggers the setup of the ICCP RG connection as well as a single ApplicationconnectionConnection simultaneously. A PE sends anRG Connect Message"RG Connect" message to declare its membership in a Redundancy Group. One such message should be sent to each PE that is a member of the same RG. The set of PEs to whichRG Connect Messages"RG Connect" messages should be transmitted is known via configuration or anauto-discoveryauto- discovery mechanism that is outside the scope of this specification. If a device is a member of multiple RGs, it MUST send separateRG Connect Messages"RG Connect" messages for each RG even if the receiving device(s)happenhappens to be the same. The format of theRG Connect Message"RG Connect" message is as follows:-i.i. ICCheaderHeader with Message type = "RG Connect Message" (0x0700)-ii.ii. ICC Sender Name TLV-iii.iii. Zero or oneApplication-specific connect TLV"Application Connect TLV" The currently definedApplication-specific connect TLVs are:"Application Connect TLVs" are as follows: - PW-RED Connect TLV(section(Section 7.1.1) - mLACP Connect TLV(section(Section 7.2.1) The details of these TLVs are discussed inthe "Application TLVs" section.Section 7. TheRG Connect"RG Connect" message can contain zero or oneApplication-specific connect TLV."Application Connect TLV". 6.2.1. ICC Sender Name TLVA TLV thatThe "ICC Sender Name TLV" carries the hostname of thesendersender, encoded in UTF-8[RFC3629].[RFC3629] format. This is used primarily for the purpose of management of the RG and easing network operations. The specific format is shown below: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| Type = 0x0001 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sender Name | + +-+-+-+-+-+-+-+-+-+ ~ ~ | ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - U=F=0 - TypesetSet to 0x0001 (from the ICC parameter name space). - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Sender Name Anadministratively-assignedadministratively assigned name of the sendingdevicedevice, encoded in UTF-8 format and limited to a maximum of 80 octets. This field does not include a terminating null character. 6.3. RG Disconnect Message TheRG Disconnect Message"RG Disconnect" message servesdual-purpose:a dual purpose: to signal that a particular ApplicationconnectionConnection is being closed within anRG,RG or that the ICCP RG connection itself is being disconnected because the PE wishes to leave the RG. The format of this messageis:is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U| MessageType=0x0701Type = 0x0701 | Message Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Message ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Type=0x0005Type = 0x0005 (ICC RG ID) | Length=4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ICC RG ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Disconnect Code TLV | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OptionalApplication-specificApplication Disconnect TLV | ~ ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional Parameter TLVs | + + | | ~ ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - U-bit U=0 - Message Type The message type forRG Disconnect Messagethe "RG Disconnect" message is set to(0x0701)0x0701. - Length Length of the TLV inoctetsoctets, excluding theU-bit, Message Type,"U-bit", "Message Type", andMessage Length"Message Length" fields. - Message ID Defined inthe "ICC Header" sectionSection 6.1.1 above. - ICC RG ID Defined inthe "ICC Header" sectionSection 6.1.1 above. - Disconnect Code TLV The format of this TLV is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0004Type = 0x0004 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ICCP Status Code | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -U,F Bits both UU-bit andFF-bit Both are set to 0. - TypesetSet to "Disconnect Code TLV"(0x0004)(0x0004). - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - ICCP Status Code A status code that reflects the reason for the disconnect message. Allowed values are "ICCP RG Removed" and "ICCP Application Removed from RG". - OptionalApplication-specificApplication Disconnect TLV Zero or oneApplication-specific"Application DisconnectTLVs which are defined laterTLV" (defined inthe document.Sections 7.1.2 and 7.2.2). If theRG Disconnect"RG Disconnect" message has a status code of "RG Removed", then it MUST NOT contain anyApplication-specific"Application DisconnectTLVs,TLVs", as the sending PE is signaling that it has left the RGand, thus,and thus is disconnecting the ICCP RGconnection,connection with all associated clientapplication connections.Application Connections. If the message has a status code of "Application Removed from RG", then it MUST contain exactly oneApplication- specific"Application DisconnectTLV,TLV", as the sending PE is only tearing down the connection for the specified application. Other applications, and the ICCP RGconnectionconnection, are not to be affected. - Optional Parameter TLVs None are defined for this message in this document. This is specified to allow for future extensions. 6.4. RG Notification Message A PE sends anRG Notification Message"RG Notification" message to indicate one of the following: to reject an ICCP connection, to reject anapplication connection,Application Connection, to reject an entiremessagemessage, or to reject one or moreTLV(s)TLVs within a message. The Notification message MUST only be sent to a PE that is already part of an RG. TheRG Notification Message"RG Notification" message MUST only be used to reject messages or TLVs corresponding to a single ICCP application. In other words, there is a limit of at most a single ICCP application perRG Notification Message."RG Notification" message. The format of theRG Notification Message is: -i."RG Notification" message is as follows: i. ICCheaderHeader with Message type = "RG Notification Message" (0x0702)-ii.ii. Notification MessageTLVs.TLVs The currently defined Notification message TLVsare: -i.are as follows: i. ICC Sender Name TLV-ii. Negative-Acknowledgementii. Negative Acknowledgement (NAK) TLV 6.4.1. Notification Message TLVs TheICC"ICC Sender NameTLVTLV" uses the same format as the format used in theRG Connect message,"RG Connect" message and was described above. TheNAK TLV"NAK TLV" is defined as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0002Type = 0x0002 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ICCP Status Code | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Rejected Message ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional TLV(s) | + + | | ~ ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -U,F Bits both UU-bit andFF-bit Both are set to 0. - TypesetSet to "NAK TLV"(0x0002)(0x0002). - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - ICCP Status Code A status code that reflects the reason for theNAK TLV."NAK TLV". Allowed valuesare: -i.are as follows: i. Unknown ICCP RG (0x00010001) This code is used to reject a new incoming ICCP connection for an RG that is not configured on the local PE. When this code is used, theRejected"Rejected MessageIDID" field MUST contain the message ID of the rejected "RG Connect" message.-ii.ii. ICCP Connection Count Exceeded (0x00010002) This is used to reject a new incoming ICCP connection that would cause the local PE's ICCP connection count to exceed its capabilities. When this code is used, theRejected"Rejected MessageIDID" field MUST contain the message ID of the rejected "RG Connect" message.-iii.iii. ICCP Application Connection Count Exceeded (0x00010003) This is used to reject a new incomingapplication connectionApplication Connection that would cause the local PE's ICCP connection count to exceed its capabilities. When this code is used, theRejected"Rejected MessageIDID" field MUST contain the message ID of the rejected "RG Connect" message and the correspondingApplication"Application ConnectTLVTLV" MUST be included in the "Optional TLV".-iv.iv. ICCP Application not in RG (0x00010004) This is used to reject a new incomingapplication connectionApplication Connection when the local PE doesn't support theapplication,application or the application is not configured in the RG. When this code is used, theRejected"Rejected MessageIDID" field MUST contain the message ID of the rejected "RG Connect" message and the correspondingApplication"Application ConnectTLVTLV" MUST be included in the "Optional TLV".-v.v. Incompatible ICCP Protocol Version (0x00010005) This is used to reject a new incomingapplication connectionApplication Connection when the local PE has an incompatible version of the application. When this code is used, theRejected"Rejected MessageIDID" field MUST contain the message ID of the rejected "RG Connect" message and the correspondingApplication"Application ConnectTLVTLV" MUST be included in the "Optional TLV".-vi.vi. ICCP Rejected Message (0x00010006) This is used to reject anRG"RG ApplicationDataData" message, or one or moreTLV(s)TLVs within the message. When this code is used, theRejected"Rejected MessageIDID" field MUST contain the message ID of the rejected "RG Application Data" message.-vii.vii. ICCP Administratively Disabled (0x00010007) This is used to reject any ICCP messages from a peer from which the PE is not allowed to exchange ICCP messages due to local administrative policy. - Rejected Message ID If non-zero,four octetsa 4-octet value that identifies the peer message to which theNAK TLV"NAK TLV" refers. If zero, no specific peer message is being identified. - Optional TLV(s) A set of one or more optional TLVs. If the status code is "RejectedMessage"Message", then this field contains theTLV(s)TLV or TLVs that were rejected. If the entire message is rejected, all of its TLVs MUST be present in this field; otherwise, the subset of TLVs that were rejected MUST be echoed in this field. If the status code is "Incompatible ProtocolVersion"Version", then this field contains the original "Application Connect TLV" sent by the peer, in addition to the "Requested Protocol Version TLV" defined below: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0003Type = 0x0003 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Connection Reference | Requested Version | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0003 for "Requested Protocol VersionTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Connection ReferenceThis field is setSet to theType"Type" field of theApplication specific"Application ConnectTLVTLV" that was rejected because of incompatible version. - Requested Version The version of the application supported by the transmitting device. For this version of theprotocolprotocol, it is set to 0x0001. 6.5. RG Application Data Message TheRG"RG ApplicationData MessageData" message is used to transport application data between PEs within an RG. A single message can be used to carry data from only one application. MultipleapplicationApplication TLVs are allowed in a single message, as long as all of these TLVs belong to the same application. The format of theApplication Data Message is: -i."Application Data" message is as follows: i. ICCheaderHeader with Message type = "RG Application Data Message"(0x703) -ii. "Application specific TLVs"(0x0703) ii. Application-specific TLVs The details of these TLVs are discussed inthe "Application TLVs" section.Section 7. Allapplication specificapplication-specific TLVs in oneRG"RG ApplicationData MessageData" message MUST belong to a single application but MAY reference different ROs. 7. Application TLVs 7.1. Pseudowire Redundancy (PW-RED) Application TLVs This section discusses theICCP TLVs"ICCP TLVs" for the Pseudowire Redundancy application. 7.1.1. PW-RED Connect TLV This TLV is included in theRG Connect"RG Connect" message to signal the establishment of a PW-REDapplication connection.Application Connection. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0010Type = 0x0010 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Protocol Version |A| Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional Sub-TLVs | ~ ~ | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0010 for "PW-RED ConnectTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Protocol Version The version of this particular protocol for the purposes of ICCP. This is set to 0x0001. -A bitA-bit AcknowledgementBit.bit. Set to 1 if the sender has received aPW-RED"PW-RED ConnectTLVTLV" from the recipient. Otherwise, set to 0. - Reserved Reserved for future use. - Optional Sub-TLVs There are no optionalSub-TLVssub-TLVs defined for this version of the protocol. This document does not impose anyresrictionsrestrictions on the length of the sub-TLVs. 7.1.2. PW-RED Disconnect TLV This TLV is used in anRG Disconnect Message"RG Disconnect" message to indicate that the connection for the PW-RED application is to be terminated. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0011Type = 0x0011 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional Sub-TLVs | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0011 for "PW-RED DisconnectTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Optional Sub-TLVs The only optionalSub-TLVsub-TLV defined for this version of the protocol is the "PW-RED DisconnectCause" TLVCause TLV" defined in Section 7.1.2.1. 7.1.2.1. PW-RED Disconnect Cause TLV 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0019Type = 0x0019 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Disconnect Cause String | ~ ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0019 for "PW-RED Disconnect CauseTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Disconnect Cause StringVariable lengthVariable-length string specifying the reason for the disconnect, encoded inUTF-8.UTF-8 format. The string does not include a terminating null character. Used for network management. 7.1.3. PW-RED Config TLV ThePW-RED"PW-RED ConfigTLVTLV" is used in theRG"RG ApplicationDataData" message and has the following format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| Type = 0x0012 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ROID | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PW Priority | Flags | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Service Name TLV | ~ ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PW ID TLV or Generalized PW ID TLV | ~ ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0012 for "PW-RED ConfigTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - ROID As defined in Section 6.1.3. - PW PriorityTwo octets2 octets. Pseudowire Priority. Used to indicate which PW has better priority to go intoActiveactive state. Numerically lower numbers are better priority. In case of a tie, the PE with the numerically lower identifier(i.e.(i.e., IP Address) has better priority. - Flags Valid valuesare: -i.are as follows: i. Synchronized (0x01) Indicates that the sender has concluded transmitting all pseudowire configuration for a given service.-ii.ii. Purge Configuration (0x02) Indicates that the pseudowire is no longer configured for PW-RED operation.-iii.iii. Independent Mode (0x04) Indicates that the pseudowire is configured for redundancy using the Independent Mode of operation, persectionSection 5.1 of [RFC6870].-iv.iv. Independent Mode with Request Switchover (0x08) Indicates that the pseudowire is configured for redundancy using the Independent Mode of operation with the use of the "Request Switchover" bit, persectionSection 6.3 of [RFC6870].-v.v. Master Mode (0x10) Indicates that the pseudowire is configured for redundancy using the Master/Slave Mode of operation, with the advertising PE acting as Master, persectionSection 5.2 of [RFC6870].-vi.vi. Slave Mode (0x20) Indicates that the pseudowire is configured for redundancy using the Master/Slave Mode of operation, with the advertising PE acting as Slave, persectionSection 5.2 of [RFC6870]. - Sub-TLVs The "PW-RED Config TLV" includes the following two sub-TLVs:-i.i. Service Name TLV-ii.ii. One of the following: PW ID TLV or Generalized PW ID TLV The format of the sub-TLVs is defined in Sections 7.1.3.1 through 7.1.3.3. 7.1.3.1. Service Name TLV 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| Type = 0x0013 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Service Name | ~ ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0013 for "Service NameTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Service Name The name of the L2VPN serviceinstanceinstance, encoded in UTF-8 format and up to 80 octets in length. The string does not include a terminating null character. 7.1.3.2. PW ID TLV This TLV is used to communicate the configuration of PWs for VPWS. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| Type = 0x0014 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Peer ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Group ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PW ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0014 for "PW IDTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Peer IDFour octet4-octet LDP Router ID of the peer at the far end of the PW. - Group ID Same as Group ID in[RFC4447] section[RFC4447], Section 5.2. - PW ID Same as PW ID in[RFC4447] section[RFC4447], Section 5.2. 7.1.3.3. Generalized PW ID TLV This TLV is used to communicate the configuration of PWs for VPLS. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| Type = 0x0015 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AGI Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ AGI Value(contd.)(continued) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AII Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ SAII Value(contd.)(continued) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AII Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ TAII Value(contd.)(continued) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF bits bothF-bit Both are set to 0. - TypesetSet to 0x0015 for "Generalized PW ID TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - AGI, AII,SAIISAII, and TAIIdefinedDefined in[RFC4447] section[RFC4447], Section 5.3.2. 7.1.4. PW-RED State TLV ThePW-RED"PW-RED StateTLVTLV" is used in theRG"RG ApplicationData Message.Data" message. This TLV is used by a device to report its PW status to other members in the RG. The format of this TLV is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0016Type = 0x0016 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ROID | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Local PW State | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Remote PW State | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0016 forPW-RED"PW-RED StateTLV.TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - ROID As defined in Section 6.1.3. - Local PW State The status of the PW as determined by the sending PE, encoded in the same format as the "Status Code" field of the "PW Status TLV" defined in [RFC4447] and extended in [RFC6870]. - Remote PW State The status of the PW as determined by the remote peer of the sending PE. Encoded in the same format as the "Status Code" field of the "PW Status TLV" defined in [RFC4447] and extended in [RFC6870]. 