<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-ac-lxsm-lxnm-glue-12" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="AC Glue for VPN Models">A YANG Data Model for Augmenting VPN Service and Network Models with Attachment Circuits</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ac-lxsm-lxnm-glue-12"/>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Richard Roberts">
      <organization>Juniper</organization>
      <address>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Samier Barguil Giraldo">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="09"/>
    <area>Operations and Management</area>
    <workgroup>OPSAWG</workgroup>
    <keyword>Slice Service</keyword>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Automation</keyword>
    <keyword>Network Automation</keyword>
    <keyword>Orchestration</keyword>
    <keyword>service delivery</keyword>
    <keyword>Service provisioning</keyword>
    <keyword>service segmentation</keyword>
    <keyword>service flexibility</keyword>
    <keyword>service simplification</keyword>
    <keyword>Network Service</keyword>
    <keyword>3GPP</keyword>
    <keyword>Network Slicing</keyword>
    <abstract>
      <?line 60?>

<t>The document specifies a module that updates existing service (i.e., the Layer 2 Service Model (L2SM) and the Layer 3 Service Model (L3SM)) and
   network (i.e., the Layer 2 Network Model (L2NM) and the Layer 3 Network Model (L3NM)) Virtual Private Network (VPN) modules with the required information to bind specific
   VPN services to Attachment Circuits (ACs) that are created using the AC service ("ietf-ac-svc") and network ("ietf-ac-ntw") models.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Operations and Management Area Working Group Working Group mailing list (opsawg@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/attachment-circuit-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 66?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>To facilitate data transfer within the provider network, it is assumed that the appropriate setup
   is provisioned over the links that connect customer terminating
   points and a provider network (usually via a Provider Edge (PE)),
   allowing successfully data exchanged over these links.  The required
   setup is referred to in this document as Attachment Circuit (AC),
   while the underlying link is referred to as "bearer".</t>
      <t>The document specifies a YANG module ("ietf-ac-glue", <xref target="sec-glue"/>) that updates existing service and
network Virtual Private Network (VPN) modules with the required information to bind specific
services to ACs that are created using the AC service model <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. Specifically, the following modules are augmented:</t>
      <ul spacing="normal">
        <li>
          <t>The Layer 2 Service Model (L2SM) <xref target="RFC8466"/></t>
        </li>
        <li>
          <t>The Layer 3 Service Model (L3SM) <xref target="RFC8299"/></t>
        </li>
        <li>
          <t>The Layer 2 Network Model (L2NM) <xref target="RFC9291"/></t>
        </li>
        <li>
          <t>The Layer 3 Network Model (L3NM) <xref target="RFC9182"/></t>
        </li>
      </ul>
      <t>Likewise, the document augments the L2NM and L3NM with references to the ACs that are managed using the AC network model <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>This approach allows operators to separate AC provisioning from actual VPN service provisioning. Refer to <xref target="sep"/> for more discussion.</t>
      <t>The YANG data model in this document conforms to the Network
Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
      <t>Examples to illustrate the use of the "ietf-ac-glue" model are provided in <xref target="sec-example"/>.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
        <t>This document contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this I-D</t>
          </li>
          <li>
            <t>SSSS --&gt; the assigned RFC number for <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/></t>
          </li>
          <li>
            <t>NNNN --&gt; the assigned RFC number for <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/></t>
          </li>
          <li>
            <t>2023-11-13 --&gt; the actual date of the publication of this document</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The meanings of the symbols in the YANG tree diagrams are defined in <xref target="RFC8340"/>.</t>
      <t>This document uses terms defined in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
      <t>LxSM refers to both the L2SM and the L3SM.</t>
      <t>LxNM refers to both the L2NM and the L3NM.</t>
      <t>The following terms are used in the modules prefixes:</t>
      <dl>
        <dt>ac:</dt>
        <dd>
          <t>Attachment circuit</t>
        </dd>
        <dt>ntw:</dt>
        <dd>
          <t>Network</t>
        </dd>
        <dt>ref:</dt>
        <dd>
          <t>Reference</t>
        </dd>
        <dt>svc:</dt>
        <dd>
          <t>Service</t>
        </dd>
      </dl>
      <t>The names of data nodes are prefixed using the prefix associated with the corresponding imported YANG module as shown in <xref target="pref"/>:</t>
      <table anchor="pref">
        <name>Modules and Their Associated Prefixes</name>
        <thead>
          <tr>
            <th align="left">Prefix</th>
            <th align="left">Module</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ac-svc</td>
            <td align="left">ietf-ac-svc</td>
            <td align="left">Section 5.2 of RFC SSSS</td>
          </tr>
          <tr>
            <td align="left">ac-ntw</td>
            <td align="left">ietf-ac-ntw</td>
            <td align="left">RFC NNNN</td>
          </tr>
          <tr>
            <td align="left">l2nm</td>
            <td align="left">ietf-l3vpn-ntw</td>
            <td align="left">
              <xref target="RFC9291"/></td>
          </tr>
          <tr>
            <td align="left">l2vpn-svc</td>
            <td align="left">ietf-l2vpn-svc</td>
            <td align="left">
              <xref target="RFC8466"/></td>
          </tr>
          <tr>
            <td align="left">l3nm</td>
            <td align="left">ietf-l3vpn-ntw</td>
            <td align="left">
              <xref target="RFC9182"/></td>
          </tr>
          <tr>
            <td align="left">l3vpn-svc</td>
            <td align="left">ietf-l3vpn-svc</td>
            <td align="left">
              <xref target="RFC8299"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="relationship-to-other-ac-data-models">
      <name>Relationship to Other AC Data Models</name>
      <t><xref target="ac-overview"/> depicts the relationship between the various AC data models:</t>
      <ul spacing="normal">
        <li>
          <t>"ietf-ac-common" (<xref target="I-D.ietf-opsawg-teas-common-ac"/>)</t>
        </li>
        <li>
          <t>"ietf-bearer-svc" (<xref section="5.1" sectionFormat="of" target="I-D.ietf-opsawg-teas-attachment-circuit"/>)</t>
        </li>
        <li>
          <t>"ietf-ac-svc" (<xref section="5.2" sectionFormat="of" target="I-D.ietf-opsawg-teas-attachment-circuit"/>)</t>
        </li>
        <li>
          <t>"ietf-ac-ntw" (<xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>)</t>
        </li>
        <li>
          <t>"ietf-ac-glue" (<xref target="sec-glue"/>)</t>
        </li>
      </ul>
      <figure anchor="ac-overview">
        <name>AC Data Models</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="256" width="368" viewBox="0 0 368 256" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 32,144 L 32,240" fill="none" stroke="black"/>
              <path d="M 56,80 L 56,112" fill="none" stroke="black"/>
              <path d="M 72,144 L 72,176" fill="none" stroke="black"/>
              <path d="M 144,48 L 144,80" fill="none" stroke="black"/>
              <path d="M 192,40 L 192,112" fill="none" stroke="black"/>
              <path d="M 240,48 L 240,80" fill="none" stroke="black"/>
              <path d="M 328,80 L 328,160" fill="none" stroke="black"/>
              <path d="M 328,192 L 328,240" fill="none" stroke="black"/>
              <path d="M 56,80 L 144,80" fill="none" stroke="black"/>
              <path d="M 240,80 L 328,80" fill="none" stroke="black"/>
              <path d="M 104,128 L 128,128" fill="none" stroke="black"/>
              <path d="M 72,176 L 264,176" fill="none" stroke="black"/>
              <path d="M 32,240 L 120,240" fill="none" stroke="black"/>
              <path d="M 240,240 L 328,240" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="336,192 324,186.4 324,197.6" fill="black" transform="rotate(270,328,192)"/>
              <polygon class="arrowhead" points="248,48 236,42.4 236,53.6" fill="black" transform="rotate(270,240,48)"/>
              <polygon class="arrowhead" points="200,40 188,34.4 188,45.6" fill="black" transform="rotate(270,192,40)"/>
              <polygon class="arrowhead" points="152,48 140,42.4 140,53.6" fill="black" transform="rotate(270,144,48)"/>
              <polygon class="arrowhead" points="136,128 124,122.4 124,133.6" fill="black" transform="rotate(0,128,128)"/>
              <polygon class="arrowhead" points="112,128 100,122.4 100,133.6" fill="black" transform="rotate(180,104,128)"/>
              <polygon class="arrowhead" points="80,144 68,138.4 68,149.6" fill="black" transform="rotate(270,72,144)"/>
              <polygon class="arrowhead" points="40,144 28,138.4 28,149.6" fill="black" transform="rotate(270,32,144)"/>
              <g class="text">
                <text x="188" y="36">ietf-ac-common</text>
                <text x="48" y="132">ietf-ac-svc</text>
                <text x="200" y="132">ietf-bearer-svc</text>
                <text x="320" y="180">ietf-ac-ntw</text>
                <text x="180" y="244">ietf-ac-glue</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
                ietf-ac-common
                 ^     ^     ^
                 |     |     |
      +----------+     |     +----------+
      |                |                |
      |                |                |
ietf-ac-svc <--> ietf-bearer-svc        |
   ^    ^                               |
   |    |                               |
   |    +------------------------ ietf-ac-ntw
   |                                    ^
   |                                    |
