AD comments on l2vpn-requirements

"Serbest, Yetik" <Yetik_Serbest@labs.sbc.com> Sun, 20 February 2005 22:32 UTC

Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA17147 for <l2vpn-web-archive@ietf.org>; Sun, 20 Feb 2005 17:32:41 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D2zzF-0003Oj-Lj for l2vpn-web-archive@ietf.org; Sun, 20 Feb 2005 17:55:38 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D2ypY-0007LY-59; Sun, 20 Feb 2005 16:41:32 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D2yAw-0006vy-1m for l2vpn@megatron.ietf.org; Sun, 20 Feb 2005 15:59:34 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA10452 for <l2vpn@ietf.org>; Sun, 20 Feb 2005 15:59:26 -0500 (EST)
Received: from howler.tri.sbc.com ([205.173.58.4]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D2yWz-0001DQ-UJ for l2vpn@ietf.org; Sun, 20 Feb 2005 16:22:22 -0500
Received: from sbctri.tri.sbc.com (mayhem-webdmz.tri.sbc.com [144.60.9.139]) by howler.tri.sbc.com (8.12.10/8.12.10) with ESMTP id j1KKxQRt003983; Sun, 20 Feb 2005 14:59:26 -0600 (CST)
Received: from TSMAIL2.ad.tri.sbc.com (tsmail2.ad.tri.sbc.com [144.60.55.226]) by sbctri.tri.sbc.com (8.12.10/8.12.10) with ESMTP id j1KKxPEq003524; Sun, 20 Feb 2005 14:59:25 -0600 (CST)
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Sun, 20 Feb 2005 14:59:25 -0600
Message-ID: <0CED449E95A92A42991EB71B778C17BF795241@TSMAIL2.ad.tri.sbc.com>
Thread-Topic: AD comments on l2vpn-requirements
Thread-Index: AcUKmC6jOz+aET23TaGYqEswA5q+mgM86s/A
From: "Serbest, Yetik" <Yetik_Serbest@labs.sbc.com>
To: Loa Andersson <loa@pi.se>, L2VPN <l2vpn@ietf.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 515708a075ffdf0a79d1c83b601e2afd
Content-Transfer-Encoding: quoted-printable
Cc: Thomas Narten <narten@us.ibm.com>, Rick Wilder <rick@rhwilder.net>, Vach Kompella <vach.kompella@alcatel.com>
Subject: AD comments on l2vpn-requirements
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: l2vpn.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
Sender: l2vpn-bounces@ietf.org
Errors-To: l2vpn-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: cdeeb24e6b743a852c396a4af0e53c8f
Content-Transfer-Encoding: quoted-printable

I just submitted a new version of l2vpn-requirements draft. The new
version includes some updates based on AD comments. Below please find AD
comments, and the corresponding responses.

Thanks,
Yetik



>    covers point to point VPNs referred to as Virtual Private Wire

s/point to point/point-to-point/

Done.

>    Service (VPWS), as well as multipoint to multipoint VPNs also known

Ditto

Done.

>    This document provides requirements for provider provisioned
Layer-2
>    Virtual Private Networks (L2VPN).  It identifies requirements that

provider-provisioned

Done.

>    Virtual Private Networks (L2VPN).  It identifies requirements that
>    MAY apply to one or more individual approaches that a Service
>    Provider (SP) MAY use for the provisioning of a Layer-2 VPN
service.
>    The content of this document makes use of the terminology defined
in
>    [VPN_TERM] and common components for deploying L2VPNs described in
>    [L2VPN_FR].

Use of upper case MAY here seems off. how does this fit with the
defintion of MAY?

Done.

>    individual approach satisfies specific requirements.  The
>    applicability statement document for each individual approach
SHOULD
>    document the results of this evaluation.

lower case should? I.e., this document is mandating that other documents
do this?

Done.

>    Some possibly salient differences between VPLS and a real LAN are:
>      - The reliability MAY likely be less, i.e., the probability that
a
>      message broadcast over the VPLS is not seen by one of the bridge
>      modules in PEs is higher than in a true Ethernet.

Not sure use of upper-case MAY is appropriate here.

Done.

>      of sequence.  If the customer's BPDU frames are sent as data

undefined/unexpanded acronym.

Expanded.

>      CE to CE.  For example, Source MAC address MAY NOT be preserved
by
>      the IPLS solution.

Again, not sure about use of upper case terms here.

Done.

> 4.3 Topology
>    A SP network MAY be realized using one or more network tunnel
>    topologies to interconnect PEs, ranging from simple point-to-point
>    to distributed hierarchical arrangements.  The typical topologies
>    include:

s/MAY/may/?

Done.

> 4.5 Security

...

>    hazards.  There MUST be methods available to protect against the
>    following situations.
> 
>      - Protocol attacks
>        o Excessive protocol adjacency setup/teardown
>        o Excessive protocol signaling/withdrawal
>      - Resource Utilization
>        o Forwarding plane replication (VPLS)
>        o Looping (VPLS primarily)
>        o MAC learning table size limit (VPLS)

this itemization is really cryptic. For the second bullet, I have no
idea what needs to be protected against. Same comment applies to some of
the other items. 

The following text added. That bullet is about protecting network
resources (bandwidth, memory, CPU, FIB).

"A number of security concerns arise in the setup and operation of a
L2VPN, ranging from mis-configurations to attacks that can be launched
on a L2VPN and can strain network resources such as memory space,
forwarding information base table, bandwidth and CPU processing.
This section lists some potential security hazards that can result due
to mis-configurations and/or malicious attacks."