7.1.5. PW-RED Synchronization Request TLV ThePW-RED"PW-RED Synchronization RequestTLVTLV" is used in theRG"RG ApplicationDataData" message. This TLV is used by a device to requestfromthat its peertoretransmit configuration or operational state. The following information can be requested: - configuration and/or state for one or more pseudowires - configuration and/or state for all pseudowires - configuration and/or state for all pseudowires in a given service The format of the TLV is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0017Type = 0x0017 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Request Number |C|S| Request Type | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional Sub-TLVs | ~ ~ | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0017 for "PW-RED Synchronization RequestTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Request Number 2 octets. Unsigned integer uniquely identifying the request. Used to match the request with a response. The value of 0 is reserved for unsolicitedsynchronization,synchronization and MUST NOT be used in thePW- RED"PW-RED Synchronization RequestTLV.TLV". Given the use of TCP, there are no issues associated with the wrap-around of the Request Number. -C BitC-bit Set to 1 if the request is for configuration data. Otherwise, set to 0. -S BitS-bit Set to 1 if the request is for running state data. Otherwise, set to 0. - Request Type14-bits14 bits specifying the request type, encoded as follows: 0x00 Request Data for specified pseudowire(s) 0x01 Request Data for all pseudowires in specified service(s) 0x3FFF Request All Data - Optional Sub-TLVs A set of zero or more TLVs, as follows: If theRequest Type"Request Type" field is set to(0x00),0x00, then this field contains one or morePW"PW IDTLV(s)TLVs" orGeneralized"Generalized PW IDTLV(s).TLVs". If theRequest Type"Request Type" field is set to(0x01),0x01, then this field contains one or moreService"Service NameTLV(s).TLVs". If theRequest Type"Request Type" field is set to(0x3FFF),0x3FFF, then this field MUST be empty. This document does not impose any restrictions on the length of the sub-TLVs. 7.1.6. PW-RED Synchronization Data TLV ThePW-RED"PW-RED Synchronization DataTLVTLV" is used in theRG"RG ApplicationData mesage.Data" message. A pair of these TLVs is used by a device to delimit a set of TLVs that are sent in response to aPW-RED"PW-RED Synchronization RequestTLV.TLV". The delimiting TLVs signal the start and end of the synchronizationdata,data and associate the response with its corresponding request via theRequest Number"Request Number" field. ThePW-RED"PW-RED Synchronization DataTLVsTLVs" are also used for unsolicited advertisements of complete PW-RED configuration and operational state data. In this case, theRequest Number"Request Number" field MUST be set to 0. This TLV has the following format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0018Type = 0x0018 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Request Number | Flags | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0018 for "PW-RED Synchronization DataTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Request Number 2 octets. Unsigned integer identifying the Request Number from the "PW-RED Synchronization Request TLV"whichthat solicited this synchronization data response. - Flags 2octets, responseoctets. Response flags encoded as follows: 0x00 Synchronization Data Start 0x01 Synchronization Data End 7.2.Multi-chassisMulti-Chassis LACP (mLACP) Application TLVs This section discusses theICCP TLVs"ICCP TLVs" for Ethernet attachment circuit redundancy using the multi-chassis LACP (mLACP) application. 7.2.1. mLACP Connect TLV This TLV is included in theRG Connect"RG Connect" message to signal the establishment of an mLACPapplication connection.Application Connection. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0030Type = 0x0030 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Protocol Version |A| Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional Sub-TLVs | ~ ~ | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0030 for "mLACP ConnectTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Protocol Version The version of this particular protocol for the purposes of ICCP. This is set to 0x0001. -A BitA-bit AcknowledgementBit.bit. Set to 1 if the sender has received anmLACP"mLACP ConnectTLVTLV" from the recipient. Otherwise, set to 0. - Reserved Reserved for future use. - Optional Sub-TLVs There are no optionalSub-TLVssub-TLVs defined for this version of the protocol. 7.2.2. mLACP Disconnect TLV This TLV is used in anRG Disconnect Message"RG Disconnect" message to indicate that the connection for the mLACP application is to be terminated. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0031Type = 0x0031 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional Sub-TLVs | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0031 for "mLACP DisconnectTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Optional Sub-TLVs The only optionalSub-TLVsub-TLV defined for this version of the protocol is the "mLACP DisconnectCause" TLVCause TLV" defined in Section 7.2.2.1. 7.2.2.1. mLACP Disconnect Cause TLV 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x003AType = 0x003A | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Disconnect Cause String | ~ ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x003A for "mLACP Disconnect CauseTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Disconnect Cause StringVariable lengthVariable-length string specifying the reason for the disconnect. Used for network management. 7.2.3. mLACP System Config TLV ThemLACP"mLACP System ConfigTLVTLV" is sent in theRG"RG ApplicationDataData" message. This TLV announces the local node's LACPSystem Parameterssystem parameters to the RG peers. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0032Type = 0x0032 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | System ID | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | System Priority | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Node ID | +-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0032 for "mLACP System ConfigTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - System ID6 octets6-octet field encoding the System ID used byLACPLACP, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.2. - System Priority 2 octets encoding the LACP SystemPriorityPriority, as defined in[IEEE- 802.1AX] section[IEEE-802.1AX], Section 5.3.2. - Node IDOne octet,1 octet. LACPnodeNode ID. Used to ensure that the LACP Port Numbers are unique across all devices in an RG. Valid values are in the range0 - 7.0-7. Uniqueness of the LACP Port Numbers across RG members is ensured by encoding the Port Numbers as follows: - Most significant bit always set to 1 - The next 3 most significant bits set to Node ID - Remaining 12 bits freely assigned by the system 7.2.4. mLACP Aggregator Config TLV ThemLACP"mLACP Aggregator ConfigTLVTLV" is sent in theRG"RG ApplicationDataData" message. This TLV is used to notify RG peers about the local configuration state of anaggregator.Aggregator. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0036Type = 0x0036 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ROID | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Aggregator ID | MAC Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Actor Key | Member Ports Priority | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | Agg Name Len | Aggregator Name | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ ~ | ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0036 for "mLACP Aggregator ConfigTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - ROID Defined inthe 'ROID Encoding' sectionSection 6.1.3 above. - Aggregator IDTwo octets,2 octets. LACP AggregatorIdentifierIdentifier, as specified in[IEEE- 802.1AX] section 5.4.6[IEEE-802.1AX], Section 5.4.6. - MAC AddressSix6 octets encoding the AggregatorMACMedia Access Control (MAC) address. - Actor KeyTwo octets,2 octets. LACP Actor Key for the corresponding Aggregator, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.5. - Member Ports PriorityTwo octets,2 octets. LACP administrative port priority associated with all interfaces bound to the Aggregator. This field is valid only when the "Flags" field has "Priority Set" asserted. - Flags Valid valuesare: -i.are as follows: i. Synchronized (0x01) Indicates that the sender has concluded transmitting all Aggregator configuration information.-ii.ii. Purge Configuration (0x02) Indicates that the Aggregator is no longer configured for mLACP operation.-iii.iii. Priority Set (0x04) Indicates that the "Member Ports Priority" field is valid. - Agg Name LenOne octet, length1 octet. Length of the "Aggregator Name" field in octets. - Aggregator Name Aggregatornamename, encoded in UTF-8 format, up to a maximum of 20 octets. Used for ease of management. The string does not include a terminating null character. 7.2.5. mLACP Port Config TLV ThemLACP"mLACP Port ConfigTLVTLV" is sent in theRG"RG ApplicationDataData" message. This TLV is used to notify RG peers about the local configuration state of a port. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0033Type = 0x0033 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Port Number | MAC Address | +-------------------------------+ + | | +---------------------------------------------------------------+ | Actor Key | Port Priority | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Port Speed | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | Port Name Len | Port Name | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ ~ | ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0033 for "mLACP Port ConfigTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Port NumberTwo octets,2 octets. LACP Port Number for the correspondinginterfaceinterface, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.4. The Port Number MUST be encoded with the NodeIDID, aswasdiscussed above. - MAC AddressSix6 octets encoding the port MAC address. - Actor KeyTwo octets,2 octets. LACP Actor Key for the corresponding interface, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.5. - Port PriorityTwo octets,2 octets. LACP administrative port priority for the corresponding interface, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.4. This field is valid only when the "Flags" field has "Priority Set" asserted. - Port SpeedFour octets4-octet integer encoding the port's current bandwidth in units of 1,000,000 bits per second. This field corresponds to the ifHighSpeed object of the IF-MIB [RFC2863]. - Flags Valid valuesare: -i.are as follows: i. Synchronized (0x01) Indicates that the sender has concluded transmitting all member link port configurations for a given Aggregator.-ii.ii. Purge Configuration (0x02) Indicates that the port is no longer configured for mLACP operation.-iii.iii. Priority Set (0x04) Indicates that the "Port Priority" field is valid. - Port Name LenOne octet, length1 octet. Length of the "Port Name" field in octets. - Port NameThis field correspondsCorresponds to the ifName object of the IF-MIB[RFC2863] encoded[RFC2863]. Encoded in UTF-8format,format and truncated to 20 octets. Port Name does not include a terminating null character. 