   |                                    |
   +----------- ietf-ac-glue -----------+
]]></artwork>
        </artset>
      </figure>
      <t>"ietf-ac-common" is imported  by "ietf-bearer-svc", "ietf-ac-svc", and "ietf-ac-ntw".
Bearers managed using "ietf-bearer-svc" may be referenced in the service ACs managed using "ietf-ac-svc".
Similarly, a bearer managed using "ietf-bearer-svc" may list the set of ACs that use that bearer.
In order to ease correlation between an AC service request and the actual AC provisioned in the network, "ietf-ac-ntw" uses the AC references exposed by "ietf-ac-svc".
To bind Layer 2 VPN or Layer 3 VPN services with ACs, "ietf-ac-glue" augments the LxSM and LxNM with AC service references exposed by "ietf-ac-svc" and AC network references exposed by "ietf-ac-ntw".</t>
    </section>
    <section anchor="sample-uses-of-the-data-models">
      <name>Sample Uses of the Data Models</name>
      <section anchor="acs-terminated-by-one-or-multiple-customer-edges-ces">
        <name>ACs Terminated by One or Multiple Customer Edges (CEs)</name>
        <t><xref target="uc"/> depicts two target topology flavors that involve ACs. These topologies have the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>A Customer Edge (CE) can be either a physical device or a logical entity. Such logical entity is typically a software component (e.g., a virtual service function that is hosted within the provider's network or a third-party infrastructure). A CE is seen by the network as a peer Service Attachment Point (SAP) <xref target="RFC9408"/>.</t>
          </li>
          <li>
            <t>CEs may be either dedicated to one single connectivity service or host multiple connectivity services (e.g., CEs with roles of service functions <xref target="RFC7665"/>).</t>
          </li>
          <li>
            <t>A network provider may bind a single AC to one or multiple peer SAPs (e.g., CE1 and CE2 are tagged as peer SAPs for the same AC). For example, and as discussed in <xref target="RFC4364"/>, multiple CEs can be attached to a PE over the same attachment circuit. This scenario is typically implemented when the Layer 2 infrastructure between the CE and the network is a multipoint service.</t>
          </li>
          <li>
            <t>A single CE may terminate multiple ACs, which can be associated with the same bearer or distinct bearers (e.g., CE4).</t>
          </li>
          <li>
            <t>Customers may request protection schemes in which the ACs associated with their endpoints are terminated by the same PE (e.g., CE3), distinct PEs (e.g., CE4), etc. The network provider uses this request to decide where to terminate the AC in the service provider network and also whether to enable specific capabilities (e.g., Virtual Router Redundancy Protocol (VRRP)).</t>
          </li>
        </ul>
        <figure anchor="uc">
          <name>Examples of ACs</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="512" viewBox="0 0 512 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,112" fill="none" stroke="black"/>
                <path d="M 8,144 L 8,192" fill="none" stroke="black"/>
                <path d="M 72,64 L 72,112" fill="none" stroke="black"/>
                <path d="M 72,144 L 72,192" fill="none" stroke="black"/>
                <path d="M 112,80 L 112,176" fill="none" stroke="black"/>
                <path d="M 176,112 L 176,144" fill="none" stroke="black"/>
                <path d="M 192,32 L 192,104" fill="none" stroke="black"/>
                <path d="M 192,152 L 192,224" fill="none" stroke="black"/>
                <path d="M 200,112 L 200,144" fill="none" stroke="black"/>
                <path d="M 280,208 L 280,240" fill="none" stroke="black"/>
                <path d="M 288,248 L 288,272" fill="none" stroke="black"/>
                <path d="M 304,208 L 304,240" fill="none" stroke="black"/>
                <path d="M 352,64 L 352,112" fill="none" stroke="black"/>
                <path d="M 352,144 L 352,192" fill="none" stroke="black"/>
                <path d="M 360,32 L 360,56" fill="none" stroke="black"/>
                <path d="M 360,200 L 360,224" fill="none" stroke="black"/>
                <path d="M 376,64 L 376,112" fill="none" stroke="black"/>
                <path d="M 376,144 L 376,192" fill="none" stroke="black"/>
                <path d="M 448,64 L 448,112" fill="none" stroke="black"/>
                <path d="M 448,144 L 448,192" fill="none" stroke="black"/>
                <path d="M 480,192 L 480,272" fill="none" stroke="black"/>
                <path d="M 504,64 L 504,112" fill="none" stroke="black"/>
                <path d="M 504,144 L 504,192" fill="none" stroke="black"/>
                <path d="M 192,32 L 360,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 352,64 L 376,64" fill="none" stroke="black"/>
                <path d="M 448,64 L 504,64" fill="none" stroke="black"/>
                <path d="M 72,80 L 112,80" fill="none" stroke="black"/>
                <path d="M 376,80 L 400,80" fill="none" stroke="black"/>
                <path d="M 424,80 L 448,80" fill="none" stroke="black"/>
                <path d="M 376,96 L 400,96" fill="none" stroke="black"/>
                <path d="M 424,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 8,112 L 72,112" fill="none" stroke="black"/>
                <path d="M 176,112 L 200,112" fill="none" stroke="black"/>
                <path d="M 352,112 L 376,112" fill="none" stroke="black"/>
                <path d="M 448,112 L 504,112" fill="none" stroke="black"/>
                <path d="M 112,128 L 136,128" fill="none" stroke="black"/>
                <path d="M 160,128 L 176,128" fill="none" stroke="black"/>
                <path d="M 8,144 L 72,144" fill="none" stroke="black"/>
                <path d="M 176,144 L 200,144" fill="none" stroke="black"/>
                <path d="M 352,144 L 376,144" fill="none" stroke="black"/>
                <path d="M 448,144 L 504,144" fill="none" stroke="black"/>
                <path d="M 376,160 L 400,160" fill="none" stroke="black"/>
                <path d="M 424,160 L 448,160" fill="none" stroke="black"/>
                <path d="M 72,176 L 112,176" fill="none" stroke="black"/>
                <path d="M 376,176 L 400,176" fill="none" stroke="black"/>
                <path d="M 424,176 L 448,176" fill="none" stroke="black"/>
                <path d="M 8,192 L 72,192" fill="none" stroke="black"/>
                <path d="M 352,192 L 376,192" fill="none" stroke="black"/>
                <path d="M 448,192 L 504,192" fill="none" stroke="black"/>
                <path d="M 280,208 L 304,208" fill="none" stroke="black"/>
                <path d="M 192,224 L 280,224" fill="none" stroke="black"/>
                <path d="M 304,224 L 360,224" fill="none" stroke="black"/>
                <path d="M 280,240 L 304,240" fill="none" stroke="black"/>
                <path d="M 288,272 L 376,272" fill="none" stroke="black"/>
                <path d="M 400,272 L 480,272" fill="none" stroke="black"/>
                <g class="text">
                  <text x="412" y="68">(b1)</text>
                  <text x="412" y="84">AC</text>
                  <text x="40" y="100">CE1</text>
                  <text x="364" y="100">PE</text>
                  <text x="412" y="100">AC</text>
                  <text x="480" y="100">CE3</text>
                  <text x="412" y="116">(b2)</text>
                  <text x="148" y="132">AC</text>
                  <text x="188" y="132">PE</text>
                  <text x="272" y="132">Network</text>
                  <text x="360" y="132">|</text>
                  <text x="412" y="148">(b3)</text>
                  <text x="412" y="164">AC</text>
                  <text x="40" y="180">CE2</text>
                  <text x="364" y="180">PE</text>
                  <text x="412" y="180">AC</text>
                  <text x="480" y="180">CE4</text>
                  <text x="412" y="196">(b3)</text>
                  <text x="292" y="228">PE</text>
                  <text x="388" y="276">AC</text>
                  <text x="20" y="292">(bx)</text>
                  <text x="48" y="292">=</text>
                  <text x="84" y="292">bearer</text>
                  <text x="124" y="292">Id</text>
                  <text x="144" y="292">x</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                       .--------------------.
                       |                    |
.-------.              |                   .--.  (b1)  .------.
|       +----.         |                   |  +---AC---+      |
|  CE1  |    |         |                   |PE+---AC---+  CE3 |
'-------'    |       .--.                  '--'  (b2)  '------'
             +---AC--+PE|     Network       |
.-------.    |       '--'                  .--.  (b3)  .------.
|       |    |         |                   |  +---AC---+      |
|  CE2  +----'         |                   |PE+---AC---+  CE4 |
'-------'              |                   '--'  (b3)  '---+--'
                       |          .--.      |              |
                       '----------+PE+------'              |
                                  '--'                     |
                                   |                       |
                                   '-----------AC----------'
(bx) = bearer Id x
]]></artwork>
          </artset>
        </figure>
        <t>These ACs can be referenced when creating VPN services. Refer to the examples provided in <xref target="sec-example"/> to illustrate how VPN services can be bound to ACs.</t>
      </section>
      <section anchor="sep">
        <name>Separate AC Provisioning From Actual VPN Service Provisioning</name>
        <t>The procedure to provision a service in a service provider network may depend on the practices adopted by a service provider. This includes the flow put in place for the provisioning of advanced network services and how they are bound to an attachment circuit. For example, a single attachment circuit may be used to host multiple connectivity services (e.g., Layer 2 VPN ("ietf-l2vpn-svc"), Layer 3 VPN ("ietf-l3vpn-svc"), Network Slice Service ("ietf-network-slice-service")). In order to avoid service interference and redundant information in various locations, a service provider may expose an interface to manage ACs network-wide using <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. Customers can request an attachment circuit ("ietf-ac-svc") to be put in place, and then refer to that AC when requesting VPN services that are bound to the AC ("ietf-ac-glue").</t>
