Internet DRAFT - draft-ietf-trill-transport-over-mpls

draft-ietf-trill-transport-over-mpls




INTERNET-DRAFT                                            Mohammed Umair
Intended Status: Informational                  Kingston Smiler Selvaraj
                                                              IPInfusion
                                                     Donald Eastlake 3rd
                                                                  Huawei
                                                               Lucy Yong
                                                                    Self
Expires: September 17, 2018                               March 18, 2018

                 TRILL Transparent Transport over MPLS
               draft-ietf-trill-transport-over-mpls-08.txt


Abstract

   This document specifies methods to interconnect multiple Transparent
   Interconnection of Lots of links (TRILL) sites with an intervening
   MPLS network using existing TRILL and VPLS standards. This draft
   addresses two problems as follows:

   1) Providing connection between more than two TRILL sites that are
      separated by an MPLS provider network.

   2) Providing a single logical virtualized TRILL network for different
      tenants that are separated by an MPLS provider network.


Status of This Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Distribution of this document is unlimited. Comments should be sent
   to the authors or the TRILL working group mailing list:
   trill@ietf.org.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html. The list of Internet-Draft
   Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.





M.Umair, K.Smiler, et al                                        [Page 1]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


Table of Contents

      1. Introduction............................................3
      1.1. Terminology...........................................3

      2. TRILL Over MPLS Model...................................5

      3. VPLS Model..............................................6
      3.1 Entities in the VPLS Model.............................7
      3.2 TRILL Adjacency for VPLS model.........................8
      3.3 MPLS encapsulation for VPLS model......................8
      3.4 Loop Free provider PSN/MPLS............................8
      3.5 Frame Processing.......................................8

      4. VPTS Model..............................................9
      4.1 Entities in the VPTS Model............................11
      4.1.1 TRILL Intermediate Routers (TIR)....................11
      4.1.2 Virtual TRILL Switch/Service Domain (VTSD)..........12
      4.2 TRILL Adjacency for VPTS model........................12
      4.3 MPLS encapsulation for VPTS model.....................12
      4.4 Loop Free provider PSN/MPLS...........................12
      4.5. Frame Processing.....................................13
      4.5.1 Multi-Destination Frame Processing..................13
      4.5.2 Unicast Frame Processing............................13

      5. VPTS Model Versus VPLS Model...........................14
      6. Packet Processing Between Pseudowires..................14

      7. Efficiency Considerations..............................15
      8. Security Considerations................................15
      9. IANA Considerations....................................16

      Normative References......................................17
      Informative References....................................18

      Acknowledgements..........................................19
      Authors' Addresses........................................19















M.Umair, K.Smiler, et al                                        [Page 2]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


1. Introduction

   The IETF Transparent Interconnection of Lots of Links (TRILL)
   protocol [RFC6325] [RFC7177] [RFC7780] provides transparent
   forwarding in multi-hop networks with arbitrary topology and link
   technologies using a header with a hop count and link-state routing.
   TRILL provides optimal pair-wise forwarding without configuration,
   safe forwarding even during periods of temporary loops, and support
   for multipathing of both unicast and multicast traffic. Intermediate
   Systems (ISs) implementing TRILL are called Routing Bridges
   (RBridges) or TRILL Switches

   This document, in conjunction with [RFC7173] on TRILL Transport using
   Pseudowires, addresses two problems:

   1) Providing connection between more than two TRILL sites belongs to
      a single TRILL network that are separated by an MPLS provider
      network using [RFC7173]. (Herein also called problem statement 1.)

   2) Providing a single logical virtualized TRILL network for different
      tenants that are separated by an MPLS provider network. In short
      providing connection between TRILL sites belonging to a
      tenant/tenants over a MPLS provider network. (Herein also called
      problem statement 2.)

   A tenant is the administrative entity on whose behalf their
   associated services are managed. Here tenant refers to a TRILL campus
   that is segregated from other tenants for security reasons.

   A key multi-tenancy requirement is traffic isolation so that one
   tenant's traffic is not visible to any other tenant. This draft also
   addresses the problem of multi-tenancy by isolating one tenant's
   traffic from the other.

