oam for l2 vpn networks using cfm and vccv n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
OAM for L2 VPN Networks Using CFM and VCCV PowerPoint Presentation
Download Presentation
OAM for L2 VPN Networks Using CFM and VCCV

Loading in 2 Seconds...

play fullscreen
1 / 9

OAM for L2 VPN Networks Using CFM and VCCV - PowerPoint PPT Presentation


  • 125 Views
  • Uploaded on

OAM for L2 VPN Networks Using CFM and VCCV. Olen Stokes Shane Amante Pranjal Dutta Yetik Serbest. IETF 70. 4 December 2007. draft-stokes-l2vpn-cfm-vccv-oam-00. Objectives. Reach working group consensus on how to utilize IEEE 802.1ag CFM and IETF VCCV in a L2 VPN environment

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'OAM for L2 VPN Networks Using CFM and VCCV' - percival-levy


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
oam for l2 vpn networks using cfm and vccv

OAM for L2 VPN Networks Using CFM and VCCV

Olen Stokes

Shane Amante

Pranjal Dutta

Yetik Serbest

IETF 70

4 December 2007

draft-stokes-l2vpn-cfm-vccv-oam-00

objectives
Objectives
  • Reach working group consensus on how to utilize IEEE 802.1ag CFM and IETF VCCV in a L2 VPN environment
  • Allow service providers to determine if there are any additional OAM capabilities required

draft-stokes-l2vpn-cfm-vccv-oam-00

Page 2

assumptions
Assumptions
  • Must consider both full mesh VPLS and hierarchical H-VPLS environments
    • Must consider Ethernet and PW access networks
  • Adhere to existing L2 VPN standards

draft-stokes-l2vpn-cfm-vccv-oam-00

Page 3

concerns
Concerns
  • Diagnosing VPLS forwarder problems
    • How do we verify the association of MACs with PWs?
  • Reporting detected mismatches
    • Is there a need to be able to reply via the control plane?

draft-stokes-l2vpn-cfm-vccv-oam-00

Page 4

potential issues
Potential Issues
  • Reference model for H-VPLS node
    • RFC 4664 shows a single VPLS forwarder with a single emulated LAN interface
    • How do point-to-point PWs connect to this reference model?
  • Placement of maintenance points with regards to the reference model
    • Inside reference model at emulated LAN interface or outside of reference model?

draft-stokes-l2vpn-cfm-vccv-oam-00

Page 5

example h vpls network
Example H-VPLS Network

PE2-rs

PW-12

PW-1

CE-1

MTU1-s

PE1-rs

PW-23

PW-13

PW-3

PE3-rs

MTU3-s

CE-3

draft-stokes-l2vpn-cfm-vccv-oam-00

Page 6

rfc4664 reference model

VPLS

Forwarder

VPLS

Forwarder

VPLS

Forwarder

VPLS

Forwarder

Emulated

LAN

Interface

Bridge

Bridge

Bridge

Bridge

RFC4664 Reference Model

PW-1

PW-13

PW-3

Emulated LAN

MTU1-s

PE1-rs

PE3-rs

MTU3-s

CE-1

CE-3

draft-stokes-l2vpn-cfm-vccv-oam-00

Page 7

reference model with cfm

VPLS

Forwarder

VPLS

Forwarder

VPLS

Forwarder

VPLS

Forwarder

Emulated

LAN

Interface

MEP

MEP

MEP

Bridge

Bridge

Bridge

Bridge

Reference Model with CFM

PW-1

PW-13

PW-3

Emulated LAN

MEP

MTU1-s

PE1-rs

PE3-rs

MTU3-s

CE-1

CE-3

draft-stokes-l2vpn-cfm-vccv-oam-00

Page 8

next steps
Next Steps
  • Reach working group consensus on applying the RFC 4664 reference model to a H-VPLS node

draft-stokes-l2vpn-cfm-vccv-oam-00

Page 9