TR 092 PDF
TR 092 PDF
TR 092 PDF
Technical Report
DSL Forum
TR-092
August 2004
Produced by:
The Architecture and Transport Working Group
Editor:
Ed Shrum, BellSouth Communications
Notice:
The DSL Forum is a non-profit corporation organized to create guidelines for DSL network system
development and deployment. This Technical Report has been approved by members of the Forum.
This document is not binding on the DSL Forum, any of its members, or any developer or service provider
involved in DSL. This document is subject to change, but only with approval of members of the Forum.
DSL Forum technical reports may be copied, downloaded, stored on a server or otherwise re-distributed
in their entirety only.
Notwithstanding anything to the contrary, the DSL Forum makes no representation or warranty,
expressed or implied, concerning this publication, its contents or the completeness, accuracy, or
applicability of any information contained in this publication. No liability of any kind shall be assumed by
the DSL Forum as a result of reliance upon any information contained in this publication. The DSL Forum
does not assume any responsibility to update or correct any information in this publication.
Broadband Remote Access Server Requirements Document TR-092
Table of Contents
8 OPERATIONS ................................................................................................................................ 34
8.1 EMS Interface Requirements .................................................................................................. 35
8.2 Provisioning ............................................................................................................................. 35
8.3 Fault Management................................................................................................................... 36
8.4 Configuration Management ..................................................................................................... 37
8.5 Performance Monitoring .......................................................................................................... 37
8.6 Trouble Resolution................................................................................................................... 39
9 SECURITY...................................................................................................................................... 39
APPENDIX A – MULTICAST SUPPORT.............................................................................................. 40
APPENDIX B - IP VPN SERVICES ....................................................................................................... 43
APPENDIX C - TRANSPARENT VIRTUAL LAN SERVICES .............................................................. 48
APPENDIX D – RADIUS ATTRIBUTES ............................................................................................... 51
Broadband Remote Access Server Requirements Document TR-092
Table of Figures
Application Service1
ASP A10-ASP
Network1 User1
DSL
Regional / Access Modem T
Network / RG
U User2
NSP
Network2 A10-NSP CPN
Network Service2
ATM
IP Access
BRAS ATM MDF NID
Node
Loop
L2TS
Eth
Regional / Access Network
1.1 Scope
The requirements included in this document are intended to meet the TR-59 phase 1 and 2 requirements.
While the requirements in this document are not meant to be inclusive of all possible deployment
scenarios, it is intended to include a broader scope than TR-59. Requirements for services not fully
described in TR-59 are included as appendixes. Additionally, service providers may require different scale
options for a BRAS device depending on their deployment architecture. The requirements contained
within this document pertain to equipment appropriate for the more common large central office
deployments. A large CO device will typically support between 64K to 128k subscriber sessions and an
aggregate downstream bandwidth of 2.5 Gbps. While focused on a large CO device, this document does
not preclude the development of smaller scale devices. The feature requirements contained in this
document (with the exception of scaling attributes) apply to any size device.
1.2 Requirements
In this document, several words are used to signify the requirements of the specification. These words
are often capitalized.
MUST This word, or the adjective “REQUIRED”, means that the definition is an absolute
requirement of the specification
MUST NOT This phrase means that the definition is an absolute prohibition of the specification.
SHOULD This word, or the adjective “RECOMMENDED”, means that there may exist valid reasons
in particular circumstances to ignore this item, but the full implications must be
understood and carefully weighted before choosing a different course.
MAY This word, or the adjective “OPTIONAL”, means that this item is one of an allowed set of
alternatives. An implementation that does not include this option MUST be prepared to
inter-operate with another implementation that does include the option.
Broadband Remote Access Server Requirements Document TR-092
Edge Network The edge of the Regional Network. The Edge Network provides
access to various layer 2 services and connects to the Regional
Network core enabling the distribution of the data traffic between
various edge devices.
LNS Group A configured set of LNSs for a given NSP. This set of LNSs may be
used for load-balancing, redundancy, etc. The LNS group is either
configured locally, or returned via RADIUS Tunnel-Server-Endpoint
attribute(s).
Loop A metallic pair of wires running from the customer’s premises to the
Access Node.
Many-to-Many Access Sessions The ability for multiple individual users or subscribers, within a single
premises, to simultaneously connect to multiple NSPs and ASPs.
Microflow A single instance of an application-to-application flow of packets,
which may for example be classified by source address, source
port, destination address, destination port and protocol id, or
stateful means.
Network Access Identifier (NAI) The user ID submitted by the client during PPP authentication as
defined in RFC 2486.
Broadband Remote Access Server Requirements Document TR-092
Tunnel Group A named group of L2TP tunnels between a BRAS (LAC) and an
LNS (or LTS) or set of LNS (or LTS). The tunnel group is used to
represent a logical connection between a given NSP and a BRAS
(or set of BRASs). The individual L2TP tunnels that are members of
the tunnel group can be configured for load balancing of traffic
and/or for redundancy. While the configuration of the tunnel group
(number of member tunnels, load balancing rules, etc.) may differ
from BRAS to BRAS, the tunnel group name is global and can be
returned via RADIUS. Newly established PPP sessions may be
directed to a tunnel group for an NSP independent of the tunnel
group's configuration or state on a given BRAS.