   [RFC7173] mentions how to interconnect a pair of Transparent
   Interconnection of Lots of Links (TRILL) switch ports using
   pseudowires.  This document explains, how to connect multiple TRILL
   sites (not limited to only two sites) using the mechanisms and
   encapsulations defined in [RFC7173].



1.1. Terminology

   Acronyms used in this document include the following:

         AC        - Attachment Circuit [RFC4664]

         Data Label - VLAN or FGL



M.Umair, K.Smiler, et al                                        [Page 3]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


         database  - IS-IS link state database

         ECMP      - Equal Cost Multi Path

         FGL       - Fine-Grained Labeling [RFC7172]

         IS-IS     - Intermediate System to Intermediate System [IS-IS]

         LDP       - Label Distribution Protocol

         LAN       - Local Area Network

         MPLS      - Multi-Protocol Label Switching

         PBB       - Provider Backbone Bridging

         PE        - Provider Edge Device

         PSN       - Packet Switched Network

         PW        - Pseudowire [RFC4664]

         TIR       - TRILL Intermediate Router (Devices that has both
                     IP/MPLS and TRILL functionality)

         TRILL     - Transparent Interconnection of Lots of Links OR
                     Tunneled Routing in the Link Layer

         TRILL Site - A part of a TRILL campus that contains at least
                     one RBridge.

         VLAN      - Virtual Local Area Network.

         VPLS      - Virtual Private LAN Service

         VPTS      - Virtual Private TRILL Service

         VSI       - Virtual Service Instance [RFC4664]

         VTSD      - Virtual TRILL Switch Domain OR Virtual TRILL
                     Service Domain.  A Virtual RBridge that segregates
                     one tenant's TRILL database as well as traffic from
                     the other.

         WAN       - Wide Area Network







M.Umair, K.Smiler, et al                                        [Page 4]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


2. TRILL Over MPLS Model

   TRILL Over MPLS can be achieved in two different ways.

         a) the VPLS Model for TRILL
         b) the VPTS Model/TIR Model for TRILL

   Both these models can be used to solve problem statements 1 and 2.
   Herein the VPLS Model for TRILL is also called Model 1 and the VPTS
   Model/TIR Model is also called Model 2.










































M.Umair, K.Smiler, et al                                        [Page 5]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


3. VPLS Model

   Figure 1 shows the topological model of TRILL over MPLS using VPLS
   model. The PE routers in the below topology model should support all
   the functional Components mentioned in [RFC4664].

          +-----+                                               +-----+
          | RBa +---+      ...........................      +---| RBb |
          +-----+   |      .                         .      |   +-----+
          Site 1    |    +----+                   +----+    |    Site 2
                    +----|PE1 |                   |PE2 |----+
                         +----+    MPLS Cloud     +----+
                           .                         .
                           .         +----+          .
                           ..........|PE3 |...........
                                     +----+      ^
                                        |        |
                                        |        +-- Emulated LAN
                                     +-----+
                                     | RBc |
                                     +-----+
                                     Site 3

              Figure 1. Topological Model of TRILL over MPLS
                       connecting three TRILL Sites

   Figure 2 below shows the topological model of TRILL over MPLS to
   connect multiple TRILL sites belonging to a tenant. (Tenant here is a
   TRILL campus, not a specific Data label.) VSI1 and VSI2 are two
   Virtual Service Instances that segregate Tenant1's traffic from other
   tenant traffic.  VSI1 will maintain its own database for Tenant1,
   similarly VSI2 will maintain its own database for Tenant2.




















M.Umair, K.Smiler, et al                                        [Page 6]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


      +-----+         ............................          +-----+
      |RBat1+---+     . ++++++++++++++++++++++++ .      +---|RBbt1|
      +-----+   |     . +                      + .      |   +-----+
      Tenant1   |    +----+                   +----+    |   Tenant1
      Site 1    +----|VSI1|                   |VSI1|----+   Site 2
                +----|VSI2|    MPLS  Cloud    |VSI2|----+
                |    +----+                   +----+    |
      +-----+   |     . +                       + .     |   +-----+
      |RBat2+---+     . +++++++++ +----+ ++++++++ .     +---|RBbt2|
      +-----+         ............|VSI1|...........         +-----+
      Tenant2                     |VSI2|          ^         Tenant2
      Site 1                      +----+          |         Site 2
                                    |             |
                                 +-----+          +-----Emulated
                                 |RBct2|                  LAN
                                 +-----+
                             Tenant2 Site 3

