<?xml version="1.0" encoding="US-ASCII"?>

<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocdepth="6"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc rfcedstyle="yes"?> 
<?rfc subcompact="no"?>

<rfc number="5085" category="std">

        <front>
                <title abbrev="PW VCCV">
       Pseudowire Virtual Circuit Connectivity Verification (VCCV):
                    A&nbsp;Control&nbsp;Channel&nbsp;for&nbsp;Pseudowires
                        </title>

                <author role="editor" fullname="Thomas D. Nadeau" initials="T."
                        surname="Nadeau">
                        <organization>Cisco Systems, Inc.</organization>
                        <address>
                                <postal>
                                        <street>300 Beaver Brook Road</street>
                                        <street/>
                                        <city>Boxborough</city>
                                        <code>01719</code>
                                        <region>MA</region>
                                        <country>USA</country>
                                </postal>
                                <email>tnadeau@cisco.com</email>
                        </address>
                </author>

                <author role="editor" fullname="Carlos Pignataro" initials="C.M."
                        surname="Pignataro">
                        <organization>Cisco Systems, Inc.</organization>
                        <address>
                                <postal>
                                        <street>7200 Kit Creek Road</street>
                                        <street>PO Box 14987</street>
                                        <city>Research Triangle Park</city>
                                        <code>27709</code>
                                        <region>NC</region>
                                        <country>USA</country>
                                </postal>
<!--
                                <phone>+1-919-392-7428</phone>
                                <facsimile>+1-919-869-1438</facsimile>
-->
                                <email>cpignata@cisco.com</email>
                        </address>
                </author>



                <date month="November" year="2007"/>
                <area></area>
                <workgroup>PWE3</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>example</keyword>

                <abstract>
                        <t>
   This document describes Virtual Circuit Connection Verification 
   (VCCV), which provides a control channel that is associated with a 
   pseudowire (PW), as well as the corresponding operations and 
   management functions (such as connectivity verification) to be used 
   over that control channel. VCCV applies to all supported access 
   circuit and transport types currently defined for PWs.
                        </t>


                </abstract>


        </front>


        <middle>

                <section anchor="Intro" title="Introduction">
                        <t>
    Fault detection and diagnostic mechanisms that can be used
    for end-to-end fault detection and diagnostics for a PW as a
    means of determining its true operational state are needed.
    Operators have indicated in 
<xref target="RFC4377"/> and 
<xref target="RFC3916"/> that such a tool
    is required for PW operation and maintenance. This document
    defines a protocol called Virtual Circuit Connection Verification
    (VCCV) that satisfies these requirements. VCCV is, in its
    simplest description, a control channel between a pseudowire's
    ingress and egress points over which connectivity verification 
    messages can be sent.

                        </t>

                        <t>

    The Pseudowire Edge-to-Edge Emulation (PWE3) Working Group defines a 
    mechanism that emulates the essential attributes of a 
    telecommunications service (such as a T1 leased line or Frame Relay)
    over a variety of Public Switched Network (PSN) types 
<xref target="RFC3985"/>.
    PWE3 is intended to provide only the minimum necessary functionality
    to emulate the service with the required degree of faithfulness for
    the given service definition.  The required functions of PWs include
    encapsulating service-specific bit streams, cells, or PDUs arriving
    at an  ingress port and carrying them across an IP path or MPLS
    tunnel.  In some cases, it is necessary to perform other operations,
    such as managing their timing and order, to emulate the behavior
    and characteristics of the service to the required degree of
    faithfulness.

                        </t>

                        <t>

    From the perspective of Customer Edge (CE) devices, the PW is
    characterized as an unshared link or circuit of the chosen service.
    In some cases, there may be deficiencies in the PW emulation that
    impact the traffic carried over a PW and therefore limit the
    applicability of this technology.  These limitations must be fully
    described in the appropriate service-specific documentation.

                        </t>

                        <t>

    For each service type, there will be one default mode of operation
    that all PEs offering that service type must support.  However,
    optional modes have been defined to improve the faithfulness of the
    emulated service, as well as to offer a means by which older
    implementations may support these services.
 
                        </t>

                        <t>

    <xref target="Fig1"/> depicts the architecture of a pseudowire as defined in
    
<xref target="RFC3985"/>.
It further depicts where the VCCV control channel resides
    within this architecture, which will be discussed in detail shortly.

                        </t>

<figure align="center" anchor="Fig1" title="PWE3 VCCV Operation Reference Model">
<preamble></preamble>
<artwork>
<![CDATA[      |<-------------- Emulated Service ---------------->|
      |          |<---------- VCCV ---------->           |
      |          |<------- Pseudowire ------->|          |
      |          |                            |          |
      |          |    |<-- PSN Tunnel -->|    |          |
      |          V    V                  V    V          |
      V    AC    +----+                  +----+     AC   V
+-----+    |     | PE1|==================| PE2|     |    +-----+
|     |----------|............PW1.............|----------|     |
| CE1 |    |     |    |                  |    |     |    | CE2 |
|     |----------|............PW2.............|----------|     |
+-----+  ^ |     |    |==================|    |     | ^  +-----+
      ^  |       +----+                  +----+     | |  ^
      |  |   Provider Edge 1         Provider Edge 2  |  |
      |  |                                            |  |
Customer |                                            | Customer
Edge 1   |                                            | Edge 2
         |                                            |
         |                                            |
   Native service                               Native service]]>
</artwork>
<postamble></postamble>
</figure>

                        <t>

    From <xref target="Fig1"/>, Customer Edge (CE) routers CE1 and CE2 are attached 
    to the emulated service via Attachment Circuits (ACs), and to each 
    of the Provider Edge (PE) routers (PE1 and PE2, respectively). An AC 
    can be a Frame Relay Data Link Connection Identifier (DLCI), an
    ATM Virtual Path Identifier / Virtual Channel Identifier (VPI/VCI), an Ethernet port, etc.  
    The PE devices provide pseudowire emulation, enabling the CEs to 
    communicate over the PSN. A pseudowire exists between these PEs 
    traversing the provider network.  VCCV provides several means of 
    creating a control channel over the PW, between PE routers that 
    attach the PW.
                        </t>
                        <t>

    <xref target="Fig2"/> depicts how the VCCV control channel is associated with the
    pseudowire protocol stack.

                        </t>

<figure align="center" anchor="Fig2" title="PWE3 Protocol Stack Reference Model including the VCCV Control Channel">
<preamble></preamble>
<artwork>
<![CDATA[+-------------+                                +-------------+
|  Layer2     |                                |  Layer2     |
|  Emulated   |       < Emulated Service >     |  Emulated   |
|  Services   |                                |  Services   |
+-------------+                                +-------------+
|             |            VCCV/PW             |             |
|Demultiplexer|       < Control Channel >      |Demultiplexer|
+-------------+                                +-------------+
|    PSN      |          < PSN Tunnel >        |    PSN      |
+-------------+                                +-------------+
|  Physical   |                                |  Physical   |
+-----+-------+                                +-----+-------+
      |                                              |
      |             ____     ___       ____          |
      |           _/    \___/   \    _/    \__       |
      |          /               \__/         \_     |
      |         /                               \    |
      +--------|      MPLS or IP Network         |---+
                \                               /
                 \   ___      ___     __      _/
                  \_/   \____/   \___/  \____/]]>
</artwork>
<postamble></postamble>
</figure>

                        <t>

    Vccv messages are encapsulated using the PWE3 encapsulation as
    described in Sections <xref target="MPLS-CC" format="counter"/>
    and <xref target="L2TPv3-CC" format="counter"/>, so that they are
    handled and processed in the same manner (or in some cases, a
    similar manner) as the PW PDUs for which they a provide control
    channel.  
<!-- [rfced] Does the edited text convey the intended meaning?

original:
   VCCV messages are encapsulated using the PWE3 encapsulation as
   described in Section 5 and Section 6, in a manner that causes these
   messages to be handled and processed in the same manner as, or in
   some cases similar to, the PW PDUs for which it provides a control
   channel. 

suggested (as edited above):
    VCCV messages are encapsulated using the PWE3 encapsulation as
    described in Sections 5 and 6, so that they are handled and
    processed in the same manner (or in some cases, a similar manner)
    as the PW PDUs for which they a provide control channel.
-->
    These VCCV messages are exchanged only after the
    capability (expressed as two VCCV type spaces, namely the VCCV
    control channel and connectivity verification types) and desire to
    exchange such traffic has been advertised between the PEs (see
    Sections <xref target="MPLS-CC.3" format="counter"/> and
    <xref target="L2TPv3-CC.3" format="counter"/>), and VCCV types
    chosen.