Tunnel Server Endpoint RADIUS attribute defined in section 3.1 of RFC2868. The Tunnel
Server Endpoint attribute may be used to return the IP address of
one or more LNSs (or LTSs) at an NSP.
Upstream The direction of transmission from the ATU-R (modem) to the ATU-
C (Access Node).
User Typically, a member, employee or guest at the Subscriber’s
household or business using the DSL circuit capabilities.
2 General Requirements
R-2-01 The device MUST have redundant Stratum 3 (or better) internal oscillators for node timing
and meets or exceeds the synchronization requirements in Section 4.6, Issue 1 revision 2, of
Telcordia GR-1110-Core.
R-2-02 The BRAS MUST be non blocking i.e. the forwarding capacity of the internal implementation
(e.g. switch fabric, forwarding plane, etc) must be equal or exceed that of the incoming
interfaces.
R-2-03 The device MUST not have ‘head-of-line blocking’ problems
R-2-04 Traffic overload on one port MUST not affect the normal behavior of other ports
2.1 Availability
R-2-05 The device SHOULD provide overall availability (hardware and software) excluding
scheduled maintenance of 99.999%
R-2-06 All components MUST be hot swappable.
R-2-07 It MUST be possible to make all appropriate configuration changes and software upgrades on
the running system, without affecting active users.
R-2-08 Automatic non-revertive switch over from a failed card to a redundant one MUST be
supported. Manual switch over should be supported as an option.
R-2-09 All components of the device MUST be configurable to provide either 1:1, N:1, or a
distributed equipment redundancy capability across all of the following system components, if
present, including:
a) Switching Fabric
b) Packet Forwarding Engine
c) Fabric Interfaces
d) Control and Route Processors
Broadband Remote Access Server Requirements Document TR-092
e) Physical Interfaces Trunk/Line Cards including APS (e.g., SONET GR253) and other
interface card redundancy capabilities. All ATM, POS, Ethernet, and channelized
interface line modules up to OC-48 MUST support N:1 redundancy.
f) Management System/Mgmt Interfaces
g) Power Converters/Supplies
h) Fans
i) Power Feeds
R-2-10 The switch over from primary to secondary (redundant) power input MUST be automatic and
cause no disruption of service.
R-2-11 Switch-over procedures for controller, fabric cards, if present, and power supply MUST
function correctly when operated in redundant mode.
R-2-12 The device MUST support Ethernet redundancy with a recovery on a point-to-point Gigabit
Ethernet connection within 800 ms.
R-2-13 The device MUST maintain operational state for VCs, PPP, or RFC 2684 sessions when it
switches to a redundant control processor, and preserve all relevant functions or protocols
bound to them.
R-2-14 [North America] The device MUST support APS 1+1 port protection on SONET ports as a
configurable option.
R-2-15 The device MUST support a forwarding plane detection and recovery (e.g. switch fabric
detection and switch over) switchover time within 60 ms.
R-2-16 The device MUST limit the duration of control plane outages to 2 seconds, specifically
session establishment and session/policy updates.
R-2-17 The device MUST maintain all sessions (e.g. ATM, PPP or IP) in any single component
failure scenario.
R-2-18 A fully configured device SHOULD be fully operational within 10 minutes from a cold start
condition.
R-2-19 The device MUST continue forwarding when one control card is removed from or fails in the
platform if a redundant card is present.
R-2-20 The device MUST support the re-insertion of a control card without disrupting forwarding of
traffic
Provisioned PVCs --- / 8,000 --- / 24,000 --- / 64,000 --- / 256,000
MST /SHD
Active PVCs with 2,000 / 4,000 8,000 / 12,000 16,000 / 32,000 64,000 / 128,000
at least one IP or
PPP interface
MST / SHD
Bridged 2684 IP + --- --- --- 96,000 / 192,000
PPP Sessions
(1.5 x Active
PVCs)
IP Interfaces --- --- --- 96,000 / 192,000
(1.5 x Active
PVCs)
Total # of 64,000 / 128,000
Triggered RIP
Updates
Total # of RIPv2 --- --- --- 5% of the total
Updates number of active
VCs that the device
can terminate
Total # of --- --- --- 50 per host
Triggered RIP or
RIPv2 Route Adv.
R-2-28 The device MUST support RFC 2544, Benchmarking Methodology for Network Interconnect
Devices, requirements.
R-2-29 The throughput capability of the forwarding engine function of the device, in terms of Packets
Per Second (PPS) SHOULD equal to the sum of the rate of all the interface types that can
exist in a valid configuration of the device.
R-2-30 PPS performance SHOULD be sufficient to fill all types of supported interfaces, with 64 byte
IP packets at line rate.