7.2.6. mLACP Port Priority TLV ThemLACP"mLACP Port PriorityTLVTLV" is sent in theRG"RG ApplicationDataData" message. This TLV is used by a device to either advertise its operational Port Priority to other members in theRG,RG ortoauthoritatively request that a particular member of an RG change its port priority. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0034Type = 0x0034 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OpCode | Port Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Aggregator ID | Last Port Priority | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Current Port Priority | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0034 for "mLACP Port PriorityTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - OpCodeTwo2 octets identifying the operationalcode-pointcode point for the TLV, encoded as follows: 0x00 Local Priority Change Notification 0x01 Remote Request for Priority Change - Port Number2 octets2-octet field representing the LACP PortNumberNumber, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.4. When the value of this field is 0, it denotes all ports bound to the Aggregator specified in the "Aggregator ID" field. When non-zero, the Port Number MUST be encoded with the NodeIDID, aswasdiscussed above. - Aggregator IDTwo octets,2 octets. LACP AggregatorIdentifierIdentifier, as specified in[IEEE- 802.1AX] section 5.4.6[IEEE-802.1AX], Section 5.4.6. - Last Port PriorityTwo octets,2 octets. LACP port priority for the corresponding interface, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.4. For local ports, this field encodes the previous operational value of port priority. For remote ports, this field encodes the operational port priority last known to the PE via notifications received from its peers in the RG. - Current Port PriorityTwo octets,2 octets. LACP port priority for the corresponding interface, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.4. For local ports, this field encodes the new operational value of port priority being advertised by the PE. For remote ports, this field specifies the new port priority being requested by the PE. 7.2.7. mLACP Port State TLV ThemLACP"mLACP Port StateTLVTLV" is used in theRG"RG ApplicationDataData" message. This TLV is used by a device to report its LACP port status to other members in the RG. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0035Type = 0x0035 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Partner System ID | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Partner System Priority | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Partner Port Number | Partner Port Priority | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Partner Key | Partner State | Actor State | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Actor Port Number | Actor Key | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Selected | Port State | Aggregator ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0035 for "mLACP Port StateTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Partner System ID 6octets, theoctets. The LACP Partner System ID for the corresponding interface, encoded as a MAC address as specified in[IEEE- 802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item r. - Partner System Priority2 octets2-octet field specifying the LACP Partner SystemPriorityPriority, as specified in[IEEE-802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item q. - Partner Port Number 2 octets encoding the LACP Partner PortNumberNumber, as specified in[IEEE-802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item u. The Port Number MUST be encoded with the NodeIDID, aswasdiscussed above. - Partner Port Priority2 octets2-octet field encoding the LACP Partner PortPriorityPriority, as specified in[IEEE-802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item t. - Partner Key2 octets2-octet field representing the LACP PartnerKeyKey, as defined in[IEEE-802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item s. - Partner State1 octet1-octet field encoding the LACP Partner StateVariableVariable, as defined in[IEEE-802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item v. - Actor State 1 octet encoding the LACPActor'sActor State Variable for theportport, as specified in[IEEE-802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item m. - Actor Port Number2 octets2-octet field representing the LACP Actor PortNumberNumber, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.4. The Port Number MUST be encoded with the NodeIDID, aswasdiscussed above. - Actor Key2 octet2-octet field encoding the LACP Actor OperationalKeyKey, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.5. - Selected 1 octet encoding the LACP'Selected'"Selected" variable, defined in[IEEE- 802.1AX] section 5.4.8,[IEEE-802.1AX], Section 5.4.8 as follows: 0x00 SELECTED 0x01 UNSELECTED 0x02 STANDBY - Port State 1 octet encoding the operational state of the port as follows: 0x00 Up 0x01 Down 0x02AdministrativeAdministratively Down 0x03 Test(e.g.(e.g., IEEE 802.3ah OAM Intrusive Loopback mode) - Aggregator IDTwo octets,2 octets. LACP Aggregator Identifier to which this port is bound based on the outcome of the LACP selection logic. 7.2.8. mLACP Aggregator State TLV ThemLACP"mLACP Aggregator StateTLVTLV" is used in theRG"RG ApplicationDataData" message. This TLV is used by a device to report its Aggregator status to other members in the RG. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0037Type = 0x0037 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Partner System ID | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Partner System Priority | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Partner Key | Aggregator ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Actor Key | Agg State | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0037 for "mLACP Aggregator StateTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Partner System ID 6octets, theoctets. The LACP Partner System ID for the corresponding interface, encoded as a MAC address as specified in[IEEE- 802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item r. - Partner System Priority2 octets2-octet field specifying the LACP Partner SystemPriorityPriority, as specified in[IEEE-802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item q. - Partner Key2 octets2-octet field representing the LACP PartnerKeyKey, as defined in[IEEE-802.1AX] section 5.4.2.2[IEEE-802.1AX], Section 5.4.2.2, item s. - Aggregator IDTwo octets,2 octets. LACP AggregatorIdentifierIdentifier, as specified in[IEEE- 802.1AX] section 5.4.6[IEEE-802.1AX], Section 5.4.6. - Actor Key2 octet2-octet field encoding the LACP Actor OperationalKeyKey, as specified in[IEEE-802.1AX] section[IEEE-802.1AX], Section 5.3.5. - Agg State 1 octet encoding the operational state of the Aggregator as follows: 0x00 Up 0x01 Down 0x02AdministrativeAdministratively Down 0x03 Test(e.g.(e.g., IEEE 802.3ah OAM Intrusive Loopback mode) 7.2.9. mLACP Synchronization Request TLV ThemLACP"mLACP Synchronization RequestTLVTLV" is used in theRG"RG ApplicationDataData" message. This TLV is used by a device to requestfromthat its peerto re-transmitretransmit configuration or operational state. The following information can be requested: - system configuration and/or state - configuration and/or state for a specific port - configuration and/or state for all ports with a specific LACPkeyKey - configuration and/or state for all mLACP ports - configuration and/or state for a specificaggregatorAggregator - configuration and/or state for allaggregatorsAggregators with a specific LACPkeyKey - configuration and/or state for all mLACPaggregatorsAggregators The format of the TLV is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0038Type = 0x0038 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Request Number |C|S| Request Type | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Port Number / Aggregator ID | Actor Key | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0038 for "mLACP Synchronization RequestTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Request Number 2 octets. Unsigned integer uniquely identifying the request. Used to match the request with a response. The value of 0 is reserved for unsolicitedsynchronization,synchronization and MUST NOT be used in themLACP"mLACP Synchronization RequestTLV.TLV". -C BitC-bit Set to 1 if the request is for configuration data. Otherwise, set to 0. -S BitS-bit Set to 1 if the request is for running state data. Otherwise, set to 0. - Request Type14-bits14 bits specifying the request type, encoded as follows: 0x00 Request System Data 0x01 Request Aggregator Data 0x02 Request Port Data 0x3FFF Request All Data - Port Number / Aggregator ID 2 octets. WhenRequest Typethe "Request Type" field is set to'Request"Request PortData',Data", this field encodes the LACP Port Number for the requested port. When theRequest Type"Request Type" field is set to'Request"Request AggregatorData',Data", this field encodes the Aggregator ID of the requested Aggregator. When the value of this field is 0, it denotes that information for all ports (orAggregators),Aggregators) whose LACP Key is specified in the "Actor Key"field, arefield is being requested. - Actor KeyTwo octets,2 octets. LACP ActorkeyKey for the corresponding port or Aggregator. When the value of this field is 0 (and the PortNumber/AggregatorNumber / Aggregator ID field is 0 as well), it denotes that information for all ports or Aggregators in the system is being requested. 7.2.10. mLACP Synchronization Data TLV ThemLACP"mLACP Synchronization DataTLVTLV" is used in theRG"RG ApplicationDataData" message. A pair of these TLVs is used by a device to delimit a set of TLVs that are being transmitted in response to anmLACP"mLACP Synchronization RequestTLV.TLV". The delimiting TLVs signal the start and end of the synchronizationdata,data and associate the response with its corresponding request via the'Request Number'"Request Number" field. ThemLACP"mLACP Synchronization DataTLVsTLVs" are also used for unsolicited advertisements of complete mLACP configuration and operational state data. The'Request Number'"Request Number" field MUST be set to 0 in this case. For such unsolicited synchronization, the PE MUST advertise all system,AggregatorAggregator, and portinformationinformation, as done during the initialization sequence. This TLV has the following format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0x0039Type = 0x0039 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Request Number | Flags | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ -UU-bit andF BitsF-bit Both are set to 0. - TypesetSet to 0x0039 for "mLACP Synchronization DataTLV"TLV". - Length Length of the TLV inoctetsoctets, excluding theU-bit, F-bit, Type,"U-bit", "F-bit", "Type", andLength"Length" fields. - Request Number 2 octets. Unsigned integer identifying the Request Number from the "mLACP Synchronization Request TLV"whichthat solicited this synchronization data response. - Flags 2octets, response flagsoctets. Response flags, encoded as follows: 0x00 Synchronization Data Start 0x01 Synchronization Data End 8. LDP Capability Negotiation Asrequitedrequired in[RFC5561][RFC5561], the following TLV is defined to indicate the ICCP capability: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| TLV CodePoint=0x700Point = 0x0700 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |S| Reserved | Reserved |VER/MajVer/Maj | Ver/Min | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+where:- U-bit SHOULD be 1 (ignore if not understood). - F-bit SHOULD be 0 (don't forward if not understood). - TLV Code Point The TLV type, which identifies a specific capability. The ICCP code point isrequestedlisted inthe IANA allocation sectionSection 12 below. - S-bitTheStateBit indicatesbit. Indicates whether the sender is advertising or withdrawing the ICCP capability. The State bit is used as follows: 1 - The TLV is advertising the capability specified by the TLV Code Point. 0 - The TLV is withdrawing the capability specified by the TLV Code Point. - Ver/Maj The major version revision ofthe ICCP protocol, thisICCP. This document specifies1.0. This1.0, and so this field isthenset to11. - Ver/Min The minor version revision ofthe ICCP protocol, thisICCP. This document specifies1.0. This1.0, and so this field isthenset to00. ICCP capability is advertised toaan LDP peer if there is at least one RG enabled on the local PE. 9. Client Applications 9.1. Pseudowire Redundancy Application Procedures This section defines the procedures for the Pseudowire Redundancy (PW-RED)Application.application. It should be noted that the PW-RED application SHOULD NOT be enabled together with an ACRedundancyredundancy application for the same service instance. This simplifies the operation of the multi-chassis redundancy solution (Figure 1) and eliminates the possibility of deadlock conditions between the AC and PW redundancy mechanisms. 9.1.1. Initial Setup When an RG is configured on a system and multi-chassis pseudowire redundancy is enabled in that RG, the PW-RED application MUST send an "RG Connect" message with a "PW-RED Connect TLV" to each PE that is a member of the same RG. The sending PE MUST set theA bitA-bit to 1 if it has already received a "PW-RED Connect TLV" from its peer; otherwise, the PE MUST set theA bitA-bit to 0. If aPE,PE that has sent the TLV with theA bitA-bit set to0,0 receives a "PW-RED Connect TLV" from a peer, it MUST repeat its advertisement with theA bitA-bit set to 1. The PW-REDapplication connectionApplication Connection is considered to be operational when both PEs have sent and received "PW-RED Connect TLVs" with theA bitA-bit set to 1. Once theapplication connectionApplication Connection becomes operational, the two devices can start exchanging "RG Application Data" messages for the PW-RED application. If a system receives an "RG Connect" message with a "PW-RED Connect TLV" that has adifferingdifferent Protocol Version, it must follow the procedures outlined inthe "Application Versioning" sectionSection 4.4.1 above. When the PW-RED application is disabled on thedevice,device or is unconfigured for the RG in question, the system MUST send an "RG Disconnect" message with a "PW-RED Disconnect TLV". 9.1.2. Pseudowire Configuration Synchronization A system MUST advertise its local PW configuration to other PEs that are members of the same RG. This allows the PEs to build a view of the redundant nodes and pseudowires that are protecting the same service instances. The advertisement MUST be initiated when thePW- RED application connectionPW-RED Application Connection first comes up. To that end, the system sends "RG Application Data" messages with "PW-RED Config TLVs" as part of an unsolicited synchronization. A PE MUST use a pair of"PW- RED"PW-RED Synchronization Data TLVs" to delimit the set of TLVs that are being sent as part of this unsolicited advertisement. In the case of a configuration change, a PE MUST re-advertise the mostup to dateup-to-date information for the affected pseudowires. As part of the configuration synchronization, a PE advertises the ROID associated with the pseudowire. This is used to correlate the pseudowires that are protecting each other on different PEs.As well, aA PE also advertises the configured PW redundancy mode. This can be one of the following four options: Master Mode, Slave Mode, IndependentModeMode, or Independent Mode with Request Switchover. If the received redundancy mode does not match the locally configured mode for the same ROID, then the PE MUST respond with an "RGNotification Message"Notification" message to reject the "PW-RED Config TLV". The PE MUST disable the associated local pseudowire until a satisfactory "PW-RED Config TLV" is received from the peer. This guarantees that devicemis-configurationmisconfiguration does not lead tonetwork widenetwork-wide problems(e.g.(e.g., by creating forwarding loops). The PE SHOULD also raise an alarm to alert the operator. If a PE receives aNAK TLV"NAK TLV" for an advertised "PW-RED Config TLV", it MUST disable the associated pseudowire and SHOULD raise an alarm to alert the operator. Furthermore, a PE advertises in its "PW-RED Config TLVs" a priority value that is used to determine the precedence of a given pseudowire to assume theActiveactive role in a redundant setup. A PE alsoadvertiesadvertises a Service Name that is global in the context of an RG and is used to identify which pseudowires belong to the same service. Finally, a PE also advertises the pseudowire identifier as part of this synchronization. 9.1.3. Pseudowire Status SynchronizationPEs,PEs that aremembermembers of anRG,RG synchronize pseudowire status for the purpose of identifying, on aper ROIDper-ROID basis, which pseudowire will be actively used for forwarding and which pseudowire(s) will be placed in standby state. Synchronization of pseudowire status is done by sending the "PW-RED State TLV" whenever the pseudowire state changes on a PE. This includes changes to the local end as well as the remote end of the pseudowire. A PE may request that its peer retransmit previously advertisedPW- REDPW-RED state. This isusefuluseful, forinstanceinstance, when the PE is recovering from a soft failure. To request such a retransmission, a PE MUST send a set of one or more "PW-RED Synchronization Request TLVs". A PE MUST respond to a "PW-RED Synchronization Request TLV" by sending the requested data in a set of one or morePW-RED TLVs"PW-RED TLVs" delimited by a pair of "PW-RED Synchronization Data TLVs". The TLVs comprising the response MUST be ordered such that theSynchronization"Synchronization ResponseTLVTLV" with the "Synchronization Data Start" flag precedes the various otherPW-RED TLVs"PW-RED TLVs" encoding the requested data. These, in turn, MUST precede theSynchronization"Synchronization DataTLVTLV" with the "Synchronization Data End" flag. It is worth noting that the response may spanacrossmultipleRG"RG ApplicationDataData" messages; however, the above TLV ordering MUST be retained across messages, and only a single pair ofSynchronization"Synchronization DataTLVsTLVs" must be used to delimit the response across allApplication Data Messages."Application Data" messages. A PE MAY re-advertise its PW-RED state in an unsolicited manner. This is done by sending the appropriateconfigConfig andstateState TLVs delimited by a pair of "PW-RED Synchronization Data TLVs" and using a'Request Number'"Request Number" of 0. While a PE has a pending synchronization request for a pseudowire or a service, it SHOULD silently ignore all TLVs for said pseudowire or service that are received prior to the synchronization response andwhichthat carry the same type of information being requested. This saves the system from the burden of updating state that will ultimately be overwritten by the synchronization response. Note that TLVs pertaining to other pseudowires or services are to continue to be processed per normal procedures in the interim. If a PE receives a synchronization request for a pseudowire or service that doesn't exist or is not known to the PE, then it MUST trigger an unsolicited synchronization of all pseudowire information(i.e.(i.e., replay the initialization sequence). In the subsections that follow, we describe the details of pseudowire status synchronization for each of the PW redundancy modes defined in [RFC6870]. 9.1.3.1. Independent Mode This section covers the operation in Independent Mode with or without Request Switchover capability. In this mode, the operator must ensure that for a givenRO,RO the PW Priority values configured for all associated pseudowires on a given PE are collectively higher (or lower) than those configured on other PEs in the same RG. If this condition is not satisfied after the PEs have exchanged "PW-RED State TLVs", a PE MUST disable the associated pseudowire(s) and SHOULD raise an alarm to alert the operator. Note that the PW Priority MAY be the same as the PW Precedence as defined in [RFC6870]. For a given RO, aftertheall of the PEs in an RG have exchanged their "PW-RED State TLVs", the PE with the best PW Priority(i.e.