                              </t>

                <section anchor="Req" title="Specification of Requirements">
                    <t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;,
                    &quot;REQUIRED&quot;, &quot;SHALL&quot;,
                    &quot;SHALL NOT&quot;, &quot;SHOULD&quot;,
                    &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;,
                    &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document
                    are to be interpreted as described in <xref
                    target="RFC2119"/>.
                    </t>


                </section> <!-- EO Req -->

</section>


                <section anchor="Acronyms"
                 title="Abbreviations">
                        <t>
<list style='hanging' hangIndent="8">
        <t hangText="AC">
Attachment Circuit <xref target="RFC3985"/>.
	</t>
        <t hangText="AVP">
Attribute Value Pair <xref target="RFC3931"/>.
	</t>
        <t hangText="CC">
Control Channel (used as CC Type).
	</t>
        <t hangText="CE">
Customer Edge.
	</t>
        <t hangText="CV">
Connectivity Verification (used as CV Type).
	</t>
        <t hangText="CW">
Control Word <xref target="RFC3985"/>.
	</t>
        <t hangText="L2SS">
L2-Specific Sublayer <xref target="RFC3931"/>.
	</t>
        <t hangText="LCCE">
L2TP Control Connection Endpoint <xref target="RFC3931"/>.
	</t>
        <t hangText="OAM">
Operation and Maintenance.
	</t>
        <t hangText="PE">
Provider Edge.
	</t>
        <t hangText="PSN">
Packet Switched Network <xref target="RFC3985"/>.
	</t>
        <t hangText="PW">
Pseudowire <xref target="RFC3985"/>.
	</t>
        <t hangText="PW-ACH">
PW Associated Channel Header <xref target="RFC4385"/>.
	</t>
        <t hangText="VCCV">
Virtual Circuit Connectivity Verification.
	</t>
</list>
                        </t>

                </section> <!-- EO Intro -->

                <section anchor="Overview"
                 title="Overview of VCCV">
                        <t>

   The goal of VCCV is to verify and further diagnose the pseudowire 
   forwarding path. To this end, VCCV is comprised of different 
   components: 

<list style="symbols">
<t>a means of signaling VCCV capabilities to a peer PE, </t>
<t>an 
   encapsulation for the VCCV control channel messages that allows the 
   receiving PE to intercept, interpret, and process them locally as OAM 
   messages, and</t>
<t>specifications for the operation of the various VCCV 
   operational modes transmitted within the VCCV messages.</t>
</list>

                              </t>
                              <t>

   When a pseudowire is first signaled using the Label Distribution 
   Protocol 
<xref target="RFC4447"/> or the Layer Two Tunneling Protocol version 3 (L2TPv3)
<xref target="RFC3931"/>,
a message is sent from the initiating PE to a receiving PE 
   requesting that a pseudowire be set up. This message has been extended 
   to include VCCV capability information (see
<xref target="CC-CV-Types"/>).  The VCCV 
   capability information indicates to the receiving PE which 
   combinations of Control Channel (CC) and Connectivity Verification 
   (CV) types it is capable of receiving.  If the receiving PE agrees to 
   establish the PW, it will return its capabilities in the subsequent 
   signaling message to indicate which CC and CV types it is capable of 
   processing.  Precedence rules for which CC and CV type to choose in 
   cases where more than one is specified in this message are defined in 
   <xref target="Capa"/> in this document.

                              </t>
                              <t>

   Once the PW is signaled, data for the PW will flow between the PEs 
   terminating the PW. At this time, the PEs can begin transmitting VCCV 
   messages based on the CC and CV type combinations just  discussed.  
   To this end, VCCV defines an encapsulation for these messages that 
   identifies them as belonging to the control channel for the PW. This 
   encapsulation is designed to both allow the control channel to be 
   processed functionally in the same manner as the data traffic for the 
   PW in order to faithfully test the data plane for the PE, and allow 
   the PE to intercept and process these VCCV messages instead of 
   forwarding them out of the AC towards the CE as if they were data traffic.
   In this way, the most 
   basic function of the VCCV control channel is to  verify connectivity 
   of the pseudowire and the data plane used to transport the data path 
   for the pseudowire.  It should be noted that because of the number of 
   combinations of optional and mandatory data plane encapsulations for 
   PW data traffic, VCCV defines a number of control channel (CC) and 
   connectivity verification (CV) types in order to support as many of 
   these as possible.  While designed to support most of the existing 
   combinations (both mandatory and optional), VCCV does define a default 
   CC and CV type combination for each PSN type, as will be described in 
   detail later in this document.

                              </t>
                              <t>

   VCCV can be used both as a fault detection and/or a diagnostic tool 
   for pseudowires. For example, an operator can periodically invoke 
   VCCV on a timed, on-going basis for proactive connectivity 
   verification on an active pseudowire, or on an ad hoc or as-needed 
   basis as a means of manual connectivity verification.  When invoking 
   VCCV, the operator triggers a combination of one of its various 
   CC types and one of its various CV types. The CV types include LSP Ping 
<xref target="RFC4379"/> for MPLS 
   PWs, and ICMP Ping 
<xref target="RFC0792"/> 
<xref target="RFC4443"/> for both MPLS and L2TPv3 PWs.  
   We define a matrix of acceptable CC and CV type  combinations further 
   in this specification.

                              </t>
                              <t>

   The control channel maintained by VCCV can additionally carry fault 
   detection status between the endpoints of the pseudowire.  
   Furthermore, this information can then be translated into the native 
   OAM status codes used by the native access technologies, such as ATM,  
   Frame-Relay or Ethernet.  The specific details of such status 
   interworking is out of the scope of this document, and is only noted 
   here to illustrate the utility of VCCV for such purposes.  More 
   complete details can be found in 
<xref target="MSG-MAP"/> and 
<xref target="RFC4447"/>.

                              </t>
                      </section> <!-- EO Overview -->

                      <section anchor="CC-CV-Types"
                       title="CC Types and CV Types">
                              <t>

   The VCCV Control Channel (CC) type defines several possible 
   types of control channel that VCCV can support. These control 
   channels can in turn carry several types of protocols defined by the 
   Connectivity Verification (CV) type. VCCV potentially supports 
   multiple CV types concurrently, but it only supports the use of a 
   single CC type.  

<!-- [rfced] Please address the inconsistent capitalization of 
"Type" following "CC" and "CV" throughout the document.  
Suggest making all lowercase, except when referring to the field name 
(e.g., "Control Channel Type field", "CC Types field",
and "Connectivity Verification (CV) Types field").-->

The specific type or types of VCCV packets that can 
   be accepted and sent by a router are indicated during capability 
   advertisement as described in Sections
<xref target="MPLS-CC.3" format="counter"/> and
   <xref target="L2TPv3-CC.3" format="counter"/>. The 
   various VCCV CV types supported are used only when they apply to the 
   context of the PW demultiplexer in use.  For example, LSP Ping type 
   should only be used when MPLS is utilized as the PSN.

                              </t>
                              <t>

   Once a set of VCCV capabilities is received and advertised, a CC Type 
   and CV Type(s) that match both the received and transmitted 
   capabilities can be selected.  That is, a PE router needs to only 
   allow Types that are both received and advertised to be selected, 
   performing a logical AND between the received and transmitted bitflag 
   fields.  The specific CC Type and CV Type(s) are then chosen within 
   the constraints and rules specified in <xref target="Capa"/>.
Once a specific CC 
   Type has been chosen (i.e., it matches both the transmitted and 
   received VCCV CC capability), transmitted and replied to, this CC 
   Type MUST be the only one used until such time as the pseudowire is 
   re-signaled.  In addition, based on these rules and the procedures 
   defined in Section 5.2 of 
<xref target="RFC4447"/>, the pseudowire MUST be 
   re-signaled if a different set of capabilities types is desired.  The 
   relevant portion of Section 5.2 of 
<xref target="RFC4447"/> is:

<list hangIndent="6" style="empty"><t>

       Interface Parameter Sub-TLV
</t>
<t>
          Note that as the "interface parameter sub-TLV" is part of the 
          FEC, the rules of LDP make it impossible to change the 
          interface parameters once the pseudowire has been set up.

