Protocol Action: 'Fail Over extensions for L2TP "failover"' to Proposed Standard
The IESG <iesg-secretary@ietf.org> Fri, 16 March 2007 22:39 UTC
Return-path: <ietf-announce-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HSL5X-0006aO-6q; Fri, 16 Mar 2007 18:39:55 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HSL5U-0006YX-CJ; Fri, 16 Mar 2007 18:39:52 -0400
Received: from ns4.neustar.com ([156.154.24.139]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1HSL5T-0006X1-1n; Fri, 16 Mar 2007 18:39:52 -0400
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by ns4.neustar.com (Postfix) with ESMTP id EF1AD2ACA7; Fri, 16 Mar 2007 22:39:20 +0000 (GMT)
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1HSL4y-0004CR-O5; Fri, 16 Mar 2007 18:39:20 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1HSL4y-0004CR-O5@stiedprstage1.ietf.org>
Date: Fri, 16 Mar 2007 18:39:20 -0400
X-Spam-Score: -2.8 (--)
X-Scan-Signature: d185fa790257f526fedfd5d01ed9c976
Cc: Internet Architecture Board <iab@iab.org>, l2tpext mailing list <l2tpext@ietf.org>, l2tpext chair <l2tpext-chairs@tools.ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: Protocol Action: 'Fail Over extensions for L2TP "failover"' to Proposed Standard
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Errors-To: ietf-announce-bounces@ietf.org
The IESG has approved the following document: - 'Fail Over extensions for L2TP "failover" ' <draft-ietf-l2tpext-failover-12.txt> as a Proposed Standard This document is the product of the Layer Two Tunneling Protocol Extensions Working Group. The IESG contact persons are Mark Townsley and Jari Arkko. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-l2tpext-failover-12.txt * Technical Summary L2TP is a connection-oriented protocol that requires some shared state between the active endpoints. Some of this shared state is vital for operation but may be rather volatile in nature, such as the sequence numbers used on the L2TP Control Connection or on data connections. This document defines protocol extensions to L2TP to facilitate state recovery after a failure of an L2TP Control Connection Endpoint (LCCE). * Working Group Summary There is consensus in the WG to publish this document. * Document Quality The l2tpext WG has reviewed this document. All concerns raised during review and last call have been addressed. At least one vendor has successfully implemented and deployed this extension. Ignacio Goyret is the WG shepherd for this document. Note to RFC Editor Please add to section 6: Asynchronous notifications for failover and recovery events may be sent by L2TP nodes to network management applications but the specification of the protocol and format to be used for these notifications is out of the scope of this document.' OLD: A device could have three kind of failures: NEW: This document assumes that the actual detection of a failure in the backup endpoint is done in an implementation specific way. It also assumes that failure detection by the backup endpoint is faster than the L2TP control channel timeout between the active and remote endpoints. Typically, active and backup endpoints reside on the same physical device, allowing fast and reliable failure detection without the need to communicate between these endpoints over the network. Similarly, an active endpoint that acts also as the backup endpoint can easily start the recovery once it has rebooted. However, when the active and backup endpoints reside in separate devices, there is a need to communicate between them in order to detect failures. As a result, this document does not provide a complete and interoperable solution for such situations, and additional failure detection protocols, for example [BFD-MULTIHOP], may be needed. A device could have three kind of failures: OLD: [L2TPv3-MIB] Nadeau, Thomas D. and Koushik, Kiran A S., "Layer Two Tunneling Protocol (version 3) Management Information Base", draft-ietf-l2tpext-l2tpmib-base-02.txt, August 2006. NEW: [L2TPv3-MIB] Nadeau, Thomas D. and Koushik, Kiran A S., "Layer Two Tunneling Protocol (version 3) Management Information Base", draft-ietf-l2tpext-l2tpmib-base-02.txt, August 2006. [BFD-MULTIHOP] Katz, D. and Ward, D., "BFD for Multihop Paths", draft-ietf-bfd-multihop-04.txt, _______________________________________________ IETF-Announce mailing list IETF-Announce@ietf.org https://www1.ietf.org/mailman/listinfo/ietf-announce