Internet Engineering Task Force                          CY Lee
INTERNET DRAFT                                   M. Higashiyama
Informational



March 2003


                      CE-based Virtual Private LAN


                 <draft-lee-ce-based-vpl-02.txt>

Status of this memo
   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as "work in progress."

   To view the list Internet-Draft Shadow Directories, see
   http://www.ietf.org/shadow.html.

   Copyright Notice

   Copyright (C) The Internet Society (2003).  All Rights Reserved.



Abstract

   This draft describes how a Virtual Private LAN (VPL) can be realized
   by setting up point-to-point tunnels from CE (Customer Edge) or CLE
   (Customer Located Equipment) to CE/CLE over a PSN, and bridging
   Ethernet traffic at the CE/CLE. Regardless of the access technology
   used (e.g. DSL or Ethernet) or the geographic distribution of
   CEs/CLEs, an end customer may use an emulated LAN service via an
   Ethernet interface, as long as the CEs/CLEs of the emulated LAN are
   reachable over the PSN.  When used in conjunction with IPSec, the
   proposal allows secure transmission of Ethernet traffic, from one
   site to another site of a VPL, over the PSN.

1. Introduction

   CE-based VPL over different types of tunneling technologies has been
   used for a number of years now, and could be viewed as a proven
   technology.  A network user provisions the required tunnels (or
   circuits) at a CE to remote CE(s) and the CEs bridge Ethernet traffic
   over the tunnels.

2. Topology

2.1 Reference Model

   Figure 1 shows CE-based VPL topology. In a CE-based VPL, tunnels are
   setup between sites of a VPL. A CE-based VPL can contain a single
   IEEE 802.1q VLAN or multiple VLANs. Each site has either a CE or CLE
   connected to the PSN.  In a PPVPL, the provider provisions the VPL, a
   tunnel MAY be setup from CLE to CLE, and the CLEs MAY be owned by the
   provider, or the tunnels MAY be setup from CE to CE, and the CEs MAY
   be owned by the customer.  In a CPVPL, a customer provisions its own
   VPL, a point to point tunnel from CE to CE may be provisioned by the
   customer at CEs or alternatively, a point to point tunnel may be
   provisioned by the provider from PE to PE. A tunnel appears as a
   virtual port or interface to the bridge entity in a CE.

   At a CE, Ethernet traffic from a VPL is encapsulated in for e.g. a
   L2TPv3 or GRE or IPSec tunnel or FR VC or ATM VCC and transported
   over the IP/FR/ATM network to another CE of the VPL. The receiving CE
   decapsulates the Ethernet frame, and bridges the frame from virtual
   port to the destination node in the VPL.









































                            Emulated Service
             (Broadcast Domain/"LAN", within dotted lines)
                   ..................................
          Native   .                                .  Native
          Ethernet .                                .  Ethernet
          or       .       |<-- PSN Tunnel-->|      .  or
          VLAN     .                                .  VLAN
          Service  .  +----+                 +----+ .  Service
              |    .  |CE/ |                 |CE/ | .   |
    Customer-------.--|CLE |=================|CLE |-.------- Customer
    LAN       |    .  | 1  |                 | 2  | .   |    LAN
    Site 1    |    .  +----+                 +----+ .   |    Site 2
                   .      \\                //    .
                   .       \\              //     .
                   .        \\            //      .
                   .     PSN \\          // PSN   .
                   .   Tunnel \\ +----+ //  Tunnel.
                   .           \\|CE/ |//         .
                   .            \|CLE |/           .
                   .             | 3  |             .
                   .             +----+             .
                   .                |               .
                   ..................................
                                    |
                                    |
                           Native Ethernet or
                             VLAN Service
                                    |
                                    |
                               Customer LAN
                               Site 3





























                                   |
                                   |
          Customer ----------------|----------------Customer
          LAN Site 1               |                LAN Site 2
                                   |
                                   |----------------Customer
                                   |                LAN Site 3

                  Fig 1 Emulated Ethernet Segment


                       CLE1                       CLE2
                   +-----------+            +-----------+
                   |\         /|            |\         /|
                   | \ Relay / |            | \ Relay / |
                   |  \     /  |            |  \     /<-|-----+
                   |   \   /   |            |   \   /   |     |ISS,E-ISS
                   |    \ /    |            |    \</----|-----+
                   |     V     |            |     V     |
                   | MAC |  E  |            |  E  | MAC |
                   +--+--+--+--+            +--+--+--+--+
                      |     |           virtual|     |LAN port
                      |     |           port   |     |
                      |     |     PSN          |     |
                      |     +------------------+     |
                      |  |<---------PW----------->|  |
                      |  A                        A  |
                      |                              |
             ................................................
             .        |                              |      .
             .        |                              |      .
             ................................................
                              Emulated LAN

                              Figure 2

   The Encapsulation (E) Entity, is responsible for encapsulating frames
   to be transported over the PSN. The Internal Sublayer Service (ISS)
   and Enhanced Internal Sublayer Service (E-ISS), i.e. the indication
   and request primitives provided by a MAC entity to the MAC Relay
   Entity within a CE is as defined in 802.1d and 802.1q. The E entity
   provides similar service primitives as the MAC entity, except that
   the handling of the Frame Check Sequence (FCS) parameter may be
   changed.

   The Relay is a bridge as defined in 802.1d and optionally 802.1q.
   CLEs process BPDUs, as defined in 802.1d and optionally 802.1q, and
   MAC control frames as defined in IEEE specifications.

   If a modified bridge (performing reverse split horizon forwarding on
   a full-meshed of PWs, I.e. traffic received on a PW is not forwarded
   to other PWs) is used, the modified bridge would reside between the
   Relay and the VP. The use of a modified bridge in a CLE is being
   reviewed, as it may introduce routing or briding issues in the
   customer's network.


2.2 Terminology

      CE        Customer Edge [PPVPN-REQ]
      CLE       Customer Located Equipment
      CPVPL     Customer Provisioned VPL
      LCCE      L2TP Control Connection Endpoint [L2TPv3]
      MAN       Metropolitan Area Network
      P         Provider's Network Equipment (excluding PE)
      PE        Provider Edge [PPVPN-REQ]
      PPVPL     Provider Provisioned VPL
      PSN       Packet Switched Network
      PW        Pseudo-Wire
      VPL       Virtual Private LAN



3. Control Plane

   For the CE-based VPL, control plane use [ETH-PW-L2TPv3].  Pseudo-wire
   Ethernet over L2TPv3 is specified in [ETH-PW-L2TPv3] and describes
   how network devices emulate ethernet over an IP network using L2TPv3
   as the tunneling protocol. CEs supporting [ETH-PW-L2TPv3]in a PPVPL
   or CPVPL are applications of [ETH-PW-L2TPv3].

   Below additional functions of these applications are required.
    - Tunnel Endpoints Information Configuration
    - VPL Monitoring


3.1 Tunnel Endpoints Information Configuration

   The required tunnel endpoint information at an LCCE (CE) are the IP
   addresses and End Identifiers of peer LCCEs, and authentication keys.

   The tunnel endpoints information may be pre-configured or remotely
   provisioned or, a mechanism to discover and distribute the tunnel
   endpoints information may be used or a mechanism where tunnel
   endponts information are retrieved from a server may be used.

3.2 Discovery

   Multiple tunnels to other CE sites can be automatically configured on
   CEs if a tunnel endpoint information discovery mechanism is used.

   To avoid having to provision deployed CEs, a mechanism to auto
   discover and distribute VPL site information is useful. [CE-
   AUTOCONFIG] or a directory query approach similar to [VPLS-DNS] are
   examples of mechanisms that may be used for this purpose.  In
   particular for [CE-AUTOCONFIG], the Authentication Server/RADIUS
   approach is applicable to both a PPVPL and CPVPL, while the DHCP
   approach is only applicable to a PPVPL where the CEs are within one
   domain (e.g for VPLs offered by a network provider).

