[L2sm] R: I: I-D Action: draft-ietf-l2sm-l2vpn-service-model-09.txt

Fioccola Giuseppe <giuseppe.fioccola@telecomitalia.it> Wed, 04 April 2018 12:54 UTC

Return-Path: <giuseppe.fioccola@telecomitalia.it>
X-Original-To: l2sm@ietfa.amsl.com
Delivered-To: l2sm@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 0B50D12741D; Wed, 4 Apr 2018 05:54:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.612
X-Spam-Status: No, score=-2.612 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id Xk3LJLgz_tXT; Wed, 4 Apr 2018 05:54:28 -0700 (PDT)
Received: from mx03.telecomitalia.it (mx03.telecomitalia.it []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C9041275FD; Wed, 4 Apr 2018 05:54:25 -0700 (PDT)
X-AuditID: d9a97917-09fff70000000db8-dc-5ac4caff5798
Received: from TELMBXB02RM001.telecomitalia.local ( []) (using TLS with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client did not present a certificate) by mx03.telecomitalia.it () with SMTP id C1.FC.03512.FFAC4CA5; Wed, 4 Apr 2018 14:54:23 +0200 (CEST)
From: Fioccola Giuseppe <giuseppe.fioccola@telecomitalia.it>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "l2sm@ietf.org" <l2sm@ietf.org>, "l2sm-chairs@ietf.org" <l2sm-chairs@ietf.org>
CC: Ladislav Lhotka <lhotka@nic.cz>, "draft-ietf-l2sm-l2vpn-service-model@ietf.org" <draft-ietf-l2sm-l2vpn-service-model@ietf.org>
Thread-Topic: I: [L2sm] I-D Action: draft-ietf-l2sm-l2vpn-service-model-09.txt
Thread-Index: AQHTyy+cVTNmiUyxnEafoW6paDS3d6PuybtAgABSXoCAAXI08A==
Date: Wed, 4 Apr 2018 12:54:22 +0000
Message-ID: <7184751657ca4c069d821ddb3888456d@TELMBXB02RM001.telecomitalia.local>
References: <152274834318.14068.7870531483602554557@ietfa.amsl.com> <50220800e12244bb938bb1d0db4ccf8b@TELMBXB02RM001.telecomitalia.local> <46888b1f-63c1-1b68-94ca-0b05ebeb7232@joelhalpern.com>
In-Reply-To: <46888b1f-63c1-1b68-94ca-0b05ebeb7232@joelhalpern.com>
Accept-Language: it-IT, en-US
Content-Language: it-IT
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: []
x-ti-disclaimer: Disclaimer1
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprFIsWRmVeSWpSXmKPExsXCxfdHWvf/qSNRBseOclr0PG5ksvh46g2T xYOdF9ks7rx8yWhxYdVcNgdWjyVLfjJ5nJvyndFj0+U7jAHMUVw2Kak5mWWpRfp2CVwZLx7M Yix451jRs30ZWwPjFIcuRk4OCQETic6Ny9m7GLk4hASmMkk093cygyTYBGwkDr46wQZiiwjU Sixa0s4EUsQs0MYosXXZDXaQhLCAj8SOdW1ADRxARX4SX+4IQdQ7Sdza0ARWwiKgIrHl2h02 kBJegUCJHy+jIXYdYZRoPPoWrIZTwFni7brDLCA2o4CsxITdixhBbGYBcYkX00+wQxwqILFk z3lmCFtU4uXjf6wQtoHE1qX7WCBsRYnb+5ZCxWUkFh6ZzAqyl1lAU2L9Ln2IkYoSU7ofgo3k FRCUODnzCcsERrFZSLbNQuiYhaRjFpKOBYwsqxhFcysMjPVKUnNSk/NzM0sSczIT9TJLNjEC Y+zmykrxHYztK50PMQpwMCrx8E7ffCRKiDWxrLgy9xCjBAezkgjvg2NAId6UxMqq1KL8+KLS nNTiQ4zSHCxK4rx2s4FSAumJJanZqakFqUUwWSYOTqkGRmeeh0/fc9QcvuxU8/rlMRPjRIt1 Qi+PJkYu55BiirHT9oyO+8FuOY1DP/2Y+MfJq/8Glr9u7jUIklz8c/fX+2JqxV7Hxf8Z2zpP sw6bwn0lnOOGcsvvy20/PVI/LnN9ePaiVdCRghjHxZPvXAj8+/DrL6Wycy6//ezey7FkZb/N W7FtnvvzK0osxRmJhlrMRcWJAPWe+pCtAgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/l2sm/WRYMUOE1CEoX9zCXMiGTqrOgHUc>
Subject: [L2sm] R: I: I-D Action: draft-ietf-l2sm-l2vpn-service-model-09.txt
X-BeenThere: l2sm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The Layer Two Virtual Private Network Service Model \(L2SM\)" <l2sm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2sm>, <mailto:l2sm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/l2sm/>
List-Post: <mailto:l2sm@ietf.org>
List-Help: <mailto:l2sm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2sm>, <mailto:l2sm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Apr 2018 12:54:31 -0000

Hi Joel,
I apologize for the oversight. Probably I lost these minor items during my review.
I will address them in the next revision.

