L2VPN Working Group HimanshuInternet Engineering Task Force (IETF) H. ShahInternet-Draft Ciena Corp Intended Status:Request for Comments: 7436 Cinea Corp. Category: HistoricEricE. RosenFrancoisISSN: 2070-1721 Juniper Networks F. Le FaucheurGilesG. Heron Cisco SystemsOctober 30,December 2014 IP-Only LAN Service (IPLS)draft-ietf-l2vpn-ipls-16.txtAbstract A Virtual Private LAN Service (VPLS) is used to interconnect systems across a wide-area or metropolitan-area network, making it appear that they are on a private LAN. The systemswhichthat are interconnected may themselves be LAN switches. If, however, they are IP hosts or IP routers, certain simplifications to the operation of the VPLS are possible. We call this simplified type of VPLS an "IP-only LAN Service" (IPLS). In an IPLS, as in a VPLS, LAN interfaces are run in promiscuous mode, and frames are forwarded based on their destinationMACMedia Access Control (MAC) addresses. However, the maintenance of the MAC forwarding tables is done via signaling, rather than via the MAC address learning procedures specified in[IEEE 802.1D].the IEEE's "Media Access Control (MAC) Bridges". Thisdraftdocument specifies the protocol extensions and procedures for support of the IPLS service. The original intent was to provide an alternate solution to VPLS for thosePEProvider Edge (PE) routers that were not capable of learning MACaddressaddresses through data plane. This became a non-issue with newer hardware. The concepts put forth by thisdraftdocument are still valuable and are adopted in one form or other by newer work such as Ethernet VPN in L2VPNWorking Groupworking group and possible data center applications. At this point, no further action is planned to update this document and it is published simply as a historic record of the ideas. Status ofthisThis Memo This document is not an Internet Standards Trackspecificaion;specification; it is published for the historical record. This document defines a Historic Document for the Internet community. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; seesectionSection 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained athttp://www.rfc-editor.org/info/rfc6348. This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire on April 30, 2015 Internet Draft draft-ietf-l2vpn-ipls-16.txthttp://www.rfc-editor.org/info/rfc7436. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.Internet Draft draft-ietf-l2vpn-ipls-16.txtTable of ContentsCopyright Notice .................................................... 1 Abstract.............................................................. 2 1.0 Contributing Authors ............................................. 3 2.0 Overview.......................................................... 4 2.11. Overview ........................................................4 1.1. Terminology..................................................... 7 3.0 Topology.......................................................... 8 4.0 Configuration..................................................... 9 5.0 Discovery........................................................ 10 5.1................................................7 2. Topology ........................................................9 3. Configuration ..................................................10 4. Discovery ......................................................10 4.1. CEdiscovery ................................................... 10 5.1.1 IPv4 basedDiscovery ..............................................10 4.1.1. IPv4-Based CEdiscovery ..................................... 10 5.1.2 Ipv6 basedDiscovery ............................11 4.1.2. IPv6-Based CEdiscovery [RFC 4861] .......................... 10 6.0 Pseudowire Creation.............................................. 11 6.1Discovery (RFC 4861) .................11 5. PW Creation ....................................................11 5.1. Receive UnicastMultipoint-to-point Pseudowire ................. 11 6.2Multipoint-to-Point PW ....................11 5.2. Receive Multicast Multipoint-to-pointPseudowire ............... 11 6.3PW ..................12 5.3. Send Multicast Replicationtree ................................ 12 7.0 Signaling........................................................ 13 7.1Tree ...........................13 6. Signaling ......................................................13 6.1. IPLS PW Signaling.............................................. 13 7.2.........................................13 6.2. IPv6 Capability Advertisement.................................. 17 7.3.............................17 6.3. Signaling Advertisement Processing............................. 18 8.........................18 7. IANAConsiderations............................................... 19 8.1.Considerations ............................................19 7.1. LDP Statusmessages ........................................... 19 8.2.Messages .......................................19 7.2. Interface Parameters.......................................... 19 9.0 Forwarding....................................................... 19 9.1......................................19 8. Forwarding .....................................................20 8.1. Non-IP ornon-ARP traffic ...................................... 19 9.2Non-ARP Traffic .................................20 8.2. Unicast IP Traffic............................................. 20 9.3........................................20 8.3. Broadcasts and Multicast IP Traffic............................ 20 9.4.......................20 8.4. ARP Traffic.................................................... 20 9.6...............................................21 8.5. Discovery of IPv6 CE Devices ..............................21 8.5.1. Processing of Neighbor Solicitations ...............22 8.5.2. Processing of Neighbor Advertisements ..............22 8.5.3. Processing of Inverse Neighbor Solicitations and Advertisement ....................22 8.5.4. Processing of Router Solicitations and Advertisements .....................................23 8.6. Encapsulation.................................................. 23 10.0.............................................23 9. Attaching to IPLS via ATM orFR............................... 23 11.0Frame Relay (FR) ..................24 10. VPLSvs IPLS.................................................... 23 12.0 IP Protocols.................................................... 24 13.0 Dual Homing with IPLS........................................... 25 14.0vs. IPLS .................................................24 11. IP Protocols ..................................................25 12. Dual-Homing with IPLS .........................................25 13. Proxy ARPfunction.............................................. 25 14.1Function ............................................26 13.1. ARP Proxy - Responder......................................... 25 14.2....................................26 13.2. ARP Proxy - Generator......................................... 25 15.0....................................26 14. Data Center Applicability...................................... 25 16.0 Acknowledgements................................................ 26 17.0.....................................27 15. SecurityConsiderations......................................... 27 17.1 Control plane security ........................................ 27 17.2 Data plane security ........................................... 28 18.0 References...................................................... 29 18.1Considerations .......................................27 15.1. Control-Plane Security ...................................27 15.2. Data-Plane Security ......................................28 16. References ....................................................29 16.1. Normative References.......................................... 29 18.2.....................................29 16.2. Informative References........................................ 29 19.0 Author's Address................................................ 