<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-ac-lxsm-lxnm-glue-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="AC Glue for VPN Models">A YANG Data Model for Augmenting VPN Service and Network Models with Attachment Circuits</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ac-lxsm-lxnm-glue-02"/>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Richard Roberts">
      <organization>Juniper</organization>
      <address>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Samier Barguil Giraldo">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="28"/>
    <area>Operations and Management</area>
    <workgroup>OPSAWG</workgroup>
    <keyword>Slice Service</keyword>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <abstract>
      <?line 49?>

<t>The document specifies a module that updates existing service and
   network VPN modules with the required information to bind specific
   services to ACs that are created using the Attachment Circuit (AC) service and network models.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Operations and Management Area Working Group Working Group mailing list (opsawg@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/attachment-circuit-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 55?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The document specifies a YANG module (<xref target="sec-glue"/>) that updates existing service and
network Virtual Private Network (VPN) modules with the required information to bind specific
services to Attachment Circuits (ACs) that are created using the AC service model <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>, specifically the following modules are augmented:</t>
      <ul spacing="normal">
        <li>
          <t>The Layer 2 Service Model (L2SM) <xref target="RFC8466"/></t>
        </li>
        <li>
          <t>The Layer 3 Service Model (L3SM) <xref target="RFC8299"/></t>
        </li>
        <li>
          <t>The Layer 2 Network Model (L2NM) <xref target="RFC9291"/></t>
        </li>
        <li>
          <t>The Layer 3 Network Model (L3NM) <xref target="RFC9182"/></t>
        </li>
      </ul>
      <t>Likewise, the document augments the L2NM and L3NM with references to the ACs that are managed using the AC network model <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>The YANG data model in this document conforms to the Network
Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
      <t>An example to illustrate the use of the model is provided in <xref target="sec-example"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The meanings of the symbols in the YANG tree diagrams are defined in <xref target="RFC8340"/>.</t>
      <t>This document uses terms defined in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
      <t>LxSM refers to both the L2SM and the L3SM.</t>
      <t>LxNM refers to both the L2NM and the L3NM.</t>
    </section>
    <section anchor="sample-uses-of-the-data-models">
      <name>Sample Uses of the Data Models</name>
      <section anchor="acs-terminated-by-one-or-multiple-customer-edges-ces">
        <name>ACs Terminated by One or Multiple Customer Edges (CEs)</name>
        <t><xref target="uc"/> depicts two target topology flavors that involve ACs. These topologies have the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>A Customer Edges (CEs) can be either a physical device or a logical entity. Such logical entity is typically a software component (e.g., a virtual service function that is hosted within the provider's network or a third-party infrastructure). A CE is seen by the network as a peer Service Attachment Point (SAP) <xref target="RFC9408"/>.</t>
          </li>
          <li>
            <t>An AC service request may include one or multiple ACs, which may be associated to a single CE or multiple CEs.</t>
          </li>
          <li>
            <t>CEs may be either dedicated to one single connectivity service or host multiple connectivity services (e.g., CEs with roles of service functions <xref target="RFC7665"/>).</t>
          </li>
          <li>
            <t>A network provider may bind a single AC to one or multiple peer SAPs (e.g., CE#1 and CE#2 are tagged as peer SAPs for the same AC). For example, and as discussed in <xref target="RFC4364"/>, multiple CEs can be attached to a PE over the same attachment circuit. This scenario is typically implemented when the Layer 2 infrastructure between the CE and the network is a multipoint service.</t>
          </li>
          <li>
            <t>A single CE may terminate multiple ACs, which can be associated with the same bearer or distinct bearers.</t>
          </li>
          <li>
            <t>Customers may request protection schemes in which the ACs associated with their endpoints are terminated by the same PE (e.g., CE#3), distinct PEs (e.g., CE#34), etc. The network provider uses this request to decide where to terminate the AC in the network provider network and also whether to enable specific capabilities (e.g., Virtual Router Redundancy Protocol (VRRP)).</t>
          </li>
        </ul>
        <figure anchor="uc">
          <name>Examples of ACs</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="528" viewBox="0 0 528 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,112 L 8,160" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,48" fill="none" stroke="black"/>
                <path d="M 72,112 L 72,160" fill="none" stroke="black"/>
                <path d="M 128,48 L 128,144" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,176" fill="none" stroke="black"/>
                <path d="M 304,176 L 304,208" fill="none" stroke="black"/>
                <path d="M 376,32 L 376,176" fill="none" stroke="black"/>
                <path d="M 456,32 L 456,80" fill="none" stroke="black"/>
                <path d="M 456,128 L 456,160" fill="none" stroke="black"/>
                <path d="M 496,160 L 496,208" fill="none" stroke="black"/>
                <path d="M 520,32 L 520,80" fill="none" stroke="black"/>
                <path d="M 520,128 L 520,160" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 208,32 L 376,32" fill="none" stroke="black"/>
                <path d="M 456,32 L 520,32" fill="none" stroke="black"/>
                <path d="M 72,48 L 128,48" fill="none" stroke="black"/>
                <path d="M 376,48 L 400,48" fill="none" stroke="black"/>
                <path d="M 424,48 L 456,48" fill="none" stroke="black"/>
                <path d="M 376,64 L 400,64" fill="none" stroke="black"/>
                <path d="M 424,64 L 456,64" fill="none" stroke="black"/>
                <path d="M 8,80 L 72,80" fill="none" stroke="black"/>
                <path d="M 456,80 L 520,80" fill="none" stroke="black"/>
                <path d="M 128,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 176,96 L 208,96" fill="none" stroke="black"/>
                <path d="M 8,112 L 72,112" fill="none" stroke="black"/>
                <path d="M 456,128 L 520,128" fill="none" stroke="black"/>
                <path d="M 72,144 L 128,144" fill="none" stroke="black"/>
                <path d="M 376,144 L 400,144" fill="none" stroke="black"/>
                <path d="M 424,144 L 456,144" fill="none" stroke="black"/>
                <path d="M 8,160 L 72,160" fill="none" stroke="black"/>
                <path d="M 456,160 L 520,160" fill="none" stroke="black"/>
                <path d="M 208,176 L 376,176" fill="none" stroke="black"/>
                <path d="M 304,208 L 392,208" fill="none" stroke="black"/>
                <path d="M 416,208 L 496,208" fill="none" stroke="black"/>
                <g class="text">
                  <text x="8" y="52">│</text>
                  <text x="412" y="52">AC</text>
                  <text x="8" y="68">│</text>
                  <text x="36" y="68">CE#1</text>
                  <text x="72" y="68">│</text>
                  <text x="412" y="68">AC</text>
                  <text x="484" y="68">CE#3</text>
                  <text x="164" y="100">AC</text>
                  <text x="280" y="100">Network</text>
                  <text x="36" y="148">CE#2</text>
                  <text x="412" y="148">AC</text>
                  <text x="484" y="148">CE#4</text>
                  <text x="404" y="212">AC</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.-------.                .--------------------.         .-------.
│       +------.         |                    +---AC----+       |
│ CE#1  │      |         |                    +---AC----+ CE#3  |
'-------'      |         |                    |         '-------'
               +---AC----+     Network        |
.-------.      |         |                    |
|       |      |         |                    |         .-------.
| CE#2  +------'         |                    +---AC----+ CE#4  |
'-------'                |                    |         '----+--'
                         '-----------+--------'              |
                                     |                       |
                                     '-----------AC----------'
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="separate-ac-provisioning-vs-actual-vpn-service-provisioning">
        <name>Separate AC Provisioning vs. Actual VPN Service Provisioning</name>
        <t>The procedure to provision a service in a service provider network may depend on the practices adopted by a service provider. This includes the flow put in place for the provisioning of advanced network services and how they are bound to an attachment circuit. For example, a single attachment circuit may be used to host multiple connectivity services. In order to avoid service interference and redundant information in various locations, a service provider may expose an interface to manage ACs network-wide. Customers can then request a bearer or an attachment circuit to be put in place, and then refer to that bearer or AC when requesting VPN services that are bound to the bearer or AC.</t>
        <t><xref target="_u-ex"/> shows the positioning of the AC service model is the overall service delivery process.</t>
        <figure anchor="_u-ex">
          <name>An Example of AC Model Usage</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="656" width="512" viewBox="0 0 512 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,560 L 8,592" fill="none" stroke="black"/>
                <path d="M 48,560 L 48,592" fill="none" stroke="black"/>
                <path d="M 96,432 L 96,480" fill="none" stroke="black"/>
                <path d="M 104,320 L 104,368" fill="none" stroke="black"/>
                <path d="M 120,544 L 120,608" fill="none" stroke="black"/>
                <path d="M 136,368 L 136,432" fill="none" stroke="black"/>
                <path d="M 136,480 L 136,536" fill="none" stroke="black"/>
                <path d="M 176,288 L 176,320" fill="none" stroke="black"/>
                <path d="M 176,432 L 176,480" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,64" fill="none" stroke="black"/>
                <path d="M 208,112 L 208,160" fill="none" stroke="black"/>
                <path d="M 208,208 L 208,256" fill="none" stroke="black"/>
                <path d="M 208,376 L 208,496" fill="none" stroke="black"/>
                <path d="M 232,320 L 232,368" fill="none" stroke="black"/>
                <path d="M 272,64 L 272,112" fill="none" stroke="black"/>
                <path d="M 272,160 L 272,208" fill="none" stroke="black"/>
                <path d="M 272,256 L 272,288" fill="none" stroke="black"/>
                <path d="M 296,320 L 296,368" fill="none" stroke="black"/>
                <path d="M 336,32 L 336,64" fill="none" stroke="black"/>
                <path d="M 336,112 L 336,160" fill="none" stroke="black"/>
                <path d="M 336,208 L 336,256" fill="none" stroke="black"/>
                <path d="M 368,288 L 368,320" fill="none" stroke="black"/>
                <path d="M 368,368 L 368,536" fill="none" stroke="black"/>
                <path d="M 384,544 L 384,608" fill="none" stroke="black"/>
                <path d="M 424,320 L 424,368" fill="none" stroke="black"/>
                <path d="M 456,560 L 456,592" fill="none" stroke="black"/>
                <path d="M 496,560 L 496,592" fill="none" stroke="black"/>
                <path d="M 208,32 L 336,32" fill="none" stroke="black"/>
                <path d="M 208,64 L 336,64" fill="none" stroke="black"/>
                <path d="M 208,112 L 336,112" fill="none" stroke="black"/>
                <path d="M 208,160 L 336,160" fill="none" stroke="black"/>
                <path d="M 208,208 L 336,208" fill="none" stroke="black"/>
                <path d="M 208,256 L 336,256" fill="none" stroke="black"/>
                <path d="M 176,288 L 368,288" fill="none" stroke="black"/>
                <path d="M 104,320 L 232,320" fill="none" stroke="black"/>
                <path d="M 296,320 L 424,320" fill="none" stroke="black"/>
                <path d="M 104,368 L 232,368" fill="none" stroke="black"/>
                <path d="M 296,368 L 424,368" fill="none" stroke="black"/>
                <path d="M 96,432 L 176,432" fill="none" stroke="black"/>
                <path d="M 96,480 L 176,480" fill="none" stroke="black"/>
                <path d="M 120,544 L 384,544" fill="none" stroke="black"/>
                <path d="M 8,560 L 48,560" fill="none" stroke="black"/>
                <path d="M 456,560 L 496,560" fill="none" stroke="black"/>
                <path d="M 48,576 L 120,576" fill="none" stroke="black"/>
                <path d="M 384,576 L 456,576" fill="none" stroke="black"/>
                <path d="M 8,592 L 48,592" fill="none" stroke="black"/>
                <path d="M 456,592 L 496,592" fill="none" stroke="black"/>
                <path d="M 120,608 L 384,608" fill="none" stroke="black"/>
                <g class="text">
                  <text x="268" y="52">Customer</text>
                  <text x="108" y="84">Customer</text>
                  <text x="176" y="84">Service</text>
                  <text x="232" y="84">Model</text>
                  <text x="96" y="100">e.g.,</text>
                  <text x="164" y="100">slice-svc,</text>
                  <text x="240" y="100">ac-svc,</text>
                  <text x="296" y="100">and</text>
                  <text x="356" y="100">bearer-svc</text>
                  <text x="272" y="132">Service</text>
                  <text x="272" y="148">Orchestration</text>
                  <text x="112" y="180">Network</text>
                  <text x="168" y="180">Model</text>
                  <text x="32" y="196">e.g.,</text>
                  <text x="100" y="196">l3vpn-ntw,</text>
                  <text x="164" y="196">sap,</text>
                  <text x="200" y="196">and</text>
                  <text x="244" y="196">ac-ntw</text>
                  <text x="264" y="228">Network</text>
                  <text x="272" y="244">Orchestration</text>
                  <text x="56" y="276">Network</text>
                  <text x="144" y="276">Configuration</text>
                  <text x="224" y="276">Model</text>
                  <text x="164" y="340">Domain</text>
                  <text x="364" y="340">Domain</text>
                  <text x="168" y="356">Orchestration</text>
                  <text x="360" y="356">Orchestration</text>
                  <text x="36" y="388">Device</text>
                  <text x="64" y="404">Configuration</text>
                  <text x="32" y="420">Model</text>
                  <text x="132" y="452">Config</text>
                  <text x="136" y="468">Manager</text>
                  <text x="256" y="516">NETCONF/CLI................</text>
                  <text x="376" y="516">.</text>
                  <text x="208" y="532">|</text>
                  <text x="84" y="564">Bearer</text>
                  <text x="420" y="564">Bearer</text>
                  <text x="28" y="580">CE#1</text>
                  <text x="248" y="580">Network</text>
                  <text x="476" y="580">CE#2</text>
                  <text x="28" y="628">Site</text>
                  <text x="56" y="628">A</text>
                  <text x="476" y="628">Site</text>
                  <text x="504" y="628">B</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                          .---------------.
                          |   Customer    |
                          '-------+-------'
          Customer Service Model  |
          e.g., slice-svc, ac-svc,| and bearer-svc
                          .-------+-------.
                          |    Service    |
                          | Orchestration |
                          '-------+-------'
           Network Model          |
  e.g., l3vpn-ntw, sap, and ac-ntw|
                          .-------+-------.
                          |   Network     |
                          | Orchestration |
                          '-------+-------'
    Network Configuration Model   |
                      .-----------+-----------.
                      |                       |
             .--------+------.       .--------+------.
             |    Domain     |       |     Domain    |
             | Orchestration |       | Orchestration |
             '---+-----------'       '--------+------'
  Device         |        |                   |
  Configuration  |        |                   |
  Model          |        |                   |
            .----+----.   |                   |
            | Config  |   |                   |
            | Manager |   |                   |
            '----+----'   |                   |
                 |        |                   |
                 | NETCONF/CLI..................
                 |        |                   |
               .--------------------------------.
 .----. Bearer |                                | Bearer .----.
 |CE#1+--------+            Network             +--------+CE#2|
 '----'        |                                |        '----'
               '--------------------------------'
  Site A                                                  Site B
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="module-tree-structure">
      <name>Module Tree Structure</name>
      <t><xref target="RFC8299"/> specifies that a "site-network-access" attachment is achieved through a
"bearer" with an "ip-connection" on top. From that standpoint, a "site-network-access" is mapped to an attachment circuit with both Layer 2 and 3 properties as per <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. <xref target="RFC8466"/> specifies that a "site-network-access" represents an logical layer 2 connection to a site. A "site-network-access" can thus be mapped to an attachment circuit with  Layer 2 properties <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. Similarly, "vpn-network-access" defined in both <xref target="RFC9182"/> and <xref target="RFC9282"/> is mapped to an attachment circuit as per <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> or <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>As such, ACs created using the "ietf-ac-svc" module <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> can be referenced in other
VPN-related modules (e.g., L2SM, L3SM, L2NM, and L3NM). Also, ACs managed using "ietf-ac-ntw" <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> can be referenced in VPN-related network modules (mainly, L2NM and L3NM). The required augmentations to that aim as shown in <xref target="tree"/>.</t>
      <figure anchor="tree">
        <name>AC Glue Tree Structure</name>
        <artwork align="center"><![CDATA[
  augment /l2vpn-svc:l2vpn-svc/l2vpn-svc:sites/l2vpn-svc:site
            /l2vpn-svc:site-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
  augment /l3vpn-svc:l3vpn-svc/l3vpn-svc:sites/l3vpn-svc:site
            /l3vpn-svc:site-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
  augment /l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service
            /l2nm:vpn-nodes/l2nm:vpn-node/l2nm:vpn-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
    +--rw ac-ntw-ref*   ac-ntw:attachment-circuit-reference
  augment /l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service
            /l3nm:vpn-nodes/l3nm:vpn-node/l3nm:vpn-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
    +--rw ac-ntw-ref*   ac-ntw:attachment-circuit-reference
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-glue">
      <name>The AC Glue ("ietf-ac-glue") YANG Module</name>
      <sourcecode markers="true"><![CDATA[ file ietf-ac-glue@2023-11-13.yang
module ietf-ac-glue {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-ac-glue";
  prefix ac-glue;

  import ietf-l3vpn-svc {
    prefix l3vpn-svc;
    reference
      "RFC 8299: YANG Data Model for L3VPN Service Delivery";
  }
  import ietf-l2vpn-svc {
    prefix l2vpn-svc;
    reference
      "RFC 8466: A YANG Data Model for Layer 2 Virtual Private
                 Network (L2VPN) Service Delivery";
  }
  import ietf-l3vpn-ntw {
    prefix l3nm;
    reference
      "RFC 9182: A YANG Network Data Model for Layer 3 VPNs";
  }
  import ietf-l2vpn-ntw {
    prefix l2nm;
    reference
      "RFC 9291: A YANG Network Data Model for Layer 2 VPNs";
  }
  import ietf-ac-svc {
    prefix ac-svc;
    reference
      "RFC SSSS: YANG Service Data Models for Attachment Circuits";
  }
  import ietf-ac-ntw {
    prefix ac-ntw;
    reference
      "RFC NNNN: A Network YANG Data Model for Attachment Circuits";
  }

  organization
    "IETF OPSAWG (Operations and Management Area Working Group)";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/opsawg/>
     WG List:  <mailto:opsawg@ietf.org>

     Editor:   Mohamed Boucadair
               <mailto:mohamed.boucadair@orange.com>
     Author:   Richard Roberts
               <mailto:rroberts@juniper.net>
     Author:   Samier Barguil
               <mailto:ssamier.barguil_giraldo@nokia.com>
     Author:   Oscar Gonzalez de Dios
               <mailto:oscar.gonzalezdedios@telefonica.com>";
  description
    "This YANG module defines a YANG model for augmenting the LxSM
     and the LxNM with attachment circuit references.

     Copyright (c) 2023 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2023-11-13 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A YANG Data Model for Augmenting VPN Service
                 and Network Models with Attachment Circuits";
  }

  grouping ac-svc-glue {
    description
      "A set of service-specific AC-related data.";
    leaf-list ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that 
         was provisionned using the ACaaS module.";
    }
  }

  grouping ac-glue {
    description
      "A set of AC-related data.";
    leaf-list ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that 
         was provisionned using the ACaaS module.";
    }
    leaf-list ac-ntw-ref {
      type ac-ntw:attachment-circuit-reference;
      description
        "A reference to the AC that  was provisionned
         using the AC network module.";
    }
  }

  augment "/l2vpn-svc:l2vpn-svc"
        + "/l2vpn-svc:sites/l2vpn-svc:site"
        + "/l2vpn-svc:site-network-accesses" {
    description
      "Augments VPN network access with AC provisioning details.";

    uses ac-svc-glue;
  }

  augment "/l3vpn-svc:l3vpn-svc"
        + "/l3vpn-svc:sites/l3vpn-svc:site"
        + "/l3vpn-svc:site-network-accesses" {
    description
      "Augments VPN network access with AC provisioning details.";

    uses ac-svc-glue;
  }

  augment "/l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service"
        + "/l2nm:vpn-nodes/l2nm:vpn-node"
        + "/l2nm:vpn-network-accesses" {
    description
      "Augments VPN network access with AC provisioning details.";

    uses ac-glue;
  }

  augment "/l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service"
        + "/l3nm:vpn-nodes/l3nm:vpn-node"
        + "/l3nm:vpn-network-accesses" {
    description
      "Augments VPN network access with AC provisioning details.";

    uses ac-glue;
  }
}
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The YANG module specified in this document defines schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>.  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) <xref target="RFC6242"/>.  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   <xref target="RFC8446"/>.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
   provides the means to restrict access for particular NETCONF or
   RESTCONF users to a preconfigured subset of all available NETCONF or
   RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   and delete operations to these data nodes without proper protection
   or authentication can have a negative effect on network operations.
   These are the subtrees and data nodes and their sensitivity/
   vulnerability in the "ietf-ac-glue" module:</t>
      <ul spacing="normal">
        <li>
          <t>TBC</t>
        </li>
        <li>
          <t>TBC</t>
        </li>
      </ul>
      <t>Some of the readable data nodes in this YANG module may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  These are the subtrees and data
   nodes and their sensitivity/vulnerability in the "ietf-ac-glue" module:</t>
      <ul spacing="normal">
        <li>
          <t>TBC</t>
        </li>
        <li>
          <t>TBC</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
   the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   URI:  urn:ietf:params:xml:ns:yang:ietf-ac-glue
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
   Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group.</t>
      <artwork><![CDATA[
   Name:  ietf-ac-glue
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-ac-glue
   Prefix:  ac-glue
   Maintained by IANA?  N
   Reference:  RFC xxxx
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="27" month="November" year="2023"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-02"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="27" month="November" year="2023"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., Network Slice Service).  A
   companion service model is specified in I-D.ietf-opsawg-teas-
   attachment-circuit.

   The module augments the Service Attachment Point (SAP) model with the
   detailed information for the provisioning of attachment circuits in
   Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-01"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC9282">
          <front>
            <title>Responsibility Change for the RFC Series</title>
            <author fullname="B. Rosen" initials="B." surname="Rosen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>In RFC 9280, responsibility for the RFC Series moved to the RFC Series Working Group and the RFC Series Approval Board. It is no longer the responsibility of the RFC Editor, and the role of the IAB in the RFC Series is altered. Accordingly, in Section 2.1 of RFC 2026, the sentence "RFC publication is the direct responsibility of the RFC Editor, under the general direction of the IAB" is deleted.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="9"/>
          <seriesInfo name="RFC" value="9282"/>
          <seriesInfo name="DOI" value="10.17487/RFC9282"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
      </references>
    </references>
    <?line 421?>

<section anchor="sec-example">
      <name>An Example</name>
      <t>Let's consider the example depicted in <xref target="ex-topo"/> with two customer terminating points (CE1 and CE2). Let's also assume that the bearers to attach these CEs to the provider network are already in place. References to the identify these bearers are shown in the figure.</t>
      <figure anchor="ex-topo">
        <name>Topology Example</name>
        <artwork align="center"><![CDATA[
            .-----.   .--------------.   .-----.
.----.      | PE1 +===+              +===+ PE2 |      .----.
| CE1+------+"450"|   |     MPLS     |   |"451"+------+ CE2|
'----'   ^  '-----'   |              |   '-----'   ^  '----'
         |            |     Core     |             |  
    Bearer:1234       '--------------'         Bearer:5678
]]></artwork>
      </figure>
      <t>The AC service model <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> can be used by the provider to manage and expose the ACs over existing bearers as shown in <xref target="ex-ac"/>.</t>
      <figure anchor="ex-ac">
        <name>ACs Created Using ACaaS</name>
        <artwork align="center"><![CDATA[
{
   "ietf-ac-svc:attachment-circuits":{
      "ac-group-profile":[
         {
            "name":"an-ac-profile",
            "l2-connection":{
               "encapsulation":{
                  "encap-type":"ietf-vpn-common:dot1q",
                  "dot1q":{
                     "tag-type":"ietf-vpn-common:c-vlan",
                     "cvlan-id":550
                  }
               }
            },
            "service":{
               "mtu":1550,
               "svc-pe-to-ce-bandwidth":{
                  "pe-to-ce-bandwidth":[
                     {
                        "bw-type":"ietf-vpn-common:bw-per-port",
                        "cir":"20480000"
                     }
                  ]
               },
               "svc-ce-to-pe-bandwidth":{
                  "ce-to-pe-bandwidth":[
                     {
                        "bw-type":"ietf-vpn-common:bw-per-port",
                        "cir":"20480000"
                     }
                  ]
               },
               "qos":{
                  "qos-profile":{
                     "qos-profile":[
                        {
                           "profile":"QoS_Profile_A",
                           "direction":"ietf-vpn-common:both"
                        }
                     ]
                  }
               }
            }
         }
      ],
      "ac":[
         {
            "name":"ac-1",
            "description":"First attachment",
            "ac-group-profile":["an-ac-profile"],
            "l2-connection":{
               "bearer-reference":"1234"
            }
         },
         {
            "name":"ac-2",
            "description":"Second attachment",
            "ac-group-profile": ["an-ac-profile"],
            "l2-connection":{
               "bearer-reference":"5678"
            }
         }
      ]
   }
}
]]></artwork>
      </figure>
      <t>Let's now consider that the customer wants to request a VPLS service between the sites as shown in <xref target="ex-vpls"/>.</t>
      <figure anchor="ex-vpls">
        <name>Example of VPLS</name>
        <artwork align="center"><![CDATA[
            |----------  VPLS "1543" ----------|
            
