Tech-invite3GPPspaceIETFspace
959493929190898887868584838281807978777675747372717069686766656463626160595857565554535251504948474645444342414039383736353433323130292827262524232221201918171615141312111009080706050403020100
in Index   Prev   Next

RFC 4045

Extensions to Support Efficient Carrying of Multicast Traffic in Layer-2 Tunneling Protocol (L2TP)

Pages: 28
Experimental

Top   ToC   RFC4045 - Page 1
Network Working Group                                         G. Bourdon
Request for Comments: 4045                                France Telecom
Category: Experimental                                        April 2005


             Extensions to Support Efficient Carrying of
        Multicast Traffic in Layer-2 Tunneling Protocol (L2TP)

Status of This Memo

   This memo defines an Experimental Protocol for the Internet
   community.  It does not specify an Internet standard of any kind.
   Discussion and suggestions for improvement are requested.
   Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

The Layer Two Tunneling Protocol (L2TP) provides a method for tunneling PPP packets. This document describes an extension to L2TP, to make efficient use of L2TP tunnels within the context of deploying multicast services whose data will have to be conveyed by these tunnels.

Table of Contents

1. Introduction.................................................. 2 1.1. Conventions Used in This Document....................... 3 1.2. Terminology............................................. 3 2. Motivation for a Session-Based Solution....................... 4 3. Control Connection Establishment.............................. 5 3.1. Negotiation Phase....................................... 5 3.2. Multicast Capability AVP (SCCRQ, SCCRP)................. 5 4. L2TP Multicast Session Establishment Decision................. 6 4.1. Multicast States in LNS................................. 6 4.2. Group State Determination............................... 8 4.3. Triggering.............................................. 9 4.4. Multicast Traffic Sent from Group Members............... 10 5. L2TP Multicast Session Opening Process........................ 11 5.1. Multicast-Session-Request (MSRQ)........................ 11 5.2. Multicast-Session-Response (MSRP)....................... 12 5.3. Multicast-Session-Establishment (MSE)................... 12 6. Session Maintenance and Management............................ 13 6.1. Multicast-Session-Information (MSI)..................... 13 6.2. Outgoing Sessions List Updates.......................... 14
Top   ToC   RFC4045 - Page 2
             6.2.1.  New Outgoing Sessions AVP (MSI)................. 15
             6.2.2.  New Outgoing Sessions Acknowledgement AVP (MSI). 15
             6.2.3.  Withdraw Outgoing Sessions AVP (MSI)............ 17
       6.3.  Multicast Packets Priority AVP (MSI).................... 17
             6.3.1.  Global Configuration............................ 18
             6.3.2.  Individual Configuration........................ 19
             6.3.3.  Priority........................................ 19
   7.  Multicast Session Teardown.................................... 19
       7.1.  Operations.............................................. 20
       7.2.  Multicast-Session-End-Notify (MSEN)..................... 20
       7.3.  Result Codes............................................ 21
   8.  Traffic Merging............................................... 22
   9.  IANA Considerations........................................... 22
   10. Security Considerations....................................... 23
   11. References.................................................... 23
       11.1. Normative References.................................... 23
       11.2. Informative References.................................. 24
   12. Acknowledgements.............................................. 24
   Appendix A.  Examples of Group States Determination............... 25
   Author's Address.................................................. 27
   Full Copyright Statement.......................................... 28

1. Introduction

The deployment of IP multicast-based services may have to deal with L2TP tunnel engineering. The forwarding of multicast data within L2TP sessions may impact the throughput of L2TP tunnels because the same traffic may be sent multiple times within the same L2TP tunnel, but in different sessions. This proposal aims to reduce the impact by applying the replication mechanism of multicast traffic only when necessary. The solution described herein provides a mechanism for transmitting multicast data only once for all the L2TP sessions that have been established in a tunnel, each multicast flow having a dedicated L2TP session. Within the context of deploying IP multicast-based services, it is assumed that the routers of the IP network that embed a L2TP Network Server (LNS) capability may be involved in the forwarding of multicast data, toward users who access the network through an L2TP tunnel. The LNS is in charge of replicating the multicast data for each L2TP session that a receiver who has requested a multicast flow uses. In the solution described here, an LNS is able to send multicast data only once and to let the L2TP Access Concentrator (LAC) perform the traffic replication. By doing so, it is expected to spare transmission resources in the core network that supports
Top   ToC   RFC4045 - Page 3
   L2TP tunnels.  This multicast extension to L2TP is designed so that
   it does not affect the behavior of L2TP equipment under normal
   conditions.

   A solution whereby multicast data is carried only once in a L2TP
   tunnel is of interest to service providers, as edge devices are
   aggregating more and more users.  This is particularly true for
   operators who are deploying xDSL (Digital Subscriber Line) services
   and cable infrastructures.  Therefore, L2TP tunnels that may be
   supported by the network will have to carry multiple redundant
   multicast data more often.  The solution described in this document
   applies to downstream traffic exclusively; i.e., data coming from the
   LNS toward end-users connected to the LAC.  This downstream multicast
   traffic is not framed by the LNS but by the LAC, thus ensuring
   compatibility for all users in a common tunnel, whatever the framing
   scheme.

1.1. Conventions Used in This Document

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].

1.2. Terminology

Unicast session This term refers to the definition of "Session" as it is described in the terminology section of [RFC2661]. Multicast session This term refers to a connection between the LAC and the LNS. Additional Control Messages and Attribute-Value-Pairs (AVPs) are defined in this document to open and maintain this connection for the particular purpose of multicast traffic transportation. This connection between the LAC and the LNS is intended to convey multicast traffic only. Session This term is used when there is no need to dissociate multicast from unicast sessions, and thus it designates both.
Top   ToC   RFC4045 - Page 4
   M-IGP

      Designates a Multicast Interior Gateway Protocol.

   Multicast flow

      Designates datagrams sent to a group from a set of sources for
      which multicast reception is desired.

   GMP

      Group Management Protocol, such as:

         - IGMPv1 ([RFC1112])
         - IGMPv2 ([RFC2236])
         - MLD ([RFC2710], [RFC3590])

   SFGMP

      Source Filtering Group Management Protocol, such as:

         - IGMPv3 ([RFC3376])
         - MLDv2 ([RFC3810])

2. Motivation for a Session-Based Solution

Multicast data have to be seen as a singular flow that may be conveyed into all the L2TP sessions that have been established in a tunnel. This means that a given L2TP session can be dedicated for the forwarding of a multicast flow that will be forwarded to multiple receivers, including those that can be reached by one or several of these L2TP sessions. A session carrying IP multicast data is independent from the underlying framing scheme and is therefore compatible with any new framing scheme that may be supported by the L2TP protocol. Using a single L2TP session per multicast flow is motivated by the following arguments: - The administrator of the LNS is presumably in charge of the IP multicast-based services and the related engineering aspects. As such, he must be capable of filtering multicast traffic on a multicast source basis, on a multicast group basis, and on a user basis (users who access the network using an L2TP session that terminates in this LNS).
Top   ToC   RFC4045 - Page 5
   -  Having an L2TP session dedicated for a multicast flow makes it
      possible to enforce specific policies for multicast traffic.  For
      instance, it is possible to change the priority treatment for
      multicast packets against unicast packets.

   -  It is not always acceptable or possible to have multicast
      forwarding performed within the network between the LAC and the
      LNS.  Having the multicast traffic conveyed within an L2TP tunnel
      ensures a multicast service between the LNS and end-users,
      alleviating the need for activating multicast capabilities in the
      underlying network.

3. Control Connection Establishment

3.1. Negotiation Phase

The multicast extension capability is negotiated between the LAC and the LNS during the control connection establishment phase. However, establishment procedures defined in [RFC2661] remain unchanged. An LAC indicates its multicast extension capability by using a new AVP, the "Multicast Capability" AVP. There is no explicit acknowledgement sent by the LNS during the control connection establishment phase. Instead, the LNS is allowed to use multicast extension messages to open and maintain multicast sessions (see Section 5).

3.2. Multicast Capability AVP (SCCRQ, SCCRP)

In order to inform the LNS that an LAC has the ability to handle multicast sessions, the LAC sends a Multicast Capability AVP during the control connection establishment phase. This AVP is either sent in a SCCRQ or a SCCRP control message by the LAC towards the LNS. Upon receipt of the Multicast Capability AVP, a LNS may adopt two distinct behaviors: 1) The LNS does not implement the L2TP multicast extension: any multicast-related information (including the Multicast Capability AVP) will be silently ignored by the LNS. 2) The LNS implements L2TP multicast extensions and therefore supports the Multicast Capability AVP: the LNS is allowed to send L2TP specific commands for conveying multicast traffic toward the LAC. The multicast capability exclusively refers to the tunnel for which the AVP has been received during the control connection establishment phase. It SHOULD be possible for an LNS administrator to shut down
Top   ToC   RFC4045 - Page 6
   L2TP multicast extension features towards one or a set of LAC(s).  In
   this case, the LNS behavior is similar to that in 1).

   The AVP has the following format:

      Vendor ID = 0
      Attribute = 80 (16 bits)

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |M|H|0|0|0|0|      Length       |          Vendor ID            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |              80               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   The M-bit MUST be set to 0, the AVP MAY be hidden (H-bit set to 0 or
   1).

   The length of this AVP is 6 octets.

4. L2TP Multicast Session Establishment Decision

4.1. Multicast States in LNS

The router that embeds the LNS feature MUST support at least one Group Management Protocol (GMP), such as: - IGMPv1 - IGMPv2 - MLD or a Source Filtering Group Management Protocol (SFGMP), such as: - IGMPv3 - MLDv2 The LAC does not have any group management activity: GMP or SFGMP processing is performed by the LNS. The LAC is a layer-2 equipment, and is not supposed to track GMP or SFGMP messages between the receivers and the LNS in this context. The LNS MUST always be at the origin of the creation of a multicast L2TP session dedicated for the forwarding of IP multicast datagrams destined to a multicast group. The LNS acts as a GMP or SFGMP Querier for every logical interface associated to an L2TP session.
Top   ToC   RFC4045 - Page 7
   As a multicast router, the equipment that embeds the LNS function
   will keep state per group per attached network (i.e., per L2TP
   session).  The LNS-capable equipment activating multicast extensions
   for L2TP will have to classify and analyze GMP and SFGMP states in
   order to create L2TP multicast sessions within the appropriate L2TP
   tunnels.  This is performed in three steps:

   1) The LNS has to compute group states for each L2TP tunnel, by using
      group states recorded for each L2TP session of the tunnel.  Group
      state determination for L2TP tunnels is discussed in Section 4.2.
      For each L2TP tunnel, the result of this computation will issue a
      list of states of the form (group, filter-mode, source-list):

      -  group: Denotes the multicast group.
      -  filter-mode: Either INCLUDE or EXCLUDE, as defined in
         [RFC3376].
      -  source-list: List of IP unicast addresses from which multicast
         reception is desired or not, depending on the filter-mode.