30 2.0...................................30 Acknowledgements ..................................................31 Contributors ......................................................31 Authors' Addresses ................................................32 1. Overview As emphasized in [VPLS], Ethernet has become popular as an access technology inMetropolitanmetropolitan- andWide Area Networks.wide-area networks. [VPLS] describes how geographically dispersed customer LANs can be interconnected over a service provider's network. The VPLS service is provided by Provider Edge (PE) devices that connect Customer Edge (CE) devices. The VPLS architecture provides this service by incorporating bridging functions such as MAC address learning in the PE devices.Provider EdgePE platforms are designed primarily to be IProuters,routers rather thanto beLAN switches. To add VPLS capability to a PE router, one has to addMAC address learningMAC- address-learning capabilities, along with aging and other mechanisms native to Ethernet switches. This may be fairly complex to add to theforwarding planeforwarding-plane architecture of an IP router. As discussed in [L2VPN-FWK], in scenarios where the CE devices are NOT LAN switches, but rather are IP hosts or IP routers, it is possible to provide the VPLS service without requiring MAC address learning and aging on the PE. Instead, a PE router has to have the capability to match the destination MAC address in a packet received from a CE to an outboundpseudowire.PW. The requirements for the IPLS service are described in [L2VPN-REQTS]. The purpose of this document is to specify a solution optimized for IPLS. IPLS provides a VPLS-like service using PE routers that are not designed to perform general LAN bridging functions. One must be willing to accept the restriction that an IPLS be used for IP traffic only, and not used to interconnect CE devices that are themselves LAN switches. This is an acceptable restriction in many environments, given that IP is the predominant type of traffic in today's networks. The original intent was to provide an alternate solution to VPLS for those PE routers that were not capable of learning MACaddressaddresses through the data plane. This became a non-issue with newer hardware. The concepts put forth by thisdraftdocument are still valuable and are adopted in one form or other by newer work such as Ethernet VPN inL2VPN Working Groupthe LVPN working group and possible data center applications. At this point, no further action is planned to update this document and is published simply as a historic record of the ideas.Internet Draft draft-ietf-l2vpn-ipls-16.txtIn IPLS, a PE device implementsmulti-pointmultipoint LAN connectivity for IP traffic using the following key functions: 1. CE Address Discovery: EachProvider Edge (PE)PE device discovers the MAC address of the locally attachedCustomer Edge (CE)CE IP devices, for each IPLS instance configured on the PE device. In some configurations, the PE also learns the IP address of the CE device (when performing ARP proxy functions, described later in the document). 2. Pseudowire (PW) for Unicast Traffic: For each locally attached CE device in a given IPLS instance, a PE device sets up a pseudowire (PW-LSP) to each of the other PEs that supports the same IPLS instance. For instance, if PEx and PEy both support IPLS I, and PEy is locally attached to CEa and CEb, PEy will initiate the setup of twopseudowiresPWs between itself and PEx. One of these will be used to carry unicast traffic from any of PEx's CE devices to CEa. The other will be used to carry unicast traffic from any of PEx's CE devices to CEb. Note that thesepseudowiresPWs carry traffic only in one direction. Further, while thepseudowirePW implicitly identifies the destination CE of the traffic, it does not identify the source CE; packets from different source CEs bound to the same destination CE are sent on a singlepseudowire.PW. 3. Pseudowires for Multicast Traffic: In addition, every PE supporting a given IPLS instance will set up a special 'multicast pseudowire' to every other PE in that IPLS instance. If, in the above example, one of PEx's CE devices sends a multicast packet, PEx would forward the multicast packet to PEy on the special 'multicast' pseudowire. PEy would then send a copy of that packet to CEa and a copy to CEb. The 'multicast' pseudowire carries Ethernet frames of multicast/broadcast IP,ARPARP, and ICMP (Inverse) Neighbor Discovery (ND/IND) packets for IPv6.ThusThus, when a PE sends a multicast packet across the network, it sends one copy to each remote PE (supporting the given IPLS instance). If a particular remote PE has more than one CE device in that IPLS instance, the remote PE must replicate the packet and send one copy to each of its local CEs. As with the pseudowires that are used for unicast traffic, packets travel in only one direction on these pseudowires, and packets from different sources may be freely intermixed.Internet Draft draft-ietf-l2vpn-ipls-16.txt4. Signaling: The necessary pseudowires can be set up and maintained using theLDP-basedsignaling procedures based on the Label Distribution Protocol (LDP) described in [PWE3-CONTROL]. A PE may assign the same label to each of the unicast pseudowires that lead to a given CE device, in effect creating a multipoint-to-point pseudowire. Similarly, a PE may assign the same label to each of the 'multicast' pseudowires for a given IPLS instance, in effect creating a multipoint-to-point pseudowire. When setting up a pseudowire to be used for unicast traffic, the PE must also signal the MAC address of the corresponding CE device. It should also, optionally, advertise the IP address of the local CE device, especially when ARP proxy function is configured or simply for operational management purposes. Similarly, for IPv6 support, PE may optionally advertise the IPv6 addresses of the local CE device. 5. ARP Packet Forwarding: ARP packets [ARP] are forwarded from the attachment circuit (AC) to 'multicast' pseudowires in the Ethernet frame format as described by[PWE3-ETH].The[PWE3-ETH]. The following rules are observed when processing ARPpackets,packets: a. Both broadcast (request) and unicast (response) ARP packets are sent over the 'multicast' pseudowire. b. When an ARP packet is received from an AC, the packet is copied to the control plane for the purpose of learning the MAC address of the CE. Optionally, an IP address is also learned to record the association of the IP and MAC address. c. All Ethernet packets, including ARP packets, received from the 'multicast' pseudowire are forwarded out to all the ACs associated with the IPLS instance. These packets are not copied to the control plane. 6. ICMP IPv6ND/IND relatedND/IND-related Packet Forwarding:(Inverse) Neighbor Discovery (ND/IND)ND/IND IPv6 packets from an AC are replicated and a copy is sent to other ACs and to 'multicast' PWs associated with the IPLS instance in the native Ethernet format, unchanged. A copy is also submitted toControl Planethe control plane to learn the MAC addressand optionallyand, optionally, corresponding IPv6 addresses. 7. Multicast IP packet forwarding: An IP Ethernet frame received from an AC is replicated to other ACs and the 'multicast'pseudowiresPWs associated with the IPLS instance. An IP Ethernet frame received from a 'multicast'pseudowirePW is replicated to all the egress ACs associated with the IPLS instance.Internet Draft draft-ietf-l2vpn-ipls-16.txt8. Unicast IP packet forwarding: An IP packet received from the AC is forwarded based on the MACDADestination Address (DA) lookup in the forwarding table. If a match is found, the packet is forwarded to the associated egress interface. If the egress interface is unicastpseudowire,PW, the packet is sent without a MAC header. If the egress interface is a localACAC, the Ethernet frame is forwarded as such. An IP packet received from the unicastpseudowirePW is forwarded to the egress AC with the MAC header prepended. The MAC DA is derived from the forwarding table while the MACSASource Address (SA) is the MAC address of the PE. Both VPLS [VPLS] and IPLS require the ingress PE to forward a frame based on its destination MAC address. However, two key differences between VPLS and IPLS can be noted from the above description:.- In VPLS, MAC entries are placed in the Forwarding Information Base (FIB) of the ingress PE as a result of MAC address learning (which occurs in the dataplane) whileplane); whereas, inIPLSIPLS, MAC entries are placed in the FIB as a result ofpseudowirePW signaling operations (control plane)..