</t></list>

   The CC and CV type indicator fields are defined as 8-bit bitmasks 
   used to indicate the specific CC or CV type or types (i.e., none, one,
   or more) of control channel packets that may be sent on the VCCV 
   control channel. These values represent the numerical value 
   corresponding to the actual bit being set in the bitfield. The 
   definition of each CC and CV Type is dependent on the PW type 
   context, either  MPLS or L2TPv3, within which it is defined.

                              </t>
                              <t>
   Control Channel (CC) Types:

<list hangIndent="3" style="empty"><t>
The defined values for CC Types for MPLS PWs are:
<figure>
<preamble></preamble>
<artwork>      MPLS Control Channel (CC) Types:

      Bit (Value)    Description
      ============   ==========================================
      Bit 0 (0x01) - Type 1: PWE3 Control Word with 0001b as
                     first nibble (PW-ACH, see [RFC4385])
      Bit 1 (0x02) - Type 2: MPLS Router Alert Label
      Bit 2 (0x04) - Type 3: MPLS PW Label with TTL == 1
      Bit 3 (0x08) - Reserved
      Bit 4 (0x10) - Reserved
      Bit 5 (0x20) - Reserved
      Bit 6 (0x40) - Reserved
      Bit 7 (0x80) - Reserved
</artwork>
<postamble></postamble>
</figure>
The defined values for CC Types for L2TPv3 PWs are:
<figure>
<preamble></preamble>
<artwork>      L2TPv3 Control Channel (CC) Types:

      Bit (Value)    Description
      ============   ==========================================
      Bit 0 (0x01) - L2-Specific Sublayer with V-bit set
      Bit 1 (0x02) - Reserved
      Bit 2 (0x04) - Reserved
      Bit 3 (0x08) - Reserved
      Bit 4 (0x10) - Reserved
      Bit 5 (0x20) - Reserved
      Bit 6 (0x40) - Reserved
      Bit 7 (0x80) - Reserved
</artwork>
<postamble></postamble>
</figure>
</t></list>

                              </t>
                              <t>
   Connectivity Verification (CV) Types:

<list hangIndent="3" style="empty"><t>
The defined values for CV Types for MPLS PWs are:
<figure>
<preamble></preamble>
<artwork>      MPLS Connectivity Verification (CV) Types:

      Bit (Value)    Description
      ============   ==========================================
      Bit 0 (0x01) - ICMP Ping
      Bit 1 (0x02) - LSP Ping
      Bit 2 (0x04) - Reserved
      Bit 3 (0x08) - Reserved
      Bit 4 (0x10) - Reserved
      Bit 5 (0x20) - Reserved
      Bit 6 (0x40) - Reserved
      Bit 7 (0x80) - Reserved
</artwork>
<postamble></postamble>
</figure>
The defined values for CV Types for L2TPv3 PWs are:
<figure>
<preamble></preamble>
<artwork>      L2TPv3 Connectivity Verification (CV) Types:

      Bit (Value)    Description
      ============   ==========================================
      Bit 0 (0x01) - ICMP Ping
      Bit 1 (0x02) - Reserved
      Bit 2 (0x04) - Reserved
      Bit 3 (0x08) - Reserved
      Bit 4 (0x10) - Reserved
      Bit 5 (0x20) - Reserved
      Bit 6 (0x40) - Reserved
      Bit 7 (0x80) - Reserved
</artwork>
<postamble></postamble>
</figure>
</t></list>

   If none of the types above are supported, the entire CC and CV Type 
   Indicator fields SHOULD be transmitted as 0x00 (i.e., all bits in the 
   bitfield set to 0) to indicate this to the peer.

                        </t>
                        <t>

   If no capability is signaled, then the peer MUST assume that the peer 
   has no VCCV capability and follow the procedures specified in this 
   document for this case.
                        </t>
                </section> <!-- EO CC CV Types -->

                <section anchor="MPLS-CC"
                 title="VCCV Control Channel for MPLS PSN">
                        <t>
   When MPLS is used to transport PW packets, VCCV packets are carried 
   over the MPLS LSP as defined in this section.  In order to apply IP 
   monitoring tools to a PW, an operator may configure VCCV as a control 
   channel for the PW between the PE's endpoints 
<xref target="RFC3985"/>.  Packets sent 
   across this channel from the source PE towards the destination PE 
   either as in-band traffic with  the PW's data, or out-of-band. In all 
   cases, the control channel traffic is not forwarded past the PE 
   endpoints towards the Customer Edge (CE) devices; instead, VCCV 
   messages are intercepted at the PE endpoints for exception 
   processing.
                       </t>
                <section anchor="MPLS-CC.1"
                 title="VCCV Control Channel Types for MPLS">
                        <t>

   As already described in <xref target="CC-CV-Types"/>,
the capability of which control 
   channel types (CC Type) are supported is advertised by a PE.  Once 
   the receiving PE has chosen a CC Type mode to use, it MUST continue 
   using this mode until such time as the PW is re-signaled.  Thus, if a 
   new CC type is desired, the PW must be torn-down and re-established.

                              </t>
                              <t>

   Ideally, such a control channel would be completely in-band (i.e., 
   following the same data-plane faith as PW data). 
 
<!-- [rfced] "data plane" and "dataplane" were used both as an
adjective and a noun in the original (e.g., third paragraph of the
Security Considerations). Have changed it to "data-plane" (hyphenated)
when used as an adjective. Note that "control plane" was consistently
not hyphenated when used as an adjective. -->

When a control word 
   is present on the PW, it is possible to indicate the  control channel 
   by setting a bit in the control word header (see
<xref target="MPLS-CC.1.1"/>).

                              </t>
                              <t>

   <xref target="MPLS-CC.1.1"/> through <xref target="MPLS-CC.1.3"/>
   describe each of the currently defined VCCV 
   Control Channel Types (CC Types).

                              </t>
                <section anchor="MPLS-CC.1.1"
                 title="In-Band VCCV (Type 1)">

                              <t>

   CC Type 1 is also referred to as "PWE3 Control Word with 0001b as 
   first nibble". It uses the PW Associated Channel Header (PW-ACH); see 
   Section 5 of 
<xref target="RFC4385"/>.
   
                              </t>
                              <t>

   The PW set-up protocol 
<xref target="RFC4447"/> determines whether a PW uses a 
   control word. When a control word is used, and that CW uses the 
   "Generic PW MPLS Control Word" format (see Section 3 of 
<xref target="RFC4385"/>), a 
   Control Channel for use of VCCV messages can be created by using the 
   PW Associated Channel CW format (see Section 5 of 
<xref target="RFC4385"/>).

                              </t>
                              <t>

   The PW Associated Channel for VCCV control channel traffic is defined 
   in 
<xref target="RFC4385"/> as shown in <xref target="Fig3"/>:

                              </t>
<figure align="center" anchor="Fig3" title="PW Associated Channel Header">
<preamble></preamble>
<artwork>
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
|0 0 0 1|Version|   Reserved    |         Channel Type          | 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
</artwork>
<postamble></postamble>
</figure>

                        <t>

   The first nibble is set to 0001b to indicate a channel associated
   with a pseudowire (see Section 5 of 
<xref target="RFC4385"/> and Section 3.6 of 
<xref target="RFC4446"/>).
The Version and the Reserved fields are set to 0, and 
   the Channel Type is set to 0x0021 for IPv4 and 0x0057 for IPv6 
   payloads.
                              </t>
                              <t>

   For example, <xref target="Fig4"/> shows how the Ethernet 
<xref target="RFC4448"/> PW-ACH 
   would be received containing an LSP Ping payload corresponding to a 
   choice of CC Type of 0x01 and a CV Type of 0x02:

                              </t>
<figure align="center" anchor="Fig4" title="PW Associated Channel Header for VCCV">
<preamble></preamble>
<artwork>
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0 0 0 1|0 0 0 0|0 0 0 0 0 0 0 0|   0x21 (IPv4) or 0x57 (IPv6)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
<postamble></postamble>
</figure>

                        <t>

   It should be noted that although some PW types are not required to 
   carry the control word, this type of VCCV can only be used for those 
   PW types that do employ the control word when it is in use.  Further, 
   this CC Type can only be used if the PW CW follows the "Generic PW 
   MPLS Control Word" format. This mode of VCCV operation MUST be 
   supported when the control word is present.
                              </t>
	</section> <!-- MPLS-CC.1.1 -->
	<section anchor="MPLS-CC.1.2"
	 title="Out-of-Band VCCV (Type 2)">
		<t>

CC Type 2 is also referred to as "MPLS Router Alert Label".

		      </t>
		      <t>

A VCCV control channel can alternatively be created by using the MPLS 
router alert label 
<xref target="RFC3032"/> immediately above the PW label.  It 
should be noted that this approach could result in a different Equal 
Cost Multi-Path (ECMP) hashing behavior than pseudowire PDUs, and 
thus result in the VCCV control channel traffic taking a path which 
differs from that of the actual data traffic under test. Please see 
Section 2 of 
<xref target="RFC4928"/>.

		      </t>
		      <t>

CC Type 2 can be used whether the PW is set-up with a Control Word 
present or not.

		      </t>
		      <t>

This is the preferred mode of VCCV operation when the Control Word
is not present.

		      </t>
		      <t>

If the Control Word is in use on this PW, it MUST also be included 
before the VCCV message. This is done to avoid the different ECMP 
hashing behavior.  In this case, the CW uses the PW-ACH format 
described in <xref target="MPLS-CC.1.1"/> (see Figures
<xref target="Fig3" format="counter"/> and <xref target="Fig4" format="counter"/>). If the 
Control Word is not in use on this PW, the VCCV message follows 
 the PW Label directly.

		      </t>
	</section> <!-- MPLS-CC.1.2 -->
	<section anchor="MPLS-CC.1.3"
	 title="TTL Expiry VCCV (Type 3)">

		      <t>

CC Type 3 is also referred to as "MPLS PW Label with TTL == 1".

		      </t>
		      <t>

The TTL of the PW label can be set to 1 to force the packet to be 
processed within the destination router's control plane. This 
approach could also result in a different ECMP hashing behavior and 
VCCV messages taking a different path than the PW data traffic.

		      </t>
		      <t>

CC Type 3 can be used whether the PW is set-up with a Control Word 
present or not.

		      </t>
		      <t>

If the Control Word is in use on this PW, it MUST also be included 
before the VCCV message. This is done to avoid the different ECMP 
hashing behavior.  In this case, the CW uses the PW-ACH format 
described in <xref target="MPLS-CC.1.1"/> (see Figures
<xref target="Fig3" format="counter"/> and <xref target="Fig4" format="counter"/>). If the 
Control Word is not in use on this PW, the VCCV message follows 
 the PW Label directly.

		      </t>
	</section> <!-- MPLS-CC.1.3 -->
	</section> <!-- MPLS-CC.1 -->
	<section anchor="MPLS-CC.2"
	 title="VCCV Connectivity Verification Types for MPLS">


	<section anchor="MPLS-CC.2.1"
	 title="ICMP Ping">

		      <t>

When this optional connectivity verification mode is used, an ICMP 
Echo packet using the encoding specified in 
<xref target="RFC0792"/> (ICMPv4) or 
<xref target="RFC4443"/> (ICMPv6) achieves connectivity verification.  
Implementations MUST use ICMPv4 
<xref target="RFC0792"/> if the signaling for VCCV 
used IPv4 addresses, or ICMPv6 
<xref target="RFC4443"/> if IPv6 addresses
were used. If the pseudowire is set up statically, then the encoding
MUST use that which was used for the pseudowire in the   
configuration.

		      </t>
	</section> <!-- MPLS-CC.2.1 -->
	<section anchor="MPLS-CC.2.2"
	 title="MPLS LSP Ping">

		      <t>

The LSP Ping header MUST be used in accordance with 
<xref target="RFC4379"/> 
and MUST also contain the target FEC Stack containing the 
sub-TLV of 8 for the "L2 VPN endpoint", 9 (deprecated), 10 for 
"FEC 128 Pseudowire", or 11 for the "FEC 129 Pseudowire". The 
sub-TLV indicates the PW to be verified.

		      </t>
	</section> <!-- MPLS-CC.2.2 -->
	</section> <!-- MPLS-CC.2 -->
	<section anchor="MPLS-CC.3"
	 title="VCCV Capability Advertisement for MPLS PSN">

		      <t>

To permit the indication of the type or types of PW control 
channel(s) and connectivity verification mode or modes over a 
particular PW, a VCCV parameter is defined in 
<xref target="MPLS-CC.3.1"/> that is 
used as part of the PW establishment signaling.  When a PE signals a 
PW and desires PW OAM for that PW, it MUST indicate this during PW 
establishment using the messages defined in <xref target="MPLS-CC.3.1"/>.  
Specifically, the PE MUST include the VCCV interface parameter 
sub-TLV (0x0C) assigned in 
<xref target="RFC4446"/> in the PW setup message 
<xref target="RFC4447"/>.

		      </t>
		      <t>

The decision of the type of VCCV control channel is left completely
to the receiving control entity, although the set of choices is 
given by the sender in that it indicates the type or types of
control channels and connectivity verification types that it can 
understand.  The receiver SHOULD choose a single Control Channel type 
from the match between the choices sent and received, based on the 
capability advertisement selection specified in 
<xref target="Capa"/>, and it 
MUST continue to use this type for the duration of the life of the 
control channel.  Changing Control Channel types after one has been 
established to be in use could potentially cause problems at the 
receiving end and could also lead to interoperability issues; thus, 
it is NOT RECOMMENDED.

		      </t>
		      <t>

When a PE sends a label mapping message for a PW, it uses 
the VCCV parameter to indicate the type of OAM control channels 
and connectivity verification type or types it is willing to receive 
and can send on that PW. A remote PE MUST NOT send VCCV messages 
before the capability of supporting a control channel or channels, and 
connectivity type or types to be used over that control channel or 
channels is signaled, and then it can do so only on a control 
channel, and using connectivity verification type or types from the 
ones indicated.

<!-- [rfced] Suggested alternate text to improve readability.
Does it convey your intended meaning?

A remote PE MUST NOT send VCCV messages before the capability of
supporting the control channel(s) (and connectivity type(s) to be used
over them) are signaled. Then, it can do so only on a control channel
and using the connectivity verification type(s) from the ones
indicated.
-->

		      </t>
		      <t>

If a PE receives VCCV messages prior to advertising capability for
this message, it MUST discard these messages and not reply to them.
In this case, the PE SHOULD increment an error counter and optionally
issue a system and/or SNMP notification to indicate to the system
administrator that this condition exists.

		      </t>
		      <t>

When LDP is used as the PW signaling protocol, the requesting PE 
indicates its configured VCCV capability or capabilities to the 
remote PE by including the VCCV parameter with appropriate options in 
the VCCV interface parameter sub-TLV field of the PW ID FEC TLV (FEC 
128) or in the interface parameter sub-TLV of the Generalized PW ID
FEC TLV (FEC 129). These options indicate which control channel and 
connectivity verification types it supports.  The requesting PE MAY 
indicate that it supports multiple control channel options, and in 
doing so, it agrees to support any and all indicated types if transmitted 
to it.  However, it  MUST do so in accordance with the rules stipulated in 
<xref target="MPLS-CC.3.1"/> (VCCV Capability Advertisement Sub-TLV.)

		      </t>
		      <t>

Local policy may direct the PE to support certain OAM capability and
to indicate it. The absence of the VCCV parameter indicates that no
OAM functions are supported by the requesting PE, and thus the
receiving PE MUST NOT send any VCCV control channel traffic to it.
The reception of a VCCV parameter with no options set MUST be 
ignored as if one is not transmitted at all.

		      </t>
		      <t>

The receiving PE similarly indicates its supported control channel 
types in the label mapping message.  These may or may not be the same 
as the ones that were sent to it.  The sender should examine the set 
that is returned to understand which control channels it may 
establish with the remote peer, as specified in Sections  
<xref target="CC-CV-Types" format="counter"/> and <xref target="Capa" format="counter"/>.
Similarly, it MUST NOT send control channel traffic to the remote 
PE for which the remote PE has not indicated it supports. 