3.3 VPL Monitoring

   The session keep-alive mechanism of L2TPv3 can serve as a link status
   monitoring mechanism for the point to point tunnels (session) that
   make up the VPL. Testing of reachability of nodes in the VPL from
   different sites may be performed at irregular intervals.



4. Data Plane

4.1 Encapsulation

Please see [ETH-L2TPv3].

4.2 Forwarding

   A CE learns MAC addresses from the customer facing ports and the
   virtual interfaces (or the tunnels to remote LCCE sites of a VPL).
   When a new MAC address is learned, the MAC address is associated with
   the virtual interface or ports where the frame arrives. When a frame
   with the cached MAC address is received, the CE knows which virtual
   interface or port to forward the frame to. When a frame with a new
   MAC address is received, a CE floods the frame to all other ports or
   virtual interfaces, except the interface where the frame is received
   from.

   The learning, bridging, filtering and forwarding procedures are as
   defined in [802.1d] and [802.1q], except that the ports on a switch
   in this case can be a virtual interface as well as a physical port.

   CEs belonging to the same VPL learn, store, manage VPL forwarding
   information and bridges traffic within the VPL, PEs do not have to
   learn MAC addresses from different VPLs, hence this approach scales
   for large number of VPLs and total MAC addresses in a network.

   Bridging within a VPL does not affect other VPLs (or customers). A CE
   bridge which is not functioning correctly will only affect a VPL. In
   contrast, if  bridging is also performed at PEs, a malfunctioning CE
   may cause network instability and affect other VPLs as well. Hence a
   CE-based VPL would be operationally stabler.

   In a network based VPL, as the number of customers/VPLS and total MAC
   addresses grow in  a provider's network, existing devices in the
   network will need to be upgraded or replaced by new devices. A CE-
   based VPL approach scales as the number of VPLs and total number of
   MAC addresses in VPLs grows and allows CEs in different MAN to be
   interconnected seamlessly.

   New VPLs can be added transparently in an IP/MPLS network, without
   having to upgrade PEs with bridging functions.

   CEs of a VPL may be located witin one domain or in different domains
   as long as the CEs have IP reachability to each other. CEs of a VPL
   in different MAN can send VPL traffic to each other without resorting
   to VLAN Stacking as long as there is IP reachability in the network.

   Tunnels may be setup using L2TP with IPSec [L2TP-IPSec] to provide
   secure transmission of traffic from CE to CE in an IP PSN.

5. References

   5.1 Normative References

   [802.1D] IEEE, "ISO/IEC 15802-3:1998,(802.1D, 1998 Edition),
   Information technology --Telecommunications and information exchange
   between systems --IEEE standard for local and metropolitan area
   networks --Common specifications-Media access control (MAC) Bridges",
   June, 1998.

   [802.1Q] ANSI/IEEE Standard 802.1Q, "IEEE Standards for Local and
   Metropolitan Area Networks: Virtual Bridged Local Area Networks",
   1998 .

   [802.3] IEEE, "ISO/IEC 8802-3: 2000 (E), Information technology--
   Telecommunications and information exchange between systems --Local
   and metropolitan area networks --Specific requirements --Part 3:
   Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
   Access Method and Physical Layer Specifications", 2000.

   [L2TPv3] Lau, J., Townsley, M., Valencia, A., Zorn, G., Goyret, I.,
   Pall, G., Rubens, A., Palter, B., "Layer Two Tunneling Protocol
   "L2TP"", (draft-ietf-l2tpext- l2tp-base-01.txt), work in progress,
   July 2001.

   [L2TP-IPSEC] RFC 3193, B. Patel,B. Aboba,W. Dixon, G. Zorn, S. Booth
   "Securing L2TP using IPSec"

   [ETH-L2TPv3] Aggarwal, et al., Transport of Ethernet Frames over
   L2TPv3, draft-ietf-l2tpext-pwe3-ethernet-00.txt, October 2002.

   [ETH-PW-L2TPv3] CY Lee, M Higashiyama, Ethernet Pseudo-Wire over
   L2TPv3, November 2002

   5.2 Informative References

   [L2VPN-REQ] W. Augustyn, Y. Serbest, Service Requirements for Layer 2
   Provider Provisioned Virtual Private Networks, February 2003

   [BCP] Mitsuru H. and Baker, "PPP Bridging Control Protocol (BCP)",
   RFC 2878, July 2000.

   [L2TP] Townsley, W., Valencia, A., Rubens, A., Singh Pall, G., Zorn,
   G., Palter, B., "Layer Two Tunneling Protocol (L2TP)", RFC 2661
   August 1999

   Internet Architectural Guidelines and Philosophy.
   http://www.ietf.org/internet-drafts/draft-ymbk-arch-guidelines-05.txt

   [EOL2TP] M. Higashiyama, "Ethernet Over L2TP", (draft-higashiyama-
   eol2tp-01.txt),

   [PPVPN-REQ] M. Carugi,D. McDysan, L. Fang, F. Johansson, Ananth
   Nagarajan, J. Sumimoto, R. Wilder, "Service requirements for Layer 3
   Provider Provisioned Virtual Private Networks" (draft-ietf-ppvpn-
   requirements-04.txt)

   [CEVPN] De Clercq J., et al., "Provider Provisioned CE-based Virtual
   Private Networks using IPsec", draft-ietf-ppvpn-ce-based-01.txt, work
   in progress.

   [Kompella] Kompella, K., Leelanivas, M., Vohra, Q., Bonica, R., Metz,
   E., Ould-Brahim, H., Achirica, J., Z., "MPLS-based Layer 2 VPNs",
   (draft-kompella- ppvpn-l2vpn-00.txt), work in progress, July 2001.

   [Martini-encap] Martini, L., El-Aawar, N., Tappan, D., Rosen, E.,
   Jayakumar, J., Vlachos, D., Liljenstolpe, C., Heron, G., Kompella,
   K., Vogelsang, S., Shirron, J., Smith, T., Radoaca, V., Malis, A.,
   Sirkay, V., Cooper, D., "Encapsulation Methods for   Transport of
   Layer 2 Frames Over IP and MPLS Networks", (draft-martini-
   l2circuit-encap-mpls-03.txt), work in progress, July 2001.

   [PWE3-frame] Pate, P., Xiao, X., So, T., Malis, A., Nadeau, T.,
   White, C., Kompella, K., Johnson, T., "Framework for Pseudo Wire
   Emulation Edge-to-Edge (PWE3)" (draft- pate-pwe3-framework-02.txt),
   work in progress, July 2001.

   [VPLS] Lasserre, M, Kompella, V, et al, "Virtual Private LAN Services
   over MPLS" draft-lasserre-vkompella-ppvpn-vpls-01.txt, March 2002

   [VPLS-DNS] Heinanen, "DNS/LDP Based VPLS". draft-heinanen-dns-ldp-
   vpls-00.txt, January 2002.

   [CE-AUTOCONFIG] CY Lee, "CE Auto-Configuration", (draft-lee-ppvpn-
   ce-auto-config-01.txt), work in progress, July 2002

   [RADIUS] Rigney, C., Willens, S., Rubens, A. and W. Simpson, "Remote
   Authentication Dial in User Service (RADIUS)", RFC 2865, June 2000.

6. Security Considerations

   It is recommended to use IPsec in conjunction with L2TPv3 to secure
   communication. Please see the Appendix for further information on
   Security Considerations.

7. IANA Consideration

   A new PW Type for CE-based VPL is required.