- In VPLS, the egress PE looks up a frame'sdestinationMACaddressDA to determine the egress AC; in IPLS, the egress AC is determined entirely by the ingress PW-label. The following sections describe the details of the IPLS scheme.2.11.1. TerminologyConventionsThe key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described inRFC 2119.[RFC2119]. IPLS IPLS stands for IP-only LAN service (a type of Virtual Private LAN Service that is restricted to IP traffic only).mp2pMP2P PW Multipoint-to-PointPseudowire. A pseudowirePseudowire is a PW that carries traffic from remote PE devices to a PE device that signals thepseudowire.PW. The signaling PE device advertises the samePW- labelPW-label to all remote PE devices that participate in the IPLS service instance. In IPLS, for a given IPLS instance, anmp2pMP2P PW used for IP unicast traffic is established by a PE for each CE device locally attached to that PE. It is a unidirectional tree whose leaves consist of the remote PE peers (which connect at least one AC associated with the same IPLS instance) and whose root is the signaling PE. Traffic flows from the leaves towards the root. Multicast PW Multicast/broadcastPseudowire. APseudowire is a special kind ofmp2pMP2P PW that carries IP multicast/broadcast traffic, all ARP frames and ICMP (I)ND frames for IPv6. In the IPLS architecture, for each IPLS instance supported by a PE, that PE device establishes exactly one multicast PW. Multicast PW uses Ethernet encapsulation.Internet Draft draft-ietf-l2vpn-ipls-16.txtUnicast PW UnicastPseudowirepseudowire carries IP unicast packets. A PE creates unicast PW for each locally attached CE. The unicast PW uses IPLayer2Layer 2 (L2) transport encapsulation. CECustomer Edge device.In this document, aCECustomer Edge (CE) is any IP node (host or router) connected to the IPLS LAN service. ReplicationTreeThe collection of all multicast PWs and ACs Tree that are members of an IPLS service instance on a given PE. When a PE receives a multicast/broadcast packet from an AC, the PE device sends a copy of the packet to every multicastpseudowirePW and AC of the replication tree, excluding the AC on which the packet was received. When a PE receives a packet from a multicast PW, the PE device sends a copy of the packet to all the ACs of the replication tree and never to other PWs. (I)ND (Inverse) Neighbor Discovery in IPv6 uses ICMP packets. It is a protocol that uses Neighborsolicitation/AdvertisementSolicitation (NS) / Neighbor Advertisement (NA) PDUs. RS RouterSolicitation. HostsSolicitation is when hosts generate all router multicast ICMPpacketpackets to discover the IPv6 router on the local link. RA RouterAdvertisement. RouterAdvertisement occurs when a router generates all multicast ICMPpacketpackets to advertise its presence on the link. A unicast response is also sent when RS is received. NS Neighbor Solicitation in IPv6 uses (multicast) ICMP packets to resolve the association of the IPv6 interface address to the MACaddress association.address. NA Neighbor Advertisement in IPv6 uses (unicast) ICMP packets to respond to NS.3.02. Topology TheCustomer Edge (CE)CE devices are IP nodes (hosts or routers) that are connected to PE devices eitherdirectly,directly or via an Ethernet network. We assume that the PE/CE connection may be regarded by the PE as an "interface" to which one or more CEs are attached. This interface may be a physical LAN interface or a VLAN. TheProvider Edge (PE)PE routers are MPLS Label Edge Routers (LERs) that serve aspseudowirePW endpoints.Internet Draft draft-ietf-l2vpn-ipls-16.txt+----+ +----+ + S1 +---+ ........................... +---| S2 | +----+ | | . . | +----+ IPa | | +----+ +----+ | IPe + +---| PE1|---MPLS and/or IP---| PE2|---+ / \ +----+ |Network +----+ | +----+ +---+ . | . | +----+ + S1 + | S1| . +----+ . +---| S2 | +----+ +---+ ..........| PE3|........... +----+ IPb IPc +----+ IPf | | +----+ | S3 | +----+ IPd In the above diagram, an IPLS instance is shown with three sites: site S1, siteS2S2, and site S3. In site S3, the CE device is directly connected to its PE. In the other two sites, there are multiple CEs connected to a single PE. More precisely, the CEs at these sites are on an Ethernet (switched at site 1 and shared at site 2) network (or VLAN), and the PE is attached to that same Ethernet network or VLAN). We impose the following restriction: if one or more CEs attach to a PE by virtue of being on a common LAN or VLAN, there MUST NOT be more than one PE on that LAN or VLAN. PE1,PE2PE2, and PE3 are shown as connected via an MPLS network; however, other tunneling technologies, such asGRE, L2TPv3,Generic Routing Encapsulation (GRE), Layer 2 Tunneling Protocol version 3 (L2TPv3), etc., could also be used to carry thepseudowires.PWs. An IPLS instance is a single broadcast domain, such that each IP end station (e.g., IPa) appears to be co-located with other IP end stations (e.g., IPb through IPf) on the same subnet. The IPLS service is transparent to the CE devices and requires no changes to them.4.03. Configuration Each PE router is configured with one or more IPLS service instances, and each IPLS service instance is associated with a unique VPN-Id. For a given IPLS service instance, a set of ACs is identified. Each AC can be associated with only one IPLS instance. An AC, in this document, is either a customer-facing Ethernet port, or a particular VLAN (identified by an IEEE 802.1Q VLAN ID) on a customer-facing Ethernet port. The PE router can optionally be configured with a local MAC address to be used as a source MAC address when IP packets are forwarded fromInternet Draft draft-ietf-l2vpn-ipls-16.txtapseudowirePW to an AC. By default, a PE uses the MAC address of the customer-facing Ethernet interface for this purpose.5.04. Discovery The discovery process includes:.- Remote PE discovery.- VPN (i.e., IPLS) membership discovery.- IP CE end station discovery Thisdraftdocument does not discuss the remote PE discovery or VPN membership discovery. This information can either be user configured or can be obtained using auto-discovery techniques described in [L2VPN-SIG] or other methods. However, the discovery of the CE is an important operational step in the IPLS model and is described below.5.14.1. CEdiscoveryDiscovery Each PE actively detects the presence of local CEs by snooping IP and ARP frames received over the ACs. When an AC configured in an IPLS instance becomes operational, it enters the CE discovery phase. In this phase, the PE examines each multicast/broadcast Ethernet frame. For link-local IP frames (forexampleexample, IGP discovery/multicast/broadcast packets typically 224.0.0.x addresses[RFC-1112]),[RFC1112]), the CE's (source) MAC address is extracted from the Ethernet header and the (source) IP address is obtained from the IP header. For each CE, the PE maintains the following tuple: <Attachment Circuit identification info, VPN-Id, MAC address, IP address (optional)>.5.1.1 IPv4 based4.1.1. IPv4-Based CEdiscoveryDiscovery As indicated earlier, a copy of ARP frames received over the AC is submitted to the control plane. The PE learns the MAC address and optionally the IP address of the CE from the source address fields of the ARP PDU. Once a CE is discovered, its status is monitored continuously by examining the received ARP frames and by periodically generating ARP requests. The absence of an ARP response from a CE after a configurable number of ARP requests is interpreted as loss of connectivity with the CE.5.1.2 Ipv6 based4.1.2. IPv6-Based CEdiscovery [RFC 4861]Discovery (RFC 4861) A copy of Neighbor and Router Discovery frames received over the AC are submitted to the control plane in the PE.Internet Draft draft-ietf-l2vpn-ipls-16.txtIf the PE receivesa Neighbor Solicitationan NS message, and the source IP address of the message is not the unspecified address, the PE learns the MAC address and optionally the IP address of the CE. If the PE receives an unsolicitedNeighbor AdvertisementNA message, the PE learns the source MAC address and optionally the IP address of the CE. If the PE receivesa Router Solicitation,an RS, and the source IP address of the message is not the unspecified address, the PE learns source MAC address and optionally the IP address of the CE. If the PE receivesa Router Advertisement,an RA, it learns the source MAC address and optionally the IP address of the CE. The PE will periodically generateNeighbor SolicitationNS messages for the IP address of the CE as a means of verifying the continued existence of the address and its MAC address binding. The absence of a response from the CE device for a given number of retries could be interpreted as a loss of connectivity with the CE.6.0 Pseudowire5. PW Creation6.15.1. Receive UnicastMultipoint-to-point PseudowireMultipoint-to-Point PW As the PE discovers each locally attached CE, a unicast multipoint- to-point pseudowire(mp2p(MP2P PW) associated exclusively with that CE is created by distributing the MAC address and optionally the IP address of the CE along with a PW-Label to all the remote PE peers that participate in the same IPLS instance. Note that the same value of a PW-label SHOULD be distributed to all the remote PE peers for a given CE. Themp2pMP2P PW thus created is used by remote PEs to send unicast IP traffic to a specific CE. (The same functionality can be provided by a set of point-to-point PWs, and the PE is not required to send the same PW-label to all the other PEs. For convenience, however, we will use the termmp2pMP2P PWs, which may be implemented using a set of point-to-point PWs.) The PE forwards a frame received over thismp2pMP2P PW to the associated AC. The unicastpseudowirePW uses IPLayer2Layer 2 Transport encapsulation asdefinedefined in [PWE3-CONTROL].6.25.2. Receive MulticastMultipoint-to-point PseudowireMultipoint-to-Point PW When a PE is configured to participate in an IPLS instance, it advertises a 'multicast' PW-label to every other PE that is a memberInternet Draft draft-ietf-l2vpn-ipls-16.txtof the same IPLS. The advertised PW-label value is the same for each PE, which creates anmp2p pseudowire.MP2P PW. There is only one such multicastmp2pMP2P PW per PE for each IPLSinstanceinstance, and thispseudowirePW is used exclusively to carry IP multicast/broadcast, ARPtraffictraffic, and (inverse) Neighbor Discovery packets for IPv6 from the remote PEs to this PE for this IPLS instance. Note that no special functionality is expected from thispseudowire.PW. We call it a 'multicast'pseudowirePW because we use it to carry multicast and broadcast IP,ARPARP, and IPv6 Neighbor Discovery traffic. ThepseudowirePW itself need not provide any different service than any of the unicastpseudowires.PWs. In particular, the Receive multicastmp2pMP2P PW does not perform any replication of frames itself. Rather, it is there to signify to the PE that the PE may need to replicate a copy of a frame received over thismp2pMP2P PW onto all theACACs that are associated with the IPLS instance of themp2pMP2P PW. The multicastmp2p pseudowireMP2P PW is considered the principlepseudowirePW in the bundle ofmp2p pseudowiresMP2P PWs thatconsistconsists of one multicastmp2p pseudowireMP2P PW and a variable number of unicastmp2p pseudowiresMP2P PWs for a given IPLS instance. In a principle role, multicast PW represents the IPLS instance. The life of all unicast PWs in the IPLS instance depends on the existence of the multicast PW. If, for somereasons,reason, multicastPWPWs cease to exist, all the associated unicastpseudowiresPWs in the bundlearewould be removed. The multicastpseudowirePW uses Ethernet encapsulation as defined in [PWE3-ETH]. The use ofpseudowires whichPWs that are specially optimized for multicast is for further study.6.35.3. Send Multicast ReplicationtreeTree The PE creates a send replication tree for each IPLS instance, which consists of the collection of all ACs and all the 'multicast'pseudowiresPWs of the IPLS instance. Any ARP, NeighborDiscoveryDiscovery, or multicast IP Ethernet frame received over an AC is replicated to the other ACs and to themp2pMP2P multicastpseudowirePW of the send replication tree. The send replication tree deals mostly with broadcast/multicast Ethernet MAC frames. One exception to this is unicast ARP and IPv6 Neighbor Discovery frame, the processing of which is described in the following section. Any Ethernet frame received over the multicast PW is replicated to all the ACs of the send replication tree of the IPLS instance associated with the incoming PWlabel. Onelabel: one exception is unicast ARPInternet Draft draft-ietf-l2vpn-ipls-16.txtand Neighbor Discoveryframeframes used for IPv6, the processing of which is described in the following section.7.06. Signaling [PWE3-CONTROL] usesthe Label Distribution Protocol (LDP)LDP to exchange PW-FECs in the Label Mapping message in a downstream unsolicited mode. The PW-FEC comes in two forms; PWid and Generalized PWid FEC elements. These FEC elements define some fields that are common between them. The discussions below refer to these common fields forIPLS relatedIPLS-related extensions. Note that the use ofmultipoint to pointmultipoint-to-point and unidirectional characteristics of the PW makes BGPasthe ideal candidate for PW-FEC signaling. The use of BGP for such purposes is for future study.7.16.1. IPLS PW Signaling An IPLS carries IP packets as payload over its unicastpseudowiresPWs and Ethernetpacketpackets as payload over its multicastpseudowire.PW. The PW-type to be used for unicastpseudowirePW is the IP PW, defined in [PWE3-CONTROL] as IPLayer2Layer 2 Transport. The PW-type to be used for multicastpseudowirePW is the Ethernet PW as defined in [PWE3-ETH]. The PW-Type values for these encapsulations are defined in[PWE3- IANA].[PWE3-IANA]. When processing a received PW FEC, the PE matches the PW Id with the locally configured PW Id for the IPLS instance. If the PW type is Ethernet, the PW-FEC is for multicastPW.PWs. If the PW type is 'IPLayer2Layer 2 transport', the PW FEC is for unicastPW.PWs. For unicastPW,PWs, the PE must check the presence of a MACaddressAddress TLV in the optional parameter fields of the Label Mapping message. If this parameter is absent, a Label Release message must be issued with a Status Code meaning "MAC Address of the CE is absent"[note:(note: Status Code 0x000000XX is pending IANAallocation],allocation), to reject the establishment of the unicast PW with the remote PE. The PE may optionally include an IP address TLV based on the user configuration for the advertising of the IP addresses of the local CE. The processing of theaddress listAddress List TLV is as follows. o If apseudowirePW is configured forACACs with IPv4 CEs only, the PE should advertiseaddress list tlvan Address List TLV with an address family typeto beof an IPv4 address. The PE should process the IPv4 address list TLV as described in this document. o If apseudowirePW is configured forACACs with both IPv4 and IPv6 CEs, the PE should advertise IPv6 capability using the procedures described inSectionthe section below.Internet Draft draft-ietf-l2vpn-ipls-16.txto If a PE does not receive any IPaddress listAddress List TLV or IPv6 capability advertisement, it MAY assume IPv4 behavior. The IPLS uses the Address List TLV as defined in[RFC 5036][RFC5036] to signal the MAC (and optionally IP) address of the local CE. There are two TLVs definedbelow;below: the IP Address TLV and MAC Address TLV. The MACaddressAddress TLV must be included in the optional parameter field of the Label Mapping message when establishing the unicast IP PW for IPLS. When configured to support a specific type of IP traffic (IPv4 or IPv6), the PE augments verification of the type of traffic PW will carry using the Address Family Type value. If there is a mismatch between the received Address Family value and the expectation of an IPLS instance to which the PW belongs, the PE must issue a Label Release message with a Status Code meaning "IP Address type mismatch" (Status Code 0x0000004A) to reject the PW establishment.EncodingThe encoding of the IP Address TLVis:is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0|0| Address List (0x0101) | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Address Family | CE's IP Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CE's IP Address | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Length When an Address Family isIPV4,IPv4, the Length is equal to 6 bytes; 2 bytes foraddress familythe Address Family and 4 bytes of IP address. ThelengthLength is 18 bytes whenaddress familythe Address Family isIPv6,IPv6; 2 bytes foraddress familythe Address Family and 16 bytes of IP address. Address FamilyTwo octetTwo-octet quantity containing a value from theADDRESS FAMILY NUMBERS from ADDRESS FAMILY NUMBERS in"Address Family Numbers" registry [ADDR-IANA] that encodes the addresses contained in the Addresses field. IP Address of the CE IP address of the CE attached to the advertising PE. The