(i.e., least numeric value) advertisesActive preferential forwardingactive Preferential Forwarding status in LDP on all of its associatedpseudowires. Whereas,pseudowires, whereas all other PEs in the RG advertiseStandby preferential forwardingstandby Preferential Forwarding status in LDP on their associated pseudowires. If the service is VPWS, then only a single pseudowire per service will be selected for forwarding. This is the pseudowire that is independently advertised withActive preferential forwardingactive Preferential Forwarding status on both endpoints, as described in [RFC6870]. If the service is VPLS, then one or multiple pseudowires per service will be selected for forwarding. These are the pseudowires that are independently advertised withActive preferential forwardingactive Preferential Forwarding status on both PW endpoints, as described in [RFC6870]. 9.1.3.2. Master/Slave Mode In this mode, the operator must ensure that for a givenRO,RO the PW Priority values configured for all associated pseudowires on a given PE are collectively higher (or lower) than those configured on other PEs in the same RG. If this condition is not satisfied after the PEs have exchanged "PW-RED State TLVs", a PE MUST disable the associated pseudowire(s) and SHOULD raise an alarm to alert the operator. Note that the PW Priority MAY be the same as the PW Precedence as defined in [RFC6870]. In addition, the operator must ensurethat,that for a givenRO,RO all of the PEs in the RG are consistently configured as Master or Slave. In the context of a given RO, if the PEs in the RG are acting as Master, then the PE with the best PW Priority(i.e.(i.e., least numeric value) advertisesActive preferential forwardingactive Preferential Forwarding status in LDP on only a single pseudowire, following the procedures insectionsSections 5.2 and 6.2 of[RFC6870]. Whereas,[RFC6870], whereas all of the other pseudowires on other PEs in the RG are advertised withStandby preferential forwardingstandby Preferential Forwarding status in LDP. 9.1.4. PE Node Failure or Isolation When a PE node detects that a remotePE,PE that is a member of the sameRG,RG is no longer reachable (using the mechanismsofdescribed in Section 5), the local PEexaminesdetermines if it has redundant PWs for the affected services. If the local PE has the highest priority (after the failedPE)PE), then it becomes the active node for the services inquestion,question and subsequently activates its associated PW(s). 9.2. Attachment Circuit Redundancy Application Procedures 9.2.1. Common AC Procedures This section describes generic procedures for ACRedundancyredundancy applications, independent of the type of the AC (ATM,FRFR, or Ethernet). 9.2.1.1. AC Failure When the ACRedundancyredundancy mechanism on theActiveactive PE detects a failure of the AC, it should send an ICCPApplication Data"Application Data" message to inform the redundant PEs of the need to take over. The AC failures can be categorized into the following scenarios: - Failure of CE interface connecting to PE - Failure of CE uplink to PE - Failure of PE interface connecting to CE 9.2.1.2. Remote PE Node Failure or Isolation When a PE node detects that a remotePE,PE that is a member of the sameRG,RG is no longer reachable (using the mechanismsofdescribed in Section 5), the local PEexaminesdetermines if it has redundant ACs for the affected services. If the local PE has the highest priority (after the failedPE)PE), then it becomes the active node for the services inquestion,question and subsequently activates its associated ACs. 9.2.1.3. Local PE Isolation When a PE node detects thatisit has been isolated from the core network(i.e.(i.e., allcore facingcore-facing interfaces/links are not operational), then it should ensure that its ACRedundancyredundancy mechanism will change the status of any active ACs toStandby.standby. The ACRedundancyredundancy application SHOULD then send ICCPApplication Data"Application Data" messages in order to trigger failover to a standby PE. Note that this works only in the case of dedicated interconnect (Sections 3.2.1 and3.2.3)3.2.3), since ICCP will still have a path to the peer, even though the PE is isolated from the MPLS core network. 9.2.1.4. Determining Pseudowire State If the PEs in an RG are running an ACRedundancyredundancy application over ICCP, then the Independent Mode of PWRedundancy,redundancy, as defined in [RFC6870], MUST be used. On a given PE, the Preferential Forwarding status of the PW(Active(active orStandby)standby) is derived from the state of the associated AC(s). This simplifies the operation of the multi-chassis redundancy solution (Figure 1) and eliminates the possibility of deadlock conditions between the AC and PW redundancy mechanisms. The rules by which the PW status is derived from the AC status are as follows: - VPWS For VPWS, there's a single AC per service instance. If the AC isActive,active, then the PW status should beActive.active. If the AC isStandby,standby, then the PW status should beStandby.standby. - VPLS For VPLS, there could be multiple ACs per service instance(i.e. VFI).(i.e., Virtual Switch Instance (VSI) [RFC4026]). If AT LEAST ONE AC isActive,active, then the PW status should beActive.active. If ALL ACs areStandby,standby, then the PW status should beStandby.standby. In this case, the PW-RED application is not used to synchronize PW status between PEs. Rather, the ACRedundancyredundancy application should synchronize AC status betweenPE,PEs, in order to establish which AC (and subsequently which PE) isActiveactive orStandbystandby for a given service. When that is determined, each PE will then derive its localPWsPW's state according to the rules described above. The Preferential Forwarding status bit, described in [RFC6870], is used to advertise PW status to the remote peers. 9.2.2.Multi-chassisMulti-Chassis LACP (mLACP) Application Procedures This section defines the procedures that are specific to themulti- chassismulti-chassis LACP (mLACP) application, which is applicable for Ethernet ACs. 9.2.2.1. Initial Setup When an RG is configured on a system and mLACP is enabled in that RG, the mLACP application MUST send an "RG Connect" message with an "mLACP Connect TLV" to each PE that is a member of the same RG. The sending PE MUST set theA bitA-bit to 1 inthesaid TLV if it has received a corresponding "mLACP Connect TLV" from its peer PE; otherwise, the sending PE MUST set theA bitA-bit to 0. If a PE receives an "mLACP Connect TLV" from its peer after sendingthesaid TLV with theA bitA-bit set to 0, it MUST resend the TLV with theA bitA-bit set to 1. A system considers the mLACPapplication connectionApplication Connection to be operational when it has sent and received "mLACP Connect TLVs" with theA bitA-bit set to 1. When the mLACPapplication connectionApplication Connection between a pair of PEs is operational, the two devices can start exchanging "RG Application Data" messages for the mLACP application. This involves having each PE advertise its mLACP configuration and operational state in an unsolicited manner. A PE SHOULDsubscribe touse the followingordersequence when advertising its mLACP state upon initialapplication connectionApplication Connection setup: - Advertise system configuration - Advertise Aggregator configuration - Advertise port configuration - Advertise Aggregator state - Advertise port state A PE MUST use a pair of "mLACP Synchronization Data TLVs" to delimit the entire set of TLVs that are being sent as part of this unsolicited advertisement. If a system receives an "RG Connect" message with an "mLACP Connect TLV" that has adifferingdifferent Protocol Version, it MUST follow the procedures outlined inthe "Application Versioning" sectionSection 4.4.1 above. After the mLACPapplication connectionApplication Connection has been established, every PE MUST communicate itssystem levelsystem-level configuration to its peers via the use of the "mLACP System Config TLV". This allows every PE to discover the Node ID and the locally configured System ID and System Priority values of its peers. If a PE receives an "mLACP System Config TLV" from a remote peer advertising the same Node ID value as the local system, then the PE MUST respond with an "RGNotification Message"Notification" message to reject the "mLACP System Config TLV". The PE MUST suspend the mLACP application until a satisfactory "mLACP System Config TLV" is received from the peer. It SHOULD also raise an alarm to alert the operator. Furthermore, if a PE receives aNAK TLV"NAK TLV" for an "mLACP System Config TLV" that it has advertised, the PE MUST suspend the mLACP application and SHOULD raise an alarm to alert the network operator of potential devicemis-configuration.misconfiguration. If a PE receives an "mLACP System Config TLV" from a new peer advertising the same Node ID value as another existing peer with which the local system has an established mLACP Applicationconnection,Connection, then the PE MUST respond to the new peer with an "RGNotification Message"Notification" message to reject the "mLACP System Config TLV" and MUST ignore the offending TLV. If the Node ID of a particular PE changes due to administrative configuration action, the PE MUST then inform its peers to purge the configuration of all previously advertised ports and/oraggregators,Aggregators and MUST replay the initialization sequence by sending an unsolicited synchronizationof:of the system configuration, Aggregator configuration, port configuration, Aggregatorstatestate, and port state. It is necessary for all PEs in an RG to agree upon the System ID and System Priority values to be used ubiquitously. To achieve this, every PE MUST use the values for the two parameters that are supplied by the PE with the numerically lowest value (among RG members) of System Aggregation Priority. This guarantees that the PEs always agree on uniformvalues, whichvalues that yield the highest System Priority. When the mLACP application is disabled on thedevice,device or is unconfigured for the RG in question, the system MUST send an "RG Disconnect" message with an "mLACP Disconnect TLV". 