        <t>Also, internal references ("ietf-ac-ntw") used within a service provider network to implement ACs can be used by network controllers to glue the L2NM ("ietf-l2vpn-ntw") or the L3NM ("ietf-l3vpn-ntw") services with relevant ACs.</t>
        <t><xref target="_u-ex"/> shows the positioning of the AC models in the overall service delivery process.</t>
        <figure anchor="_u-ex">
          <name>An Example of AC Models Usage</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="688" width="512" viewBox="0 0 512 688" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,592 L 8,624" fill="none" stroke="black"/>
                <path d="M 48,592 L 48,624" fill="none" stroke="black"/>
                <path d="M 96,464 L 96,512" fill="none" stroke="black"/>
                <path d="M 104,352 L 104,400" fill="none" stroke="black"/>
                <path d="M 120,576 L 120,640" fill="none" stroke="black"/>
                <path d="M 136,400 L 136,464" fill="none" stroke="black"/>
                <path d="M 136,512 L 136,568" fill="none" stroke="black"/>
                <path d="M 176,320 L 176,352" fill="none" stroke="black"/>
                <path d="M 176,464 L 176,512" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,64" fill="none" stroke="black"/>
                <path d="M 208,128 L 208,176" fill="none" stroke="black"/>
                <path d="M 208,240 L 208,288" fill="none" stroke="black"/>
                <path d="M 208,408 L 208,528" fill="none" stroke="black"/>
                <path d="M 232,352 L 232,400" fill="none" stroke="black"/>
                <path d="M 272,64 L 272,128" fill="none" stroke="black"/>
                <path d="M 272,176 L 272,240" fill="none" stroke="black"/>
                <path d="M 272,288 L 272,320" fill="none" stroke="black"/>
                <path d="M 296,352 L 296,400" fill="none" stroke="black"/>
                <path d="M 336,32 L 336,64" fill="none" stroke="black"/>
                <path d="M 336,128 L 336,176" fill="none" stroke="black"/>
                <path d="M 336,240 L 336,288" fill="none" stroke="black"/>
                <path d="M 368,320 L 368,352" fill="none" stroke="black"/>
                <path d="M 368,400 L 368,568" fill="none" stroke="black"/>
                <path d="M 384,576 L 384,640" fill="none" stroke="black"/>
                <path d="M 424,352 L 424,400" fill="none" stroke="black"/>
                <path d="M 456,592 L 456,624" fill="none" stroke="black"/>
                <path d="M 496,592 L 496,624" fill="none" stroke="black"/>
                <path d="M 208,32 L 336,32" fill="none" stroke="black"/>
                <path d="M 208,64 L 336,64" fill="none" stroke="black"/>
                <path d="M 208,128 L 336,128" fill="none" stroke="black"/>
                <path d="M 208,176 L 336,176" fill="none" stroke="black"/>
                <path d="M 208,240 L 336,240" fill="none" stroke="black"/>
                <path d="M 208,288 L 336,288" fill="none" stroke="black"/>
                <path d="M 176,320 L 368,320" fill="none" stroke="black"/>
                <path d="M 104,352 L 232,352" fill="none" stroke="black"/>
                <path d="M 296,352 L 424,352" fill="none" stroke="black"/>
                <path d="M 104,400 L 232,400" fill="none" stroke="black"/>
                <path d="M 296,400 L 424,400" fill="none" stroke="black"/>
                <path d="M 96,464 L 176,464" fill="none" stroke="black"/>
                <path d="M 96,512 L 176,512" fill="none" stroke="black"/>
                <path d="M 120,576 L 384,576" fill="none" stroke="black"/>
                <path d="M 8,592 L 48,592" fill="none" stroke="black"/>
                <path d="M 456,592 L 496,592" fill="none" stroke="black"/>
                <path d="M 48,608 L 120,608" fill="none" stroke="black"/>
                <path d="M 384,608 L 456,608" fill="none" stroke="black"/>
                <path d="M 8,624 L 48,624" fill="none" stroke="black"/>
                <path d="M 456,624 L 496,624" fill="none" stroke="black"/>
                <path d="M 120,640 L 384,640" fill="none" stroke="black"/>
                <g class="text">
                  <text x="268" y="52">Customer</text>
                  <text x="108" y="84">Customer</text>
                  <text x="176" y="84">Service</text>
                  <text x="232" y="84">Model</text>
                  <text x="72" y="100">ietf-l2vpn-svc,</text>
                  <text x="200" y="100">ietf-l3vpn-svc,</text>
                  <text x="392" y="100">ietf-network-slice-service,</text>
                  <text x="100" y="116">ietf-ac-svc,</text>
                  <text x="208" y="116">ietf-ac-glue,</text>
                  <text x="296" y="116">and</text>
                  <text x="376" y="116">ietf-bearer-svc</text>
                  <text x="272" y="148">Service</text>
                  <text x="272" y="164">Orchestration</text>
                  <text x="112" y="196">Network</text>
                  <text x="168" y="196">Model</text>
                  <text x="72" y="212">ietf-l2vpn-ntw,</text>
                  <text x="200" y="212">ietf-l3vpn-ntw,</text>
                  <text x="336" y="212">ietf-sap-ntw,</text>
                  <text x="448" y="212">ietf-ac-glue,</text>
                  <text x="96" y="228">and</text>
                  <text x="160" y="228">ietf-ac-ntw</text>
                  <text x="264" y="260">Network</text>
                  <text x="272" y="276">Orchestration</text>
                  <text x="56" y="308">Network</text>
                  <text x="144" y="308">Configuration</text>
                  <text x="224" y="308">Model</text>
                  <text x="164" y="372">Domain</text>
                  <text x="364" y="372">Domain</text>
                  <text x="168" y="388">Orchestration</text>
                  <text x="360" y="388">Orchestration</text>
                  <text x="36" y="420">Device</text>
                  <text x="64" y="436">Configuration</text>
                  <text x="32" y="452">Model</text>
                  <text x="132" y="484">Config</text>
                  <text x="136" y="500">Manager</text>
                  <text x="256" y="548">NETCONF/CLI................</text>
                  <text x="376" y="548">.</text>
                  <text x="208" y="564">|</text>
                  <text x="84" y="596">Bearer</text>
                  <text x="420" y="596">Bearer</text>
                  <text x="28" y="612">CE#1</text>
                  <text x="248" y="612">Network</text>
                  <text x="476" y="612">CE#2</text>
                  <text x="28" y="660">Site</text>
                  <text x="56" y="660">A</text>
                  <text x="476" y="660">Site</text>
                  <text x="504" y="660">B</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                          .---------------.
                          |   Customer    |
                          '-------+-------'
          Customer Service Model  |
  ietf-l2vpn-svc, ietf-l3vpn-svc, | ietf-network-slice-service,
       ietf-ac-svc, ietf-ac-glue, | and ietf-bearer-svc
                          .-------+-------.
                          |    Service    |
                          | Orchestration |
                          '-------+-------'
           Network Model          |
  ietf-l2vpn-ntw, ietf-l3vpn-ntw, | ietf-sap-ntw, ietf-ac-glue,
           and ietf-ac-ntw        |
                          .-------+-------.
                          |   Network     |
                          | Orchestration |
                          '-------+-------'
    Network Configuration Model   |
                      .-----------+-----------.
                      |                       |
             .--------+------.       .--------+------.
             |    Domain     |       |     Domain    |
             | Orchestration |       | Orchestration |
             '---+-----------'       '--------+------'
  Device         |        |                   |
  Configuration  |        |                   |
  Model          |        |                   |
            .----+----.   |                   |
            | Config  |   |                   |
            | Manager |   |                   |
            '----+----'   |                   |
                 |        |                   |
                 | NETCONF/CLI..................
                 |        |                   |
               .--------------------------------.
 .----. Bearer |                                | Bearer .----.
 |CE#1+--------+            Network             +--------+CE#2|
 '----'        |                                |        '----'
               '--------------------------------'
  Site A                                                  Site B
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="module-tree-structure">
      <name>Module Tree Structure</name>
      <t><xref target="RFC8299"/> specifies that a 'site-network-access' attachment is achieved through a
'bearer' with an 'ip-connection' on top. From that standpoint, a 'site-network-access' is mapped to an attachment circuit with both Layers 2 and 3 properties as per <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. <xref target="RFC8466"/> specifies that a 'site-network-access' represents a logical Layer 2 connection to a site. A 'site-network-access' can thus be mapped to an attachment circuit with  Layer 2 properties <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. Similarly, 'vpn-network-access' defined in both <xref target="RFC9182"/> and <xref target="RFC9291"/> is mapped to an attachment circuit as per <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> or <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>As such, ACs created using the "ietf-ac-svc" module <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> can be referenced in other
VPN-related modules (e.g., L2SM, L3SM, L2NM, and L3NM). Also, ACs managed using the "ietf-ac-ntw" module <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> can be referenced in VPN-related network modules (mainly, the L2NM and the L3NM). The required augmentations to that aim are shown in <xref target="tree"/>.</t>
      <figure anchor="tree">
        <name>AC Glue Tree Structure</name>
        <artwork align="center"><![CDATA[
module: ietf-ac-glue

  augment /l2vpn-svc:l2vpn-svc/l2vpn-svc:sites/l2vpn-svc:site
            /l2vpn-svc:site-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
  augment /l2vpn-svc:l2vpn-svc/l2vpn-svc:sites/l2vpn-svc:site
            /l2vpn-svc:site-network-accesses
            /l2vpn-svc:site-network-access:
    +--rw ac-svc-ref?   ac-svc:attachment-circuit-reference {ac-glue}?
  augment /l3vpn-svc:l3vpn-svc/l3vpn-svc:sites/l3vpn-svc:site
            /l3vpn-svc:site-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
  augment /l3vpn-svc:l3vpn-svc/l3vpn-svc:sites/l3vpn-svc:site
            /l3vpn-svc:site-network-accesses
            /l3vpn-svc:site-network-access:
    +--rw ac-svc-ref?   ac-svc:attachment-circuit-reference {ac-glue}?
  augment /l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service
            /l2nm:vpn-nodes/l2nm:vpn-node/l2nm:vpn-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
    +--rw ac-ntw-ref* [ac-ref]
       +--rw ac-ref         leafref
       +--rw node-ref?      leafref
       +--rw network-ref?   -> /nw:networks/network/network-id
  augment /l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service
            /l2nm:vpn-nodes/l2nm:vpn-node/l2nm:vpn-network-accesses
            /l2nm:vpn-network-access:
    +--rw ac-svc-ref?   ac-svc:attachment-circuit-reference {ac-glue}?
    +--rw ac-ntw-ref {ac-glue}?
       +--rw ac-ref?        leafref
       +--rw node-ref?      leafref
       +--rw network-ref?   -> /nw:networks/network/network-id
  augment /l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service
            /l3nm:vpn-nodes/l3nm:vpn-node/l3nm:vpn-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
    +--rw ac-ntw-ref* [ac-ref]
       +--rw ac-ref         leafref
       +--rw node-ref?      leafref
       +--rw network-ref?   -> /nw:networks/network/network-id
  augment /l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service
            /l3nm:vpn-nodes/l3nm:vpn-node/l3nm:vpn-network-accesses
            /l3nm:vpn-network-access:
    +--rw ac-svc-ref?   ac-svc:attachment-circuit-reference {ac-glue}?
    +--rw ac-ntw-ref {ac-glue}?
       +--rw ac-ref?        leafref
       +--rw node-ref?      leafref
       +--rw network-ref?   -> /nw:networks/network/network-id
]]></artwork>
      </figure>
      <t>When an AC is referenced within a specific network access, then that AC information takes precedence over any overlapping information that is also enclosed for this network access.</t>
      <ul empty="true">
        <li>
          <t>This approach is consistent with the design in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> where an AC service reference, called 'ac-svc-name', is used to indicate the names of AC services. As per <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, when both 'ac-svc-name' and the attributes of 'attachment-circuits' are defined, the 'ac-svc-name' takes precedence.</t>
        </li>
      </ul>
      <t>The "ietf-ac-glue" module includes provisions to reference ACs within or outside a VPN network access to accommodate deployment contexts where an AC reference may be created before or after a VPN instance is created. <xref target="ref-within-access"/> illustrates how an AC reference can be included as part of a specific VPN network access, while <xref target="ref-outside-access"/> shows how AC references can be indicated outside individual VPN network access entries.</t>
    </section>
    <section anchor="sec-glue">
      <name>The AC Glue ("ietf-ac-glue") YANG Module</name>
      <t>This modules augments the L2SM <xref target="RFC8466"/>, the L3SM <xref target="RFC8299"/>, the L2NM <xref target="RFC9291"/>, and the L3NM <xref target="RFC9182"/>.</t>
      <t>This module uses references defined in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <sourcecode markers="true" name="ietf-ac-glue@2023-11-13.yang"><![CDATA[
module ietf-ac-glue {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-ac-glue";
  prefix ac-glue;

  import ietf-l3vpn-svc {
    prefix l3vpn-svc;
    reference
      "RFC 8299: YANG Data Model for L3VPN Service Delivery";
  }
  import ietf-l2vpn-svc {
    prefix l2vpn-svc;
    reference
      "RFC 8466: A YANG Data Model for Layer 2 Virtual Private
                 Network (L2VPN) Service Delivery";
  }
  import ietf-l3vpn-ntw {
    prefix l3nm;
    reference
      "RFC 9182: A YANG Network Data Model for Layer 3 VPNs";
  }
  import ietf-l2vpn-ntw {
    prefix l2nm;
    reference
      "RFC 9291: A YANG Network Data Model for Layer 2 VPNs";
  }
  import ietf-ac-svc {
    prefix ac-svc;
    reference
      "RFC SSSS: YANG Data Models for Bearers and 'Attachment
                 Circuits'-as-a-Service (ACaaS)";
  }
  import ietf-ac-ntw {
    prefix ac-ntw;
    reference
      "RFC NNNN: A Network YANG Data Model for Attachment Circuits";
  }

  organization
    "IETF OPSAWG (Operations and Management Area Working Group)";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/opsawg/>
     WG List:  <mailto:opsawg@ietf.org>

     Editor:   Mohamed Boucadair
               <mailto:mohamed.boucadair@orange.com>
     Author:   Richard Roberts
               <mailto:rroberts@juniper.net>
     Author:   Samier Barguil
               <mailto:ssamier.barguil_giraldo@nokia.com>
     Author:   Oscar Gonzalez de Dios
               <mailto:oscar.gonzalezdedios@telefonica.com>";
  description
    "This YANG module defines a YANG model for augmenting the LxSM
     and the LxNM with attachment circuit references.

     Copyright (c) 2024 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2023-11-13 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A YANG Data Model for Augmenting VPN Service
                 and Network Models with Attachment Circuits";
  }

  feature ac-glue {
    description
      "The VPN implementation supports binding a specific VPN
       network access or site access to an attachment circuit.";
  }

  grouping single-ac-svc-ref {
    description
      "A grouping with single reference to a service AC.";
    leaf ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that was
         provisioned using the ACaaS module.";
    }
  }

  grouping single-ac-svc-ntw-ref {
    description
      "A grouping with single AC references.";
    leaf ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that was
         provisioned using the ACaaS module.";
    }
    container ac-ntw-ref {
      description
        "A reference to the AC that was provisioned using the AC
         network module.";
      uses ac-ntw:attachment-circuit-reference;
    }
  }

  grouping ac-svc-ref {
    description
      "A set of service-specific AC-related data.";
    leaf-list ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that was
         provisioned using the ACaaS module.";
    }
  }

  grouping ac-svc-ntw-ref {
    description
      "A set of AC-related data.";
    leaf-list ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that was
         provisioned using the ACaaS module.";
    }
    list ac-ntw-ref {
      key "ac-ref";
      description
        "A reference to the AC that was provisioned using the AC
         network module.";
      uses ac-ntw:attachment-circuit-reference;
    }
  }

  augment "/l2vpn-svc:l2vpn-svc"
        + "/l2vpn-svc:sites/l2vpn-svc:site"
        + "/l2vpn-svc:site-network-accesses" {
    description
      "Augments VPN site network accesses with AC provisioning
       details. Concretely, it binds a site to a set of
       attachment circuits with Layer 2 properties that were
       created using the ACaaS module.";
    uses ac-svc-ref;
  }

  augment "/l2vpn-svc:l2vpn-svc"
        + "/l2vpn-svc:sites/l2vpn-svc:site"
        + "/l2vpn-svc:site-network-accesses"
        + "/l2vpn-svc:site-network-access" {
    if-feature "ac-glue";
    description
      "Augments VPN site network access with AC provisioning
       details. Concretely, it glues a 'site-network-access'
       to an attachment circuit with Layer 2 properties that was
       created using the ACaaS module.

       The ACaaS information takes precedence over any overlapping
       information that is also provided for a site network access.";
    uses single-ac-svc-ref;
  }

  augment "/l3vpn-svc:l3vpn-svc"
        + "/l3vpn-svc:sites/l3vpn-svc:site"
        + "/l3vpn-svc:site-network-accesses" {
    description
      "Augments VPN site network accesses with AC provisioning
       details. Concretely, it binds a site to a set of attachment
       circuits with both Layers 2 and 3 properties that were
       created using the ACaaS module.";
    uses ac-svc-ref;
  }

  augment "/l3vpn-svc:l3vpn-svc"
        + "/l3vpn-svc:sites/l3vpn-svc:site"
        + "/l3vpn-svc:site-network-accesses"
        + "/l3vpn-svc:site-network-access" {
    if-feature "ac-glue";
    description
      "Augments VPN site network access with AC provisioning
       details. Concretely, it glues a 'site-network-access' to an
       attachment circuit with both Layer 2 and Layer 3 properties
       that was created using the ACaaS module.

       The ACaaS information takes precedence over any overlapping
       information that is also provided for a site network access.";
    uses single-ac-svc-ref;
  }

  augment "/l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service"
        + "/l2nm:vpn-nodes/l2nm:vpn-node"
        + "/l2nm:vpn-network-accesses" {
    description
      "Augments VPN network accesses with both service and network
       AC provisioning details. Concretely, it binds a site to (1)
       a set of attachment circuits with Layer 2 properties that were
       created using the ACaaS module and (2) a set of attachment
       circuits with Layer 2 properties that were provisioned using
       the AC network model.";
    uses ac-svc-ntw-ref;
  }

  augment "/l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service"
        + "/l2nm:vpn-nodes/l2nm:vpn-node"
        + "/l2nm:vpn-network-accesses"
        + "/l2nm:vpn-network-access" {
    if-feature "ac-glue";
    description
      "Augments VPN network access with service and network
       references to an AC. Concretely, it glues a VPN network
       access to (1) an attachment circuit with Layer 2 properties
       that was created using the ACaaS module and (2) an attachment 
       circuit with Layer 2 properties that was created using the AC 
       network module.

       The AC service and network information takes precedence over
       any overlapping information that is also provided for a VPN
       network access.";
    uses single-ac-svc-ntw-ref;
  }

  augment "/l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service"
        + "/l3nm:vpn-nodes/l3nm:vpn-node"
        + "/l3nm:vpn-network-accesses" {
    description
      "Augments VPN network accesses with both service and network
       AC provisioning details. Concretely, it binds a site to (1)
       a set of attachment circuits with both Layer 2 and Layer 3 
       properties that were created using the ACaaS module and (2)
       a set of attachment circuits with both Layer 2 and Layer 3
       properties that were provisioned using the AC network model.";
    uses ac-svc-ntw-ref;
  }

  augment "/l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service"
        + "/l3nm:vpn-nodes/l3nm:vpn-node"
        + "/l3nm:vpn-network-accesses"
        + "/l3nm:vpn-network-access" {
    if-feature "ac-glue";
    description
      "Augments VPN network access with service and network
       references to an AC. Concretely, it glues a VPN network
       access to (1) an attachment circuit with both Layer 2 and
       Layer 3 properties that was created using the ACaaS module
       and (2) an attachment circuit with both Layer 2 and Layer 3
       properties that was created using the AC network module.

       The AC service and network information takes precedence over
       any overlapping information that is also provided for a VPN
       network access.";
    uses single-ac-svc-ntw-ref;
  }
}
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section is modeled after the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
      <t>The "ietf-ac-common" YANG module defines a data model that is
designed to be accessed via YANG-based management protocols, such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These protocols have to
use a secure transport layer (e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and
QUIC <xref target="RFC9000"/>) and have to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
   provides the means to restrict access for particular NETCONF or
   RESTCONF users to a preconfigured subset of all available NETCONF or
   RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   and delete operations to these data nodes without proper protection
   or authentication can have a negative effect on network operations.
   Specifically, the following subtrees and data nodes have particular
   sensitivities/vulnerabilities:</t>
      <dl>
        <dt>'ac-svc-ref' and 'ac-ntw-ref':</dt>
        <dd>
          <t>An attacker who is able to access network nodes can
undertake various attacks, such as deleting a running VPN
service, interrupting all the traffic of a client. Specifically,
an attacker may modify (including delete) the ACs that are bound to a running service, leading to
malfunctioning of the service and therefore to Service Level
Agreement (SLA) violations.
    : Such activity can be detected by adequately monitoring and tracking
network configuration changes.</t>
        </dd>
      </dl>
      <t>Some of the readable data nodes in this YANG module may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  Specifically, the following
subtrees and data nodes have particular sensitivities/vulnerabilities:</t>
      <dl>
        <dt>'ac-svc-ref' and 'ac-ntw-ref':</dt>
        <dd>
          <t>These references do not expose per se
privacy-related information, however 'ac-svc-ref' may be used to track
the set of VPN instances in which a given customer is involved.</t>
        </dd>
        <dt/>
        <dd>
          <t>Note that, unlike 'ac-svc-ref', 'ac-ntw-ref' is unique within the scope of
   a node and may multiplex many peer CEs.</t>
        </dd>
      </dl>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
   the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   URI:  urn:ietf:params:xml:ns:yang:ietf-ac-glue
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
   Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group:</t>
      <artwork><![CDATA[
   Name:  ietf-ac-glue
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-ac-glue
   Prefix:  ac-glue
   Maintained by IANA?  N
   Reference:  RFC XXXX
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-18"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-14"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-common-ac">
          <front>
            <title>A Common YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   The document specifies a common Attachment Circuits (ACs) YANG
   module, which is designed with the intent to be reusable by other
   models.  For example, this common model can be reused by service
   models to expose ACs as a service, service models that require
   binding a service to a set of ACs, network and device models to
   provision ACs, etc.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-common-ac-13"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="28" month="August" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-16"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="13" month="November" year="2024"/>
            <abstract>
              <t>   This memo provides guidelines for authors and reviewers of
   specifications containing YANG modules, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.  The document also updates RFC 6020 by
   clarifying how modules and their revisions are handled by IANA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-21"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
      </references>
    </references>
    <?line 671?>

<section anchor="sec-example">
      <name>Examples</name>
      <section anchor="ref-within-access">
        <name>A Service AC Reference within The VPN Network Access</name>
        <t>Let us consider the example depicted in <xref target="ex-vpws"/> which is inspired from <xref section="2.1" sectionFormat="of" target="RFC4664"/>. Each PE is servicing two CEs. Let us also assume that the service references to identify attachment circuits with these CEs are shown in the figure.</t>
        <figure anchor="ex-vpws">
          <name>VPWS Topology Example</name>
          <artwork align="center"><![CDATA[
.-----.                                           .-----.
|     |  AC1                                AC2   |     |
| CE1 |--+ 2001:db8:100::1     2001:db8:200::1 +--| CE2 |
|     |  |    .-----.   .-----.     .-----.    |  |     |
'-----'  +----|---- |   |  P  |     | ----+----+  '-----'
              |VPWS\----|-----|-----|/VPWS|
              | PE1 |===|=====|=====| PE2 |
              |    /|---|-----|-----|\\   |
.-----.  +----|---- |   |     |     | ----|----+  .-----.
|     |  |    '-----'   '-----'     '-----'    |  |     |
| CE3 |--+                                     +--| CE4 |
|     |  AC3                                 AC4  |     |
'-----'                                           '-----'
]]></artwork>
        </figure>
        <t>As shown in <xref target="ex-vpws-query"/>, the service AC references can be explicitly indicated in the L2NM query for the realization of the Virtual Private Wire Service (VPWS) <xref section="3.1.1" sectionFormat="of" target="RFC4664"/>).</t>
        <figure anchor="ex-vpws-query">
          <name>Example of VPWS Creation with AC Service References</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
   "ietf-l2vpn-ntw:l2vpn-ntw":{
      "vpn-services":{
         "vpn-service":[
            {
               "vpn-id":"vpws12345",
               "vpn-description":"Sample VPWS with AC service \
                                                         references",
               "customer-name":"customer-12345",
               "vpn-type":"ietf-vpn-common:vpws",
               "bgp-ad-enabled":true,
               "signaling-type":"ietf-vpn-common:ldp-signaling",
               "global-parameters-profiles":{
                  "global-parameters-profile":[
                     {
                        "profile-id":"simple-profile",
                        "local-autonomous-system":65550,
                        "rd-auto":{
                           "auto":[
                              null
                           ]
                        },
                        "vpn-target":[
                           {
                              "id":1,
                              "route-targets":[
                                 {
                                    "route-target":"0:65535:1"
                                 }
                              ],
                              "route-target-type":"both"
                           }
                        ]
                     }
                  ]
               },
               "vpn-nodes":{
                  "vpn-node":[
                     {
                        "vpn-node-id":"pe1",
                        "ne-id":"2001:db8:100::1",
                        "active-global-parameters-profiles":{
                           "global-parameters-profile":[
                              {
                                 "profile-id":"simple-profile"
                              }
                           ]
                        },
                        "bgp-auto-discovery":{
                           "vpn-id":"587"
                        },
                        "signaling-option":{
                           "advertise-mtu":true,
                           "ldp-or-l2tp":{
                              "saii":1,
                              "remote-targets":[
                                 {
                                    "taii":2
                                 }
                              ],
                              "t-ldp-pw-type":"ethernet"
                           }
                        },
                        "vpn-network-accesses":{
                           "vpn-network-access":[
                              {
                                 "id":"1/1/1.1",
                                 "interface-id":"1/1/1",
                                 "description":"Interface to CE1",
                                 "active-vpn-node-profile":"simple-\
                                                            profile",
                                 "status":{
                                    "admin-status":{
                                       "status":"ietf-vpn-common:\
                                                            admin-up"
                                    },
                                    "ietf-ac-glue:ac-svc-ref":"AC1"
                                 }
                              },
                              {
                                 "id":"1/1/3.1",
                                 "interface-id":"1/1/3",
                                 "description":"Interface to CE3",
                                 "active-vpn-node-profile":"simple-\
                                                            profile",
                                 "status":{
                                    "admin-status":{
                                       "status":"ietf-vpn-common:\
                                                            admin-up"
                                    },
                                    "ietf-ac-glue:ac-svc-ref":"AC3"
                                 }
                              }
                           ]
                        }
                     },
                     {
                        "vpn-node-id":"pe2",
                        "ne-id":"2001:db8:200::1",
                        "active-global-parameters-profiles":{
                           "global-parameters-profile":[
                              {
                                 "profile-id":"simple-profile"
                              }
                           ]
                        },
                        "bgp-auto-discovery":{
                           "vpn-id":"587"
                        },
                        "signaling-option":{
                           "advertise-mtu":true,
                           "ldp-or-l2tp":{
                              "saii":2,
                              "remote-targets":[
                                 {
                                    "taii":1
                                 }
                              ],
                              "t-ldp-pw-type":"ethernet"
                           }
                        },
                        "vpn-network-accesses":{
                           "vpn-network-access":[
                              {
                                 "id":"2/1/2.1",
                                 "interface-id":"2/1/2",
                                 "description":"Interface to CE2",
                                 "active-vpn-node-profile":"simple-\
                                                            profile",
                                 "status":{
                                    "admin-status":{
                                       "status":"ietf-vpn-common:\
                                                            admin-up"
                                    },
                                    "ietf-ac-glue:ac-svc-ref":"AC2"
                                 }
                              },
                              {
                                 "id":"2/1/4.1",
                                 "interface-id":"2/1/4",
                                 "description":"Interface to CE4",
                                 "active-vpn-node-profile":"simple-\
                                                            profile",
                                 "status":{
                                    "admin-status":{
                                       "status":"ietf-vpn-common:\
                                                            admin-up"
                                    },
                                    "ietf-ac-glue:ac-svc-ref":"AC4"
                                 }
                              }
                           ]
                        }
                     }
                  ]
               }
            }
         ]
      }
   }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="ref-outside-access">
        <name>Network and Service AC References</name>
        <t>Let us consider the example depicted in <xref target="ex-topo"/> with two customer terminating points (CE1 and CE2). Let us also assume that the bearers to attach these CEs to the service provider network are already in place. References to identify these bearers are shown in the figure.</t>
        <figure anchor="ex-topo">
          <name>Topology Example</name>
          <artwork align="center"><![CDATA[
            .-----.   .--------------.   .-----.
.----.      | PE1 +===+              +===+ PE2 |      .----.
| CE1+------+"450"|   |     MPLS     |   |"451"+------+ CE2|
'----'   ^  '-----'   |              |   '-----'   ^  '----'
         |            |     Core     |             |  
    Bearer:1234       '--------------'         Bearer:5678
]]></artwork>
        </figure>
        <t>The AC service model <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> can be used by the provider to manage and expose the ACs over existing bearers as shown in <xref target="ex-ac"/>.</t>
        <figure anchor="ex-ac">
          <name>ACs Created Using ACaaS</name>
          <artwork><![CDATA[
{
  "ietf-ac-svc:attachment-circuits": {
    "ac-group-profile": [
      {
        "name": "an-ac-profile",
        "l2-connection": {
          "encapsulation": {
            "type": "ietf-vpn-common:dot1q",
            "dot1q": {
              "tag-type": "ietf-vpn-common:c-vlan",
              "cvlan-id": 550
            }
          }
        },
        "service": {
          "mtu": 1550,
          "svc-pe-to-ce-bandwidth": {
            "bandwidth": [
              {
                "bw-type": "ietf-vpn-common:bw-per-port",
                "cir": "20480000"
              }
            ]
          },
          "svc-ce-to-pe-bandwidth": {
            "bandwidth": [
              {
                "bw-type": "ietf-vpn-common:bw-per-port",
                "cir": "20480000"
              }
            ]
          },
          "qos": {
            "qos-profiles": {
              "qos-profile": [
                {
                  "profile": "QoS_Profile_A",
                  "direction": "ietf-vpn-common:both"
                }
              ]
            }
          }
        }
      }
    ],
    "ac": [
      {
        "name": "ac-1",
        "description": "First attachment",
        "ac-group-profile": [
          "an-ac-profile"
        ],
        "l2-connection": {
          "bearer-reference": "1234"
        }
      },
      {
        "name": "ac-2",
        "description": "Second attachment",
        "ac-group-profile": [
          "an-ac-profile"
        ],
        "l2-connection": {
          "bearer-reference": "5678"
        }
      }
    ]
  }
}
]]></artwork>
        </figure>
        <t>Let us now consider that the customer wants to request a VPLS instance between the sites as shown in <xref target="ex-vpls"/>.</t>
        <figure anchor="ex-vpls">
          <name>Example of VPLS</name>
          <artwork align="center"><![CDATA[
            |----------  VPLS "1543" ----------|
            