         .... VSI1 Path
         ++++ VSI2 Path

                Figure 2. Topological Model for VPLS Model
                  connecting 2 Tenants with 3 sites each

   In this model, TRILL sites are connected to VPLS-capable PE devices
   that provide a logical interconnect, such that TRILL RBridges
   belonging to a specific tenant connected via an single bridged
   Ethernet. These PE devices are the same as the PE devices specified
   in [RFC4026]. The Attachment Circuit ports of PE Routers are layer 2
   switch ports that are connected to the RBridges at a TRILL site. Here
   each VPLS instance looks like an emulated LAN. This model is similar
   to connecting different RBridges by a layer 2 bridge domain (multi
   access link) as specified in [RFC6325]. This model doesn't requires
   any changes in PE routers to carry TRILL packets, as TRILL packets
   will be transferred transparently.



3.1 Entities in the VPLS Model

   The PE (VPLS-PE) and CE devices are defined in [RFC4026].

   The Generic L2VPN Transport Functional Components like Attachment
   Circuits, Pseudowires, VSI etc. are defined in [RFC4664].

   The RB (RBridge) and TRILL Sites are defined in [RFC6325] as updated
   by [RFC7780].





M.Umair, K.Smiler, et al                                        [Page 7]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


3.2 TRILL Adjacency for VPLS model

   As specified in section 3 of this document, the MPLS cloud looks like
   an emulated LAN (also called multi-access link or broadcast link).
   This results in RBridges at different sites looking like they are
   connected by a multi-access link. With such interconnection, the
   TRILL adjacencies over the link are automatically discovered and
   established through TRILL IS-IS control messages [RFC7177]. These IS-
   IS control messages are transparently forwarded by the VPLS domain,
   after doing MPLS encapsulation as specified in the section 3.4.



3.3 MPLS encapsulation for VPLS model

   Use of VPLS [RFC4762] [RFC4761] to interconnect TRILL sites requires
   no changes to a VPLS implementation, in particular the use of
   Ethernet pseudowires between VPLS PEs. A VPLS PE receives normal
   Ethernet frames from an RBridge (i.e., CE) and is not aware that the
   CE is an RBridge device. As an example, an MPLS-encapsulated TRILL
   packet within the MPLS network can use the format illustrated in
   Appendix A of [RFC7173] for the non-PBB case. For the PBB case,
   additional header fields illustrated in [RFC7041] can be added by
   entry PE and removed by the exit PE.



3.4 Loop Free provider PSN/MPLS

   No explicit handling is required to avoid loop free topology. Split
   Horizon technique specified in [RFC4664] will take care of avoiding
   loops in the provider PSN network.



3.5 Frame Processing

   The PE devices transparently process the TRILL control and data
   frames. Procedures to forward the frames are defined in [RFC4664].













M.Umair, K.Smiler, et al                                        [Page 8]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


4. VPTS Model

   The VPTS (Virtual Private TRILL Service) is a L2 TRILL service, that
   emulates TRILL service across a Wide Area Network (WAN). VPTS is
   similar to what VPLS does for bridge core but provides a TRILL core.
   VPLS provides "Virtual Private LAN Service" for different customers.
   VPTS provides "Virtual Private TRILL Service" for different TRILL
   tenants.

   Figure 3 shows the topological model of TRILL over MPLS using VPTS.
   In this model the PE routers are replaced with TIR (TRILL
   Intermediate Router) and VSI is replaced with VTSD (Virtual TRILL
   Switch Domain). The TIR devices must be capable of supporting both
   MPLS and TRILL as specified in section 4.1.1. The TIR devices are
   interconnected via PWs and appear as a unified emulated TRILL campus
   with each VTSD inside a TIR equivalent to a RBridge.

   Some of the reasons for interconnecting TRILL Sites without isolating
   the TRILL Control plane of one TRILL site from other sites are as
   described below.

   1) Nickname Uniqueness: One of the basic requirements of TRILL is
      that, RBridge Nicknames are unique within the campus [RFC6325]. If
      we segregate control plane of one TRILL site from other TRILL site
      and provide interconnection between these sites, it may result in
      Nickname collision.