   2) According to each group state, the LNS will create one or multiple
      replication contexts, depending on the filter-mode for the
      considered group and the local policy configured in the LNS.

      For groups in INCLUDE mode, the LNS SHOULD implement two different
      policies:

      -  One session per (source, group) pair: the LNS creates one
         replication context per (source, group) pair.
      or
      -  One session per group: the LNS creates one replication context
         per (source-list, group) pair.

      For groups in EXCLUDE mode, the LNS will create one replication
      context per (list of sources excluded by *all* the receivers,
      group).  The list of sources represents the intersection of the
      sets, not the union.

   3) For each replication context, the LNS will create one L2TP
      multicast session (if threshold conditions are met; see Section
      4.3) and its associated Outgoing Session List (OSL).  The OSL
      lists L2TP sessions that requested the multicast flow
      corresponding to the group and the associated source-filtering
      properties.  There is one OSL per replication context; i.e., per
      L2TP multicast session.

   For a group member running an SFGMP, it is therefore possible to
   receive multicast traffic from sources that have been explicitly
   excluded in its SFGMP membership report if other group members in the
Top   ToC   RFC4045 - Page 8
   same L2TP tunnel wish to receive packets from these sources.  This
   behavior is comparable to the case where group members are connected
   to the same multi-access network.  When a group is in EXCLUDE mode or
   in INCLUDE mode with a policy allowing one session per (group,
   source-list), sharing the same L2TP tunnel is equivalent to being
   connected to the same multi-access network in terms of multicast
   traffic received.  For groups in INCLUDE mode with a policy allowing
   one L2TP multicast session per (source, group), the behavior is
   slightly improved because it prevents group members from receiving
   traffic from non-requested sources.  On the other hand, this policy
   potentially increases the number of L2TP multicast sessions to
   establish and maintain.  Examples are provided in Appendix A.

   In order for the LAC to forward the multicast traffic received
   through the L2TP multicast session to group members, the LNS sends
   the OSL to the LAC for the related multicast session (see Section 6).

4.2. Group State Determination

Source Filtering Group Management Protocols require querier routers to keep a filter-mode per group per attached network, to condense the total desired reception state of a group to a minimum set so that all systems' memberships are satisfied. Within the context of L2TP, each L2TP session has to be considered an attached network by GMP and SFGMP protocols. When the L2TP multicast extension is activated, each L2TP Control Connection has to be considered a pseudo attached network, as well, in order to condense group membership reports for every L2TP session in the tunnel. Therefore, a list of group states is maintained for each L2TP Control Connection into which the membership information of each of its L2TP sessions is merged. This list of group states is a set of membership records of the form (group, filter-mode, source-list). Each group state represents the result of a merging process applied to subscriptions on L2TP sessions of a Control Connection for a considered group. This merging process is performed in three steps: 1) Conversion of any GMP subscription into SFGMP subscription (IGMPv1/v2 to IGMPv3, MLDv1 to MLDv2); 2) Removal of subscription timers and, if filter-mode is EXCLUDE, sources with source timer > 0; 3) Then, resulting subscriptions are merged by using merging rules described in SFGMP specifications ([RFC3376], Section 3.2, [RFC3810], Section 4.2).
Top   ToC   RFC4045 - Page 9
   This process is also described in [PROXY].  Examples of group state
   determination are provided in Appendix A.

4.3. Triggering

The rules to be enforced by the LNS whereby it is decided when to open a dedicated L2TP multicast session for a multicast group SHOULD be configurable by the LNS administrator. This would typically happen whenever a threshold of MULTICAST_SESSION_THRESHOLD receivers/sessions referenced in a replication context is reached. This threshold value SHOULD be valued at 2 by default, as it is worth opening a dedicated L2TP multicast session for two group members sharing the same desired reception state (which means that two L2TP unicast sessions are concerned). In this case, the OSL will reference two distinct L2TP sessions. The actual receipt by the LNS of multicast traffic requested by end- users can also be taken into account to decide whether the associated L2TP multicast session has to be opened. Whenever an OSL gets empty, the LNS MUST stop sending multicast traffic over the corresponding L2TP multicast session. Then the L2TP multicast session MUST be torn down as described in Section 7. Filter-mode changes for a group can also trigger the opening or the termination of L2TP multicast sessions in the following ways: a) From INCLUDE Mode to EXCLUDE Mode When a group state filter-mode switches from INCLUDE to EXCLUDE, only one replication context (and its associated L2TP multicast session) issued from this group state can exist (see Section 4.1). The LNS SHOULD keep one replication context previously created for this group state and it has to update it with: - a new source-list that has to be excluded from forwarding - a new OSL The LNS MUST send an OSL update to the LAC to reflect L2TP session list changes (section 6.2), whenever appropriate. The unused L2TP multicast sessions that correspond to previously created replication contexts for the group SHOULD be terminated, either actively or passively by emptying their corresponding OSLs. The remaining L2TP multicast session MAY also be terminated if the number of receivers is below a predefined threshold (see Section 7). To limit the duration of temporary packet loss or duplicates to receivers, the LNS has to minimize delay between OSL updates messages
Top   ToC   RFC4045 - Page 10
   sent to the LAC.  Therefore, one can assume that terminating a
   multicast session passively gives the smoothest transition.

   b) From EXCLUDE Mode to INCLUDE Mode

   When a group state filter-mode switches from EXCLUDE to INCLUDE,
   multiple replication contexts issued by this group state may be
   created (see Section 4.1).  The LNS SHOULD keep the replication
   context previously created for this group state and it has to update
   it accordingly with the following information:

      -  a new list of sources that has to be forwarded.  This list has
         only one record if there is one replication context per (group,
         source)
      -  a new OSL

   The LNS MUST send an OSL update to the LAC to reflect L2TP session
   list changes, whenever appropriate.  If the LNS is configured to
   create one replication context per (group, source), L2TP multicast
   sessions will be opened in addition to the existing one, depending on
   the number of sources for the group.