8. Acknowledgment

   The authors would like to thank Jeremy deClercq and Jeanne DeJaegher
   for their helpful comments on the initial version of this draft. The
   draft benefited from discussions with Sasha Cirkovic, Jeff Smith,
   Raymond Chang, Roy Nighswander, Neil Harrison, Alexis Berthillier,
   Dean Welsh and Arnold Jansen.























9. Author's Address

   Cheng-Yin Lee Alcatel 600 March Rd, Ottawa Ontario, Canada K2K 2E6
   e-mail: Cheng-Yin.Lee@alcatel.com

   Mitsuru Higashiyama Anritsu Corporation 1800 Onna, Atsugi-shi,
   Kanagawa-prf., 243-8555 Japan e-mail:
   Mitsuru.Higashiyama@yy.anritsu.co.jp



10. Full Copyright Statement

   Copyright (C) The Internet Society (2003).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.






















Appendix

   This Appendix describes how CE-based VPL (CEVPL) satisfies [L2VPN-
   REQ].  The sections are numbered as in [L2VPN-REQ].

3.2 Taxonomy of Layer 2 PPVPN Types

   The requirements distinguish two major L2VPNs models, a Virtual
   Private Wire Service (VPWS), and a Virtual Private LAN Service
   (VPLS).

   The following diagram shows a L2VPN reference model.
       +-----+                                       +-----+
       + CE1 +--+                                +---| CE2 |
       +-----+  |    ........................    |   +-----+
       L2VPN A  |  +----+                +----+  |   L2VPN A
                +--| PE |--- Service  ---| PE |--+
                   +----+    Provider    +----+
                  /  .       Backbone       .  \     -   /\-_
       +-----+   /   .          |           .   \   / \ /   \     +-----+
       + CE4 +--+    .          |           .    +-- Access \----| CE5 |
       +-----+       .        +----+        .       | Network |   +-----+
       L2VPN B       .........| PE |.........        \       /    L2VPN B
                              +----+     ^            -------
                                |        |
                                |        |
                             +-----+     |
                             | CE3 |     +-- Logical switching instance
                             +-----+
                             L2VPN A

                        Figure 1 L2VPN Reference Model

4. Service Requirements Common to CUstomers and Service Providers

4.1 Scope of emulation

   CEVPL interoperates with the existing protocols and standards
   (802.1d/q, 802.3 control frames handling) of the Ethernet network the
   customer is managing.

   Some possibly salient differences between CEVPL and a real LAN are:
   - the reliability MAY likely be less -- a message sent to a remote
   node may not be received by the remote bridge because the remote
   bridge may be temporarily not reachable --  a message broadcast over
   a CEVPL using a spanning tree may not be seen by one of the remote CE
   if the PSN is partitioned -- the probability that a message broadcast
   over a CEVPL using a spanning tree is not seen by one of the remote
   CE is lower than if reverse split horizon forwarding is used (which
   can occur whenever a PSN tunnel is broken)

   - if sequencing is not turned on, BPDUs on a PW may get out of oerder
   - Ethernet frames can get duplicated or received out of sequence if
   the sequencing option is not turned on. - 802.3 Pause frames will be
   handled by a CE/CLE as defined in 802.3

   CEVPL interoperates with customer equipment as specified in IEEE
   specifications.

4.2 Traffic Types

   CE VPL support unicast, multicast, and broadcast traffic.  It is
   desirable that the CE/CLE support efficient replication of broadcast
   and multicast traffic.

4.3 Topology

   A CEVPL allows multipoint to multipoint connectivity over point to
   point tunnels setup for different types topologies e.g. :
        o Point-to-point
        o Point-to-multipoint, a.k.a. hub and spoke
        o Any-to-any, a.k.a. full mesh
        o Mixed, a.k.a. partial mesh
        o Hierarchical

   Not all traffic characteristics (such as bandwidth, QoS, delay, etc.)
   would necessarily be the same between any two end points of a CEVPL.
   The SLS requirements of a service would have a bearing on the type of
   topology that can be used.

   A CEVPL is capable of crossing multiple administrative boundaries.

   CEVPL services are independent of access network technology.

4.4 Isolated Exchange of Data and Forwarding Information

   CEVPL has means to allow CE to authenticate each other during tunnel
   setup. If a CE needs to obtain configuration information from e.g.  a
   server, a CE configuration solution which allows authentication and
   authorization SHOULD be used.

   CEVPL implemented according to specification SHOULD not introduce
   undesired forwarding information that could corrupt the L2VPN
   forwarding information base.

   CEVPL constrains, or isolates, the distribution of addressed data to
   only those VPLS sites determined either by MAC learning.

   The internal structure of a CEVPL is not be advertised nor
   discoverable from outside that L2VPN.

4.5 Security

   A number of security concerns arise in the setup and operation of a
   L2VPN, ranging from mis-configurations to attacks that may be
   launched on a L2VPN.  This section lists some potential security
   hazards. Methods to protect against the following situations are
   listed in >>.

        - Protocol attacks
          o Excessive protocol adjacency setup/teardown
              >> This may not be applicable to CEVPL.
          o Excessive protocol signaling/withdrawal
                   >> Setting a limit on the tunnel setup frequency
   needs to be specified in CEVPL. A provider may also ingress rate-
   limit tunnel setup messages.

        - Resource Utilization
          o Forwarding plane replication (VPLS)
                   >> emulated LAN topology/network engineering to limit
   the
                 number of CEs that a CE shall be connected to

          o Looping (VPLS primarily)
                   >> STP
          o MAC learning table size limit (VPLS)
                   >> Same requirement as all bridges in the LAN, the
   MAC table is not shared by other customers
        - Unauthorized access
          o Unauthorized member of VPN
               >> A remote CE is authenticated during tunnel setup
          o Incorrect customer interface
               >> A remote CE is authenticated during tunnel setup
          o Incorrect service delimiting VLAN tag
                >> N/A
          o Unauthorized access to PE
                >> A PE may be protected from authorized in the same as
   an existing NE in a provider's network
        - Tampering with signaling
          o Incorrect FEC signaling
                >> N/A
          o Incorrect PW ID assignment
                >> See [L2TPv3]
          o Incorrect signaled VPN parameters (e.g., QoS, MTU, etc.)
                >> See [L2TPv3]
        - Tampering with data forwarding
          o Incorrect MAC learning entry
                >> A CE can only be updated by authorized entites
          o Incorrect Session ID/PW ID
                >> See [L2TPv3]
          o Incorrect customer facing encapsulation
                >> See [L2TPv3]
          o Incorrect pseudo-wire encapsulation
                >> See [L2TP3]
          o Hijacking pseudowires using the wrong tunnel
                >> See [L2TPv3]
          o Incorrect tunnel encapsulation
                >> See [L2TPv3]

4.5.1  User data security

   CEVPL provides traffic separation between different VPL.

   in 0 4.5.2  Access control

   A CEVPL MAY have the ability to activate the appropriate filtering
   capabilities upon request of a customer, if CE configuration or
   management such as LMI is used.

4.6 Addressing

   CEVPL supports overlapping addresses of different L2VPNs. For
   instance, customers are not prevented from using the same MAC
   addresses and/or the same VLAN Ids when used with different L2VPNs. A
   CEVPL is oblivious to customer VLANs, I.e. customers can have
   overlapping VLAN Ids.

4.7 Quality of Service

   A CEVPL QoS SHOULD be independent of the access network technology.

4.7.1  QoS Standards

   A CEVPL SHALL be able to support QoS in one or more of the following
   already standardized modes:
        - Best Effort  (support mandatory for all PPVPN types)
        - Aggregate CE Interface Level QoS (i.e., hose level)
        - Site-to-site, or pipe level QoS

   This MAY require that the CE and/or PE perform shaping and/or
   policing.