encoding of the individual address depends on the Address Family. The following address encodings are defined by this version of the protocol: Address Family Address Encoding IPv4 (1)4 octet4-octet full IPv4 addressInternet Draft draft-ietf-l2vpn-ipls-16.txtIPv6 (2)16 octet16-octet full IPv6 address Note that more than one instance of the IP address TLV may exist, especially when support for IPv6 is configured.Internet Draft draft-ietf-l2vpn-ipls-16.txt EncodingThe encoding of the MAC Address TLVis:is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0|0| Address List (0x0101) | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Address Family | CE's MACaddressAddress | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Length ThelengthLength field is set to a value of 8 (2 bytes foraddress family,the Address Family, 6 bytes for the MAC address) Address FamilyTwo octetTwo-octet quantity containing a value fromADDRESS FAMILY NUMBERS inthe "Address Family Numbers" registry [ADDR-IANA] that encodes the addresses contained in the Addresses field. CE's MAC Address MAC address of the CE attached to the advertising PE. The encoding of the individual address depends on the Address Family. The following address encodings are defined by this version of the protocol: Address Family Address Encoding MAC (6)6 octet6-octet full Ethernet MAC address The IPv4 address of the CE is also supplied in the optional parameters field of the LDP Notification message along with the PW FEC. The LDP Notification message is used to signal any change in the status of the CE's IPv4 address. Note that Notification message does not apply to the MACaddressAddress TLV since an update to the MAC address of the CE should result in labelwithdrawwithdrawal followed by establishment of a new PW with a new MAC address of the CE. However, advertisement of IP address(es) of the CE isoptionaloptional, and changes may become known after the establishment of unicast PW.Internet Draft draft-ietf-l2vpn-ipls-16.txtThe encoding of the LDP Notification message is as follows. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0| Notification (0x0001) | Message Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Message ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Status (TLV) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IP Address List TLV (as defined above) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PWId FEC or Generalized ID FEC | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The Status TLV status code is set to 0x0000002C "IP address of CE", to indicate that an IPAddressaddress update follows. Since this notification does not refer to any particularmessagemessage, the MessageId,ID and Message Type fields are set to 0. The PW FEC TLV SHOULD NOT include the interface parameters as they are ignored in the context of this message.7.26.2. IPv6 Capability Advertisement A 'Stack Capability' Interface Parameter sub-TLV is signaled by the two PEs so that they can agree which stack(s) they should be using. It isassumedassumed, bydefaultdefault, that the IP PW will always be capable of carrying IPv4 packets.ThusThus, this capability sub-TLV is used to indicate if other stacks need to be supported concurrently with IPv4. The 'Stack Capability' sub-TLV is part of the interface parameters of the PW FEC. The proposed format for theStack Capability interface parameter'Stack Capability' Interface Parameter sub-TLV is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Parameter ID | Length | Stack Capability | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Parameter ID = 0x16 Length = 4 StackcapabilityCapability = 0x000X to indicate IPv6 stack capabilityInternet Draft draft-ietf-l2vpn-ipls-16.txtTheValuevalue of StackcapabilityCapability is dependent on the PW type context. For IP PW type, a setting of 0x000X indicates IPv6 stack capability. A PE that supports IPv6 on an IP PW MUST signal thestack capability'Stack Capability' sub-TLV in the initiallabel mappingLabel Mapping message for the PW. The PE nodes compare the value advertised by the remote PE with the local configuration and only use a capabilitywhichthat is advertised by both. If a PE that supports IPv6 does not receive a'stack capability''Stack Capability' sub-TLV from the far-end PE in the initiallabel mappingLabel Mapping message, or one is received but it is set to a reserved value, the PE MUST send an unsolicited release for the PW label with the LDP status code meaning "IP Address type mismatch" (Status Code 0x0000004A). The behavior of a PE that does not understand an interface parameter sub-TLV is specified inRFC4447RFC 4447 [PWE3-CONTROL].7.36.3. Signaling Advertisement Processing A PE should process a received [PWE3-CONTROL] advertisement withPW- typea PW-type of IPLayer2 transportLayer 2 Transport for IPLS asfollows,follows: - Verify the IPLS VPN membership by matching the VPN-Id signaled in theAGIAttachment Group Identifier (AGI) field or the PW-ID field with all the VPN-Ids configured in the PE. Discard and release the PW label if VPN-Id is not found. - Program theForwarding Information Base (FIB)FIB such that when a unicast IP packet is received from an AC with its destination MAC address matching the advertised MAC address, the packet is forwarded out over the tunnel to the advertising PE with the advertised PW-label as the inner label. A PE should process a received [PWE3-CONTROL] advertisement with the PW type of Ethernet for IPLS asfollows,follows: - Verify the IPLS VPN membership by matching the VPN-Id signaled in the AGI field or the PW-ID field with all the VPN-Ids configured in the PE. Discard and release the PW label ifVPN-IdVPN- Id is not found. - Add the PW-label to the send broadcast replication tree for the VPN-Id. This enables the sending of a copy of a multicast/broadcast IP Ethernetframe orframe, ARP Ethernetframeframe, or Neighbor Discovery frames from the AC to thispseudowire. Internet Draft draft-ietf-l2vpn-ipls-16.txt 8.PW. 7. IANA Considerations Since this document is being published ashistoric record,Historic, norequests forregistration of IANA code points are necessary. However,ifin the future, if interest to pursue this proposal arises, the followingrequests forIANAcodescode registrations would become necessary.8.1.7.1. LDP StatusmessagesMessages This document uses a new LDPstatus code.Status Code. IANA already maintainsathe "Status Code Name Space" registryof name "STATUS CODE NAME SPACE"defined by[RFC 5036].[RFC5036]. The following valueiswould be suggested for assignment: 0x000000XX "MAC Address of CE is absent"8.2.7.2. Interface Parameters This document proposes a new Interface Parameters sub-TLV, to be assigned from the'Pseudowire"Pseudowire Interface Parameters Sub-TLV typeRegistry'.Registry". The following valueiswould be suggested for the Parameter ID: 0xXX "Stackcapability"Capability" IANAiswould also be requested to set upa registry ofan "L2VPN PEstack capabilities".Stack Capabilities" registry. This is a16 bit16-bit field. The Stackcapability values 0x000XCapability value (0x000X) is specified in Section7.6.2 of this document. The remainingbitfieldbit field values (0x0002,..,0x8000)are towould be assigned by IANA using the "IETF Consensus" policy defined in[RFC 5226].[RFC5226]. L2VPN PE Stack Capabilities: Bit (Value) Description =============== ========================================== Bit 0 (0x000X)-IPv6 stack capability Bit 1 (0x000X)-Reserved Bit 2 (0x000X)-Reserved . . . Bit 14 (0xX000)-Reserved Bit 15 (0xX000)-Reserved9.08. Forwarding9.18.1. Non-IP ornon-ARP trafficNon-ARP Traffic In an IPLS VPN, a PE forwards only IP and ARP traffic. All other frames are dropped silently. If the CEs must pass non-IP traffic to each other, they must do so through IP tunnels that terminate at the CEs themselves.Internet Draft draft-ietf-l2vpn-ipls-16.txt 9.28.2. Unicast IP Traffic In IPLS, IP traffic is forwarded from the AC to the PW based on the destination MAC address of thelayer 2L2 frame (and not based on the IPHeader).header). The PE identifies the FIB associated with an IPLS instance based on the AC or the PW label. When a frame is received from an AC, the PE uses the destination MAC address as the lookup key. When a frame is received from a PW, the PE uses the PW-Label as the lookup key. The frame is dropped if the lookup fails. For IPv6 support, the unicast IP ICMP frame of Neighbor Discovery Protocol[RFC 4861][RFC4861] is bi-casted; one copy is submitted to the control plane and other copy to the PW, based on the destination MAC address.9.38.3. Broadcasts and Multicast IP Traffic When the destination MAC address is eitherabroadcast or multicast, a copy of the frame is sent to the control plane for CE discovery purposes (seesection 5.1).Section 4.1). It is important to note that stricter rate-limiting criteria is applied to frames sent to the control plane, in order to avoid overwhelming it under adverse conditions such asDenial of Service attack.Denial-of-Service (DoS) attacks. The service provider should also provide a configurable limitation to prevent the overflowing of the learned source addresses in a given IPLS instance. Also, caution must be used such that onlylink locallink-local multicasts and broadcast IP packets are sent to the control plane. When a multicast/broadcast IP packet is received from an AC, the PE replicates it onto the Send Multicast Replication Tree(See section 6.3).(see Section 5.3). When a multicast/broadcast IP Ethernet frame is received from apseudowire,PW, the PE forwards a copy of the frame to all the ACs associated with the respective IPLS VPN instance. Note that 'multicast' PW uses Ethernetencapsulation and henceencapsulation; hence, it does not require additional header manipulations.9.48.4. ARP Traffic When a broadcast ARP frame is received over the AC, a copy of the frame is sent to the control plane for CE discovery purposes. The PE replicates the frame onto the Send Multicast Replication Tree (seesection 6.3),Section 5.3), which resultsintoin a copy to be delivered to all the remote PEs on the 'multicast' PW and other local CEs through the egress ACs. When a broadcast Ethernet ARP frame is received over the 'multicast' PW, a copy of the Ethernet ARP frame is sent to all the ACs associated with the IPLS instance.Internet Draft draft-ietf-l2vpn-ipls-16.txtWhen a unicast Ethernet ARP frame is received over the AC, a copy of the frame is sent to the control plane for CE discovery purposes. The PE may optionally do MAC DA lookup in the forwarding table and send the ARP frame to a specific egress interface (AC or 'multicast' PW to a remote PE) or replicate the frame onto the Send Multicast Replication Tree (seesection 6.3).Section 5.3). When a unicast ARP Ethernet frame is received over the 'multicast' PW, the PE may optionally do MAC DA lookup in the forwarding table and forward it to the AC where the CE is located. If the CE is not accessible through any local AC, the frame is dropped. Conversely, the PE may simply forward the frame to all the ACs associated with that IPLS instance without any lookup in the forwarding table.9.58.5. Discovery of IPv6 CEdevicesDevices A PE device that supports IPv6 MUST be capableof,of: - Intercepting ICMPv6 Neighbor Discovery[RFC 4861][RFC4861] packets received over the AC. -RecordRecording the IPv6 interface addresses and CE link-layer addresses present in these packets -ForwardForwarding them towards the originaldestinationdestination. A PE device may also intercept Router Discovery packets in order to discover thelink layerlink-layer address and IPv6 interface address(es) of the CE.FollowingThe following sections describe the details. The PE device MUST learn the link-layer address of the local CE and be able to use it when forwarding traffic between CEs. The PE MAY also wish to monitor the source link-layer address of data packets received from theCE,CE and discard packets not matching its learned CE link-layer address. The PE device may also optionally learn a list of CE IPv6 interface addresses for itsdirectly-attacheddirectly attached CE.9.5.1.8.5.1. Processing of Neighbor Solicitations When a broadcastNeighbor SolicitationNS frame is received over the AC, a copy of the frame is sent to the control plane for CE discovery purposes. The PE replicates the frame onto the Send Multicast Replication Tree (seesection 6.3),Section 5.3), which results in a copy to be delivered to all the remote PEs on the 'multicast' PW and other local CEs through the egress ACs. The PE may optionally learn an IPv6 interface address (If provided--- this will not be the case for Duplicate Address Detection) when present.Internet Draft draft-ietf-l2vpn-ipls-16.txtWhen a broadcast EthernetNeighbor SolicitationNS frame is received over the 'multicast' PW, a copy is sent to all the ACs associated with the IPLS instance.9.5.28.5.2. Processing of Neighbor Advertisements When a unicastNeighbor AdvertisementNA is received over the AC, a copy of the frame is sent to the control plane for the CE discovery purposes. The PE may optionally do MAC DA lookup in the forwarding table and send theNeighbor AdvertisementNA frame to a specific egress interface (AC or 'multicast' PW to a remote PE) or replicate the frame onto the Send Multicast Replication Tree (seesection 6.3).Section 5.3). Optionally, the PE could learn the IPv6 Interface address of the CE. When a unicastNeighbor AdvertisementNA frame is received over the 'multicast' PW, the PE may optionally do MAC DA lookup in the forwarding table and forward it to the AC where the CE is located. If the CE is not accessible through any local AC, the frame is dropped. Conversely, the PE may simply forward the frame to all the ACs associated with that IPLS instance without any lookup in the forwarding table.9.5.38.5.3. Processing of Inverse Neighbor Solicitations and Advertisement Inverse Neighbor Discovery is typically used on non-broadcast links, butareis allowed on broadcast linkstoo [RFC 3122].as well [RFC3122]. A PE may optionally intercept Inverse Neighbor Solicitation and Advertisement and learn the MAC and IPv6 interface address list of the attached CE from the copy of the frame sent to the control plane. The PE may optionally do MAC DA lookup in the forwarding table and send another copy of the frame to a specific egress interface (AC or 'multicast' PW to a remote PE) or replicate the frame onto the Send Multicast Replication Tree (seesection 6.3). 9.5.4Section 5.3). 8.5.4. Processing of Router Solicitations and AdvertisementsRouter Solicitations (RS)RSs are multicast whileRouter Advertisement (RA)RAs can be unicast or multicast Ethernet frames. The PE could optionally intercept RS and RA frames and send a copy to the control plane. The PE may learn the MAC address and a list of interface addresses for the attached CE. For unicast RA, the PE may optionally do MAC DA lookup in the forwarding table and send theNeighbor AdvertisementNA frame to a specific egress interface (AC or 'multicast' PW to a remote PE) or replicate the frame onto the Send Multicast Replication Tree (seesection 6.3).Section 5.3). The multicast RA and RS Ethernet frames are replicated using the Send Multicast Replication Tree as described insection 6.3. Internet Draft draft-ietf-l2vpn-ipls-16.txt 9.6Section 5.3. 8.6. Encapsulation The Ethernet MAC header of a unicast IP packet received from an AC is stripped before forwarding the frame to the unicastpseudowire.PW. However, the MAC header is retained for the following cases,.- when a frame is a unicast or broadcast IP packet that is directed to one or more localAC(s). .ACs. - when a frame is a broadcast IP packet.- when a frame is an ARP packet.