		      </t>

	<section anchor="MPLS-CC.3.1"
	 title="VCCV Capability Advertisement LDP Sub-TLV">

		      <t>

<xref target="RFC4447"/>
defines an Interface Parameter Sub-TLV in the LDP PW ID
FEC (FEC 128) and an Interface Parameters TLV in the LDP Generalized
PW ID FEC (FEC 129) to signal different capabilities for specific
PWs. An optional sub-TLV parameter is defined to indicate the
capability of supporting none, one, or more control channel and 
connectivity verification types for VCCV. This is the VCCV parameter 
field.  If FEC 128 is used, the VCCV parameter field is carried in 
the Interface Parameter sub-TLV field. If FEC 129 is used, it is 
carried as an Interface Parameter sub-TLV in the Interface Parameters 
TLV.

		</t>

<figure>
<preamble>The VCCV parameter ID is defined as follows in <xref target="RFC4446"/>:</preamble>
<artwork>
Parameter ID   Length     Description
  0x0c           4           VCCV
</artwork>
<postamble></postamble>
</figure>


<figure>
<preamble>The format of the VCCV parameter field is as follows:</preamble>
<artwork>
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      0x0c     |       0x04    |   CC Types    |   CV Types    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
<postamble></postamble>
</figure>

		      <t>

The Control Channel type field (CC Types) defines a bitmask used to
indicate the type of control channel(s) (i.e., none, one, or more)
that a router is capable of receiving control channel traffic on. 
If more than one control channel is specified, the router agrees 
to accept control traffic over either control channel; however, see 
the rules specified in Sections
<xref target="CC-CV-Types" format="counter"/> and <xref target="Capa" format="counter"/> for more details.
If none of the types are supported, a CC Type Indicator of 0x00 
SHOULD be transmitted to indicate this to the peer. However, 
if no capability is signaled, then the PE MUST assume that its 
peer is incapable of receiving any of the VCCV CC Types and 
MUST NOT send any OAM control channel traffic to it. Note that
the CC and CV types definitions are consistent regardless of
the PW's transport or access circuit type. The CC and CV type values
are defined in <xref target="CC-CV-Types"/>.

		      </t>
	</section> <!-- MPLS-CC.3.1 -->
	</section> <!-- MPLS-CC.3 -->
	</section> <!-- MPLS-CC -->
	<section anchor="L2TPv3-CC"
	 title="VCCV Control Channel for L2TPv3/IP PSN">

		      <t>

When L2TPv3 is used to set up a PW over an IP PSN, VCCV packets are
carried over the L2TPv3 session as defined in this section.  L2TPv3
provides a "Hello" keepalive mechanism for the L2TPv3 control plane
that operates in-band over IP or UDP (see Section 4.4 of 
<xref target="RFC3931"/>).
This built-in Hello facility provides dead peer and path detection
only for the group of sessions associated with the L2TP Control
Connection. VCCV, however, allows individual L2TP sessions to be
tested. This provides a more granular mechanism which can be used to
troubleshoot potential problems within the data plane of L2TP
endpoints themselves, or to provide additional connection status of
individual pseudowires.

		</t>
		<t>

The capability of which control channel type (CC Type) to use is
advertised by a PE to indicate which of the potentially various
control channel types are supported. Once the receiving PE
has chosen a mode to use, it MUST continue using this mode
until such time as the PW is re-signaled. Thus, if a new CC
type is desired, the PW must be torn down and re-established.

		</t>

                              <t>

   An LCCE sends VCCV messages on an L2TPv3-signaled pseudowire for
   fault detection and diagnostic of the L2TPv3 session.  The VCCV
   message travels in-band with the Session and follows the exact same
   path as the user data for the session, because the IP header and
   L2TPv3 Session header are identical.  The egress LCCE of the L2TPv3
   session intercepts and processes the VCCV message, and verifies the
   signaling and forwarding state of the pseudowire on reception of the
   VCCV message.
   It is to be noted that the VCCV mechanism for L2TPv3 is
   primarily targeted at verifying the pseudowire forwarding and
   signaling state at the egress LCCE. It also helps when L2TPv3 Control
   Connection and Session paths are not identical.

                              </t>

        <section anchor="L2TPv3-CC.1"
         title="VCCV Control Channel Type for L2TPv3">

		<t>

In order to carry VCCV messages within an L2TPv3 session data packet,
the PW MUST be established such that an L2-Specific Sublayer (L2SS)
that defines the V-bit is present.  This document defines the V-bit
for the Default L2-Specific Sublayer 
<xref target="RFC3931"/> and the ATM-Specific
Sublayer 
<xref target="RFC4454"/> using the Bit 0 position (see Sections
<xref target="IANA.3.2" format="counter"/> and <xref target="IANA.3.3" format="counter"/>).
The L2-Specific Sublayer presence and type (either
the Default or a PW-Specific L2SS) is signaled via the L2-Specific
Sublayer AVP, Attribute Type 69, as defined in 
<xref target="RFC3931"/>.  The V-bit
within the L2-Specific Sublayer is used to identify that a VCCV
message follows, and when the V-bit is set the L2SS has the 
format shown in <xref target="Fig5"/>:

		</t>

<figure align="center" anchor="Fig5" title="L2-Specific Sublayer Format when the V-bit (bit 0) is set">
<preamble></preamble>
<artwork>
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1|0 0 0|Version|   Reserved    |         Channel Type          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
<postamble></postamble>
</figure>


		<t>

The VCCV messages are distinguished from user data by the V-bit.  The
V-bit is set to 1, indicating that a VCCV session message follows.
The next three bits MUST be set to 0 when sending and ignored upon
receipt. The remaining fields comprising 28 bits (i.e., Version,
Reserved, and Channel Type) follow the same definition, format, and
number registry from Section 5 of 
<xref target="RFC4385"/>.

		</t>
		<t>

The Version and Reserved fields are set to 0. For the CV Type 
currently defined of ICMP Ping (0x01), the Channel Type can indicate 
IPv4 (0x0021) or IPv6 (0x0057) (see 
<xref target="RFC4385"/>) as the VCCV payload 
directly following the L2SS.

		</t>

        </section> <!-- L2TPv3-CC.1 -->
	<section anchor="L2TPv3-CC.2"
	 title="VCCV Connectivity Verification Type for L2TPv3">

		<t>

The VCCV message over L2TPv3 directly follows the L2-Specific
Sublayer with the V-bit set.  It MUST contain an ICMP Echo
packet as described in <xref target="L2TPv3-CC.2.1"/>.

		</t>

	<section anchor="L2TPv3-CC.2.1"
	 title="L2TPv3 VCCV using ICMP Ping">

		<t>

When this connectivity verification mode is used, an ICMP Echo packet 
using the encoding specified in 
<xref target="RFC0792"/> for (ICMPv4) or 
<xref target="RFC4443"/> 
(for ICMPv6) achieves connectivity verification. Implementations MUST 
use ICMPv4 
<xref target="RFC0792"/> if the signaling for the L2TPv3 PW used IPv4 
addresses, or ICMPv6 
<xref target="RFC4443"/> if IPv6 addresses were used. If the 
pseudowire  is setup statically, then the encoding MUST use that 
which was used for the pseudowire in the configuration.

		      </t>
		      <t>

The ICMP Ping packet directly follows the L2SS with the V-bit  set.  
In the ICMP Echo request, the IP Header fields MUST have the 
following  values: the destination IP address is set to the remote 
LCCE's IP address for the tunnel endpoint, the source IP address is 
set to the local LCCE's IP address for the tunnel endpoint, and the 
TTL or Hop Limit is set  to 1.

		      </t>

                </section> <!-- L2TPv3-CC.2.1 -->
                </section> <!-- L2TPv3-CC.2 -->
                <section anchor="L2TPv3-CC.3"
                 title="L2TPv3 VCCV Capability Advertisement for L2TPv3">


                              <t>


   A new optional AVP is defined in 
<xref target="L2TPv3-CC.3.1"/> to indicate the 
   VCCV capabilities during session establishment.  An LCCE MUST signal
   its desire to use connectivity verification for a particular L2TPv3
   session and its VCCV capabilities using the VCCV Capability AVP.

                      </t>
                              <t>

   An LCCE MUST NOT send VCCV packets on an L2TPv3 session unless it has
   received VCCV capability by means of the VCCV Capability AVP from the
   remote end.  If an LCCE receives VCCV packets and it's not VCCV
   capable or it has not sent VCCV capability indication to the remote
   end, it MUST discard these messages.  It should also increment an
   error counter. In this case the LCCE MAY optionally issue a system
   and/or SNMP notification.


                              </t>

                <section anchor="L2TPv3-CC.3.1"
                 title="L2TPv3 VCCV Capability AVP">


                              <t>

   The "VCCV Capability AVP", Attribute type 96, specifies the
   VCCV capabilities as a pair of bitflags for the Control Channel
   (CC) and Connectivity Verification (CV) Types.  This AVP is
   exchanged during session establishment (in ICRQ (Incoming Call
   Request), ICRP (Incoming Call Response), OCRQ (Outgoing Call
   Request), or OCRP (Outgoing Call Response) messages). The value
   field has the following format:

                              </t>

                        <figure>
                                <preamble>
   VCCV Capability AVP (ICRQ, ICRP, OCRQ, OCRP)
                                </preamble>
                                <artwork>
    0                   1
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   CC Types    |   CV Types    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                </artwork>
                                <postamble></postamble>
                        </figure>
                              <t>
   CC Types:
<list hangIndent="3" style="empty"><t>

      The Control Channel (CC) Types field defines a bitmask used to
      indicate the type of control channel(s) that may be used to
      receive OAM traffic on for the given Session.  The router agrees
      to accept VCCV traffic at any time over any of the signaled VCCV
      control channel types.  CC Type values are defined in 
<xref target="CC-CV-Types"/>.
      Although there is only one value defined in this document, the CC
      Types field is included for forward compatibility should further
      CC Types need to be defined in the future.

</t><t>

      A CC Type of 0x01 may only be requested when there is an
      L2-Specific Sublayer that defines the V-bit present. If a CC Type
      of 0x01 is requested without requesting an L2-Specific Sublayer
      AVP with an L2SS type that defines the V-bit, the session MUST be
      disconnected with a Call-Disconnect-Notify (CDN) message.

</t><t>

      If no CC Type is supported, a CC Type Indicator of 0x00 SHOULD be
      sent.
</t></list>

   CV Types:

<list hangIndent="3" style="empty"><t>

      The Connectivity Verification (CV) Types field defines a bitmask
      used to indicate the specific type or types (i.e., none, one, or
      more) of control packets that may be sent on the specified VCCV
      control channel. CV Type values are defined in 
<xref target="CC-CV-Types"/>.

</t></list>

   If no VCCV Capability AVP is signaled, then the LCCE MUST assume that
   the peer is incapable of receiving VCCV and MUST NOT send any OAM
   control channel traffic to it.

</t><t>

   All L2TP AVPs have an M (Mandatory) bit, H (Hidden) bit, Length, and
   Vendor ID. The Vendor ID for the VCCV Capability AVP MUST be 0,
   indicating that this is an IETF-defined AVP.  This AVP MAY be hidden
   (the H bit MAY be 0 or 1).  The M bit for this AVP SHOULD be set to
   0.  The Length (before hiding) of this AVP is 8.


                              </t>

                </section> <!-- L2TPv3-CC.3.1 -->
                </section> <!-- L2TPv3-CC.3 -->

<!-- Moved first para to main L2TPv3-CC, and second para to L2TPv3-CC.3
                <section anchor="L2TPv3-CC.4"
                 title="L2TPv3 VCCV Operation">

[snipped-out]

                </section>
-->
                </section> <!-- L2TPv3-CC -->
                <section anchor="Capa"
                 title="Capability Advertisement Selection">

                              <t>

   When a PE receives a VCCV capability advertisement, the advertisement 
   may potentially contain more than one CC or CV Type. Only matching 
   capabilities can be selected. When multiple capabilities match, only 
   one CC Type MUST be used.
   
                              </t>
                              <t>

   In particular, as already specified, once a valid CC Type is used by 
   a PE (traffic sent using that encapsulation), the PE MUST NOT send 
   any traffic down another CC Type control channel.

                              </t>
                              <t>

   For cases where multiple CC Types are advertised, the following 
   precedence rules apply when choosing the single CC Type to use:

                        <list style="numbers">
<t>
      Type 1: PWE3 Control Word with 0001b as first nibble
</t><t>
      Type 2: MPLS Router Alert Label
</t><t>
      Type 3: MPLS PW Label with TTL == 1
</t></list>

   For MPLS PWs, the CV Type of LSP Ping (0x02) is the default, and the 
   CV Type of ICMP Ping (0x01) is optional.


                              </t>

                </section> <!-- Capa -->
                <section anchor="IANA"
                 title="IANA Considerations">

                <section anchor="IANA.1"
                 title="VCCV Interface Parameters Sub-TLV">
                              <t>

   The VCCV Interface Parameters Sub-TLV codepoint is defined in 
<xref target="RFC4446"/>.
IANA has created and will maintain registries for 
   the CC Types and CV Types (bitmasks in the VCCV Parameter ID). The CC 
   Type and CV Type new registries (see 
Sections <xref target="IANA.1.1" format="counter"/> and
<xref target="IANA.1.2" format="counter"/>,
   respectively) have been created in the Pseudo Wires Name Spaces, 
   reachable from <xref target="IANA.pwe3-parameters"/>.
   The allocations must be done using the "IETF Consensus" policy 
   defined in RFC 2434.

                              </t>
                <section anchor="IANA.1.1"
                 title="Control Channel Types (CC Types)">
                              <t>


   IANA has set up a registry of "VCCV Control Channel
   Types". These are 8-bit values. CC Type values 0x01, 0x02, and
   0x04 are specified in <xref target="CC-CV-Types"/>
of this document. The remaining
   bitfield values (0x08, 0x10, 0x20, 0x40, and 0x80) are to be assigned
   by IANA using the "IETF Consensus" policy defined in 
<xref target="RFC2434"/>.  A
   VCCV Control Channel Type description and a reference to an RFC
   approved by the IESG are required for any assignment from this
   registry.

                              </t>

<figure>
<preamble></preamble>
<artwork>
   MPLS Control Channel (CC) Types:

   Bit (Value)    Description
   ============   ==========================================
   Bit 0 (0x01) - Type 1: PWE3 Control Word with 0001b as
                  first nibble (PW-ACH, see [RFC4385])
   Bit 1 (0x02) - Type 2: MPLS Router Alert Label
   Bit 2 (0x04) - Type 3: MPLS PW Label with TTL == 1
   Bit 3 (0x08) - Reserved
   Bit 4 (0x10) - Reserved
   Bit 5 (0x20) - Reserved
   Bit 6 (0x40) - Reserved
   Bit 7 (0x80) - Reserved
</artwork>
<postamble></postamble>
</figure>


                </section> <!-- IANA.1.1 -->
                <section anchor="IANA.1.2"
                 title="Connectivity Verification Types (CV Types)">
                              <t>


   IANA is requested to set up a registry of "VCCV Control Verification 
   Types".  These are 8-bit values. CV Type values 0x01 and 0x02 
   are specified in <xref target="CC-CV-Types"/>
of this document.  The remaining bitfield 
   values (0x04, 0x08, 0x10, 0x20, 0x40, and 0x80) are to be assigned by 
   IANA using the "IETF Consensus" policy defined in 
<xref target="RFC2434"/>. A VCCV 
   using the "IETF Consensus" policy defined in 
<xref target="RFC2434"/>. A VCCV 
   Control Verification Type description and a reference to an RFC 
   approved by the IESG are required for any assignment from this 
   registry.

                              </t>
<figure>
<preamble></preamble>
<artwork>
   MPLS Connectivity Verification (CV) Types:

   Bit (Value)    Description
   ============   ==========================================
   Bit 0 (0x01) - ICMP Ping
   Bit 1 (0x02) - LSP Ping
   Bit 2 (0x04) - Reserved
   Bit 3 (0x08) - Reserved
   Bit 4 (0x10) - Reserved
   Bit 5 (0x20) - Reserved
   Bit 6 (0x40) - Reserved
   Bit 7 (0x80) - Reserved
</artwork>
<postamble></postamble>
</figure>

                </section> <!-- IANA.1.2 -->
                </section> <!-- IANA.1 -->

                <section anchor="IANA.2"
                 title="PW Associated Channel Type">
                              <t>

   The PW Associated Channel Types used by VCCV as defined in 
Sections <xref target="MPLS-CC.1.1" format="counter"/> and <xref target="L2TPv3-CC.1" format="counter"/>
   rely on previously allocated numbers from 
   the Pseudowire Associated Channel Types Registry 
<xref target="RFC4385"/> in the 
   Pseudo Wires Name Spaces reachable from 
   <xref target="IANA.pwe3-parameters"/>. In particular, 
   0x21 (Internet Protocol version 4) MUST be used whenever an IPv4 
   payload follows the Pseudowire Associated Channel Header, or 0x57 
   MUST be used when an IPv6 payload follows the Pseudowire Associated 
   Channel Header.