> 4.5.1  User data security
>    L2VPN solution MUST provide traffic separation between different
>    L2VPNs.

s/L2VPN/An L2VPN/

Done.

> 4.6 Addressing
>    A L2VPN solution MUST support overlapping addresses of different
>    L2VPNs.  For instance, customers SHOULD not be prevented from using
>    the same MAC addresses and/or the same VLAN Ids when used with

seems like a s/SHOULD not/MUST NOT/

Done.

>    have overlapping VLAN Ids.  Second, VLAN Ids MAY be used as service
>    delimiters, in which case it depends on whether the SP assigns the
>    VLANs or not.  If it does, then there is no overlapping.  If it
>    doesn't, then overlapping VLAN Ids can occur and the SP has to put
>    safeguards in place to avoid this situation.

last case seems odd. You will let customers pick the VPN IDs and hope
they aren't duplicated elsewhere? Seems like a pretty poor choice.

It is there just for completeness, to make sure VLAN-Ids are unique per
customer in such scenarios.

> 4.13 Inter-working
>    Inter-working scenarios among different solutions, providing L2VPN
>    services, are highly desirable.  Inter-working SHOULD be supported
>    in a scalable manner.
> 
>    Inter-working scenarios MUST consider at least traffic isolation,
>    security, QoS, access, and management aspects.  This requirement is
>    essential in the case of network migration, to ensure service
>    continuity among sites belonging to different portions of the
>    network.

this needs to be made more clear/detailed. The IETF does not do
interworking of l2 in general; so what exactly is meant here?

The following text is added. A possible example is inter-working between
VPLS-LDP and VPLS-BGP. Let's say an SP buys another SP (former deployed
VPLS-LDP, and latter deployed VPLS-BGP), how does the new combined Sp
provides VPLS?

"It is possible to have cases that require inter-working or
interconnection between customer sites, which span network domains with
different L2VPN solutions or different implementations of the same
approach."

> 5.7.2  Packet Re-ordering
>    The queuing and forwarding policies SHOULD preserve packet order
for
>    packets with the same QoS parameters.
> 

Seems like reordering should only be allowed where the service being
emulated alows for reordering. Otherwise, random things will break.

This is what we meant by this requirement: do not cause re-ordering.

> 5.7.4  End-point VLAN tag translation
>    The L2VPN service MAY support translation of customers' AC
>    identifiers (e.g., VLAN tags, if the customer VLANs are used as
>    service delimiters).  Such service simplifies connectivity of sites
>    that want to keep their AC assignments or sites that belong to
>    different administrative domains.  In the latter case, the
>    connectivity is sometimes referred to as Layer-2 extranet.  On the
>    other hand, it SHOULD be noted that VLAN tag translation affects
the
>    support for multiple spanning trees (i.e., 802.1s [IEEE_802.1s])
and
>    can break the proper operation.

not sure about this. Has tagging been adopted as a WG approach?

Tags here are VLAN tags, an AC can be a VLAN.

>    prevented.  This can be accomplished with a loop free topology or

s/loop free/loop-free/

Done.

>    A L2VPN solution SHOULD be scalable to support a wide range of
>    number of customer addresses (e.g., MAC) per VPLS.  The number of
>    customer addresses per VPLS MAY range from just a few (i.e., the
>    number of sites when the CE devices are routers or when the service
>    is IPLS) to a very large number such as 1,000 (i.e., when CE
devices
>    are switches).  The number of customer addresses would be on the
>    order of addresses supported in a typical native Layer-2 backbone.

this could be made more clear. does "number of customer addresses"
relate to the number of CE devices (only) or to the number of nodes the
custer has connected to the VPN? I assume the latter, but if that is the
case, the 1,000 figure seems low. Or maybe not. Where does the 1K figure
come from? Is that the max (reasonable) size for a bridged network?

I removed the examples in Scalability section, and just refer to RFC3809
(Generic requirements), which already has the examples. But to answer
your answers: the latter to first question, yes to the second one.

>    The number of users per VPLS is the combination of servers and
hosts
>    connected to the VPLS.  It needs to scale from a handful to high
>    numbers.  A VPLS MUST scale from 2 users to a few hundred.

Hmm. few hundred? How does this relate to the 1000 figure above?

Again, I removed the example. A 1000 is an upper limit for a few hundred
:-)

> 6.8.2  Bandwidth and QoS Brokering
>    When a L2VPN spans multiple AS's, there is a need for a brokering
>    mechanism that requests certain SLS parameters, such as bandwidth
>    and QoS, from the other domains and/or networks involved in
>    transferring traffic to various sites.  The essential requirement
is
>    that a solution MUST be able to determine whether a set of AS's can
>    establish and guarantee uniform QoS in support of a provider
>    provisioned VPN.

Is this MUST one that has to be met? and will be by the proposed
approaches?

Yes.

> 8.2.2  Responsiveness to Congestion
>    A L2VPN solution SHOULD utilize the congestion avoidance techniques
>    defined by PWE3 ([PWE3_ARCH]).
> 

more words needed. I think what you need to say is that VPLS services
will provide congestion control. E.g,. if they carry TDM... It may well
be that PWE3 provides those mechanisms, but they MUST be somewhere.

I really don't know what we can add here. L2VPN is not supposed to
create new protocols. We are utilizing what PWE3 is giving us. That is
what we mean here.