   Mappings or translations of Layer 2 QoS parameters into
   PacketSwitched work QoS (e.g., DSCPs or MPLS EXP field) as well as
   QoS mapping based on VC (e.g., FR/ATM or VLAN) MAY be performed in
   order to provide QoS transparency. The actual mechanisms for these
   mappings or translations are outside the scope of this document. In
   addition, the Diffserv support of underlying tunneling technologies
   (e.g., [RFC3270] or [RFC3308]) and the Intserv model ([RFC2205]) MAY
   be used.  As such, the L2VPN SLS requirements should be supported by
   appropriate core mechanisms.

4.7.2  Service Models

   A service provider MUST be able to offer QoS service to a customer
   for at least the following generic service types: managed access VPN
   service or an edge-to-edge QoS service. The details of the service
   models can be found in [PPVPN-REQTS] and in [L3REQTS]. In CEVPL
   service, 802.1p fields shall be mapped to DSCP.

4.8 Service Level Specifications

   For a CEVPL, the monitoring and reporting of the VPL is described in
   "VPL Monitoring". Further work is required to fulfil the capabilities
   for Service Level Specification (SLS) monitoring and reporting stated
   in [PPVPN-REQTS].

4.9 Protection and Restoration

   To assure high availability, the underlying PSN SHOULD be able to
   provide fast failover to alternative paths or rerouting of traffic.

   The intention is to keep the restoration time small. The restoration
   time MUST be less than the time it takes the CE devices, or customer
   Layer 2 control protocols as well as Layer 3 routing protocols, to
   detect a failure in the L2VPN.

4.10 CE-to-CE and CE-to-PE link requirements

   The CE-to-PE links MAY either be direct physical links, e.g.
   100BaseTX, T1/E1 TDM or logical links, e.g. ATM PVC, or RFC2427-
   encapsulated link, or transport networks carrying Ethernet, or a
   Layer 2 tunnel that go through a layer 3 network (e.g., L2TP
   sessions), over which Ethernet traffic is carried.

   Ethernet frames MAY be tunneled through a layer 3 backbone from
   CE/CLE to CE/CLE, using the following tunneling technologies (e.g.,
   IP-in- IP, GRE, MPLS, L2TP, etc.).

4.11 Management

   Standard interfaces to manage Ethernet services is provided (e.g.,
   standard SNMP MIBs).  These interfaces shall provide access to
   configuration, verification and runtime monitoring protocols.

   The Service management MAY include the TMN 'FCAPS' functionalities,
   as follows: Fault, Configuration, Accounting, Provisioning, and
   Security, as detailed in [L3REQTS]. Accounting is out of scope of
   this draft.

4.12 Interoperability

   If CEVPL is standardized, it should promote interoperability among
   CEs/CLEs from different vendors.  CEVPL is defined to interoperate
   with existing 802.1d/q devices at customers' LAN sites.

   A CEVPL is agnostic to different access technologies.  For instance,
   customer access connections to a CEVPL service MAY be different at
   different CE/CLE devices (e.g. Ethernet, DSL, ATM)

4.13 Inter-working

   CEVPL may inter-work with PE-based VPLS or Provider Bridges if the
   customer facing port of a CLE is connected to the customer facing
   side of a PE.  The scalability of this inter-working is dependent on
   the scalability of PE-based VPLS or Provider Bridges.

   CEVPL may inter-work with Hybrid VPLS [HYBRID-VPLS] if the tunnel
   from a CE/CLE is terminated at a PE. The PE switch the decapsulated
   traffic onto an Attachment Circuit. The CE/CLE at the end of the
   Attachment Circuit bridges the traffic accordingly. Inter-working in
   this case scales as well as Hybrid VPLS. This allows CEs/CLEs with IP
   access to peer with CEs/CLEs with Ethernet, FR or ATM access. The SLA
   for CEs/CLEs with different types of access technologies may vary and
   dependent on the customer's network requirements.

   In both inter-working scenarios, customer traffic isolation is
   maintained. CEVPL may encrypt transmission of traffic over an IP
   network from CE/CLE to CE/CLE but when interworking with other VPLS
   solutions which terminates tunnels at PEs, the traffic is encrypted
   from a CE/CLE to a PE.

   CEVPL is able to work independently of other VPLS solutions in a
   network (Ships in the Night). Sites belonging to different VPLS
   networks shall continue to have emulated LAN service while CEVPL
   inter-working is being introduced.

5 Customer Requirements

   This section captures requirements from a customer perspective.

5.1 Service Provider Independence

   Customers MAY require L2VPN service that spans multiple
   administrative domains or service provider networks. Sites of a CEVPL
   is able to span multiple AS and SP networks, but still be able to act
   and to appear as a single, homogenous emulated LAN from a customer
   point of view.

   A customer might also start with a VPL provided in a single AS with a
   certain SLS but then ask for an expansion of the service spanning
   multiple ASs/SPs. In this case, as well as for all kinds of multi-
   AS/SP L2VPNs, a L2VPN service SHOULD be able to deliver the same SLS
   to all sites in a VPN regardless of the AS/SP to which it homes, if
   all AS and SP gives similar and consistent treatment of 802.1q p
   bits, DSCP and COS, but this is not generally practiced.

5.2 Layer 3 Support

   A CEVPL is agnostic to customer layer 3 traffic (e.g., IPv4/v6, IPX,
   Appletalk) encapsulated within Layer 2 frames.

5.3 Quality of Service and Traffic Parameters

   QoS is expected to be an important aspect of a L2VPN service for some
   customers.

   A customer requires that a CEVPL service provide the QoS applicable
   to his or her application, which can range from voice and interactive
   video to multimedia applications. Hence, best-effort as well as delay
   and loss sensitive traffic MUST be supported over a L2VPN service.
   The support of this requirement is dependent on the PSN QoS support.

   A customer application SHOULD experience consistent QoS independent
   of the access network technology used at different sites connected to
   the same L2VPN. Again, this is dependent on the SP's network being
   able to support QoS consistently independent of access network
   technology.

5.4 Service Level Specification

   Most customers simply want their applications to perform well. A SLS
   is a vehicle for a customer to measuere the quality of the service
   that SP(s) provide. Therefore, when purchasing a service, a customer
   requires access to the measures from the SP(s) that support the SLS.

   Standard interfaces to monitor usage of CEVPL services SHALL be
   provided (e.g., standard SNMP MIBs).

5.5 Security

5.5.1  Isolation

   A  CEVPL service provides traffic as well as forwarding information
   base isolation for customers similar to that obtained in private
   lines, FR, or ATM services.

   A CEVPL service MAY use customer VLAN identifications as service
   delimiters. In that case, traffic separation is provided by 802.1q.

5.5.2  Access control

   A CEVPL MAY have the mechanisms to activate the appropriate filtering
   capabilities upon request of a customer. For instance, MAC and/or
   VLAN filtering MAY be considered between CE/CLE and PE for a CEVPL.

5.5.3  Value added security services

   CEVPL allows value added security services such as encryption and/or
   authentication of customer packets, but does not restrict
   implementation of customer based security add-ons.

5.6 Network Access

   Every packet exchanged between the customer and the SP over the
   access connection MUST appear as it would on a private network
   providing an equivalent service to that offered by the L2VPN.

5.6.1  Physical/Link Layer Technology

   CEVPL is agnostic to a broad range of physical and link layer access
   technologies, such as PSTN, ISDN, xDSL, cable modem, leased line,
   Ethernet, Ethernet VLAN, ATM, Frame Relay, Wireless local loop,
   mobile radio access, etc, as long as the CEs/CLEs have reachability
   in the PSN. The capacity and QoS achievable MAY be dependent on the
   specific access technology in use.