                              </t>
                </section> <!-- IANA.2 -->

                <section anchor="IANA.3"
                 title="L2TPv3 Assignments">
                              <t>

   <xref target="IANA.3.1"/> through 
<xref target="IANA.3.3"/> are registrations of new L2TP values for 
   registries already managed by IANA.  
<xref target="IANA.3.4"/> requests a new 
   registry to be added to the existing L2TP name spaces, and be 
   maintained by IANA accordingly. The Layer Two Tunneling Protocol 
   "L2TP" Name Spaces are reachable from 
   <xref target="IANA.l2tp-parameters"/>.

                              </t>
                <section anchor="IANA.3.1"
                 title="Control Message Attribute Value Pairs (AVPs)">
                              <t>


   An additional AVP Attribute is specified in <xref target="L2TPv3-CC.3.1"/>.
  It is
   required to be defined by IANA as described in Section 2.2 of
<xref target="RFC3438"/>.
                              </t>

<figure>
<preamble></preamble>
<artwork>
   Attribute
   Type        Description
   ---------   ----------------------------------
   96          VCCV Capability AVP
</artwork>
<postamble></postamble>
</figure>

                </section> <!-- IANA.3.1 -->
                <section anchor="IANA.3.2"
                 title="Default L2-Specific Sublayer bits">
                              <t>

   The Default L2-Specific Sublayer contains 8 bits in the low-order
   portion of the header.  This document defines one reserved bit in
   the Default L2-Specific Sublayer in 
<xref target="L2TPv3-CC.1"/>, which may be assigned
   by IETF Consensus 
<xref target="RFC2434"/>. It is required to be assigned by IANA.

                              </t>

<figure>
<preamble></preamble>
<artwork>
   Default L2-Specific Sublayer bits - per [RFC3931]
   ---------------------------------
   Bit 0 - V (VCCV) bit
</artwork>
<postamble></postamble>
</figure>

                </section> <!-- IANA.3.2 -->
                <section anchor="IANA.3.3"
                 title="ATM-Specific Sublayer bits">
                              <t>

   The ATM-Specific Sublayer contains 8 bits in the low-order portion of
   the header.  This document defines one reserved bit in the ATM-Specific
   Sublayer in 
<xref target="L2TPv3-CC.1"/>, which may be assigned by IETF
   Consensus 
<xref target="RFC2434"/>. It is required to be assigned by IANA.

                              </t>

<figure>
<preamble></preamble>
<artwork>
   ATM-Specific Sublayer bits - per [RFC4454]
   --------------------------
   Bit 0 - V (VCCV) bit
</artwork>
<postamble></postamble>
</figure>

                </section> <!-- IANA.3.3 -->
                <section anchor="IANA.3.4"
                 title="VCCV Capability AVP Values">
                              <t>

   This is a new registry for IANA to maintain in the L2TP Name Spaces.
                              </t>
                              <t>

   IANA maintains a registry for the CC Types and CV
   Types bitmasks in the VCCV Capability AVP, defined in 
<xref target="L2TPv3-CC.3.1"/>.
   The allocations must be done using the "IETF Consensus" policy 
   defined in 
<xref target="RFC2434"/>.  A VCCV CC or CV Type description and a 
   reference to an RFC approved by the IESG are required for any 
   assignment from this registry.
                              </t>
                              <t>

   IANA has reserved the following bits in this registry:
                              </t>

<figure>
<preamble></preamble>
<artwork>
   VCCV Capability AVP (Attribute Type 96) Values
   ---------------------------------------------------

   L2TPv3 Control Channel (CC) Types:

      Bit (Value)    Description
      ============   ==========================================
      Bit 0 (0x01) - L2-Specific Sublayer with V-bit set
      Bit 1 (0x02) - Reserved
      Bit 2 (0x04) - Reserved
      Bit 3 (0x08) - Reserved
      Bit 4 (0x10) - Reserved
      Bit 5 (0x20) - Reserved
      Bit 6 (0x40) - Reserved
      Bit 7 (0x80) - Reserved

   L2TPv3 Connectivity Verification (CV) Types:

      Bit (Value)    Description
      ============   ==========================================
      Bit 0 (0x01) - ICMP Ping
      Bit 1 (0x02) - Reserved
      Bit 2 (0x04) - Reserved
      Bit 3 (0x08) - Reserved
      Bit 4 (0x10) - Reserved
      Bit 5 (0x20) - Reserved
      Bit 6 (0x40) - Reserved
      Bit 7 (0x80) - Reserved
</artwork>
<postamble></postamble>
</figure>

                </section> <!-- IANA.3.4 -->
                </section> <!-- IANA.3 -->
                </section> <!-- IANA -->

<?rfc comments="yes" ?>
<?rfc inline="yes" ?>
                <section anchor="Congestion"
                 title="Congestion Considerations">
                              <t>
The bandwidth resources used by VCCV are recommended to be
minimal compared to
those of the associated PW.
   The bandwidth required for
   the VCCV channel is taken outside any allocation for PW data traffic,
   and can be configurable.  When doing resource reservation or network
   planning, the bandwidth requirements for both PW data and VCCV
   traffic need to be taken into account.
                              </t>
                              <t>
VCCV applications (i.e., 
Connectivity Verification (CV) Types)
MUST
consider congestion and bandwidth usage implications and
provide details on bandwidth or packet frequency management.
   VCCV
   applications can have built-in bandwidth management in their
   protocols. Other VCCV applications can have their bandwidth
   configuration-limited, and rate-limiting them can be harmful as it
   could translate to incorrectly declaring connectivity failures. For
   all other VCCV applications, outgoing VCCV messages SHOULD be
   rate-limited to prevent aggressive connectivity verification
   consuming excessive bandwidth, causing congestion, becoming
   denial-of-service attacks, or generating an excessive packet rate at
   the CE-bound PE.
                              </t>
                              <t>
   If these conditions cannot be followed, an adaptive loss-based scheme
   SHOULD be applied to congestion-control outgoing VCCV traffic, so
   that it competes fairly with TCP within an order of magnitude.
   One method of
   determining an acceptable bandwidth for VCCV is described in 
   <xref target="RFC3448"/> (TFRC); other methods exist. For example, bandwidth
   or packet frequency management can include any of the following: a 
   negotiation of transmission interval/rate, a throttled transmission 
   rate on "congestion detected" situations, a slow-start after shutdown 
   due to congestion and until basic connectivity is verified, and other
   mechanisms.
                              </t>
                              <t>
   The ICMP and MPLS LSP PING applications SHOULD be rate-limited to 
   below 5% of the bit-rate of the associated PW. For this purpose, the
   considered bit-rate of a pseudowire is dependent on the PW Type. For 
   pseudowires that carry constant bit-rate traffic (e.g., TDM PWs) the 
   full bit-rate of the PW is used. For pseudowires that carry variable 
   bit-rate traffic (e.g., Ethernet PWs), the mean or sustained bit-rate
   of the PW is used.
                              </t>
                              <t>
As described in <xref target="Security"/>,
incoming VCCV messages can be rate-limited as a protection
against denial-of-service attacks. This throttling or policing
of incoming VCCV messages should not be more stringent than the
bandwidth allocated to the VCCV channel to prevent
false indications of connectivity failure.
                              </t>

                </section> <!-- Congestion -->

                <section anchor="Security"
                 title="Security Considerations">
                              <t>


   Routers that implement VCCV create a Control Channel (CC) associated 
   with a pseudowire. This control channel can be signaled (e.g., using 
   LDP or L2TPv3 depending on the PSN) or statically configured. Over 
   this control channel, VCCV Connectivity Verification (CV) messages 
   are sent. Therefore, three different areas are of concern from a 
   security standpoint.

                              </t>
                              <t>

   The first area of concern relates to
   control plane parameter and status message attacks, that is, 
   attacks that concern the signaling of VCCV capabilities. MPLS PW 
   Control Plane security is discussed in 
Section 8.2 of <xref target="RFC4447"/>.
   L2TPv3 PW Control Plane security is discussed in Section 8.1 of 
<xref target="RFC3931"/>.
The addition of the connection verification negotiation 
   extensions does not change the security aspects of Section 8.2 of 
   RFC 4447, or Section 8.1 of RFC 3931. Implementation of IP source 
   address filters may also aid in deterring these types of attacks.

