{"draft":"draft-ietf-l2vpn-signaling-08","doc_id":"RFC6074","title":"Provisioning, Auto-Discovery, and Signaling in Layer 2 Virtual Private Networks (L2VPNs)","authors":["E. Rosen","B. Davie","V. Radoaca","W. Luo"],"format":["ASCII","HTML"],"page_count":"32","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Layer 2 Virtual Private Networks","abstract":"Provider Provisioned Layer 2 Virtual Private Networks (L2VPNs) may\r\nhave different \"provisioning models\", i.e., models for what\r\ninformation needs to be configured in what entities. Once\r\nconfigured, the provisioning information is distributed by a\r\n\"discovery process\". When the discovery process is complete, a\r\nsignaling protocol is automatically invoked to set up the mesh of\r\npseudowires (PWs) that form the (virtual) backbone of the L2VPN.\r\nThis document specifies a number of L2VPN provisioning models, and\r\nfurther specifies the semantic structure of the endpoint identifiers\r\nrequired by each model. It discusses the distribution of these\r\nidentifiers by the discovery process, especially when discovery is\r\nbased on the Border Gateway Protocol (BGP). It then specifies how\r\nthe endpoint identifiers are carried in the two signaling protocols\r\nthat are used to set up PWs, the Label Distribution Protocol (LDP),\r\nand the Layer 2 Tunneling Protocol version 3 (L2TPv3). [STANDARDS-\r\nTRACK]","pub_date":"January 2011","keywords":["[--------]"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6074","errata_url":null}