5.6.2  Access Connectivity

   Various types of physical connectivity scenarios MUST be supported,
   such as multi-homed sites, backdoor links between customer sites,
   devices homed to two or more SP networks. CEVPL supports multi- link
   access for CE devices, the types of physical or link-layer
   connectivity arrangements shown in Figure 2 (in addition to the case
   shown in Figure 1). For example, in case (b) a CE/CLE MAY connect to
   two different SPs via diverse access networks. Resiliency MAY be
   further enhanced as shown in case (d), where CEs/CLEs, connected via
   a "back door" connection, connect to different SPs. Furthermore,
   arbitrary combinations of the above methods, with a few examples
   shown in cases (e) and (f) is supported.

   Note: In CEVPL, CEs/CLEs process BPDUs from other CEs/CLEs. A
   customer BPDU is tunneled from CE/CLE to CE/CLE and is transparent to
   the attached PE.


























                     +----------------                    +---------------
                     |                                    |
                  +------+                            +------+
        +---------|  PE  |                  +---------|  PE  |
        |         |device|                  |         |device| SP network
        |         +------+                  |         +------+
     +------+         |                  +------+         |
     |  CE  |         |                  |  CE  |         +---------------
     |device|         |   SP network     |device|         +---------------
     +------+         |                  +------+         |
        |         +------+                  |         +------+
        |         |  PE  |                  |         |  PE  |
        +---------|device|                  +---------|device| SP network
                  +------+                            +------+
                      |                                   |
                      +----------------                   +---------------
                     (a)                                 (b)
                      +----------------                  +---------------
                      |                                  |
     +------+     +------+               +------+     +------+
     |  CE  |-----|  PE  |               |  CE  |-----|  PE  |
     |device|     |device|               |device|     |device| SP network
     +------+     +------+               +------+     +------+
        |             |                     |             |
        | Backdoor    |                     | Backdoor    +---------------
        | link        |   SP network        | link        +---------------
        |             |                     |             |
     +------+     +------+               +------+     +------+
     |  CE  |     |  PE  |               |  CE  |     |  PE  |
     |device|-----|device|               |device|-----|device| SP network
     +------+     +------+               +------+     +------+
                      |                                   |
                      +----------------                   +---------------
                     (c)                                  (d)
                      +----------------                   +---------------
                      |                                   |
     +------+     +------+               +------+     +------+
     |  CE  |-----|  PE  |               |  CE  |-----|  PE  |
     |device|     |device|               |device|     |device| SP network
     +------+    +------+               +------+    +------+
        |            |                     |            |
        |Back        |                     |Back        +---------------
        |door        |   SP network        |door        +---------------
        |link        |                     |link        |
     +------+     +------+               +------+     +------+
     |  CE  |     |  PE  |               |  CE  |     |  PE  |
     |device|-----|device|               |device|-----|device| SP network
     +------+     +------+               +------+     +------+
                      |                                   |
                      +----------------                   +---------------
                     (e)                                 (f)
            Figure 2 Representative types of access arrangements.

5.7 Customer traffic

5.7.1  Unicast, Unknown Unicast, Multicast, and Broadcast forwarding

   CEVPL delivers every packet at least to its intended destination(s)
   within the scope of the VPL subject to the ingress policing and
   security policies.

5.7.2  Packet Re-ordering

   The queuing and forwarding policies SHOULD preserve packet order for
   packets with the same QoS parameters. Sequencing in [ETH-LT2Pv3]
   should be turned on to preserve frame order.

5.7.3  Minimum MTU

   CEVPL can support the theoretical MTU of the offered service.

   The committed minimum MTU size can be the same for a given VPL
   instance. Different CEVPL services MAY have different committed MTU
   sizes. If the customer VLANs are used as service delimiters, all
   VLANs within a given VPL would inherit the same MTU size.

   CEVPL MAY fragment packets and it is transparent to the customer.

5.7.4  End-point VLAN tag translation

   A CEVPL service does not translate customers' VLAN tags, when the
   customer VLANs are used as service delimiter.  It SHOULD be noted
   that VLAN tag translation (may be supported in other PE-based VPLS)
   affects the support for multiple spanning trees (i.e., 802.1s) but
   this is not an issue with CEVPL.

5.7.5  Transparency

   A CEVPL service emulates a LAN and appear to customer devices as a
   bridged LAN.  CEVPL does not require any special packet processing by
   the end users before sending packets to the provider's network.

   CEVPL does not require VLAN-ids to be assigned by the SP, hence the
   issue with VLANs being not transparent if VLAN-ids are assigned by
   the SP, is not applicable here.

5.8 Support for Layer 2 Control Protocols

   CLEs process L2 control protocols as defined in IEEE specifications.

   CEVPL ensure that loops be prevented. This can be accomplished
   through   Control protocols such as Spanning Tree (STP). A CEVPL does
   not require indications from customer Layer 2 control protocols, e.g.
   STP BPDU snooping, to improve the operation of a VPL, since CLEs
   participate in STP.

5.9 CE Provisioning

   A CEVPL requires configuration of the tunnel endpoint information on
   CEs/CLES. Provisioning on CEs/CLEs can be minimized or automated
   using the methods described in "Discovery" of this draft or an LMI
   method.

6 Service Provider Network Requirements

   This section describes the requirements from a service provider
   perspective.  How CEVPL behaves wrt these requirements are described
   in text preceeded by >>.

6.1 Scalability

   This section contains projections regarding L2VPN sizing projections
   and scalability requirements and metrics specific to CEVPL.

6.1.1  Service Provider Capacity Sizing Projections

   This section captures projections for scaling requirements over the
   next several years in terms of number of L2VPNs, number of interfaces
   per L2VPN, the size of forwarding information base per L2VPN, and the
   rate of L2VPN configuration changes. The examples are provided in
   [PPVPN-REQTS].

   The numbers provided in this section are examples and MUST be treated
   as such. A L2VPN solution MAY scale much more than the examples
   provided here. Each requirement in this section MUST be considered
   independently.

   A L2VPN solution SHOULD be scalable to support a very large number of
   L2VPNs per Service Provider network. The estimate is that a large
   service provider will require support O(10^5) VPWSs and O(10^4) VPLSs
   within the next four years.
   >> The forwarding states for L2VPN forwarding in CEVPL are only
   created at CLEs. Hence the number of VPL that can be supported in a
   provider's network is independent of the number VPWSs or the number
   of VPLSs. The limitation to the number of VPLSs shall be the amount
   of traffic that can be handled by the provider's network.

   A L2VPN solution SHOULD be scalable to support of a wide range of
   number of site interfaces per VPLS, depending on the size and/or
   structure of the customer organization. The number of site interfaces
   SHOULD range from a few site interfaces to O(10^2) site interfaces
   per VPLS.
   >> A CEVPL is capable of supporting number of site interfaces ranging
   from a few site interfaces to lower end O(10^2) site interfaces per
   VPLS.  It is recommended that a LAN (including emulated LAN) be
   subnetted when then number of nodes (including CLEs) becomes large.
   It is not clear how well bridging works in the case of higher end
   O(10^2) site interfaces per VPLS.  Note: In CEVPL, it is not
   necessary to have a full-meshed of tunnels from CLE to CLE - traffic
   is forwarded on a Spanning Tree. For e.g. a 5 site interfaces VPLS
   may require 4 tunnels in a hub and spoke configuration with a few
   additional tunnels for failover.

   A L2VPN solution SHOULD be scalable to support a wide range of number
   of customer addresses (e.g., MAC) per VPLS. The number of customer
   addresses per VPLS MAY range from just a few (i.e., the number of
   sites when the CE devices are routers or when the service is IPLS) to
   a very large number such as 1,000 (i.e., when CE devices are
   switches). The number of customer addresses would be on the order of
   addresses supported in a typical native Layer 2 backbone.
   >> Since MAC addresses are only stored in CLEs, CEVPLS can support a
   wide range of number of customer addresses per VPLS from just a few
   to a very large number such as 1000 or the number of MAC addresses in
   a typical LAN can be easily supported.