   2) Distribution Trees and their pruning: When a TRILL Data packet
      traverses a Distribution Tree, it will stay on it even in other
      TRILL sites. If no end-station service is enabled for a particular
      Data Label in a TRILL site, the Distribution Tree may be pruned
      and TRILL data packets of that particular Data Label might never
      get to another TRILL site where the pckets had no receivers. The
      TRILL RPF check will always be performed on the packets that are
      received by TIRs through pseudowires.

   3) Hop Count values: When a TRILL data packet is received over a
      pseudowire by a TIR, the TIR does the processing of Hop Count
      defined in [RFC6325] and will not perform any resetting of Hop
      Count.












M.Umair, K.Smiler, et al                                        [Page 9]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


        +-----+                                               +-----+
        | RBa +---+      ...........................      +---| RBb |
        +-----+   |      .                         .      |   +-----+
        Site 1    |    +----+                   +----+    |    Site 2
                  +----|TIR1|                   |TIR2|----+
                       +----+    MPLS Cloud     +----+
                         .                         .
                         .         +----+          .
                         ..........|TIR3|...........
                                   +----+      ^
                                      |        |
                                      |        +-- Emulated TRILL
                                   +-----+
                                   | RBc |
                                   +-----+
                                   Site 3

                   Figure 3. Topological Model of VPTS/TIR
                         connecting three TRILL Sites

   In the above Figure 3, Site1, Site2 and Site3 (running the TRILL
   protocol) are connected to TIR Devices. These TIR devices, along with
   the MPLS cloud, look like an unified emulated TRILL network. Only the
   PE devices in the MPLS network should be replaced with TIRs so the
   intermediate Provider routers are agnostic to the TRILL protocol.

   Figure 4 below extends the topological model of TRILL over MPLS to
   connect multiple TRILL sites belonging to a tenant (tenant here is a
   campus, not a Data label) using VPTS model. VTSD1 and VTSD2 are two
   Virtual TRILL Switch Domains (Virtual RBridges) that segregate
   Tenant1's traffic from Tenant2's traffic. VTSD1 will maintain its own
   TRILL database for Tenant1. Similarly VTSD2 will maintain its own
   TRILL database for Tenant2.



















M.Umair, K.Smiler, et al                                       [Page 10]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


       +-----+          ............................         +-----+
       |RBat1+---+      . ######################## .     +---|RBbt1|
       +-----+   |      . #                      # .     |   +-----+
       Tenant1   |    +-----+                 +-----+    |   Tenant1
       Site 1    +----|VTSD1|                 |VTSD1|----+   Site 2
                 +----|VTSD2|   MPLS  Cloud   |VTSD2|----+
                 |    +-----+                 +-----+    |
       +-----+   |      . #                       # .    |   +-----+
       |RBat2+---+      . #########+-----+######### .    +---|RBbt2|
       +-----+          ...........|VTSD1|...........        +-----+
       Tenant2                     |VTSD2|          ^        Tenant2
       Site 1                      +-----+          |        Site 2
                                      |             |
                                   +-----+          +-----Emulated
                                   |RBct2|                  TRILL
                                   +-----+
                                Tenant2 Site 3

           .... VTSD1 Connectivity
           #### VTSD2 Connectivity

                  Figure 4. Topological Model of VPTS/TIR
                connecting 2 tenants with three TRILL Sites



4.1 Entities in the VPTS Model

   The CE devices are defined in [RFC4026].

   The Generic L2VPN Transport Functional Components like Attachment
   Circuits, Pseudowires etc. are defined in [RFC4664].

   The RB (RBridge) and TRILL Campus are defined in [RFC6325] as updated
   by [RFC7780].

   This model introduces two new entities called TIR and VTSD that are
   described below.



4.1.1 TRILL Intermediate Routers (TIR)

   The TIRs (TRILL Intermediate Routers) must be capable of running both
   VPLS and TRILL protocols. TIR devices are a superset of the VPLS-PE
   devices defined in [RFC4026] with the additional functionality of
   TRILL. The VSI instance that provides transparent bridging
   functionality in the PE device is replaced with VTSD in a TIR.