            .-----.   .--------------.   .-----.
.----.  AC1 | PE1 +===+              +===+ PE2 |  AC2 .----.
| CE1+------+"450"|   |     MPLS     |   |"451"+------+ CE2|
'----'   ^  '-----'   |              |   '-----'   ^  '----'
         |            |     Core     |             |  
    Bearer:1234       '--------------'         Bearer:5678
]]></artwork>
      </figure>
      <t>To that aim, existing ACs are referenced during the creation of the VPLS instance using the L2NM and the "ietf-ac-glue" as shown in <xref target="ex-vpls-req"/>.</t>
      <figure anchor="ex-vpls-req">
        <name>Example of a VPLS Request Using L2NM and AC Glue (Message Body)</name>
        <artwork align="center"><![CDATA[
{
  "ietf-l2vpn-ntw:l2vpn-ntw": {
    "vpn-services": {
      "vpn-service": [
        {
          "vpn-id": "1543",
          "vpn-name": "CORPO-EXAMPLE",
          "customer-name": "EXAMPLE",
          "vpn-type": "ietf-vpn-common:vpls",
          "vpn-service-topology": "ietf-vpn-common:hub-spoke",
          "bgp-ad-enabled": false,
          "signaling-type": "ietf-vpn-common:ldp-signaling",
          "global-parameters-profiles": {
            "global-parameters-profile": [
              {
                "profile-id": "simple-profile",
                "ce-vlan-preservation": true,
                "ce-vlan-cos-preservation": true
              }
            ]
          },
          "vpn-nodes": {
            "vpn-node": [
              {
                "vpn-node-id": "450",
                "ne-id": "2001:db8:5::1",
                "role": "ietf-vpn-common:hub-role",
                "status": {
                  "admin-status": {
                    "status": "ietf-vpn-common:admin-up"
                  }
                },
                "active-global-parameters-profiles": {
                  "global-parameters-profile": [
                    {
                      "profile-id": "simple-profile"
                    }
                  ]
                },
                "signaling-option": {
                  "ldp-or-l2tp": {
                    "t-ldp-pw-type": "vpls-type",
                    "pw-peer-list": [
                      {
                        "peer-addr": "2001:db8:50::1",
                        "vc-id": "1543"
                      }
                    ]
                  }
                },
                "vpn-network-accesses": {
                  "ietf-ac-glue:ac-svc-ref": ["ac-1"]
                }
              },
              {
                "vpn-node-id": "451",
                "ne-id": "2001:db8:50::1",
                "role": "ietf-vpn-common:spoke-role",
                "status": {
                  "admin-status": {
                    "status": "ietf-vpn-common:admin-up"
                  }
                },
                "active-global-parameters-profiles": {
                  "global-parameters-profile": [
                    {
                      "profile-id": "simple-profile"
                    }
                  ]
                },
                "signaling-option": {
                  "ldp-or-l2tp": {
                    "t-ldp-pw-type": "vpls-type",
                    "pw-peer-list": [
                      {
                        "peer-addr": "2001:db8:5::1",
                        "vc-id": "1543"
                      }
                    ]
                  }
                },
                "vpn-network-accesses": {
                  "ietf-ac-glue:ac-svc-ref": ["ac-2"]
                }
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
      </figure>
      <t>Note that before implementing the VPLS creation request, the provider service orchestrator may first check if the VPLS service can be provided to the customer using the target delivery locations. The orchestrator will use the SAP model <xref target="RFC9408"/> as exemplified in <xref target="ex-sap-query"/>. This example assumes that the query concerns only PE1. A similar query can be issued for PE2.</t>
      <figure anchor="ex-sap-query">
        <name>Example of SAP Response (Message Body)</name>
        <artwork align="center"><![CDATA[
{
   "ietf-sap-ntw:service":[
      {
         "service-type":"ietf-vpn-common:vpls",