   If new L2TP multicast sessions have to be opened, the LNS SHOULD wait
   until these multicast sessions are established before updating the
   OSL of the original multicast session.  To limit the duration of
   temporary packet loss or duplicates to receivers, the LNS has to
   minimize delay between OSL updates messages sent to the LAC.

4.4. Multicast Traffic Sent from Group Members

The present document proposes a solution to enhance the forwarding of downstream multicast traffic exclusively; i.e., data coming from the LNS toward end-users connected to the LAC. If a group member that uses an L2TP session is also a multicast source for traffic conveyed in a multicast session, datagrams may be sent back to the source. To prevent this behavior, two options can be used in the LNS: 1) Disable the multicast packets' forwarding capability, for those multicast datagrams sent by users connected to the network by means of an L2TP tunnel. Protocols using well-known multicast addresses MUST NOT be impacted. 2) Exclude from the OSL the L2TP session used by a group member that sends packets matching the replication context of this OSL. Therefore, the corresponding multicast flow is sent by the LNS over the user L2TP unicast session, using standard multicast forwarding rules.
Top   ToC   RFC4045 - Page 11

5. L2TP Multicast Session Opening Process

The opening of an L2TP multicast session is initiated by the LNS. A three-message exchange is used to set up the session. The following is a typical sequence of events: LAC LNS --- --- (multicast session triggering) <- MSRQ MSRP -> (Ready to replicate) MSE -> <- ZLB ACK The ZLB ACK is sent if there are no further messages waiting in the queue for that peer.

5.1. Multicast-Session-Request (MSRQ)

Multicast-Session-Request (MSRQ) is a control message sent by the LNS to the LAC to indicate that a multicast session can be created. The LNS initiates this message according to the rules in Section 4.3. It is the first in a three-message exchange used for establishing a multicast session within an L2TP tunnel. A LNS MUST NOT send a MSRQ control message if the remote LAC did not open the L2TP tunnel with the Multicast Capability AVP. The LAC MUST ignore MSRQ control messages sent in an L2TP tunnel, if the L2TP tunnel was not opened with control messages including a Multicast Capability AVP. The following AVPs MUST be present in MSRQ: Message Type Assigned Session ID The following AVPs MAY be present in MSRQ: Random Vector Maximum BPS
Top   ToC   RFC4045 - Page 12
   The Maximum BPS value is set by the LNS administrator.  However, this
   value should be chosen in accordance with the line capabilities of
   the end-users.  The Maximum BPS value SHOULD NOT be higher than the
   highest speed connection for all end-users within the L2TP tunnel.

   The associated Message Type AVP is encoded with the following values:

      Vendor ID = 0
      Attribute Type = 0
      Attribute Value = 23 (16 bits)

   The M-bit MUST be set to 0, and the H-bit MUST be set to 0.

5.2. Multicast-Session-Response (MSRP)

Multicast-Session-Response (MSRP) is a control message sent by the LAC to the LNS in response to a received MSRQ message. It is the second in a three-message exchange used for establishing a multicast session within an L2TP tunnel. MSRP is used to indicate that the MSRQ was successful and that the LAC will attempt to reserve appropriate resources to perform multicast replication for unicast sessions managed in the pertaining control connection. The following AVPs MUST be present in MSRP: Message Type Assigned Session ID The following AVP MAY be present in MSRP: Random Vector The associated Message Type AVP is encoded with the following values: Vendor ID = 0 Attribute Type = 0 Attribute Value = 24 (16 bits) The M-bit MUST be set to 0, and the H-bit MUST be set to 0.

5.3. Multicast-Session-Establishment (MSE)

Multicast-Session-Establishment (MSE) is a control message sent by the LAC to the LNS to indicate that the LAC is ready to receive necessary multicast information (Section 6) for the group using the
Top   ToC   RFC4045 - Page 13
   newly created multicast session.  It is the third message in the
   three-message sequence used for establishing a multicast session
   within an L2TP tunnel.

   The following AVP MUST be present in MSE:

      Message Type

   The following AVP MAY be present in MSE:

      Sequencing Required

   Sequencing will occur only from the LNS to the LAC, as a multicast
   session is only used to forward multicast traffic downstream.

   The associated Message Type AVP is encoded with the following values:

      Vendor ID = 0
      Attribute Type = 0
      Attribute Value = 25 (16 bits)

   The M-bit MUST be set to 0, and the H-bit MUST be set to 0.

6. Session Maintenance and Management

Once the multicast session is established, the LAC has to be informed of the L2TP unicast sessions interested in receiving the traffic from the newly created multicast session, and a related optional priority parameter, defined in Section 6.3. To achieve this, a new control message type is defined: Multicast-Session-Information (MSI).