M.Umair, K.Smiler, et al                                       [Page 11]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


4.1.2 Virtual TRILL Switch/Service Domain (VTSD)

   The VTSD (Virtual Trill Switch Domain) is similar to VSI (layer 2
   bridge) in the VPLS model, but the VTSD acts as a TRILL RBridge. The
   VTSD is a superset of VSI and must support all the functionality
   provided by the VSI as defined in [RFC4026]. Along with VSI
   functionality, the VTSD must be capable of supporting TRILL protocols
   and forming TRILL adjacencies. The VTSD must be capable of performing
   all the operations that a standard TRILL Switch can do.

   One VTSD instance per tenant must be maintained, when multiple
   tenants are connected to a TIR. The VTSD must maintain all the
   information maintained by the RBridge on a per tenant basis. The VTSD
   must also take care of segregating one tenant traffic from other.
   Each VTSD will have its own nickname for each tenant, If a TIR
   supports 10 TRILL tenants, it needs to be assigned with ten TRILL
   nicknames, one for the nickname space of each of its tenants, and run
   ten copies of TRILL protocols, one for each tenant. It is possible
   that it would have the same nickname for two or more tenants but,
   since the TRILL data and control traffic are separated for the
   tenants, there is no confusion.



4.2 TRILL Adjacency for VPTS model

   The VTSD must be capable of forming TRILL adjacency with the
   corresponding VTSDs present in its peer VPTS neighbor, and also the
   neighbor RBridges present in the TRILL sites. The procedure to form
   TRILL Adjacency is specified in [RFC7173] and [RFC7177].



4.3 MPLS encapsulation for VPTS model

   The VPTS model uses PPP or Ethernet pseudowires for MPLS
   encapsulation as specified in [RFC7173], and requires no changes in
   the packet format in that RFC. In accordance with [RFC7173], the PPP
   encapsulation is the default.



4.4 Loop Free provider PSN/MPLS

   This model isn't required to employ Split Horizon mechanism in the
   provider PSN network, as TRILL takes care of Loop free topology using
   Distribution Trees. Any multi-destination packet will traverse a
   distribution tree path. All distribution trees are calculated based
   on TRILL base protocol standard [RFC6325] as updated by [RFC7780].



M.Umair, K.Smiler, et al                                       [Page 12]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


4.5. Frame Processing

   This section specifies multi-destination and unicast frame processing
   in VPTS/TIR model.



4.5.1 Multi-Destination Frame Processing

   Any multi-destination (unknown unicast, multicast or broadcast, as
   indicated by multi-destination bit in the TRILL Header) packets
   inside a VTSD will be processed or forwarded through the distribution
   tree for which they were encapsulated on TRILL ingress. If any multi-
   destination packet is received from the wrong pseudowire at a VTSD,
   the TRILL protocol running in the VTSD will perform an RPF check as
   specified in [RFC7780] and drop the packet.

   The Pruning mechanism in Distribution Trees, as specified in
   [RFC6325] and [RFC7780], can also be used to avoid forwarding of
   multi-destination data packets on the branches where there are no
   potential destinations.



4.5.2 Unicast Frame Processing

   Unicast packets are forwarded in same way they get forwarded in a
   standard TRILL Campus as specified in [RFC6325]. If multiple equal
   cost paths are available over pseudowires to reach destination, then
   VTSD should be capable of doing ECMP for them.






















M.Umair, K.Smiler, et al                                       [Page 13]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


5. VPTS Model Versus VPLS Model

   VPLS Model uses a simpler loop-breaking rule: the "split horizon"
   rule, where a PE must not forward traffic from one PW to another in
   the same VPLS mesh, whereas the VPTS Model uses distribution Trees
   for loop free topology. As this is an emulated TRILL service, for
   interoperability purposes the VPTS model is the default.




6. Packet Processing Between Pseudowires

   Whenever a packet gets received over a pseudowire, a VTSD will
   decapsulate the MPLS headers followed by checking the TRILL header.
   If the egress nickname in the TRILL header is for a TRILL site
   located beyond another pseudowire, then VTSD will encapsulate with
   new MPLS headers and send it across the proper pseudowire.