Thanks a lot,


-----Messaggio originale-----
Da: Joel M. Halpern [mailto:jmh@joelhalpern.com] 
Inviato: martedì 3 aprile 2018 18:37
A: Fioccola Giuseppe; l2sm@ietf.org; l2sm-chairs@ietf.org
Cc: Ladislav Lhotka; draft-ietf-l2sm-l2vpn-service-model@ietf.org
Oggetto: Re: I: [L2sm] I-D Action: draft-ietf-l2sm-l2vpn-service-model-09.txt

The following minor items from my review do not seem to have been dealt with.  They are rephrased ehre for clarity:

     Section 5.2 still says in the definition of Cloud Access that "[a]ll sites in the L2VPN MUST be authorized ..." while section 5.3.2 says SHOULD, with clear instructions for how to handle exceptions.  I presume 5.2 should say SHOULD?

     Section 5.3 still talks about a site having multiple locations without any specific requirement that there be internal connectivity among those locations.  I understand that the model does not represent that connectivity.  But it seems pretty clear that things will break if that connectivity is not present.

      Section on connecting to multiple VPNs still talks about prefixes.  This is, as far as I know, an L2VPN service.  And L2VPNs work in MAC addresses, which do not use prefix based routing.  I think the solution is to replace "destination-based routing" with "MAC destination based forwarding", and to replace "mapping of its prefixes" with "mapping of its MAC addresses".
      Given that this is MAC address based forwarding, I think there also needs to be some text about what happens with BUM packets?

     In section it is still unclear what it means to name LANs in a site.

     IN section 5.6, the text says that although constraints must be met, some specific constraints are just hints.  I would have thought those would be something other than constraints, but okay.  However, the wording is "Parameters such as ... as special constraints are just hints"  given the use of "such as", this implies that maybe some other constraints are special and just hints.  But the reader has no idea whether there are other hints.


On 4/3/18 5:45 AM, Fioccola Giuseppe wrote:
> Hi All,
> This new revision of draft-ietf-l2sm-l2vpn-service-model addresses Lada's and Joel's comments.
> Thanks,
> Giuseppe
> -----Messaggio originale-----
> Da: L2sm [mailto:l2sm-bounces@ietf.org] Per conto di 
> internet-drafts@ietf.org
> Inviato: martedì 3 aprile 2018 11:39
> A: i-d-announce@ietf.org
> Cc: l2sm@ietf.org
> Oggetto: [L2sm] I-D Action: draft-ietf-l2sm-l2vpn-service-model-09.txt
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the L2VPN Service Model WG of the IETF.
>          Title           : A YANG Data Model for L2VPN Service Delivery
>          Authors         : Bin Wen
>                            Giuseppe Fioccola
>                            Chongfeng Xie
>                            Luay Jalil
> 	Filename        : draft-ietf-l2sm-l2vpn-service-model-09.txt
> 	Pages           : 156
> 	Date            : 2018-04-03
> Abstract:
>     This document defines a YANG data model that can be used to configure
>     a Layer 2 Provider Provisioned VPN service.
>     This model is intended to be instantiated at management system to
>     deliver the overall service.  This model is not a configuration model
>     to be used directly on network elements, but provides an abstracted
>     view of the Layer 2 VPN service configuration components.  It is up
>     to a management system to take this as an input and generate specific
>     configurations models to configure the different network elements to
>     deliver the service.  How configuration of network elements is done
>     is out of scope of the document.
>     The YANG model in this document includes support for point-to-point
>     Virtual Private Wire Services (VPWS) and multipoint Virtual Private
>     LAN services (VPLS) that use Pseudowires signaled using the Label
>     Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as
>     described in RFC4761 and RFC6624.
>     The YANG model in this document conforms to the Network Management
>     Datastore Architecture defined in I-D.ietf-netmod-revised-datastores.
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-l2sm-l2vpn-service-model/
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-l2sm-l2vpn-service-model-09
> https://datatracker.ietf.org/doc/html/draft-ietf-l2sm-l2vpn-service-mo
> del-09
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-l2sm-l2vpn-service-model-
> 09
> Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> _______________________________________________
> L2sm mailing list
> L2sm@ietf.org
> https://www.ietf.org/mailman/listinfo/l2sm
> Questo messaggio e i suoi allegati sono indirizzati esclusivamente alle persone indicate. La diffusione, copia o qualsiasi altra azione derivante dalla conoscenza di queste informazioni sono rigorosamente vietate. Qualora abbiate ricevuto questo documento per errore siete cortesemente pregati di darne immediata comunicazione al mittente e di provvedere alla sua distruzione, Grazie.
> This e-mail and any attachments is confidential and may contain privileged information intended for the addressee(s) only. Dissemination, copying, printing or use by anybody else is unauthorised. If you are not the intended recipient, please delete this message and any attachments and advise the sender by return e-mail, Thanks.
> Rispetta l'ambiente. Non stampare questa mail se non è necessario.