- when a frame is Neighbor/Router Solicitation/Advertisement An IP frame received over a unicastpseudowirePW is prepended with a MAC header before transmitting it on the appropriate AC(s). The fields in the MAC header are filled in as follows: - The destination MAC address is the MAC address associated with the PW label in theFIBFIB. - The source MAC address is the PE's own local MAC address or a MAC addresswhichthat has been specially configured on the PE for this use. - The Ethernet Type field is 0x0800 if IPv4 or 0x86DD if IPv6[RFC 2464][RFC2464]. - The frame may beIEEE802.1QIEEE 802.1Q tagged based on the VLAN information associated with the AC.An FCSA Frame Check Sequence (FCS) is appended to the frame.10.09. Attaching to IPLS via ATM orFRFrame Relay (FR) In addition to (i) an Ethernet port and a (ii) combination of Ethernet port and a VLAN ID, an AC to IPLS may also be (iii) an ATM or FR VC carrying encapsulated bridged Ethernet frames or (iv) the combination of an ATM or FRVCVirtual Circuit (VC) and a VLAN ID. The ATM/FR VC is just used as a way to transport Ethernet frames between a customer site and the PE. The PE terminates the ATM/FR VC and operates on the encapsulated Ethernet frames exactly as if those were received on a local Ethernet interface. When a frame is propagated frompseudowirePW toaan ATM or FRVCVC, the PE prepends the Ethernet frame with the appropriate bridged encapsulation header as defined in[RFC 2684][RFC2684] and[RFC 2427][RFC2427], respectively. Operation of an IPLS over ATM/FR VC is exactly as described above, with the exception that the AC is then identified via the ATM VCI/VPI or Frame RelayDLCIData Link Connection Identifier (DLCI) (instead of via a local Ethernet port ID), or a combination of those with a VLAN ID.11.010. VPLSvsvs. IPLS The VPLS approach proposed in [VPLS] provides VPN services for IP as well as other protocols. The IPLS approach described in thisdraftdocument is similar to VPLS in many respects:Internet Draft draft-ietf-l2vpn-ipls-16.txt- It provides aProvider ProvisionedProvider-Provisioned Virtual LAN service with multipoint capability where a CE connected via a single attachment circuit can reach many remote CEs - It appears as a broadcast domain and a single subnet -forwardingForwarding is based on destination MAC addresses However, unlike VPLS, IPLS is restricted to IP traffic only. By restricting the scope of the service to the predominant type of traffic in today's environment, IPLS eliminates the need for service provider edge routers to implement some bridging functions such as MAC address learning in the data path (by, instead, distributing MAC information in the control plane).ThusThus, this solution offers a number of benefits: -FacilitatesIt facilitates Virtual LAN services in instances where PE devices cannot or cannot efficiently (or are specifically configured not to) perform MAC address learning. - Unknown Unicast frames are never flooded as would be the case in VPLS. - Encapsulation is more efficient(MAC(the MAC header is stripped) for unicast IP packets while traversing the backbone network. - PE devices are not burdened with the processing overhead associated with traditional bridging (e.g.,STPSpanning Tree Protocol (STP) processing, etc.). Note, however, that some of these overheads (e.g., STP processing) could optionally beturned-offturned off with a VPLS solution in the case where it is known that only IP devices are interconnected. - Loops (perhaps through backdoor links) are minimized since a PE could easily reject (via label release) a duplicate IP to MAC address advertisement. - Greater control over CE topologydistribution. 12.0distribution is available. 11. IP Protocols The solution described in this document offers IPLS service for IPv4 and IPv6 traffic only. For this reason, the MACHeaderheader is not carried over the unicastpseudowire.PW. It is reconstructed by the PE when receiving a packet from a unicastpseudowirePW and the Ethertype 0x0800 or 0x86DD is used in the MACHeaderheader since IPv4 orIPv6IPv6, respectively, is assumed. However, this solution may be extended to carry other types of important traffic such asISISIS-IS , which does not use Ethernet-II,EtherType basedan EtherType-based header. In order to permit the propagation of such packets correctly, one may create a separate set ofpseudowires,PWs, or pass protocol information in the "control word" of a "multiprotocol"pseudowire,PW, or encapsulate the Ethernet MACHeaderheader in thepseudowire.PW. The selection of appropriate multiplexing/demultiplexing schemes is the subject of future study. The current document focuses on IPLS service for IPv4 and IPv6 traffic.Internet Draft draft-ietf-l2vpn-ipls-16.txt 13.0 Dual Homing12. Dual-Homing with IPLS As stated in previous sections, IPLS prohibits the connection of a common LAN or VLAN to more than one PE. However, the CE device itself can connect to more than one instance of IPLS through two separate LAN or VLAN connections to separate PEs. To the CE IP device, these separate connections appear as connections to two IP subnets. The failure of reachability through one subnet is then resolved via the other subnet using IP routing protocols.14.013. Proxy ARPfunctionFunction The earlier version of this proposal used IP-PW to carry both the broadcast/multicast and unicast IP traffic. It also discussed how PE proxy functionality responds to the ARP requests of the local CE on behalf of remote CE. The current version of thedraftdocument eliminated these functions and instead uses Ethernet PW to carry broadcast, multicast and ARP frames to remote PEs. The motivation to use Ethernet PW and propagate ARP frames in the current version is to support configuration like back-to-back IPLS (similar toInter ASInter-AS option-A configurations in[RFC 4364]).[RFC4364]). The termination and controlled propagation of ARP frames is still a desirable option for security,DoSDoS, and other purposes. For these reasons, were-introducereintroduce the ARP Proxy [PROXY-ARP] function in this revision as an optional feature.FollowingThe following sections describe this option.14.113.1. ARP Proxy - Responder As a local configuration, a PE can enable the ARP ProxyresponderResponder function. In this mode, the local PE responds to ARP requests received over the Attachment Circuit vialearntlearned IP and MAC address associations, which are advertised by the remote PEs. In addition, the PE may utilize local policies to determine if ARP requests should be responded based on the source of the ARP request, rate at which the ARP requests are generated, etc. In a nutshell, when this feature is enabled, ARP requests are not propagated to remote PE routers that are members of the same IPLS instance.14.213.2. ARP Proxy - Generator As a local configuration, a PE can enable the ARP ProxygeneratorGenerator function. In this mode, the PE generates an ARP request for each IP and MAC addressassociationsassociation received from the remote PEs. The remote CE's IP and MAC address is used as the source information in the ARP request while the destination IP address in the request is obtained from the local configuration (that is, user needs to configure an IP address when this feature is enabled). The ARP request is sent onInternet Draft draft-ietf-l2vpn-ipls-16.txttheAttachment CircuitsACs that have ARP Proxy Generator enabled and is associated with the given IPLS instance. In addition, the PE may utilize local policies to determine which IP/MAC addresses are candidate for ARP request generation. The ARP Proxy Generator feature is required to support back-to-back IPLS configuration when any member of the IPLS instance is using the ARP Proxy Responder function. An example of a back-to-back IPLS is a configuration where PE-1 (ASBR) in an IPLS cloud in one Autonomous System (say, AS-1) is connected via anAttachment CircuitAC to another PE-2 (ASBR) in an IPLS cloud in another Autonomous System (say, AS- 2) where each PE appears as CE to each other. Such configuration is described in[RFC 4364][RFC4364] as option-A for inter-AS connectivity. The Proxy ARPresponderResponder feature prevents propagation of ARP requests to PE-1 (ASBR) in AS-1. This necessitates that PE-1 (ASBR) in AS-1generategenerates an ARP request on behalf of each CE connected to the IPLS instance in AS-1 as a mean to 'advertise' the reachability to IPLS cloud inAS-2 15.0AS-2. 