   For example in figure 3, consider that the pseudowire between TIR1
   and TIR2 fails, Then TIR1 will communicate with TIR2 via TIR3,
   whenever packets which are destined to TIR3 gets received from
   pseudowire between TIR1 and TIR3, VTSD inside TIR3 will decapsulate

   the MPLS headers, then check the TRILL header's egress nickname
   field. If the egress nickname indicate it is destained for the
   RBridge in site3 then the packet will be sent to RBc, if the egress
   nickname is located at site2, VTSD will add MPLS headers for the
   pseudowire between TIR3 and TIR2 and forward the packet on that
   pseudowire.






















M.Umair, K.Smiler, et al                                       [Page 14]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


7. Efficiency Considerations

   Since the VPTS Model uses Distribution trees for processing of multi-
   destination data packets, it is always advisable to have at least one
   Distribution tree root to be located in every TRILL site. This will
   avoid data packets getting received at TRILL sites where end-station
   service is not enabled for that data packet.



8. Security Considerations

   This document specifies methods using existing standards and
   facilities in ways that do not create new security problems.

   For general VPLS security considerations, including discussion of
   isolating customers from each other, see [RFC4761] and [RFC4762].

   For transport of TRILL by Pseudowires security consideration, see
   [RFC7173]. In particular, since pseudowires are support by MPLS or IP
   which are in turn supported by a link layer, that document recommends
   using IP security, such as IPsec [RFC4301] or DTLS [RFC6347], or the
   lower link layer security, such as MACSEC [802.1AE] for Ethernet
   links.

   Transmission outside the customer environment through the provider
   environment, as described in this document, increases risk of
   compromise or injection of false data through failure of tenant
   isolation or by the provider. In the VPLS model (Section 3), the use
   of link encryption and authentication between the CEs of a tenant
   that is being connected through provider facilities should be a good
   defense. In the VPTS model (Section 4), it is assumed that the CEs
   will peer with virtual TRILL switches of the provider network and
   thus link security between TRILL switch ports is inadequate as it
   will terminate at the edge PE. Thus, end station to end station
   encryption and authentication is more appropriate for the VPTS model.

   For added security against the compromise of data end-to-end
   encryption and authentication should be considered; that is,
   encryption and authentication from source end station to destination
   end station. This would typically be provided by IPsec [RFC4301] or
   DTLS [RFC6347] or other protocols convenient to protect information
   of concern.

   For general TRILL security considerations, see [RFC6325].







M.Umair, K.Smiler, et al                                       [Page 15]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


9. IANA Considerations

   This document requires no IANA actions. RFC Editor: Please delete
   this section before publication
















































M.Umair, K.Smiler, et al                                       [Page 16]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


Normative References

   [IS-IS] "Intermediate system to Intermediate system routeing
         information exchange protocol for use in conjunction with the
         Protocol for providing the Connectionless-mode Network Service
         (ISO 8473)", ISO/IEC 10589:2002, 2002".

   [RFC4761] Kompella, K., Ed., and Y. Rekhter, Ed., "Virtual Private
         LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling",
         RFC 4761, DOI 10.17487/RFC4761, January 2007, <https://www.rfc-
         editor.org/info/rfc4761>.

   [RFC4762] Lasserre, M., Ed., and V. Kompella, Ed., "Virtual Private
         LAN Service (VPLS) Using Label Distribution Protocol (LDP)
         Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007,
         <https://www.rfc-editor.org/info/rfc4762>.

   [RFC6325] Perlman, R., Eastlake 3rd, D., Dutt, D., Gai, S., and A.
         Ghanwani, "Routing Bridges (RBridges): Base Protocol
         Specification", RFC 6325, DOI 10.17487/RFC6325, July 2011,
         <https://www.rfc-editor.org/info/rfc6325>.

   [RFC7173] Yong, L., Eastlake 3rd, D., Aldrin, S., and J. Hudson,
         "Transparent Interconnection of Lots of Links (TRILL) Transport
         Using Pseudowires", RFC 7173, DOI 10.17487/RFC7173, May 2014,
         <https://www.rfc-editor.org/info/rfc7173>.

   [RFC7177] Eastlake 3rd, D., Perlman, R., Ghanwani, A., Yang, H., and
         V. Manral, "Transparent Interconnection of Lots of Links
         (TRILL): Adjacency", RFC 7177, DOI 10.17487/RFC7177, May 2014,
         <https://www.rfc-editor.org/info/rfc7177>.