            .-----.   .--------------.   .-----.
.----.  AC1 | PE1 +===+              +===+ PE2 |  AC2 .----.
| CE1+------+"450"|   |     MPLS     |   |"451"+------+ CE2|
'----'   ^  '-----'   |              |   '-----'   ^  '----'
         |            |     Core     |             |  
    Bearer:1234       '--------------'         Bearer:5678
]]></artwork>
        </figure>
        <t>To that aim, existing ACs are referenced during the creation of the VPLS instance using the L2NM <xref target="RFC9291"/> and the "ietf-ac-glue" as shown in <xref target="ex-vpls-req"/>.</t>
        <figure anchor="ex-vpls-req">
          <name>Example of a VPLS Request Using L2NM and AC Glue (Message Body)</name>
          <artwork><![CDATA[
{
  "ietf-l2vpn-ntw:l2vpn-ntw": {
    "vpn-services": {
      "vpn-service": [
        {
          "vpn-id": "1543",
          "vpn-name": "CORPO-EXAMPLE",
          "customer-name": "EXAMPLE",
          "vpn-type": "ietf-vpn-common:vpls",
          "vpn-service-topology": "ietf-vpn-common:hub-spoke",
          "bgp-ad-enabled": false,
          "signaling-type": "ietf-vpn-common:ldp-signaling",
          "global-parameters-profiles": {
            "global-parameters-profile": [
              {
                "profile-id": "simple-profile",
                "ce-vlan-preservation": true,
                "ce-vlan-cos-preservation": true
              }
            ]
          },
          "vpn-nodes": {
            "vpn-node": [
              {
                "vpn-node-id": "450",
                "ne-id": "2001:db8:5::1",
                "role": "ietf-vpn-common:hub-role",
                "status": {
                  "admin-status": {
                    "status": "ietf-vpn-common:admin-up"
                  }
                },
                "active-global-parameters-profiles": {
                  "global-parameters-profile": [
                    {
                      "profile-id": "simple-profile"
                    }
                  ]
                },
                "signaling-option": {
                  "ldp-or-l2tp": {
                    "t-ldp-pw-type": "vpls-type",
                    "pw-peer-list": [
                      {
                        "peer-addr": "2001:db8:50::1",
                        "vc-id": "1543"
                      }
                    ]
                  }
                },
                "vpn-network-accesses": {
                  "ietf-ac-glue:ac-svc-ref": ["ac-1"]
                }
              },
              {
                "vpn-node-id": "451",
                "ne-id": "2001:db8:50::1",
                "role": "ietf-vpn-common:spoke-role",
                "status": {
                  "admin-status": {
                    "status": "ietf-vpn-common:admin-up"
                  }
                },
                "active-global-parameters-profiles": {
                  "global-parameters-profile": [
                    {
                      "profile-id": "simple-profile"
                    }
                  ]
                },
                "signaling-option": {
                  "ldp-or-l2tp": {
                    "t-ldp-pw-type": "vpls-type",
                    "pw-peer-list": [
                      {
                        "peer-addr": "2001:db8:5::1",
                        "vc-id": "1543"
                      }
                    ]
                  }
                },
                "vpn-network-accesses": {
                  "ietf-ac-glue:ac-svc-ref": ["ac-2"]
                }
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
        </figure>
        <t>Note that before implementing the VPLS instance creation request, the provider service orchestrator may first check if the VPLS service can be provided to the customer using the target delivery locations. The orchestrator uses the SAP model <xref target="RFC9408"/> as exemplified in <xref target="ex-sap-query"/>. This example assumes that the query concerns only PE1. A similar query can be issued for PE2.</t>
        <figure anchor="ex-sap-query">
          <name>Example of SAP Response (Message Body)</name>
          <artwork><![CDATA[
{
   "ietf-sap-ntw:service":[
      {
         "service-type":"ietf-vpn-common:vpls",
         "sap":[
            {
               "sap-id":"sap#1",
               "peer-sap-id":[
                  "ce-1"
               ],
               "description":"A parent SAP",
               "attachment-interface":"GE0/6/1",
               "interface-type":"ietf-sap-ntw:phy",
               "role":"ietf-sap-ntw:uni",
               "allows-child-saps":true,
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               }
            }
         ]
      }
   ]
}
]]></artwork>
        </figure>
        <t>The response in <xref target="ex-sap-query"/> indicates that the VPLS service can be delivered to CE1. <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> can be also used to access AC-related details that are bound to the target SAP (<xref target="ex-acntw-query-2"/>).</t>
        <figure anchor="ex-acntw-query-2">
          <name>Example of AC Network Response with SAP (Message Body)</name>
          <artwork><![CDATA[
{
   "ietf-sap-ntw:service":[
      {
         "service-type":"ietf-vpn-common:vpls",
         "sap":[
            {
               "sap-id":"sap#1",
               "peer-sap-id":[
                  "ce-1"
               ],
               "description":"A parent SAP",
               "attachment-interface":"GE0/6/1",
               "interface-type":"ietf-sap-ntw:phy",
               "role":"ietf-sap-ntw:uni",
               "allows-child-saps":true,
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               }
            },
            {
               "sap-id":"sap#11",
               "description":"A child SAP",
               "parent-termination-point":"GE0/6/4",
               "attachment-interface":"GE0/6/4.2",
               "interface-type":"ietf-sap-ntw:logical",
               "encapsulation-type":"ietf-vpn-common:vlan-type",
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               },
               "ietf-ac-ntw:ac":[
                  {
                     "ac-ref":"ac-1",
                     "node-ref":"example:pe2",
                     "network-ref":"example:an-id"
                  }
               ]
            }
         ]
      }
   ]
}
]]></artwork>
        </figure>
        <t>The provisioned AC at PE1 can be retrieved using the AC network model <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> as depicted in <xref target="ex-acntw-query"/>.</t>
        <figure anchor="ex-acntw-query">
          <name>Example of AC Network Response (Message Body)</name>
          <artwork><![CDATA[
{
   "ietf-ac-ntw:ac":[
      {
         "name":"ac-11",
         "svc-ref":"ac-1",
         "peer-sap-id":[
            "ce-1"
         ],
         "status":{
            "admin-status":{
               "status":"ietf-vpn-common:admin-up"
            },
            "oper-status":{
               "status":"ietf-vpn-common:op-up"
            }
         },
         "l2-connection":{
            "encapsulation":{
               "encap-type":"ietf-vpn-common:dot1q",
               "dot1q":{
                  "tag-type":"ietf-vpn-common:c-vlan",
                  "cvlan-id":550
               }
            },
            "bearer-reference":"1234"
         },
         "service":{
            "mtu":1550,
            "svc-pe-to-ce-bandwidth":{
               "bandwidth":[
                  {
                     "bw-type": "ietf-vpn-common:bw-per-port",
                     "cir":"20480000"
                  }
               ]
            },
            "svc-ce-to-pe-bandwidth":{
               "bandwidth":[
                  {
                     "bw-type": "ietf-vpn-common:bw-per-port",
                     "cir":"20480000"
                  }
               ]
            },
            "qos":{
               "qos-profiles":{
                  "qos-profile":[
                     {
                        "qos-profile-ref":"QoS_Profile_A",
                        "network-ref":"example:an-id",
                        "direction":"ietf-vpn-common:both"
                     }
                  ]
               }
            }
         }
      }
   ]
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bo Wu and Qin Wu for the review and comments.</t>
      <t>Thanks to Martin Björklund for the yangdoctors review, Gyan Mishra for the rtg-dir review, Ron Bonica for the opsdir review,
Reese Enghardt for the genart review, and Prachi Jain for the sec-dir review.</t>
      <t>Thanks to Mahesh Jethanandani for the AD review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