                              </t>
                              <t>

   A second area of concern centers on data-plane attacks, that is, attacks on  
   the associated channel itself.  Routers that implement the VCCV 
   mechanisms are subject to additional data-plane denial-of-service 
   attacks as follows:

<list hangIndent="3" style="empty"><t>

      An intruder could intercept or inject VCCV packets effectively 
      providing false positives or false negatives.

                              </t>
                              <t>

      An intruder could deliberately flood a peer router with VCCV 
      messages to deny services to others.

                              </t>
                              <t>

      A misconfigured or misbehaving device could inadvertently flood a 
      peer router with VCCV messages which could result in a denial of 
      services. In particular, if a router has either implicitly or 
      explicitly indicated that it cannot support one or all of the 
      types of VCCV, but is sent those messages in sufficient quantity, 
      that could result in a denial of service.

</t></list>

   To protect against these potential (deliberate or unintentional) 
   attacks, multiple mitigation techniques can be employed:

<list hangIndent="3" style="empty"><t>

      VCCV message throttling mechanisms can be used, especially in 
      distributed implementations which have a centralized control plane 
      processor with various line cards attached by some control plane 
      data path.  In these architectures, VCCV messages may be processed 
      on the central processor after being forwarded there by the 
      receiving line card. In this case, the path between the line card 
      and the control processor may become saturated if appropriate VCCV 
      traffic throttling is not employed, which could lead to a complete 
      denial of service to users of the particular line card. Such 
      filtering is also useful for preventing the processing of unwanted 
      VCCV messages, such as those which are sent on unwanted (and 
      perhaps unadvertised) control channel types or VCCV types.

                              </t>
                              <t>

      Section 8.1 of 
<xref target="RFC4447"/> discusses methods to protect the data 
      plane of MPLS PWs from data-plane attacks. However the 
      implementation of the connection verification protocol expands the 
      range of possible data-plane attacks. For this reason 
      implementations MUST provide a method to secure the data plane.  
      This can be in the form of encryption of the data by running IPsec 
      on MPLS packets encapsulated according to 
<xref target="RFC4023"/>, or by 
      providing the ability to architect the MPLS network in such a way 
      that no external MPLS packets can be injected (private MPLS 
      network).

                              </t>
                              <t>

      For L2TPv3, data packet spoofing considerations are outlined in 
      Section 8.2 of 
<xref target="RFC3931"/>.  While the L2TPv3 Session ID provides 
      traffic separation, the optional cookie provides additional 
      protection to thwart spoofing attacks. To maximize protection 
      against a variety of data-plane attacks, a 64-bit cookie can be 
      used. L2TPv3 can also be run over IPsec as detailed in Section 
      4.1.3 of 
<xref target="RFC3931"/>.

</t></list>

   A third and last area of concern relates to the processing of the actual 
   contents of VCCV messages, i.e., LSP Ping and ICMP messages.  
   Therefore, the corresponding security considerations for these 
   protocols (LSP Ping 
<xref target="RFC4379"/>, ICMPv4 Ping 
<xref target="RFC0792"/>, and ICMPv6 Ping 
<xref target="RFC4443"/>) apply as well.


</t>

                </section> <!-- EO Security -->

                <section anchor="Acknowledgements"
                 title="Acknowledgements">
                        <t>

   The authors would like to thank Hari Rakotoranto, Michel Khouderchah,
   Bertrand Duvivier, Vanson Lim, Chris Metz, W. Mark Townsley, Eric
   Rosen, Dan Tappan, Danny McPherson, Luca Martini, Don O'Connor, Neil 
   Harrison, Danny Prairie, 
   Mustapha Aissaoui, and Vasile Radoaca for their valuable 
   comments and suggestions.

</t>

                </section> <!-- Ack -->


        </middle>
        <back>
                <references title="Normative References">

                        <?rfc include="reference.RFC.0792" ?>
                        <?rfc include="reference.RFC.4443" ?>
                        <?rfc include="reference.RFC.2119" ?>
                        <?rfc include="reference.RFC.3032" ?>
                        <?rfc include="reference.RFC.3931" ?>
                        <?rfc include="reference.RFC.4385" ?>
                        <?rfc include="reference.RFC.4446" ?>
                        <?rfc include="reference.RFC.4447" ?>
                        <?rfc include="reference.RFC.4379" ?>

                </references>
                <references title="Informative References">             

                        <?rfc include="reference.RFC.4377" ?>
                        <?rfc include="reference.RFC.3985" ?>
                        <?rfc include="reference.RFC.3916" ?>
                        <?rfc include="reference.RFC.2434" ?>
                        <?rfc include="reference.RFC.3438" ?>
                        <?rfc include="reference.RFC.4454" ?>
                        <?rfc include="reference.RFC.4448" ?>
                        <?rfc include="reference.RFC.4023" ?>
                        <?rfc include="reference.RFC.4928" ?>
                        <?rfc include="reference.RFC.3448" ?>

<!--    <?rfc include="reference.I-D.ietf-pwe3-oam-msg-map" ?> -->
<reference anchor='MSG-MAP'>
<front>
<title>Pseudo Wire (PW) OAM Message Mapping</title>

<author initials='T' surname='Nadeau' fullname='Thomas Nadeau'>
    <organization />
</author>

<date month='March' day='6' year='2007' />

<abstract><t>This document specifies the mapping of defect states between a Pseudo Wire and the Attachment Circuits (AC) of the end-to-end emulated service. This document covers the case whereby the ACs and the PWs are of the same type in accordance to the PWE3 architecture [RFC3985] such that a homogenous PW service can be constructed.</t></abstract>

</front>

<seriesInfo name='Work' value='in Progress'/>

</reference>


                <reference anchor='IANA.pwe3-parameters'
                   target='http://www.iana.org/assignments/pwe3-parameters'>
                   <front>
                   <title>
                        Pseudo Wires Name Spaces
                   </title>
                   <author
                        fullname=''>
                   <organization>
                        Internet Assigned Numbers Authority
                   </organization>
                   </author>
                   <date month='June' year='2007' />
                   </front>
                   <format type="TXT"
                        target="http://www.iana.org/assignments/pwe3-parameters" />
                </reference>

                <reference anchor='IANA.l2tp-parameters'
                   target='http://www.iana.org/assignments/l2tp-parameters'>
                   <front>
                   <title>
                        Layer Two Tunneling Protocol "L2TP"
                   </title>
                   <author
                        fullname=''>
                   <organization>
                        Internet Assigned Numbers Authority
                   </organization>
                   </author>
                   <date month='April' year='2007' />
                   </front>
                   <format type="TXT"
                        target="http://www.iana.org/assignments/l2tp-parameters" />
                </reference>

                </references>


                <section title="Contributors' Addresses">


<figure>
<preamble></preamble>
<artwork>
George Swallow
Cisco Systems, Inc.
300 Beaver Brook Road
Boxborough, MA 01719
USA

Email: swallow@cisco.com


Monique Morrow
Cisco Systems, Inc.
Glatt-com
CH-8301 Glattzentrum
Switzerland

Email: mmorrow@cisco.com


Yuichi Ikejiri
NTT Communication Corporation
1-1-6, Uchisaiwai-cho, Chiyoda-ku
Tokyo 100-8019
Shinjuku-ku
JAPAN

Email: y.ikejiri@ntt.com


Kenji Kumaki
KDDI Corporation
KDDI Bldg. 2-3-2
Nishishinjuku
Tokyo 163-8003
JAPAN

Email: ke-kumaki@kddi.com


Peter B. Busschbach
Alcatel-Lucent
67 Whippany Road
Whippany, NJ, 07981
USA

Email: busschbach@alcatel-lucent.com


Rahul Aggarwal
Juniper Networks
1194 North Mathilda Ave.
Sunnyvale, CA 94089
USA

Email: rahul@juniper.net


Luca Martini
Cisco Systems, Inc.
9155 East Nichols Avenue, Suite 400
Englewood, CO, 80112
USA

Email: lmartini@cisco.com
</artwork>
<postamble></postamble>
</figure>

                </section>

        </back>
</rfc>