   A L2VPN solution SHOULD support high values of the frequency of
   configuration setup and change, e.g., for real-time provisioning of
   an on-demand videoconferencing or addition/deletion of sites.
   >> With an auto-configuration mechanism, CEVPL can support high
   values of frequency of configuration setup and change.

   Approaches SHOULD articulate scaling and performance limits for more
   complex deployment scenarios, such as inter-AS(S) L2VPNs and
   carriers' carrier.  Approaches SHOULD also describe other dimensions
   of interest, such as capacity requirements or limits, number of
   inter-working instances supported as well as any scalability
   implications on management systems.
   >> Since bridging and tunneling are performed on CLEs, CEVPL is
   transparent to the provider's PEs and Ps and hence can be deployed
   and scale well across different domains.  No inter-working is
   required across different domains.

   The number of users per VPLS is the combination of servers and hosts
   connected to the VPLS. It needs to scale from a handful to high
   numbers. A VPLS MUST scale from 2 users to a few hundred.
   >> CEVPL scales from 2 users to a few hundred.

   The number of users per VPLS interface follows the same logic as for
   users per VPLS. Further, it MUST be possible to have single user
   sites connected to the same VPLS as very large sites are connected
   to. VPLSs MUST scale from 1 user to a few hundred per site.
   >> CEVPL scales from 1 user to a few hundred per site.

   The number of sites per VPLS is clearly limited by the number of
   users for a VPLS. The largest number of sites in a VPLS would be
   equal to the largest number of users, distributed one per site.

   The number of L2VPNs SHOULD scale linearly with the size of the
   access network and with the number of PEs.
   >> CEVPL is transparent to PEs and hence is independent of the size
   of the access network or the number of PEs, I.e, CEVPL scales wrt to
   these parameters.

6.1.2  Solution-Specific Metrics

   Each L2VPN solution SHALL document its scalability characteristics in
   quantitative terms.

6.2 Identifiers

   A SP domain MUST be uniquely identified at least within the set of
   all interconnected SP networks when supporting a L2VPN that spans
   multiple SPs. Ideally, this identifier SHOULD be globally unique
   (e.g., an AS number).

   An identifier for each L2VPN SHOULD be unique, at least within each
   SP's network, as it MAY be used in auto-discovery, management (e.g,
   alarm and service correlation, troubleshooting, performance
   statistics collection), and signaling. Ideally, the L2VPN identifier
   SHOULD be globally unique to support the case, where a L2VPN spans
   multiple SPs (e.g., [RFC2685]). Globally unique identifiers
   facilitate the support of inter-AS/SP L2VPNs.

   >> CEVPL work transparently across different domains, hence a
   globally unique domain identifier for CEVPL that spans different
   domains is not required.

6.3 Discovering L2VPN Related Information

   Configuration of PE devices (i.e., U-PE and N-PE) is a significant
   task for a service provider. Solutions SHOULD provide methods that
   dynamically allow L2VPN information to be discovered by the PEs to
   minimize the configuration steps.
   >> CE Auto-configuration referred to in CEVPL can be used to minimize
   configuration steps.

   Each device in a L2VPN SHOULD be able to determine which other
   devices belong to the same L2VPN.  Such a membership discovery scheme
   MUST prevent unauthorized access and allows authentication of the
   source.
   >> CE Auto-configuration referred to in CEVPL has means to prevent
   unauthorized access and allows authentication of devices.

   Distribution of L2VPN information SHOULD be limited to those devices
   involved in that L2VPN. A L2VPN solution SHOULD employ discovery
   mechanisms to minimize the amount of operational information
   maintained by the SPs.  For example, if a SP adds or removes a
   customer port on a given PE, the remaining PEs SHOULD determine the
   necessary actions to take without the SP having to explicitly
   reconfigure those PEs.
   >> Distribution of configuration information to CE is limited to CEs
   of a VPLS only. CE Auto-configuration describes ways to minimize the
   amount of operational information maintained and configured by SPs,
   for e.g. if a CE is removed, other CEs should be updated accordingly.

   A L2VPN solution SHOULD support the means for attached CEs to
   authenticate each other and verify that the service provider L2VPN is
   correctly configured.
   >> CEVPL allows CEs to authenticate each other.

   The mechanism SHOULD respond to L2VPN membership changes in a timely
   manner. A "timely manner" is no longer than the provisioning
   timeframe, typically on the order of minutes, and MAY be as short as
   the timeframe required for "rerouting," typically on the order of
   seconds.
   >> Using a CE Auto-Configuration to dynamically update CEs of L2VPN
   membership change should allow CEVPL to respond in a "timely manner".

   Dynamically creating, changing, and managing multiple L2VPN
   assignments to sites and/or customers is another aspect of membership
   that MUST be addressed in a L2VPN solution.
   >> CE Auto-Configuration can be used to dynamically update CEs of
   different L2VPN membership changes.  In general, this could be
   addressed within a provisioning framework, independent of the CEVPL
   proposal.

6.4 SLS Support

   Typically, a SP offering a L2VPN service commits to specific Service
   Level Specifications (SLS) as part of a contract with the customer.
   Such a Service Level Agreement (SLA) drives the specific SP
   requirements for measuring Specific Service Level Specifications
   (SLS) for quality, availability, response time, and configuration
   intervals.

6.5 Quality of Service (QoS)

   A significant aspect of a PPVPN is support for QoS. A SP has control
   over the provisioning of resources and configuration of parameters in
   at least the PE and P devices, and in some cases, the CE devices as
   well. Therefore, the SP is to provide either managed QoS access
   service, or edge-to-edge QoS service, as defined in [L3REQTS].

6.6 Isolation of Traffic and Forwarding Information

   From a high level SP perspective, a L2VPN MUST isolate the exchange
   of traffic and forwarding information to only those sites that are
   authenticated and authorized members of a L2VPN.
   >> In CEVPL, the exchange of traffic and forwarding information only
   occurs among those sites that are authenticated and authorized
   members of the VPLS.

   A L2VPN solution SHOULD provide a means for meeting PPVPN QoS SLS
   requirements that isolates L2VPN traffic from the affects of traffic
   offered by non-VPN customers. Also, L2VPN solutions SHOULD provide a
   means so that traffic congestion produced by sites as part of one
   L2VPN does not affect another L2VPN.
   >> A provider can use existing methods to treat L2VPN traffic with
   the appropriate priority or DSCP or CoS to differentiate them from
   non-VPN traffic. Rate-limiting at ingress to provider's network can
   also be used to prevent traffic from a L2VPN from exceeding its share
   of bandwidth use.

6.7 Security

   The security requirements are stated in Section 4.5. The requirements
   provided in [PPVPN-REQTS] and in [L3REQTS] SHOULD be met as
   appropriate.

   In addition, a SP network MUST be immune to malformed or maliciously
   constructed customer traffic. This includes but not limited to
   duplicate or invalid Layer 2 addresses, customer side loops,
   short/long packets, spoofed management packets, spoofed VLAN tags,
   high volume traffic.
   >> In CEVPL, internal customer addresses or customer BPDUs are
   transparent to an SP network since trafffic is tunneled from CLE to
   CLE, and one customer/s CLE does not communicate with another
   customer's CLE. Hence malformed or maliciously consructed customer
   traffic shall not affect an SP network.

   The SP network devices MUST NOT be accessible from any L2VPN, unless
   specifically authorized. The devices in the PPVPN network SHOULD
   provide some means of reporting intrusion attempts to the SP, if the
   intrusion is detected.
   >> There is no reason to grant access of SP network devices to L2VPN.
   Hence a provider may perform ingress filtering of traffic from L2VPN
   towards the SP network addresses (subnet). A CLE only need to be able
   to reach other CLEs of the same L2VPN.

