Protocol Action: 'Fail Over extensions for L2TP "failover"' to Proposed Standard

The IESG <iesg-secretary@ietf.org> Fri, 16 March 2007 22:39 UTC

Return-path: <ietf-announce-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HSL5X-0006aO-6q; Fri, 16 Mar 2007 18:39:55 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HSL5U-0006YX-CJ; Fri, 16 Mar 2007 18:39:52 -0400
Received: from ns4.neustar.com ([156.154.24.139]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1HSL5T-0006X1-1n; Fri, 16 Mar 2007 18:39:52 -0400
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by ns4.neustar.com (Postfix) with ESMTP id EF1AD2ACA7; Fri, 16 Mar 2007 22:39:20 +0000 (GMT)
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1HSL4y-0004CR-O5; Fri, 16 Mar 2007 18:39:20 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1HSL4y-0004CR-O5@stiedprstage1.ietf.org>
Date: Fri, 16 Mar 2007 18:39:20 -0400
X-Spam-Score: -2.8 (--)
X-Scan-Signature: d185fa790257f526fedfd5d01ed9c976
Cc: Internet Architecture Board <iab@iab.org>, l2tpext mailing list <l2tpext@ietf.org>, l2tpext chair <l2tpext-chairs@tools.ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: Protocol Action: 'Fail Over extensions for L2TP "failover"' to Proposed Standard
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Errors-To: ietf-announce-bounces@ietf.org

The IESG has approved the following document:

- 'Fail Over extensions for L2TP "failover" '
   <draft-ietf-l2tpext-failover-12.txt> as a Proposed Standard

This document is the product of the Layer Two Tunneling Protocol 
Extensions Working Group. 

The IESG contact persons are Mark Townsley and Jari Arkko.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-l2tpext-failover-12.txt

* Technical Summary

L2TP is a connection-oriented protocol that requires some shared
state between the active endpoints. Some of this shared state is
vital for operation but may be rather volatile in nature, such as
the sequence numbers used on the L2TP Control Connection or on
data connections.

This document defines protocol extensions to L2TP to facilitate state
recovery after a failure of an L2TP Control Connection Endpoint (LCCE).

* Working Group Summary

There is consensus in the WG to publish this document.

* Document Quality

The l2tpext WG has reviewed this document. All concerns raised during
review and last call have been addressed. At least one vendor has
successfully implemented and deployed this extension. Ignacio Goyret is
the WG shepherd for this document.

Note to RFC Editor
 
Please add to section 6:

Asynchronous notifications for failover and recovery events may be 
sent by L2TP nodes to network management applications but the 
specification of the protocol and format to be used for these 
notifications is out of the scope of this document.'


 OLD:
    A device could have three kind of failures:

 NEW:
    This document assumes that the actual detection of a failure in the
    backup endpoint is done in an implementation specific way.  It also
    assumes that failure detection by the backup endpoint is faster than
    the L2TP control channel timeout between the active and remote
    endpoints. Typically, active and backup endpoints reside on the same
    physical device, allowing fast and reliable failure detection without
    the need to communicate between these endpoints over the network.
    Similarly, an active endpoint that acts also as the backup endpoint
    can easily start the recovery once it has rebooted. However, when the
    active and backup endpoints reside in separate devices, there is a
    need to communicate between them in order to detect failures. As a
    result, this document does not provide a complete and interoperable
    solution for such situations, and additional failure detection
    protocols, for example [BFD-MULTIHOP], may be needed.

    A device could have three kind of failures:

 OLD:
       [L2TPv3-MIB] Nadeau, Thomas D. and Koushik, Kiran A S., "Layer Two
                    Tunneling Protocol (version 3) Management Information
                    Base", draft-ietf-l2tpext-l2tpmib-base-02.txt,
                    August 2006.
  
 NEW:
       [L2TPv3-MIB] Nadeau, Thomas D. and Koushik, Kiran A S., "Layer Two
                    Tunneling Protocol (version 3) Management Information
                    Base", draft-ietf-l2tpext-l2tpmib-base-02.txt,
                    August 2006.

       [BFD-MULTIHOP] Katz, D. and Ward, D., "BFD for Multihop Paths",
                      draft-ietf-bfd-multihop-04.txt,


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce