<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bg-onions-update-network-service-models-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="Service &amp; Network Data Models Update">An Update of Service and Network YANG Data Models</title>
    <seriesInfo name="Internet-Draft" value="draft-bg-onions-update-network-service-models-00"/>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author fullname="Samier Barguil">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="16"/>
    <keyword>Network Models</keyword>
    <keyword>L3NM</keyword>
    <keyword>L2NM</keyword>
    <abstract>
      <?line 42?>

<t>Service &amp; Network data models have been implemented in recent years to facilitate the deployment of connectivity services such as Layer 2 and Layer 3 VPN services in provider networks. This document reports the findings from the implementations, including missing functionalities, configuration blocks aligment against recent network models published, operational issues/limitatations and enhancements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oscargdd.github.io/lxnm-bis/draft-bg-onions-update-network-service-models.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-bg-onions-update-network-service-models/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oscargdd/lxnm-bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Service and Network YANG data models <xref target="RFC8199"/><xref target="RFC8309"/> such as the Layer 3 Network Model (L3NM) <xref target="RFC9182"/> and the Layer 2 Network Model (L2NM) <xref target="RFC9291"/> have been implemented to automate the deployment of VPN services by providers. This document reports the findings from the implementations, deriving the functionalities required to update the Service and Network YANG data models.</t>
      <t><xref target="RFC8969"/> documents the automation framework. <xref target="RFC9315"/> documents Intent-based networking from IRTF perspective, with specific problems which are addressable today after the first deployments have been done.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="service-and-network-yang-data-models-in-the-ietf">
      <name>Service and Network YANG Data Models in the IETF</name>
      <t>Several IETF Working Groups have developed YANG modules in order
   to foster the provisioning and, more generally, the deployment of services. These modules focus on
   how the network operator intents to manage a network through
   protocols and devices to deliver a service. The intended configuration
   at the device level is derived from network YANG data models.
   The customer service YANG data models abstract the service for upper layers. The
   intended network service configuration is derived from the the service model.</t>
      <t>A set of these models is listed here:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="RFC9182"/> As a complement to the Layer 3 Virtual Private Network Service Model (L3SM),
   which is used for communication between customers and service providers,
   L3NM is a Network Model (L3NM) that can be used for the provisioning of
   BGP based Layer 3 Virtual Private Network (L3VPN) services within a service provider network.</t>
        </li>
        <li>
          <t><xref target="RFC9291"/> documents a data model that describes the deployment of
   various types of L2VPN, including VPWS and BGP based L2VPN, such as EVPNs.</t>
        </li>
      </ul>
    </section>
    <section anchor="observations-and-new-requirements">
      <name>Observations and new requirements</name>
      <section anchor="enhancements-to-lxsm-and-lxnm">
        <name>Enhancements to LxSM and LxNM</name>
        <t>Implementations of LxNM models in controllers required new functionalities which were not covered in <xref target="RFC9182"/> and <xref target="RFC9291"/> to deploy the missing functions in the Operator services. This section compiles the functions that were reported by those implementations.</t>
        <section anchor="l3nm-enhancements">
          <name>L3NM Enhancements</name>
          <ul spacing="normal">
            <li>
              <t>BFD parametrization of static routes (Github issue #1):
              </t>
              <ul spacing="normal">
                <li>
                  <t>The L3NM Yang data model allows to manage static routes in a VPN. That is, for a particular VPN service, new Pv4 and IPv6 static routes can be added, modified or deleted. The data model allows to specify whether BFD is desired in the static route. Whenever a controller derives the device configuration of the static route it will need to decide a particular BFD configuration, typically from a pre-defined template. Operators required, for different services, to customize the main BFD parameters to allow, for example, faster detection for critical services. The new requirement is the ability to specify BFD intended configuration in the IPv4 and IPv6 static routes, including a required-min-rx-interval and multiplier.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Management of VLAN 0 in tagged interfaces (Github issue #2): LxNM Yang models have a range defined for cvlan between 1 and 4094. VLAN 0 should also be supported and is used in deployments.</t>
            </li>
            <li>
              <t>Missing BGP intended configuration blocks (in relation to Attachment Circuits) (Github issue #3).
              </t>
              <ul spacing="normal">
                <li>
                  <t>There are a set of BGP configuration blocks required to manage BGP based services which are present now in the AC-Model but not in the L3NM:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>BGP Peer group creation</t>
                    </li>
                    <li>
                      <t>BGP Redistribution rules</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>Missing pointer to ACL (also present in Github issue #3).
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>ACL pointer to attach forwarding filter</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t>SRv6 support for L3VPN (Github issue #15): SRv6-based BGP services including L3VPN, whose procedures are defined in <xref target="RFC9252"/></t>
            </li>
            <li>
              <t>Improving Multicast Support:
              </t>
              <ul spacing="normal">
                <li>
                  <t>For L3VPN with multicast, one implementation has reported that Cisco MVPN augmentation were added to include various profiles ( ipmsi and spmsi ) . There is no YANG module from IETF as of today that supports full MVPN/SPMSI/IPMSI under L3NM directly. Standardized profiles are required to be added.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Extend guidance of how the network models can be used to/and operationalize Inter-AS VPN options (A, B, and C as defined in <xref target="RFC4364"/>) using the L3NM framework (Github issue #25).</t>
            </li>
          </ul>
        </section>
        <section anchor="l2nm-enhancements">
          <name>L2NM Enhancements</name>
          <ul spacing="normal">
            <li>
              <t>EVPN Remote and Local eth-tag (Github issue #6)</t>
            </li>
            <li>
              <t>Explicitly assign a RD at node level (Github issue #7)
              </t>
              <ul spacing="normal">
                <li>
                  <t>In the model, a RD must be always assigned via profile at service level. It is useful to be able to set a explicit RD directly at node level overriding the value of the profile. This way, a common profile can be used for all the services for use cases where only RD changes per node.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Add support for Flexible Cross-Connect (FXC) Service (<xref target="RFC9744"/>) (Github issue #8)</t>
            </li>
            <li>
              <t>Add explanatory text for EVPN multihoming using LAG (Github issue #9)</t>
            </li>
            <li>
              <t>support for vlan-lists/vlan-ranges (Github issue #10)
              </t>
              <ul spacing="normal">
                <li>
                  <t>When defining a Layer 2 service, sometimes multiple VLANs are mapped into a given service. It would be good to support this in the L2NM encapsulation stanza. Examples are as follows:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Typically used in single-tagged scenarios: vlan-id-list [ 200 210-219 222 234 240-249 ];</t>
                    </li>
                    <li>
                      <t>Dual-tagged scenario, with s-vlan=430 and a list of c-vlans: vlan-tags outer 430 inner-list [ 200 210-219 222 234 240-249 ];</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t>SRv6 support for L2VPN (Github issue #15)</t>
            </li>
            <li>
              <t>Performance monitoring
              </t>
              <ul spacing="normal">
                <li>
                  <t>ITU-T Y.1731 performance monitoring in Ethernet based networks . L2NM itself <xref target="RFC9291"/> doesn't natively include OAM specifics.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Add EVI identifier to differentiate it from VPN-ID. Each EVI maps to a specific EVPN service (e.g., a Layer 2 VPN bridging a particular VLAN across the EVPN fabric) (Github issue #24).</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="new-functionalities-required-to-fully-support-connectivity-services">
        <name>New Functionalities Required to Fully Support Connectivity Services</name>
        <t>The realization of advanced connectivity services requires, in addition to the configurations expressed in LxNM models:
* Definition of Access Control lists and prefix Sets:
    + Connectivity services often include mechanisms to filter forwarding packets. The LxNM models allow to include a 'forwarding-profile-identifier'. A forwarding profile refers to the policies that apply to the forwarding of packets conveyed within a VPN. Such policies may consist, for example, of applying Access Control Lists (ACLs). However, currently there is not an ACL network service model (even though a device level ACL model exists) that allows to manipulate such ACLs and sets when creating the service.
    + ACLs and Prefix sets can be reused among services. Thus, they need to be handled at a network level, regardless of the actual service using them.
* Definition of routing policies, including community sets, as path sets, etc:
    + Advanced connectivity services require the creation of complex policies. The LxNM models allows to indicate which policy (or policies) should be used. However, LxNM does not include the definition of policies. There are a set a device models which could be used as a base for the network model.
* Pre and post checks before and after deploying a service in the network.