6.8 Inter-AS (SP) L2VPNs

   All applicable SP requirements, such as traffic and forwarding
   information isolation, SLS's, management, security, provisioning,
   etc. MUST be preserved across adjacent ASes. The solution MUST
   describe the inter-SP network interface, encapsulation method(s),
   routing protocol(s), and all applicable parameters [VPN-IW].

   A L2VPN solution MUST provide the specifics of offering L2VPN
   services spanning multiple ASs and/or SPs.

   >> CEVPL works the same within a domain as it is across different
   domains.  It is not clear if there is any motivation for a CEVPL SP
   to share management of a CEVPL with another CEVPL SP, since the
   tunnels from a CE to another CE can be setup across different domains
   without another SP cooperation or intervention, as long as the
   different CEs are reachable.

   A L2VPN solution MUST support proper dissemination of operational
   parameters to all elements of a L2VPN service in the presence of
   multiple ASs and/or SPs. A L2VPN solution MUST employ mechanisms for
   sharing operational parameters between different ASs.
   >> A CE Auto-Configuration mechanism which allows CEs to query a
   server accessible from different ASs can be used for this purpose.

   A L2VPN solution SHOULD support policies for proper selection of
   operational parameters coming from different ASs. Similarly, a L2VPN
   solution SHOULD support policies for selecting information to be
   disseminated to different ASs.

6.8.1  Management

   The general requirements for managing a single AS apply to a
   concatenation of AS's. A minimum subset of such capabilities is the
   following:
     - Diagnostic tools
     - Secured access to one AS management system by another
     - Configuration request and status query tools
     - Fault notification and trouble tracking tools

6.8.2  Bandwidth and QoS Brokering

   When a L2VPN spans multiple AS's, there is a need for a brokering
   mechanism that requests certain SLS parameters, such as bandwidth and
   QoS, from the other domains and/or networks involved in transferring
   traffic to various sites. The essential requirement is that a
   solution MUST be able to determine whether a set of AS's can
   establish and guarantee uniform QoS in support of a PPVPN.

6.9 L2VPN Wholesale

   The architecture MUST support the possibility of one SP offering
   L2VPN service to another SP.  One example is when one SP sells L2VPN
   service at wholesale to another SP, who then resells that L2VPN
   service to his or her customers.
   >> CEVPL allows one SP to sell a CEVPL at wholesale to another SP,
   who then resells the emulated LAN to the 2nd SP's customers.  In this
   case, the "CE" would appear as a 802.1d/q bridge in the second SP's
   network, providing one emulated LAN to all the 2nd SP's customers.
   If the 2nd SP wishes to provide L2VPN to its customers', it is better
   for the 2nd SP to provide the L2VPN service over a PSN than over the
   wholesale L2VPN. The latter incurs additional encapsulation layers
   and may be susceptible to forwarding loops.

6.10 Tunneling Requirements

   Connectivity between CE sites or PE devices in the backbone SHOULD be
   able to use a range of tunneling technologies, such as L2TP, GRE,
   IP-in-IP, MPLS, etc.
   >> Although CEVPL is specified for L2TPv3, it does not preclude the
   use of other tunneling technologies.

   Every PE MUST support a tunnel setup protocol, if tunneling is used.
   A PE MAY support static configuration. If employed, a tunnel
   establishment protocol SHOULD be capable of conveying information,
   such as the following:
        - Relevant identifiers
        - QoS/SLS parameters
        - Restoration parameters
        - Multiplexing identifiers
        - Security parameters
   >> A CLE support a tunnel setup protocol. A CLE allows static
   configuration of the tunnel. The multiplexing identifier is conveyed,
   other information (TLV) may be added to L2TPv3 if necessary.

   There MUST be a means to monitor the following aspects of tunnels:
        - Statistics, such as amount of time spent in the up and down
          state
        - Count of transitions between the up and down state
        - Events, such as transitions between the up and down states
   >> Using the functions in "VPL Monitoring" the above statistics to be
   collected.

   The tunneling technology used by the VPN Service Provider and its
   associated mechanisms for tunnel establishment, multiplexing, and
   maintenance MUST meet the requirements on scaling, isolation,
   security, QoS, manageability, etc.

   Regardless of the tunneling choice, the existence of the tunnels and
   their operations MUST be transparent to the customers.  >> The
   tunnels and their operations are transparent to customers.

6.11 Support for Access Technologies

   >> A CE/CLE is connected to a PE via an access link. The access link
   MAY span networks of other providers or public networks.  Some
   popular choices of access technologies include Ethernet, ATM (DSL),
   Frame Relay, MPLS-based virtual circuits etc. The access link,
   whether direct or virtual, MUST maintain all committed
   characteristics of the customer traffic, such as QoS, priorities etc.
   This provider may use existing methods to enforce this.  The access
   technology used is transparent to CEVPL.

   >> The CLE connection to the customer network (or CE) is typically
   Ethernet and is bi-directional in nature. The CLE uses Ethernet
   frames as the Service Protocol Data Unit (SPDU).

6.12 Backbone Networks

   Ideally, the backbone interconnecting SP PE and P devices SHOULD be
   independent of physical and link layer technology. Nevertheless, the
   characteristics of backbone technology MUST be taken into account
   when specifying the QoS aspects of SLSs for VPN service offerings.

6.13 Network Resource Partitioning and Sharing Between L2VPNs

   In case network resources such as memory space, FIB table, bandwidth
   and CPU processing are shared between L2VPNs, the solution SHOULD
   guarantee availability of resources necessary to prevent any specific
   L2VPN instance from taking up available network resources and causing
   others to fail. The solution SHOULD be able to limit the resources
   consumed by a L2VPN instance. The solution SHOULD guarantee
   availability of resources necessary to fulfill the obligation of
   committed SLSs.
   >> CEVPL L2VPN operation is transparent to the provider's network.
   Hence L2VPN related resources and processing e.g. MAC table, Layer 2
   protocol processing has no effect on the provider's network.  A CEVPL
   may share bandwidth in the provider's network with another CEVPL. A
   provider may use rate-limiting at ingress to limit traffic from a
   L2VPN and existing methods to manage bandwidth sharing.  The may be
   specified in a separate L2VPN QoS framework.

6.14 Interoperability

   Service providers are interested in interoperability in at least the
   following scenarios:
        - To facilitate use of CLE and customer devices (CE)
        >> The CLE and CE shall interoperate as specified in IEEE 802.1d
        - To implement L2VPN services across two or more interconnected
   SP
        networks
        >> As long as there is reachability from a CLE to another CLE,
   traffic in a CEVPL can be tunneled in one domain or across different
   domains. Hence there is no need to devise inter-working means when
   CEVPL span different SP networks.
        - To achieve inter-working or interconnection between customer
        sites using different L2VPN solutions or different
   implementations
        of the same approach
        >> CEVPL may inter-work with other VPLS solutions if the
   customer facing side of a CLE in a CEVPL is connected to the customer
   facing side of a PE of other VPLS solutions.

6.15 Testing

   The L2VPN solution SHOULD provide the ability to test and verify
   operational and maintenance activities on a per L2VPN service basis,
   and in case of VPLS, on a per VLAN basis if customer VLANs are used
   as service delimiters.

   The L2VPN solution SHOULD provide mechanisms for connectivity
   verification, and for detecting/locating faults.

   Examples of testing mechanisms are as follows:
        o Checking connectivity between "service-aware" network nodes
        o Verifying data plane and control plane integrity
        o Verifying service membership

   The provided mechanisms MUST satisfy the following: the connectivity
   checking for a given customer MUST enable the end-to- end testing of
   the data path used by that customer's data packets and the test
   packets MUST not propagate beyond the boundary of the SP network.