14. Data Center Applicability The resurgence of interest in providingIP/MPLS basedan IP/MPLS-based solution for Data Center Networks(DCN)(DCNs) deserves another look at the IPLS methodologies described in this document. The key requirement of a DCN to permitVMVirtual Machine (VM) mobility within or across a DCN necessiates extending the reachability of IP subnet over a LAN, transparently. In addition, VMs tendency to generate frequentgratutiousgratuitous ARPs for location discoverynecessiatesnecessitates a solution that curbs broadcasts closest to the source. The IPLS solution facilitates VM mobility by the PE closest to the new location signaling the MAC address to all remote peers. In addition,control-plane basedcontrol-plane-based MAC learning mechanisms prevent flooding of unknown unicast across a DCN. The optional ARP proxy mechanisms furtherreducesreduce ARP broadcast floods by preventing its reach across a local PE.Internet Draft draft-ietf-l2vpn-ipls-16.txt 17.015. Security Considerations A more comprehensive description of the security issues involved in L2VPNs are covered in [VPN-SEC]. Most of the security issues can be avoided through implementation of appropriate guards. The security aspect of this solution is addressed for twoplanes;planes: the control plane and data plane.17.1 Control plane security15.1. Control-Plane Security Thecontrol planecontrol-plane security pertains to establishing the LDP connection,pseudo-wirePW establishment and CE's IP and MAC address distribution. The LDP connection between two trusted PEs can be achieved by each PE verifying the incoming connection against the configured peer's address and authenticating the LDP messages by verifying keyed digests. Thepseudo-wirePW establishments between two secure LDP peers do not pose security issue but mis-wiring could occur due to configuration error. Some checks, such as, properpseudo-wirePW type and otherpseudo-wirePW options may preventmis- wiringmis-wiring due to configuration errors. The learning of the appropriate CE's IP and MAC address can be a security issue. It is expected that the local attachment circuit to CE be physically secured. If this is a concern, the PE must be configured with the CE's IP and MAC address. During each ARP frame processing, the PE must verify the received information against the configuration before accepting. This prevents theft of service, denial of service to asubscribersubscriber, or DoS attacks to all subscribers by malicious use of network services. The IPLS also provides MACanti spoofinganti-spoofing by preventing the use of already known MAC address. For instance, if a PE has already learned a presence of a CE through a local connection or from another PE, and subsequently an advertisement for the same MAC and/or IP address is received from a different PE, the receiving PE can terminate service to that CE (either through label release and/or removing the ARP entry from the FIB) and raise the alarm. The IPLS learns and distributes CE reachability through the control plane. This provides greater control over CE topology distribution through the application of local policies.Internet Draft draft-ietf-l2vpn-ipls-16.txt 17.2 Data plane security15.2. Data-Plane Security The data traffic between the CE and PE is notencrypted andencrypted. In an insecure environment, it is possible thatin an insecure environment,a malicious user may tap into theCE to PECE-to-PE connection and could conduct an active or passive attack. An example of an active attack would be generating traffic using the spoofed destination MAC address on the Ethernet Attachment Circuit and a passive attack could include targeted or passive monitoring between the CE and PE. In order to avoid such hijacking, the local PE may verify the source MAC address of the received frame against the MAC address of the admitted connection. The frame is forwarded to the PW only when authenticity is verified. When spoofing is detected, the PE must severe the connection with the local CE, tear down thePWPW, and start over. Each IPLS instance uses its own FIB. This prevents leaking of one customer data into another.Internet Draft draft-ietf-l2vpn-ipls-16.txt 18.016. References18.116.1. Normative References[ARP][RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC826, STD 37, D.2119, March 1997, <http://www.rfc-editor.org/info/rfc2119>. [ARP] Plummer,"An EthernetD., "Ethernet Address ResolutionProtocol".Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware", STD 37, RFC 826, November 1982, <http://www.rfc-editor.org/info/rfc826>. [PWE3-CONTROL]L. Martini et al.,Martini, L., Ed., Rosen, E., El-Aawar, N., Smith, T., and G. Heron, "Pseudowire Setup and Maintenanceusing LDP",Using the Label Distribution Protocol (LDP)", RFC4447.4447, April 2006, <http://www.rfc-editor.org/info/rfc4447>. [PWE3-IANA]L. Martini et al,.Martini, L., "IANA Allocations forpseudo WirePseudowire Edge to Edge Emulation (PWE3)", BCP 116, RFC4446.4446, April 2006, <http://www.rfc-editor.org/info/rfc4446>. [PWE3-ETH]Martini et al.,Martini, L., Ed., Rosen, E., El-Aawar, N., and G. Heron, "Encapsulation Methods for Transport of Ethernet over MPLS Networks", RFC4448.4448, April 2006, <http://www.rfc-editor.org/info/rfc4448>. [VPLS]Lasserre et al,Lasserre, M., Ed., and V. Kompella, Ed., "Virtual Private LAN Service (VPLS) UsingLDP",Label Distribution Protocol (LDP) Signaling", RFC 4762, January2007. [RFC 5036]2007, <http://www.rfc-editor.org/info/rfc4762>. [RFC5036] Andersson, L., Ed., Minei, I., Ed., and B. Thomas, Ed., "LDP Specification", RFC 5036, October2007. [IEEE 802.1D]2007, <http://www.rfc-editor.org/info/rfc5036>. [IEEE802.1D] ISO/IEC 10038, ANSI/IEEE Std 802.1D-1993, "MAC Bridges".[RFC 4861][RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, September2007. [RFC 2464]2007, <http://www.rfc-editor.org/info/rfc4861>. [RFC2464] Crawford, M., "Transmission of IPv6packetsPackets over Ethernet Networks", RFC 2464, December1998. [RFC 3122]1998, <http://www.rfc-editor.org/info/rfc2464>. [RFC3122] Conta, A., "Extensions to IPv6 Neighbor Discovery for Inverse Discovery Specification", RFC 3122, June2001. [RFC 5226]2001, <http://www.rfc-editor.org/info/rfc3122>. [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 5226, May2008. Internet Draft draft-ietf-l2vpn-ipls-16.txt 18.22008, <http://www.rfc-editor.org/info/rfc5226>. 16.2. Informative References [L2VPN-FWK] Andersson, L., Ed., and E. Rosen, Ed., "Framework for Layer 2 Virtual Private Networks (L2VPNs)", RFC 4664, September2006.2006, <http://www.rfc-editor.org/info/rfc4664>. [PROXY-ARP]RFC 925, J.Postel, J., "Multi-LANAddress Resolution".address resolution", RFC 925, October 1984, <http://www.rfc-editor.org/info/rfc925>. [L2VPN-REQTS] Augustyn,W. et.alW., Ed., and Y. Serbest, Ed., "Service Requirements for Layer 2Provider ProvisionedProvider-Provisioned Virtual Private Networks", RFC 4665, September2006.2006, <http://www.rfc-editor.org/info/rfc4665>. [L2VPN-SIG]Rosen et al.,Rosen, E., Davie, B., Radoaca, V., and W. Luo, "Provisioning,Autodiscovery,Auto-Discovery, andsignalingSignaling inL2VPN",Layer 2 Virtual Private Networks (L2VPNs)", RFC 6074,Jan 2011. [RFC-1112]January 2011, <http://www.rfc-editor.org/info/rfc6074>. [RFC1112] Deering, S., "HostExtensionsextensions for IPMulticasting",multicasting", STD 5, RFC 1112,August, 1989. [RFC 2684]August 1989, <http://www.rfc-editor.org/info/rfc1112>. [RFC2684] Grossman,et al.,D. and J. Heinanen, "Multiprotocol Encapsulation over ATM Adaptation Layer 5", RFC 2684, September1999. [RFC 2427]1999, <http://www.rfc-editor.org/info/rfc2684>. [RFC2427] Brown,et al.,C. and A. Malis, "Multiprotocol Interconnect over Frame Relay", STD 55, RFC 2427, September1998. [RFC 4364] Rosen et al.,1998, <http://www.rfc-editor.org/info/rfc2427>. [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual PrivateNetworkNetworks (VPNs)", RFC 4364, February2006.2006, <http://www.rfc-editor.org/info/rfc4364>. [VPN-SEC] Fang, L., Ed., "SecurityframeworkFramework forProviderProvider- Provisioned Virtual PrivateNetworks",Networks (PPVPNs)", RFC 4111, July2005.2005, <http://www.rfc-editor.org/info/rfc4111>. [ADDR-IANA]http://www.iana.org/assignments/address-family-numbers/ address-family-numbers.xhtml Internet Draft draft-ietf-l2vpn-ipls-16.txt 16.0IANA, "Address Family Numbers", http://www.iana.org/assignments/address-family- numbers/. Acknowledgements Authors would like to thank Alp Dibirdi from Alcatel, Xiahou fromHuaweiHuawei, and other L2VPN working group members for their valuable comments.1.0 Contributing Authors Internet Draft draft-ietf-l2vpn-ipls-16.txtContributors This document is the combined effort of the following individuals and many others who have carefully reviewed this document and provided the technical clarifications. K. Arvind Fortress Vach Kompella/Mathew Bocci Alcatel/Lucent Shane Amante Apple18.0 Author's AddressAuthors' Addresses Himanshu Shah Ciena Corp 3939 North 1stStreet,Street San Jose, CA 95110Email:United States EMail: hshah@ciena.com Eric RosenCisco Systems 300 Apollo Drive, Chelmsford, MA 01824 Email: erosen@cisco.com Giles Heron Cisco Systems Email: giheron@cisco.comJuniper Networks, Inc. 10 Technology Park Drive Westford, MA, 01886 United States EMail: erosen@juniper.net Francois Le Faucheur Cisco Systems, Inc. Village d'Entreprise Green Side - Batiment T3 400, Avenue de Roumanille 06410 Biot-SophiaAntipolis,Antipolis FranceEmail:EMail: flefauch@cisco.com Giles Heron Cisco Systems 9-11 New Square Bedfont Lakes Feltham Middlesex TW14 8HA United Kingdom EMail: giheron@cisco.com