         "sap":[
            {
               "sap-id":"sap#1",
               "peer-sap-id":[
                  "ce-1"
               ],
               "description":"A parent SAP",
               "attachment-interface":"GE0/6/1",
               "interface-type":"ietf-sap-ntw:phy",
               "role":"ietf-sap-ntw:uni",
               "allows-child-saps":true,
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               }
            }
         ]
      }
   ]
}
]]></artwork>
      </figure>
      <t>The response in <xref target="ex-sap-query"/> indicates that the VPLS service can be delivered to CE1. <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> can be also used to access AC-related details that are bound to the target SAP (<xref target="ex-acntw-query"/>).</t>
      <figure anchor="ex-acntw-query">
        <name>Example of AC Network Response (Message Body)</name>
        <artwork align="center"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
   "ietf-sap-ntw:service":[
      {
         "service-type":"ietf-vpn-common:vpls",
         "sap":[
            {
               "sap-id":"sap#1",
               "peer-sap-id":[
                  "ce-1"
               ],
               "description":"A parent SAP",
               "attachment-interface":"GE0/6/1",
               "interface-type":"ietf-sap-ntw:phy",
               "role":"ietf-sap-ntw:uni",
               "allows-child-saps":true,
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               }
            },
            {
               "sap-id":"sap#11",
               "description":"A child SAP",
               "parent-termination-point":"GE0/6/4",
               "attachment-interface":"GE0/6/4.2",
               "interface-type":"ietf-sap-ntw:logical",
               "encapsulation-type":"ietf-vpn-common:vlan-type",
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               },
               "ietf-ac-ntw:ac":[
                  {
                     "name":"ac-11",
                     "ac-svc-ref":"ac-1",
                     "peer-sap-id":[
                        "ce-1"
                     ],
                     "status":{
                        "admin-status":{
                           "status":"ietf-vpn-common:admin-up"
                        },
                        "oper-status":{
                           "status":"ietf-vpn-common:op-up"
                        }
                     },
                     "l2-connection":{
                        "encapsulation":{
                           "encap-type":"ietf-vpn-common:dot1q",
                           "dot1q":{
                              "tag-type":"ietf-vpn-common:c-vlan",
                              "cvlan-id":550
                           }
                        },
                        "bearer-reference":"1234"
                     },
                     "service":{
                        "mtu":1550,
                        "svc-pe-to-ce-bandwidth":{
                           "pe-to-ce-bandwidth":[
                              {
                                 "cir":"20480000"
                              }
                           ]
                        },
                        "svc-ce-to-pe-bandwidth":{
                           "ce-to-pe-bandwidth":[
                              {
                                 "cir":"20480000"
                              }
                           ]
                        },
                        "qos":{
                           "qos-profile":{
                              "qos-profile":[
                                 {
                                    "profile":"QoS_Profile_A",
                                    "direction":"ietf-vpn-common:\
                                                                both"
                                 }
                              ]
                           }
                        }
                     }
                  }
               ]
            }
         ]
      }
   ]
}
]]></artwork>
      </figure>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bo Wu for the review and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