   >> There are on-going work to address Ethernet "ping" and
   "traceroute" functions. This may be adapted for CEVPL in future.

7 Service Provider Management Requirements

   A service provider desires to have a means to view the topology,
   operational state, and other parameters associated with each
   customer's L2VPN. Furthermore, the service provider requires a means
   to view the underlying logical and physical topology, operational
   state, provisioning status, and other parameters associated with the
   equipment providing the L2VPN service(s) to its customers.
   Therefore, the devices SHOULD provide standards-based interfaces
   (e.g., L2VPN MIBs) wherever feasible.
   >> CEVPL shall provide standards-based interfaces for the above
   purpose.

   The details of service provider management requirements for a Network
   Management System (NMS) in the traditional fault, configuration,
   accounting, performance, and security (FCAPS) management categories
   can be found in [Y.1311.1].

8 Engineering Requirements

   These requirements are driven by implementation characteristics that
   make service and SP requirements achievable.

8.1 Control Plane Requirements

   A L2VPN service SHOULD be provisioned with minimum number of steps.
   Therefore, the control protocols SHOULD provide methods for signaling
   between PEs. The signaling SHOULD inform of membership, tunneling
   information, and other relevant parameters.  >> Using a suitable CE
   Auto-Configuration, the provisioning of CEVPL can be minimized.

   The infrastructure MAY employ manual configuration methods to provide
   this type of information.  >> CEVPL does not preclude the use of
   manual configuration methods.

   The infrastructure SHOULD use policies to scope the membership and
   reachability advertisements for a particular L2VPN service. A
   mechanism for isolating the distribution of reachability information
   to only those sites associated with a L2VPN MUST be provided.  >> CE
   Auto-Configuration mechanisms only distribute reachability
   information to only those sites associated with a CEVPL.

   The control plane traffic increases with the growth of L2VPN
   membership. Similarly, the control plane traffic increases with the
   number of supported L2VPN services. The use of control plane
   resources MAY increase as the number of hosts connected to a L2VPN
   service grows.

   A L2VPN solution SHOULD minimize control plane traffic and the
   consumption of control plane resources. The control plane MAY offer
   means for enforcing a limit on the number of customer hosts attached
   to a L2VPN service.

   >> In CEVPL, L2VPN control plane processing occurs only in CLE/CE,
   hence L2VPN control plane resource consumption are restricted to CLEs
   and customer devices (including CE) only. The number of customer
   hosts that can be attached to a CEVPL is similar to the MAC table
   size supported by customer devices (and CLEs).

8.2 Data Plane Requirements
8.2.1  Encapsulation

   >> CEVPL utilizes the encapsulation techniques defined by PWE3
   ([PWE3-FR]), and does not impose any new requirements on these
   techniques.

8.2.2  Responsiveness to Congestion

   >> CEVPL utilize thes congestion avoidance techniques defined by PWE3
   ([PWE3-FR]).

8.2.3  Broadcast Domain

   >> CEVPL maintains a separate Broadcast Domain for each VPLS.

   In addition to VPLS Broadcast Domains, a L2VPN service MAY honor
   customer VLAN Broadcast Domains, if customer VLANs are used as
   service delimiters. In that case, the L2VPN solution SHOULD maintain
   a separate VLAN Broadcast Domain for each customer VLAN.  >> In the
   case of CEVPL, customer VLANs are switched as defined by 802.1q.

8.2.4  Virtual Switching Instance

   L2VPN Provider Edge devices MUST maintain a separate Virtual
   Switching Instance (VSI) per each VPLS. Each VSI MUST have
   capabilities to forward traffic based on customer's traffic
   parameters such as MAC addresses, VLAN tags (if supported), etc. as
   well as local policies.

   L2VPN Provider Edge devices MUST have capabilities to classify
   incoming customer traffic into the appropriate VSI.

   >> In CEVPL, typically only one VSI may be required.  Customer's VLAN
   traffic may be switched as defined in IEEE 802.1q.

   Each VSI MUST have flooding capabilities for its Broadcast Domain to
   facilitate proper forwarding of Broadcast, Multicast and Unknown
   Unicast customer traffic.
   >> A CEVPL VSI has flooding capabilities for its Broadcast Domain to
   facilitate Broadcast, Multicast and Unknown Unicast customer traffic.

8.2.5  MAC address learning

   A VPLS SHOULD derive all topology and forwarding information from
   packets originating at customer sites.  Typically, MAC address
   learning mechanisms are used for this purpose.

   Dynamic population of the Forwarding Information Base (e.g. via MAC
   address learning) MUST take place on a per Virtual Switching Instance
   (VSI) basis, i.e. in the context of a VPLS and, if supported, in the
   context of VLANs therein.  >> CEVPL populates the FIB on a per VSI
   basis, typically only one VSI is required.

9 Security Considerations

   Security considerations occur at several levels and dimensions within
   Layer 2 Provider Provisioned VPNs, as detailed within this document.

   The requirements in this document separate the notion of traditional
   security requirements, such as integrity, confidentiality, and
   authentication as detailed in section 4.5 from that of isolating (or
   separating) the exchange of forwarded packets and exchange of
   forwarding information between specific sets of sites. Further
   details on security requirements are given from the customer and
   service provider perspectives in sections 5.5 and 6.7, respectively.
   In an analogous manner, further detail on traffic and routing
   isolation requirements are given from the customer and service
   provider perspectives in sections 4.4 and 6.6, respectively.
   Safeguards to protect network resources such as CPU, memory, and
   bandwidth are required in section 6.13.  >> CEVPL security
   considerations are covered in the respective sections listed above.

   IPSec can be also be applied after tunneling Layer-2 traffic to
   provide additional security.  >> CEVPL allows the use of IPSec with
   L2TPv3.

   11 References

   11.1 Normative References

      [RFC2026]   Bradner, S., "The Internet Standards Process --
                  Revision 3", BCP 9, RFC 2026, October 1996.
      [RFC2119]   Bradner, S., "Key words for use in RFCs to Indicate
                  Requirement Levels", BCP 14, RFC 2119, March 1997

      [TERMINOLOGY]    Andersson, L, Madsen, T. "PPVPN Terminology", work
                  in progress

   11.2 Non-normative References

      [GENERIC-REQTS]  Nagarajan, A., et al. "Generic Requirements for
                  Provider Provisioned VPN", work in progress
      [PPVPN-L2-FR]    Andersson, L, et al. "PPVPN L2 Framework", work in
                  progress
      [RFC3270]   Le Faucheur, F., et al. "Multi-Protocol Label Switching
                  (MPLS) Support of Differentiated Services", RFC 3270,
                  May 2002.
      [RFC3308]   Calhoun, P., et al, "Layer 2 Tunneling Protocol (L2TP)
                  Differentiated Services Extension", RFC 3308, November
                  2002.
      [RFC2205]   Braden, R., et al, "Resource ReSerVation Protocol
                  (RSVP)", RFC 2205, September 1997.
      [L3REQTS]   Carugi, M., McDysan, D. et. al., "Service Requirements
                  for Layer 3 Provider Provisioned Virtual Private
                  Networks", work in progress
      [Y.1311.1]  Carugi, M. (editor), "Network Based IP VPN over MPLS
                  architecture",Y.1311.1 ITU-T Recommendation, May 2001
                  (http://standards.nortelnetworks.com/ppvpn/relateditu.ht
                  m)
      [RFC2685]   Fox B., et al, "Virtual Private Networks Identifier",
                  RFC 2685, September 1999.
      [VPN-IW]    H. Kurakami et al, "Provider-Provisioned VPNs
                  Interworking," work in progress.
      [PWE3-FR]   Pate, P, et al. "Framework for Pseudo Wire Emulation
                  Edge-to-Edge (PWE3)", work in progress