[mpls] Document Action: 'Per-Interface MIP Addressing Requirements and Design Considerations' to Informational RFC (draft-ietf-mpls-tp-mip-mep-map-09.txt)

The IESG <iesg-secretary@ietf.org> Tue, 17 September 2013 00:30 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF3D111E8250; Mon, 16 Sep 2013 17:30:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.464
X-Spam-Level:
X-Spam-Status: No, score=-102.464 tagged_above=-999 required=5 tests=[AWL=0.136, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3HmCb0eqTxZL; Mon, 16 Sep 2013 17:30:37 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 459BF11E8168; Mon, 16 Sep 2013 17:30:37 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 4.71.p1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20130917003037.15602.6841.idtracker@ietfa.amsl.com>
Date: Mon, 16 Sep 2013 17:30:37 -0700
Cc: mpls mailing list <mpls@ietf.org>, mpls chair <mpls-chairs@tools.ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [mpls] Document Action: 'Per-Interface MIP Addressing Requirements and Design Considerations' to Informational RFC (draft-ietf-mpls-tp-mip-mep-map-09.txt)
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.12
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Sep 2013 00:30:37 -0000

The IESG has approved the following document:
- 'Per-Interface MIP Addressing Requirements and Design Considerations'
  (draft-ietf-mpls-tp-mip-mep-map-09.txt) as Informational RFC

This document is the product of the Multiprotocol Label Switching Working
Group.

The IESG contact persons are Stewart Bryant and Adrian Farrel.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-mpls-tp-mip-mep-map/




Technical Summary

   The Framework for Operations, Administration and Maintenance (OAM)
   within the MPLS Transport Profile (MPLS-TP) describes how Maintenance
   Entity Group Intermediate Points (MIPs) may be situated within
   network nodes at the incoming and outgoing interfaces.

   This document elaborates on important considerations for internal MIP
   addressing.  More precisely it describes important restrictions for
   any mechanism that specifies a way of forming OAM messages so that
   they can be targeted at MIPs on incoming or MIPs on outgoing
   interfaces and forwarded correctly through the forwarding engine.
   Furthermore, the document includes considerations for node
   implementations where there is no distinction between the incoming
   and outgoing MIP.

Working Group Summary

   This document has support in the working group and has been well
   reviewed.

   There has been a comparatively long discussion that in the end
   converged on a widely accepted definition of pre-interface MIPs
   and MEPs.

Document Quality

    This an informational document, it discusses deployment of per-
   interface MIPs and MEPs.

   The document have had the review that is needed.

   No need for third party expert reviews.

Personnel

    Loa Andersson is the document shepherd.

   Stewart Bryant is the responsible AD.

RFC Editor Note
OLD
Deployments are strongly advised to use such mechanisms.
NEW
Deployments are therefore strongly advised to follow the security advice provided in RFC6371 and RFC6941.
END