* Preparation of the interface. Prior to the application of the entire configuration profile.</t>
      </section>
      <section anchor="status-of-the-intended-network-service">
        <name>Status of the Intended Network Service</name>
        <t>The Network Service Yang models represent an intent of the realization of service. A controller, after an instance of the network service yang intent has been created, will derive the necessary device level configurations and apply them to the necessary devices. However, the implementations reported a set of open issues which are related to the status. Those issues are not solved today and are left to implementation choices and solutions.</t>
        <ul spacing="normal">
          <li>
            <t>Is the Service running on the Network? (Github issue #5)
            </t>
            <ul spacing="normal">
              <li>
                <t>How can the northbound system be assured with 100% certainty that a configuration has been successfully installed on the network device?</t>
              </li>
              <li>
                <t>What mechanisms or feedback loops exist to confirm successful configuration deployment beyond simple acknowledgment?</t>
              </li>
              <li>
                <t>How can the system can handle transient errors or partial configuration applications from the model perspective?</t>
              </li>
              <li>
                <t>Are there specific operational attributes that can be used to reflect the real-time status of the configuration?</t>
              </li>
              <li>
                <t>Does the network element provide any operational state parameters or notifications that indicate whether the configuration is active, pending, or has failed?</t>
              </li>
              <li>
                <t>If a configuration is manually removed via CLI at the network device, is there a mechanism to reflect this change northbound?</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Operational Status Clarification (Github issue #4)
            </t>
            <ul spacing="normal">
              <li>
                <t>Understanding the interrelationships between the operational status of VPN services, VPN nodes, and VPN network access is another significant operational gap. The status of a VPN service may depend on the status of the underlying VPN nodes and the network access provided to the VPN.</t>
              </li>
              <li>
                <t>To address this gap, IETF should establish clear dependencies and correlations between the various operational statuses. This could involve defining specific criteria for determining the overall status of a VPN service based on the status of its constituent VPN nodes and network access components. Moreover, real-time monitoring and correlation of status information can provide insights into the health and performance of VPN services.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="summary">
        <name>Summary</name>
        <ul spacing="normal">
          <li>
            <t>L3NM and L2NM need to be updated to cover new technologies (such as SRv6), incomplete support (such as multicast) and enhancements.</t>
          </li>
          <li>
            <t>New network YANG data models (such as ACLs and routing policies)</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8199">
          <front>
            <title>YANG Module Classification</title>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="C. Moberg" initials="C." surname="Moberg"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
              <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
              <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8199"/>
          <seriesInfo name="DOI" value="10.17487/RFC8199"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="RFC9315">
          <front>
            <title>Intent-Based Networking - Concepts and Definitions</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
            <author fullname="L. Z. Granville" initials="L. Z." surname="Granville"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>Intent and Intent-Based Networking are taking the industry by storm. At the same time, terms related to Intent-Based Networking are often used loosely and inconsistently, in many cases overlapping and confused with other concepts such as "policy." This document clarifies the concept of "intent" and provides an overview of the functionality that is associated with it. The goal is to contribute towards a common and shared understanding of terms, concepts, and functionality that can be used as the foundation to guide further definition of associated research and engineering problems and their solutions.</t>
              <t>This document is a product of the IRTF Network Management Research Group (NMRG). It reflects the consensus of the research group, having received many detailed and positive reviews by research group participants. It is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9315"/>
          <seriesInfo name="DOI" value="10.17487/RFC9315"/>
        </reference>
        <reference anchor="RFC9252">
          <front>
            <title>BGP Overlay Services Based on Segment Routing over IPv6 (SRv6)</title>
            <author fullname="G. Dawra" initials="G." role="editor" surname="Dawra"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Zhuang" initials="S." surname="Zhuang"/>
            <author fullname="J. Rabadan" initials="J." surname="Rabadan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document defines procedures and messages for SRv6-based BGP services, including Layer 3 Virtual Private Network (L3VPN), Ethernet VPN (EVPN), and Internet services. It builds on "BGP/MPLS IP Virtual Private Networks (VPNs)" (RFC 4364) and "BGP MPLS-Based Ethernet VPN" (RFC 7432).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9252"/>
          <seriesInfo name="DOI" value="10.17487/RFC9252"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC9744">
          <front>
            <title>EVPN Virtual Private Wire Service (VPWS) Flexible Cross-Connect (FXC) Service</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="P. Brissette" initials="P." surname="Brissette"/>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="S. Boutros" initials="S." surname="Boutros"/>
            <author fullname="J. Rabadan" initials="J." surname="Rabadan"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document describes a new EVPN Virtual Private Wire Service (VPWS) service type specifically for multiplexing multiple attachment circuits across different Ethernet Segments (ESs) and physical interfaces into a single EVPN-VPWS service tunnel and still providing Single-Active and All-Active multi-homing. This new service is referred to as the EVPN-VPWS Flexible Cross-Connect (FXC) service. This document specifies a solution based on extensions to EVPN-VPWS (RFC 8214), which in turn is based on extensions to EVPN (RFC 7432). Therefore, a thorough understanding of RFCs 7432 and 8214 are prerequisites for this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9744"/>
          <seriesInfo name="DOI" value="10.17487/RFC9744"/>
        </reference>
      </references>
    </references>
    <?line 178?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This documents is based on the issues compiled in Github lxnm repository. The authors would like to acknowledge the issues raised by Julian Lucek, Xiao Min, Daniele Ceccarelli and Sujay Murthy.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