6.1. Multicast-Session-Information (MSI)

Multicast-Session-Information (MSI) control messages carry AVPs to keep the OSL synchronized between the LNS and the LAC, and to set the optional priority parameter for multicast traffic versus unicast traffic. MSI may be extended to update the multicast session with additional parameters, as needed. Each MSI message is specific to a particular multicast session. Therefore, the control message MUST use the assigned session ID associated with the multicast session (assigned by the LAC), except for the case mentioned in 6.3.2.
Top   ToC   RFC4045 - Page 14
   The associated Message Type AVP is encoded with the following values:

      Vendor ID = 0
      Attribute Type = 0
      Attribute Value = 26 (16 bits)

   The M-bit MUST be set to 0, and the H-bit MUST be set to 0.

   The following AVP MUST be present in MSI:

      Message Type

   The following AVPs MAY be present in MSI:

      Random Vector
      New Outgoing Sessions
      New Outgoing Sessions Acknowledgement
      Withdraw Outgoing Sessions
      Multicast Packets Priority

   New Outgoing Sessions, New Outgoing Sessions Acknowledgement,
   Withdraw Outgoing Sessions, and Multicast Packets Priority are new
   AVPs defined in sections 6.2 and 6.3.

6.2. Outgoing Sessions List Updates

Whenever a change occurs in the Outgoing Sessions List, the LNS MUST inform the LAC of that change. The OSL is built upon subscription reports recorded by GMP or SFGMP processes running in the LNS (Section 4.1). The LAC maintains an OSL as a local table transmitted by the LNS. As for the LNS, the LAC has to maintain an OSL for each L2TP multicast session within an L2TP tunnel. To update the LAC OSL, the LNS sends a New Outgoing Sessions AVP for additional sessions, or sends a Withdraw Outgoing Sessions AVP to remove sessions. All sessions mentioned in these AVPs MUST be added or removed by the LAC from the relevant OSL. The Outgoing Sessions List is identified by the tunnel ID and the multicast session ID to which the updating AVP refers. To update the OSL, the following AVPs are used: Additional session(s): New Outgoing Sessions AVP Session(s) removal: Withdraw Outgoing Sessions AVP These new AVPs MUST be sent in an MSI message.
Top   ToC   RFC4045 - Page 15

6.2.1. New Outgoing Sessions AVP (MSI)

The New Outgoing Sessions AVP can only be carried within an MSI message type. This AVP piggybacks every Session ID to which the multicast traffic has to be forwarded. The AVP has the following format: Vendor ID = 0 Attribute = 81 (16 bits) 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |M|H|0|0|0|0| Length | Vendor ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 81 | Session ID 0 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ... | Session ID N | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ There can be from 1 to N Session IDs present in the New Outgoing Sessions AVP (considering the maximum value of the Length field). This AVP must be placed in an MSI message and sent after the establishment of the multicast session to indicate the initial outgoing sessions to the LAC, and must be sent at any time when one or more outgoing sessions appear during the multicast session lifetime. Upon receipt of this AVP, the LAC sends a New Outgoing Sessions Acknowledgment AVP to the LNS to notify that the LAC is ready to replicate the multicast traffic toward the indicated sessions. Usage of this AVP is incremental; only new outgoing sessions have to be listed in the AVP. The M-bit MUST be set to 1, and the AVP MAY be hidden (H-bit set to 0 or 1).

6.2.2. New Outgoing Sessions Acknowledgement AVP (MSI)

The New Outgoing Sessions Acknowledgement AVP can only be carried within an MSI message type. This AVP informs the LNS that the LAC is ready to replicate traffic for every Session ID listed in the AVP.
Top   ToC   RFC4045 - Page 16
   The AVP has the following format:

      Vendor ID = 0
      Attribute = 82 (16 bits)

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |M|H|0|0|0|0|      Length       |          Vendor ID            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |              82               |         Session ID 0          |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |              ...              |         Session ID N          |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   This AVP must be placed in an MSI message and sent by the LAC toward
   the LNS to acknowledge the receipt of a New Outgoing Sessions list
   received in a New Outgoing Sessions AVP from the LNS.

   An LNS is allowed to send multicast traffic within the L2TP multicast
   session as soon as a New Outgoing Sessions Acknowledgement AVP is
   received for the corresponding L2TP multicast session.

   An LNS is allowed to stop sending packets of the corresponding
   multicast flow within L2TP unicast sessions only if it receives an
   MSI message with the New Outgoing Session Acknowledgement AVP, and
   only for the unicast Session IDs mentioned in this AVP.  The
   multicast traffic can then be conveyed in L2TP unicast sessions when
   the L2TP multicast session goes down.  From this standpoint, packets
   related to this multicast flow SHOULD NOT be conveyed within the L2TP
   unicast sessions mentioned in the AVP in order to avoid the
   duplication of multicast packets.

   There can be from 1 to N Session IDs present in the New Outgoing
   Sessions Acknowledgement AVP (considering the maximum value of the
   Length field).  Session IDs mentioned in this AVP that have not been
   listed in a previous New Outgoing Sessions AVP should be ignored.
   Non-acknowledged Session IDs MAY be listed in forthcoming New
   Outgoing Sessions AVPs, but multicast traffic MUST be sent to logical
   interfaces associated to these Session IDs as long as these Session
   IDs are not acknowledged for replication by the LAC.

   The M-bit MUST be set to 1, and the AVP MAY be hidden (H-bit set to 0
   or 1).
Top   ToC   RFC4045 - Page 17

6.2.3. Withdraw Outgoing Sessions AVP (MSI)

The Withdraw Outgoing Sessions AVP is sent whenever there is one or more withdrawn subscriptions for the corresponding multicast flow (designated by the session ID on which the MSI is sent). The LAC can stop forwarding packets to Session IDs mentioned in the AVP for the corresponding multicast flow as soon as it receives the MSI message embedding this Withdraw Target Session AVP. The AVP has the following format: Vendor ID = 0 Attribute = 83 (16 bits) 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |M|H|0|0|0|0| Length | Vendor ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 83 | Session ID 0 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ... | Session ID N | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ There can be from 1 to N Session IDs present in the Withdraw Outgoing Sessions AVP (considering the value of the Length field). The M-bit MUST be set to 1, and the AVP MAY be hidden (H-bit set to 0 or 1).

6.3. Multicast Packets Priority AVP (MSI)

The Multicast Packets Priority AVP is an optional AVP intended to indicate to the LAC how to process multicast traffic against unicast traffic. Even though the LAC behavior is partially described here, the nature of the traffic (layer-2 frames for unicast traffic and pure IP packets for multicast traffic) is not a criteria for enforcing a traffic prioritization policy. Traffic processing for the provisioning of a uniformly framed traffic for the final user is described is section 8. Three different behaviors can be adopted: 1) Best effort: the traffic is forwarded from the LAC to the end-user in the order in which it comes from the LNS, whatever the type of traffic.
Top   ToC   RFC4045 - Page 18
   2) Unicast traffic priority: traffic coming down the L2TP unicast
      session has priority over traffic coming down the L2TP multicast
      session.

   3) Multicast traffic priority: traffic coming down the L2TP multicast
      session has priority over traffic coming down the L2TP unicast
      session.

   The priority is encoded as a 16-bit quantity, which can take the
   following values:

      0: Best effort (default)
      1: Unicast traffic priority
      2: Multicast traffic priority

   The AVP has the following format:

      Vendor ID = 0
      Attribute = 84 (16 bits)

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |M|H|0|0|0|0|      Length       |          Vendor ID            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |              84               |        Priority Value         |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Note that the multicast traffic rate can reach up to Maximum BPS (as
   indicated in MSRQ).  This rate can exceed the maximum rate allowed
   for a particular end-user.  This means that even with a priority
   value of 0, the end-user may receive multicast traffic only; unicast
   packets might be dropped because the multicast flow overwhelms the
   LAC forwarding buffer(s).

   The default Priority Value is 0.  The M-bit MUST be set to 0, and the
   AVP MAY be hidden (H-bit set to 0 or 1).

   There are two ways of using this AVP: global configuration and
   individual configuration.

6.3.1. Global Configuration

The Multicast Priority Packet AVP is sent for all L2TP unicast sessions concerned with a specific multicast flow represented by an L2TP multicast session. In this case, the AVP is sent in an L2TP MSI control message for the corresponding multicast session ID (Session ID = L2TP session for the corresponding multicast group). The
Top   ToC   RFC4045 - Page 19
   priority value applies to all L2TP unicast sessions to which the
   multicast group designated by the L2TP multicast session is intended,
   as soon as this AVP is received.

6.3.2. Individual Configuration

The Multicast Priority Packet AVP is sent for a specific L2TP unicast session that SHALL adopt a specific behavior for both unicast and multicast traffics. In this case, the AVP is sent in an L2TP MSI control message for the L2TP unicast session (Session ID = L2TP session for the concerned user). The priority value applies to the targeted session only and does not affect the other sessions. Note that in this case, all multicast packets carried in L2TP multicast sessions are treated the same way by the LAC for the concerned user. This is the only case in which an MSI control message can be sent for an L2TP unicast session.

6.3.3. Priority

It is the responsibility of the network administrator to decide which behavior to adopt between global or individual configurations, if the AVP is sent twice (one for a multicast group and one for a specific end-user). By default, only the individual configurations SHOULD be taken into consideration in that case. Support of the Multicast Packets Priority AVP is optional and SHOULD be configurable by the LAC administrator, if it is relevant.

7. Multicast Session Teardown

An L2TP multicast session should be torn down whenever there are no longer any users interested in receiving the corresponding multicast traffic. A multicast session becomes useless once the related OSL has fewer than a predefined number of entries, this number being defined by a threshold. Multicast session flapping may occur when the number of OSL entries oscillates around the threshold, if the same value is used to trigger the creation or deletion of an L2TP multicast session. To avoid this behavior, two methods can be used: - The threshold value that is used to determine whether the L2TP multicast session has to be torn down is lower than the MULTICAST_SESSION_THRESHOLD value;
Top   ToC   RFC4045 - Page 20
   -  The MULTICAST_SESSION_THRESHOLD value is used to determine whether
      the L2TP multicast session has to be torn down.  A multicast
      session SHOULD be killed after a period of
      MULTICAST_SESSION_HOLDTIME seconds if the corresponding OSL
      maintains fewer than a MULTICAST_SESSION_THRESHOLD number of
      entries.  The MULTICAST_SESSION_HOLDTIME value is 10 seconds by
      default and SHOULD be configurable by either the LAC or the LNS
      administrator.

   The multicast session can be torn down for multiple reasons,
   including specific criteria not described here (which can be vendor
   specific).

   A multicast session teardown can be initiated by either the LAC or
   the LNS.  However, multicast session teardown MUST be initiated by
   the LNS if the termination decision is motivated by the number of
   users interested in receiving the traffic corresponding to a
   multicast flow.

7.1. Operations

The actual termination of a multicast session is initiated with a new Multicast-Session-End-Notify (MSEN) control message, sent either by the LAC or by the LNS. The following is an example of a control message exchange that terminates a multicast session: LAC or LNS LAC or LNS ---------- ---------- (multicast session termination) <- MSEN (Clean up) ZLB ACK -> (Clean up)

7.2. Multicast-Session-End-Notify (MSEN)

The Multicast-Session-End-Notify (MSEN) is an L2TP control message sent by either the LAC or the LNS to request the termination of a specific multicast session within the tunnel. Its purpose is to give the peer the relevant termination information, including the reason why the termination occurred. The peer MUST clean up any associated resources and does not acknowledge the MSEN message.
Top   ToC   RFC4045 - Page 21
   As defined in [RFC2661], termination of a control connection will
   terminate all sessions managed within, including multicast sessions
   if there are any.

   The MSEN message carries a Result Code AVP with an optional Error
   Code.

   The following AVPs MUST be present in an MSEN message:

      Message Type
      Result Code
      Assigned Session ID

   The associated Message Type AVP is encoded with the following values:

      Vendor ID = 0
      Attribute Type = 0
      Attribute Value = 27 (16 bits)

   The M-bit MUST be set to 0, and the H-bit MUST be set to 0.

7.3. Result Codes

The following values are the defined result codes for MSEN control messages: 1 (16 bits) - No multicast traffic for the group 2 (16 bits) - Session terminated for the reason indicated in the error code 3 (16 bits) - No more receivers 4 (16 bits) - No more receivers (filter-mode change) o The code 1 MAY be used when the LAC detects that no traffic is coming down the multicast session, or when the LNS doesn't receive multicast traffic to be conveyed over the L2TP multicast session during a certain period of time. o The code 2 refers to General Error Codes maintained by the IANA for L2TP. o The code 3 MAY be used by the LAC or the LNS when the OSL is empty. o The code 4 MAY be used by the LNS when a multicast session is torn down because of a filter-mode change. This result code SHOULD also be used when the OSL becomes empty after a filter- mode change (passive termination when filter-mode changes from INCLUDE to EXCLUDE; see Section 4.3).
Top   ToC   RFC4045 - Page 22

8. Traffic Merging

Both unicast and multicast traffics have to be merged by the LAC in order to forward properly framed data to the end-user. Multicast packets are framed by the LAC and transmitted toward the proper end- user. Methods used to achieve this function are not described here, since it is an implementation-specific issue. All frames conveyed from the LAC to the end-users have to follow the framing scheme applied for the considered peer to which the traffic is destined (e.g., the LAC is always aware of the PPP [RFC1661] link parameters, as described in [RFC2661], Section 6.14). Note that using L2TP Multicast Extension features is not appropriate for end- users who have negotiated a sequenced layer-2 connection with the LNS. While inserting PPP-encapsulated multicast packets in a session, the LAC cannot modify PPP sequencing performed by the LNS for each PPP session.

9. IANA Considerations

This document defines: - 5 new Message Type (Attribute Type 0) Values: o Multicast-Session-Request (MSRQ) : 23 o Multicast-Session-Response (MSRP) : 24 o Multicast-Session-Establishment (MSE) : 25 o Multicast-Session-Information (MSI) : 26 o Multicast-Session-End-Notify (MSEN) : 27 - 5 new Control Message Attribute Value Pairs: o Multicast Capability : 80 o New Outgoing Sessions : 81 o New Outgoing Sessions Acknowledgement : 82 o Withdraw Outgoing Sessions : 83 o Multicast Packets Priority : 84 - 4 Result Codes for the MSEN message: o No multicast traffic for the group : 1 o Session terminated for the reason indicated in the error code : 2 o No more receivers : 3 o No more receivers (filter-mode change): 4
Top   ToC   RFC4045 - Page 23

10. Security Considerations

It is possible for one receiver to make additional multicast traffic that has not been requested go down the link of another receiver. This can happen if a single replication context per group is used in INCLUDE mode with receivers having divergent source lists, and in EXCLUDE mode if a receiver has a source list not shared by another. This behavior can be encountered every time receivers are connected to a common multi-access network. The extension described in this document does not introduce any additional security issues as far as the activation of the L2TP protocol is concerned. Injecting appropriate control packets in the tunnel toward the LAC to modify Outgoing Session List and to flood end-users with unwanted multicast traffic is only possible if the control connection is hacked. As for any reception of illegitimate L2TP control messages, the following apply: - If the spoofed control message embeds consistent sequence numbers, next messages will appear out of synch, yielding the control connection to terminate. - If sequence numbers are inconsistent with current control connection states, the spoofed control message will be queued or discarded, as described in [RFC2661], Section 5.8. The activation of the L2TP multicast capability on the LAC could make the equipment more sensitive to Denial of Service attacks if the control connection or the related LNS is hacked. The LAC might also be sensitive to the burden generated by the additional replication work. As mentioned in [RFC2661], Section 9.2, securing L2TP requires that the underlying transport make encryption, integrity, and authentication services available for all L2TP traffic, including L2TP multicast traffic (control and data).

11. References

11.1. Normative References

[RFC1112] Deering, S., "Host extensions for IP multicasting", STD 5, RFC 1112, August 1989. [RFC1661] Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51, RFC 1661, July 1994.
Top   ToC   RFC4045 - Page 24
   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
             Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2236] Fenner, W., "Internet Group Management Protocol, Version
             2", RFC 2236, November 1997.

   [RFC2661] Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G.,
             and B. Palter, "Layer Two Tunneling Protocol "L2TP"", RFC
             2661, August 1999.

   [RFC2710] Deering, S., Fenner, W., and B. Haberman, "Multicast
             Listener Discovery (MLD) for IPv6", RFC 2710, October 1999.