9.2.2.2. mLACP Aggregator and Port Configuration A system MUST synchronize the configuration of itsmLACP enabledmLACP-enabled Aggregators and ports with other RG members. This is achieved via the use of "mLACP Aggregator Config TLVs" and "mLACP Port Config TLVs", respectively. An implementation MUST advertise the configuration of Aggregators prior to advertising the configuration of any of their associated member ports. The PEs in an RG MUST all agree on the MAC address to be associated with a given Aggregator. It is possible to achieve this via consistent configuration on member PEs. However, in order to protect against possible misconfiguration, a system MUST use, for any given Aggregator, the MAC address supplied by the PE with the numerically lowest System Aggregation Priority in the RG. A system that receives an "mLACP Aggregator Config TLV" with anROID to KeyROID- to-Key association that is different from its local association MUST reject the corresponding TLV and disable the Aggregator with the same ROID. Furthermore, it SHOULD raise an alarm to alert the operator. Similarly, a system that receives aNAK TLV"NAK TLV" in response to a transmitted "mLACP Aggregator Config TLV" MUST disable the associated Aggregator and SHOULD raise an alarm to alert the network operator. A system MAY enforce a restriction that all ports that are to be bundled together on a given PE share the same Port Priority value. If so, the system MUST advertise this common priority in the "mLACP Aggregator Config TLV" and assert the "Priority Set" flag insuchthat TLV. Furthermore, the system in this case MUST NOT advertise individual Port Priority values in the associated "mLACP Port Config TLVs"(i.e.(i.e., the "Priority Set" flag in these TLVs should be 0). A system MAY support individual Port Priority values to be configured on ports that are to be bundled together on a PE. If so, the system MUST advertise the individual Port Priority values in the appropriate "mLACP Port ConfigTLVs",TLVs" and MUST NOT assert the "Priority Set" flag in the corresponding "mLACP Aggregator Config TLV". When the configurations of all ports for member links associated with a given Aggregator have been sent by a device, it asserts that fact by setting the "Synchronized" flag in the last port's "mLACP Port Config TLV". If an Aggregator doesn't have any candidate member ports configured, this is indicated by asserting the "Synchronized" flag in its "mLACP Aggregator Config TLV". Furthermore, for a given port/Aggregator, an implementation MUST advertise the port/Aggregator configuration prior to advertising its state (via the "mLACP Port State TLV" or "mLACP Aggregator State TLV"). If a PE receives an "mLACP Port State TLV" or "mLACP Aggregator State TLV" for a port or Aggregator that it had not previously learnedof beforevia an appropriatePort"Port Config TLV" orAggregator"Aggregator ConfigTLV,TLV", then the PE MUST request synchronization of the configuration and state of all mLACP ports as well as all mLACP Aggregators from its respective peer.If duringDuring a synchronization (solicited or unsolicited), if a PE receives aState TLV"State TLV" for a port or Aggregator that it has not learnedofbefore, then the PE MUST send aNAK TLV"NAK TLV" for the offending TLV. The PE MUST NOT requestre-synchronizationresynchronization in this case. When mLACP is unconfigured on a port/Aggregator, a PE MUST send a "Port/Aggregator Config TLV" with the "Purge Configuration" flag asserted. This allows receiving PEs to purge any state maintained for the decommissioned port/Aggregator. If a PE receives a "Port/Aggregator Config TLV" with the "Purge Configuration" flagasserted,asserted and the PE is not maintaining any state for that port/Aggregator, then it MUST silently discard the TLV. 9.2.2.3. mLACP Aggregator and Port Status Synchronization PEs within an RG need to synchronize theirstate-machinesstate machines for proper mLACP operation with a multi-homed device. This is achieved by having each system advertise its Aggregators and ports running state in "mLACP Aggregator State TLVs" and "mLACP Port State TLVs", respectively. Whenever any LACP parameter for an Aggregator or aport,port -- whether on the Partner(i.e.(i.e., multi-homed device) side or the Actor(i.e.(i.e., PE)side,side -- ischangedchanged, a system MUST transmit an updated TLV for the affected Aggregator and/or port. Moreover, when the administrative or operational state of an Aggregator or port changes, the system MUST transmit an updated Aggregator orport statePort State TLV to its peers. If a PE receives an Aggregator orport statePort State TLV where the'Actor Key'Actor Key doesn't match what was previously received in a correspondingAggregator"Aggregator Config TLV" orport config TLV,"Port Config TLV", the PE MUST then request synchronization of the configuration and state of the affected Aggregator or port. If such a mismatch occurs between theconfigConfig andstateState TLVs as part of a synchronization (solicited or unsolicited), then the PE MUST send aNAK TLV"NAK TLV" for thestate TLV."State TLV". Furthermore, if a PE receives aport state TLV"Port State TLV" with the'Aggregator ID'"Aggregator ID" set to a value that doesn't map to some Aggregator that the PE had learnedofvia a previousAggregator config TLV,"Aggregator Config TLV", then the PE MUST request synchronization of the configuration and state of all Aggregators and ports. If the above anomaly occurs during a synchronization, then the PE MUST send aNAK TLV"NAK TLV" for the offendingport state TLV."Port State TLV". A PE MAY request that its peer retransmit previously advertised state. This isusefuluseful, forexampleexample, when the PE is recovering from a soft failure and attempting to relearn state. To request such retransmissions, a PE MUST send a set of one or more "mLACP Synchronization Request TLVs". A PE MUST respond to an "mLACP Synchronization Request TLV" by sending the requested data in a set of one or more mLACP TLVs delimited by a pair of "mLACP Synchronization Data TLVs". The TLVs comprising the response MUST be ordered in theRG"RG ApplicationDataData" message(s) such that theSynchronization"Synchronization ResponseTLVTLV" with the "Synchronization Data Start" flag precedes the various other mLACP TLVs encoding the requested data. These, in turn, MUST precede theSynchronization"Synchronization DataTLVTLV" with the "Synchronization Data End" flag. Note that the response may spanacrossmultipleRG"RG ApplicationData messages,Data" messages -- forexampleexample, when MTU limits are exceeded; however, the above ordering MUST be retained across messages, and only a single pair ofSynchronization"Synchronization DataTLVsTLVs" MUST be used to delimit the response across allApplication Data Messages."Application Data" messages. A PE device MAY re-advertise its mLACP state in an unsolicited manner. This is done by sending the appropriate Config and State TLVs delimited by a pair of "mLACP Synchronization Data TLVs" and using a'Request Number'"Request Number" of 0. While a PE has a pending synchronization request for a system,AggregatorAggregator, or port, it SHOULD silently ignore all TLVs for said system,AggregatorAggregator, or port that are received prior to the synchronization response andwhichthat carry the same type of information being requested. This saves the system from the burden of updating state that willutlimatelyultimately be overwritten by the synchronization response. Note that TLVs pertaining to other systems,AggregatorsAggregators, or ports are to continue to be processed per normal procedures in this case. If a PE receives a synchronization request for an Aggregator,portport, orKeykey that doesn't exist or is not known to the PE, then it MUST trigger an unsolicited synchronization of all system,AggregatorAggregator, and port information(i.e.(i.e., replay the initialization sequence). If a PE learns, as part of a synchronization operation from its peer, that the latter is advertising a Node ID valuewhichthat is different from the value previously advertised, then the PE MUST purge allport/aggregatorPort/Aggregator data previouslylearntlearned from that peer prior to the last synchronization. 9.2.2.4. Failure and Recovery When a PE that is active for a multi-chassis link aggregation group encounters a core isolation fault, it SHOULD attempt tofail-overfail over to a peer PEwhichthat hosts the same RO. The defaultfail-overfailover procedure is to have the failed PE bring down thelink(s)link or links towards the multi-homed CE(e.g.(e.g., by bringing down theline-protocol).line protocol). This will cause the CE tofail-overfail over to the other memberlink(s)link or links of the bundle that are connected to the other PE(s) in the RG. Other procedures for triggeringfail-overfailover arepossible, andpossible; such procedures are outside the scope of this document. Upon recovery from a previous fault, a PE MAY reclaim the active role for a multi-chassis link aggregation group if configured for revertive protection. Otherwise, the recovering PE may assume the standby role when configured for non-revertive protection. In the revertive scenario, a PE SHOULD assume the active role within the RG by sending an "mLACP Port Priority TLV" to the currently active PE, requesting that the latter change its port priority to a value that is lower(i.e.(i.e., numerically larger) for the Aggregator in question. If a system is operating in a mode where different ports of a bundle are configured with different Port Priorities, then the system MUST NOT advertise or requestchangechanges of Port Priority values for aggregated ports collectively(i.e.