   [RFC7780] Eastlake 3rd, D., Zhang, M., Perlman, R., Banerjee, A.,
         Ghanwani, A., and S. Gupta, "Transparent Interconnection of
         Lots of Links (TRILL): Clarifications, Corrections, and
         Updates", RFC 7780, DOI 10.17487/RFC7780, February 2016,
         <https://www.rfc-editor.org/info/rfc7780>.















M.Umair, K.Smiler, et al                                       [Page 17]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


Informative References

   [802.1AE] "IEEE Standard for Local and metropolitan area networks--
         Media Access Control (MAC) Security.", 2006.

   [RFC4026] Andersson, L. and T. Madsen, "Provider Provisioned Virtual
         Private Network (VPN) Terminology", RFC 4026, DOI
         10.17487/RFC4026, March 2005, <https://www.rfc-
         editor.org/info/rfc4026>.

   [RFC4301] Kent, S. and K. Seo, "Security Architecture for the
         Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, December
         2005, <https://www.rfc-editor.org/info/rfc4301>.

   [RFC4664] Andersson, L., Ed., and E. Rosen, Ed., "Framework for Layer
         2 Virtual Private Networks (L2VPNs)", RFC 4664, DOI
         10.17487/RFC4664, September 2006, <https://www.rfc-
         editor.org/info/rfc4664>.

   [RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
         Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347, January
         2012, <https://www.rfc-editor.org/info/rfc6347>.

   [RFC7041] Balus, F., Ed., Sajassi, A., Ed., and N. Bitar, Ed.,
         "Extensions to the Virtual Private LAN Service (VPLS) Provider
         Edge (PE) Model for Provider Backbone Bridging", RFC 7041, DOI
         10.17487/RFC7041, November 2013, <https://www.rfc-
         editor.org/info/rfc7041>.

   [RFC7172] Eastlake 3rd, D., Zhang, M., Agarwal, P., Perlman, R., and
         D. Dutt, "Transparent Interconnection of Lots of Links (TRILL):
         Fine-Grained Labeling", RFC 7172, DOI 10.17487/RFC7172, May
         2014, <https://www.rfc-editor.org/info/rfc7172>.



















M.Umair, K.Smiler, et al                                       [Page 18]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


Acknowledgements

   The contributions of Andrew G. Malis are gratefully acknowledged in
   improving the quality of this document.




Authors' Addresses

      Mohammed Umair
      Cisco Systems
      SEZ, Cessna Business Park
      Sarjapur - Marathahalli Outer Ring road
      Bengaluru - 560103, India

      EMail: mohammed.umair2@gmail.com


      Kingston Smiler Selvaraj
      IPInfusion
      RMZ Centennial
      Mahadevapura Post
      Bangalore - 560048 India

      EMail: kingstonsmiler@gmail.com


      Donald E. Eastlake 3rd
      Huawei Technologies
      155 Beaver Street
      Milford, MA  01757
      USA

      Phone: +1-508-333-2270
      EMail: d3e3e3@gmail.com


      Lucy Yong
      Self

      Phone: +1-469-227-5837
      EMail: lucyyong@gmail.com









M.Umair, K.Smiler, et al                                       [Page 19]

INTERNET-DRAFT                     TRILL Transparent Transport over MPLS


Copyright, Disclaimer, and Additional IPR Provisions

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.  The definitive version of
   an IETF Document is that published by, or under the auspices of, the
   IETF. Versions of IETF Documents that are published by third parties,
   including those that are translated into other languages, should not
   be considered to be definitive versions of IETF Documents. The
   definitive version of these Legal Provisions is that published by, or
   under the auspices of, the IETF. Versions of these Legal Provisions
   that are published by third parties, including those that are
   translated into other languages, should not be considered to be
   definitive versions of these Legal Provisions.  For the avoidance of
   doubt, each Contributor to the IETF Standards Process licenses each
   Contribution that he or she makes as part of the IETF Standards
   Process to the IETF Trust pursuant to the provisions of RFC 5378. No
   language to the contrary, or terms, conditions or rights that differ
   from or are inconsistent with the rights and licenses granted under
   RFC 5378, shall have any effect and shall be null and void, whether
   published or posted by such Contributor, or included with or in such
   Contribution.





















M.Umair, K.Smiler, et al                                       [Page 20]