   [RFC3376] Cain, B., Deering, S., Kouvelas, I., Fenner, B., and A.
             Thyagarajan, "Internet Group Management Protocol, Version
             3", RFC 3376, October 2002.

   [RFC3438] Townsley, W., "Layer Two Tunneling Protocol (L2TP) Internet
             Assigned Numbers Authority (IANA) Considerations Update",
             BCP 68, RFC 3438, December 2002.

   [RFC3590] Haberman, B., "Source Address Selection for the Multicast
             Listener Discovery (MLD) Protocol", RFC 3590, September
             2003.

   [RFC3810] Vida, R. and L. Costa, "Multicast Listener Discovery
             Version 2 (MLDv2) for IPv6", RFC 3810, June 2004.

11.2. Informative References

[PROXY] Fenner, B., He, H., Haberman, B., Sandick, H., "IGMP/MLD- based Multicast Forwarding ("IGMP/MLD Proxying")", Work in Progress.

12. Acknowledgements

Thanks to Christian Jacquenet for all the corrections done on this document and his precious advice, to Pierre Levis for his contribution about IGMP, to Francis Houllier for PPP considerations, and to Xavier Vinet for his input about thresholds. Many thanks to W. Mark Townsley, Isidor Kouvelas, and Brian Haberman for their highly valuable input on protocol definition.
Top   ToC   RFC4045 - Page 25

Appendix A. Examples of Group States Determination

*Example 1: All users are managed in the same control connection. Users {1, 2, 3} subscribe to (Group G1, EXCLUDE {}) Users {3, 4, 5} subscribe to (Group G2, EXCLUDE {}) Group states for this L2TP tunnel will be: (G1, EXCLUDE, {}) (G2, EXCLUDE, {}) Therefore, two replication contexts will be created: -RC1: (*, G1) packets, Multicast Session MS1, OSL = 1, 2, 3 -RC2: (*, G2) packets, Multicast Session MS2, OSL = 3, 4, 5 *Example 2: All users are managed in the same control connection. Users {1, 2, 3} subscribe to (Group G1, INCLUDE {S1}) Users {4, 5, 6} subscribe to (Group G1, INCLUDE {S1,S2}) Users {7, 8, 9} subscribe to (Group G1, INCLUDE {S2}) The group state for this L2TP tunnel will be: (G1, INCLUDE, {S1, S2)}) If the LNS policy allows one replication context per (group, source), two replication contexts will be created: -RC1: (S1, G1) packets, Multicast Session MS1, OSL = 1, 2, 3, 4, 5, 6 -RC2: (S2, G1) packets, Multicast Session MS2, OSL = 4, 5, 6, 7, 8, 9 If the LNS policy allows one replication context per (group, source- list), one replication context will be created: -RC1: ({S1, S2}, G1) packets, Multicast Session MS1, OSL = [1..9]
Top   ToC   RFC4045 - Page 26
   *Example 3:

   All users are managed in the same control connection.

      Users {1, 2} subscribe to (Group G1, EXCLUDE {S1})
      User {3} subscribes to (Group G1, EXCLUDE {S1, S2})

   The group state for this L2TP tunnel will be:

      (G1, EXCLUDE, {S1})

   Therefore, one replication context will be created:

      -RC1:
      (*-{S1}, G1) packets, Multicast Session MS1, OSL = 1, 2, 3

   Next, user {4} subscribes to (Group G1, INCLUDE {S1}).  The group
   state for the L2TP tunnel is changed to:

      (G1, EXCLUDE, {})

   The replication context RC1 is changed to:

      -RC1: (*, G1) packets, Multicast Session MS1, OSL = 1, 2, 3, 4


   *Example 4:

   All users are managed in the same control connection.  The LNS policy
   allows one replication context per (group, source).

      Users {1, 2, 3} subscribe to (Group G1, INCLUDE {S1, S2})

   The group state for this L2TP tunnel will be:

      (G1, INCLUDE, {S1, S2)})

   Therefore, two replication contexts will be created:

      -RC1:
      (S1, G1) packets, Multicast Session MS1, OSL = 1, 2, 3
      -RC2:
      (S2, G1) packets, Multicast Session MS2, OSL = 1, 2, 3
Top   ToC   RFC4045 - Page 27
   Next, user {4} subscribes to (Group G1, EXCLUDE {}), equivalent to an
   IGMPv2 membership report.  The group state for the L2TP tunnel is
   changed to:

      (G1, EXCLUDE, {})

   The replication context RC1 is changed to:

      -RC1: (*, G1) packets, Multicast Session MS1, OSL = 1, 2, 3, 4

   The replication context RC2 is changed to:

      -RC2: no packets to forward, Multicast Session MS2, OSL = {}
      (Multicast Session MS2 will be deleted)

   When user {4} leaves G1, the group state for the L2TP tunnel goes
   back to:

      (G1, INCLUDE, {S1, S2})

   Replication contexts become:

      -RC1:
      (S1, G1) packets, Multicast Session MS1, OSL = 1, 2, 3
      -RC2:
      (S2, G1) packets, Multicast Session MS2, OSL = 1, 2, 3
      (Multicast Session MS2 is re-established)

Author's Address

Gilles Bourdon France Telecom 38-40, rue du General Leclerc 92794 Issy les Moulineaux Cedex 9 - FRANCE Phone: +33 1 4529-4645 EMail: gilles.bourdon@francetelecom.com
Top   ToC   RFC4045 - Page 28
Full Copyright Statement

   Copyright (C) The Internet Society (2005).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.