(i.e., by using a'Port Number'"Port Number" of 0 in the "mLACP Port Priority TLV"). This is to avoid ambiguity in the interpretation of the'Last"Last PortPriority'Priority" field. If a PE receives an "mLACP Port Priority TLV" requesting a priority change for a port or Aggregator that is not local to the device, then the PE MUST re-advertise the local configuration of the system, as well as the configuration and state of all of its mLACP ports and Aggregators. If a PE receives an "mLACP Port Priority TLV" in which the remote system is advertising priority change for a port or Aggregator that the local PE had not previously learnedof beforevia an appropriatePort"Port Config TLV" orAggregator"Aggregator ConfigTLV,TLV", then the PE MUST request synchronization of the configuration and state of all mLACP ports as well as all mLACP Aggregators from its respective peer. 10. Security Considerations ICCP SHOULD only be used inwell managedwell-managed and highly monitored networks. It ought not be deployed on or over the public Internet.TheICCPprotocolis not intended to be applicable when theredundancy groupRedundancy Group spansPEPEs in different administrative domains. The security considerations described in [RFC5036] and [RFC4447] that apply to the base LDPspecification,specification and to the PW LDP control protocol extensions apply to the capability mechanism described in this document. In particular, ICCP implementations MUST provide a mechanism to select to which LDP peers the ICCP capability will be advertised, and from which LDP peers the ICCP messages will be accepted. Therefore, an incoming ICCP connection request MUST NOT be accepted unless its source IP address is known to be the source of an "eligible" ICCP peer. The set of eligible peers could bepre- configured (either aspreconfigured (as a list of either IPaddresses,addresses oras a list ofaddress/mask combinations), or it could be discovered dynamically via some secure discovery protocol. The TCP Authentication Option(TCP- AO),(TCP-AO), as defined in [RFC5925], SHOULD be used. This provides integrity and authentication for the ICCP messages and eliminates thepossiblitypossibility of source address spoofing. However, for backwards compatibility and/or to accommodate the ease of migration, the LDP MD5 authentication key option, as described insectionSection 2.9 of[RFC5036][RFC5036], MAY be used instead. The security framework and considerations for MPLS in general, and LDP in particular, as described in [RFC5920] apply to this document. Moreover, the recommendations of [RFC6952] and mechanisms of[LDP- CRYPTO][LDP-CRYPTO] aimed at addressing LDP's vulnerabilities are applicable as well. Furthermore,activitiyactivity on the attachmentciruitscircuits may cause security threats or be exploited to createdenial of service attackes.denial-of-service attacks. For example, a malicious CE implementation may trigger continuouslyvariyingvarying LACP messages that lead to excessive ICCP exchanges. Also, excessive link bouncing of the attachment circuits may lead to the same effect. Similar arguments apply to the inter-PE MPLS links. Implementations SHOULD provide mechanisms to perform control-plane policing and mitigatesuchthese types of attacks. 11. Manageability Considerations Implementations SHOULD generally minimize the number of parameters required to configureICCP, as this contributesICCP in order to help make ICCP easier tothe ease ofuse. Implementations SHOULD allow the user to control the RGID via configuration, as this is required to support flexible grouping of PEs in RGs. Furthermore, implementations SHOULD provide mechanisms to troubleshoot the correct operation ofICCP,ICCP; this includes providing mechanisms to diagnose ICCP connections as well as Applicationconnections.Connections. Implementations MUST provide a means for the user to indicate the IP addresses of remote PEs that are to be members of a given RG. Automatic discovery of RG membership MAY besupported, andsupported; this topic is outside the scope of this specification. 12. IANA Considerations 12.1.MESSAGE TYPE NAME SPACEMessage Type Name Space This document uses several new LDP messagetypes,types. IANAalreadymaintainsathe "Message Type Name Space" registryof name "MESSAGE TYPE NAME SPACE"as defined by [RFC5036]. The following valuesare suggested for assignment:have been assigned: MessagetypeType Description ------------- ---------------------------- 0x0700 RG Connect Message 0x0701 RG Disconnect Message 0x0702 RG Notification Message 0x0703 RG Application Data Message 0x0704-0x070F Reserved for future ICCP use 12.2. TLVTYPE NAME SPACEType Name Space This document uses a new LDP TLVtype,type. IANAalreadymaintainsa registry of namethe "TLVTYPE NAME SPACE"Type Name Space" registry as defined by [RFC5036]. The following valueis suggested for assignment:has been assigned: TLV Type Description0x700-------- ------------------- 0x0700 ICCP capabilityTLV.TLV 12.3. ICC RG Parameter Type Space IANAneeds to set uphas created a registryofcalled "ICC RGparameter type", to be added toParameter Types", within thelist of"Pseudowire Name Spaces (PWE3)"registries.registry. ICC RG parameter types are 14-bit values. Parameter Type values 1 through 0x003A are specified in thisdocument,document. Parameter Type values 0x003B through 0x1FFF are to be assigned by IANA, using the "Expert Review" policy defined in [RFC5226]. Parameter Type values 0x2000 through 0x2FFF, 0x3FFF, and 0 are to be allocated using theIETF consensus"IETF Review" policy defined in [RFC5226]. Parameter Type values 0x3000 through 0x3FFE are reserved for vendor proprietary extensions and are to be assigned by IANA, using the "First Come First Served" policy defined in [RFC5226]. Initial ICC parameter type space value allocations are specified below: Parameter Type Description --------------------------------------------------------------------------------- 0x0001 ICC Sender Name 0x0002 NAK TLV 0x0003 Requested Protocol Version TLV 0x0004 Disconnect Code TLV 0x0005 ICC RG ID TLV 0x0006-0x000F Reserved 0x0010 PW-RED Connect TLV 0x0011 PW-RED Disconnect TLV 0x0012 PW-RED Config TLV 0x0013 Service Name TLV 0x0014 PW ID TLV 0x0015 Generalized PW ID TLV 0x0016 PW-RED State TLV 0x0017 PW-RED Synchronization Request TLV 0x0018 PW-RED Synchronization Data TLV 0x0019 PW-RED Disconnect Cause TLV 0x001A-0x002F Reserved 0x0030 mLACP Connect TLV 0x0031 mLACP Disconnect TLV 0x0032 mLACP System Config TLV 0x0033 mLACP Port Config TLV 0x0034 mLACP Port Priority TLV 0x0035 mLACP Port State TLV 0x0036 mLACP Aggregator Config TLV 0x0037 mLACP Aggregator State TLV 0x0038 mLACP Synchronization Request TLV 0x0039 mLACP Synchronization Data TLV 0x003A mLACP Disconnect Cause TLV 12.4.STATUS CODE NAME SPACEStatus Code Name Space This documentuseuses several new Statuscodes,codes. IANAalreadymaintainsathe "Status Code Name Space" registryof name "STATUS CODE NAME SPACE"as defined by [RFC5036]. The following valuesis suggested for assignment: Thehave been assigned; the "E" column is the required setting of the Status Code E-bit. Range/Value E Description------------------------- --------------------------------------------------------------------- 0x00010001 0 Unknown ICCP RG 0x00010002 0 ICCP Connection Count Exceeded 0x00010003 0 ICCP Application Connection Count Exceeded 0x00010004 0 ICCP Application not in RG 0x00010005 0 Incompatible ICCP Protocol Version 0x00010006 0 ICCP Rejected Message 0x00010007 0 ICCP Administratively Disabled 0x00010010 0 ICCP RG Removed 0x00010011 0 ICCP Application Removed from RG 13. Acknowledgments The authors wish to acknowledge the important contributions of Dennis Cai, Neil McGill, Amir Maleki, Dan Biagini, Robert Leger, Sami Boutros, NeilKetleyKetley, and Mark Christopher Sains. The authors also thank Daniel Cohn, LizhongJinJin, and Ran Chen forthetheir valuable input,discussionsdiscussions, and comments. 14. References 14.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC5036]L. Andersson et al,Andersson, L., Ed., Minei, I., Ed., and B. Thomas, Ed., "LDP Specification", RFC 5036, October 2007. [RFC5561] Thomas, B., Raza, K., Aggarwal, S., Aggarwal, R., and JL. Le Roux, "LDP Capabilities",RFC5561,RFC 5561, July 2009.[RFC4447] "Transport of Layer 2 Frames Over MPLS",[RFC4447] Martini, L.,et al., rfc4447Ed., Rosen, E., El-Aawar, N., Smith, T., and G. Heron, "Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)", RFC 4447, April 2006. [IEEE-802.1AX] IEEE Std. 802.1AX-2008, "IEEE Standard for Local and metropolitan areanetworks- Linknetworks--Link Aggregation", IEEE Computer Society, November 2008. [RFC2863]K.McCloghrie, K. and F. Kastenholz, "The Interfaces Group MIB",rfc2863,RFC 2863, June 2000. [RFC6870]PraveenMuley,MustaphaP., Ed., and M. Aissaoui, Ed., "Pseudowire Preferential Forwarding Status Bit", RFC 6870, February 2013. [RFC5920]L.Fang, L., Ed., "Security Framework for MPLS and GMPLS Networks",rfc5920,RFC 5920, July 2010. [RFC6952]M. Jethanandani et al.,Jethanandani, M., Patel, K., and L. Zheng, "Analysis of BGP, LDP, PCEP, and MSDP Issues According to the Keying and Authentication for Routing Protocols (KARP) Design Guide",rfc6952,RFC 6952, May 2013. [RFC5925]J. Touch et al.,Touch, J., Mankin, A., and R. Bonica, "The TCP Authentication Option", RFC 5925, June 2010.15.14.2. Informative References [RFC2922]Bierman &Bierman, A. and K. Jones, "Physical Topology MIB",RFC2922,RFC 2922, September 2000. [RFC4026] Andersson, L. and T. Madsen, "Provider Provisioned Virtual Private Network (VPN) Terminology", RFC 4026, March 2005. [RFC5880]D.Katz, D. and D. Ward, "Bidirectional ForwardingDetection", RFC5880,Detection (BFD)", RFC 5880, June20102010. [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA ConsiderationssectionSection in RFCs", BCP 26, RFC 5226, May20082008. [RFC3629]F.Yergeau, F., "UTF-8, a transformation format of ISO 10646", STD 63, RFC 3629, November 2003. [LDP-CRYPTO]L. Zheng et al.,Zheng, L., Chen, M., and M. Bhatia, "LDP Hello CryptographicAutentication", draft-ietf-mpls-ldp-hello-crypto-auth-02, workAuthentication", Work inprogress, August 2013. 16. Author'sProgress, June 2014. Authors' Addresses Luca Martini Cisco Systems, Inc. 9155 East Nichols Avenue, Suite 400 Englewood,CO,CO 80112e-mail:United States EMail: lmartini@cisco.com Samer Salam Cisco Systems, Inc. 595 Burrard Street, Suite 2123 Vancouver, BC V7X 1J1 Canadae-mail:EMail: ssalam@cisco.com Ali Sajassi Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134e-mail:United States EMail: sajassi@cisco.com Matthew Bocci Alcatel-LucentGrove House, WalthamVoyager Place Shoppenhangers RoadRd White Waltham,Maidenhead Berks,UK.SL63TN e-mail: matthew.bocci@alcatel-lucent.co.uk2PJ UK EMail: matthew.bocci@alcatel-lucent.com Satoru Matsushima Softbank Telecom 1-9-1, Higashi-Shinbashi, Minato-ku Tokyo105-7313, JAPAN e-mail: satoru.matsushima@gmail.com105-7304 Japan EMail: satoru.matsushima@g.softbank.co.jp Thomas Nadeau Brocadee-mail:EMail: tnadeau@brocade.comCopyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.