Broadband Remote Access Server Requirements Document TR-092
3 Physical Interfaces
3.1 General
R-3-01 The device MUST have a craft access console (through RS-232 VT-100 type terminals).
R-3-02 The device SHOULD have redundant Building Integrated Timing Source (BITS) inputs for
external node timing.
R-3-03 The device MUST be able to derive timing from channelized interfaces.
R-3-04 Any interface MUST be able to be used as either access or trunk without impacting the
functionality of the interface.
R-3-05 The device MUST support physical loop back on a per port basis on all SONET and TDM
interfaces.
3.2 SONET
R-3-06 [North America] The device ‘s SONET interfaces MUST support implementation of SONET
1+1 Automatic Protection Switching (APS) that is compliant with requirements in section
5.3.2.1, issue 2 of GR-253-CORE.
R-3-07 [North America] The device’s SONET interfaces MUST be compliant with GR-253-CORE
including SONET physical layer management capabilities that are compliant with the
requirements for memory administration, alarm surveillance, performance monitoring (near
and far end, testing processes, and control features in section 6, of issue 2, of Telcordia GR
253-CORE.
R-3-08 [North America] The optical interfaces SHOULD support the use of exchangeable or tunable
ITU-grid lasers, such that a given output may be configured to work directly with passive
WDM transport gear.
R-3-09 [North America] All optical interfaces MUST support single-mode operation.
R-3-10 [North America] All optical interfaces SHOULD support multi-mode operation.
R-3-11 [North America] All optical interfaces SHOULD be available in short range, intermediate
range, and long range laser configurations.
Broadband Remote Access Server Requirements Document TR-092
3.3 TDM
Requirements for what interface types will support which protocol instances is provided in the table below
(MST=MUST; SHD=SHOULD; NA=not applicable):
Interface PPP ATM MPLS
Module
DS3 MST MST NA
Chan OC- MST MST MST
3
OC-3c MST MST MST
Chan OC- MST MST MST
12
OC-12c MST MST MST
OC-48c MST SHD MST
STM-1 MST MST MST
STM-4 MST MST MST
STM-16 MST MST MST
3.4 Ethernet
R-3-12 The device MUST support 10/100 Mbps, and 1000 Mbps twisted pair and fiber optic
requirements of “IEEE Std 802.3, 2002 Edition, Carrier sense multiple access with collision
detection CSMA/CD) access method and physical layer specifications” including:
• 100Base-TX
• 1000Base-LX (also known as 1000Base-LH) using GBIC or SFP-GBIC
• 1000Base-SX using GBIC or SFP-GBIC
• 1000Base-ZX using GBIC or SFP-GBIC.
R-3-13 The device MUST support auto-negotiation on all copper 10/100 Ethernet interfaces.
R-3-14 Optical Gigabit interfaces line cards MUST support GigaBit Interface Converter or Small
Form-factor Plugable modules.
R-3-15 The device MUST support IEEE 802.3ad link aggregation / load sharing functionality on
physical ports.
Broadband Remote Access Server Requirements Document TR-092
4 Protocols
IP
PPP
IP PPPoE IP
802.3 IP 802.3 PPP
2684 2684 2684 PPPoA
ATM ATM ATM ATM ATM
PHY PHY PHY PHY PHY
IP
PPP
L2TP
UDP
IP IP
ATM, ATM,
ATM Ethernet, etc Ethernet, etc
PHY PHY PHY
* Stacks E & X are required when the device supports the ATM cross connect function
R-4-01 Stacks A, through E illustrate the protocols that MUST be supported between the BRAS
device and the end user across the U interface. Stacks Y and Z MUST be support between
the BRAS and NSPs or BRAS to BRAS.
R-4-02 The device MUST be able to aggregate end users sessions using protocol stacks (A) through
(D) of Figure 4-1 into any of the aggregation stacks (Y) or (Z) of Figure 4-1.
R-4-03 Multiple simultaneous sessions received from one end user across a single PVC MUST be
able to be aggregated differently from one another using either stacks (Y) or (Z).
R-4-04 The device MUST support termination and routing of different protocol stacks coming from
one PVC simultaneously. Specifically IP over 2684 and PPPoE over 2684 MUST be able to
be dealt with when coming across a single PVC.
R-4-05 The device MUST simultaneously support the following aggregation services described in the
following sections 4.4 PPP/PTA, 4.8 LAC, and 4.3 Bridged Ethernet.
4.1 IPv4
R-4-06 The device MUST support IPv4 as defined in RFC 791, Internet Protocol.
R-4-07 The device MUST support the reassembly of fragmented packets (RFC 791, Internet
Protocol).
R-4-08 The device MUST support ICMP as defined in RFC 792.
4.2 ATM
R-4-09 The device MUST support ATM VP and VC aggregation and termination
R-4-10 The device MUST support ATM VP, VC cross connect capabilities
R-4-11 The device MUST preserve ATM class of service if providing a VC, VP cross connect
function
R-4-12 The device SHOULD support ATM Forum User-Network Interwork Interface (UNI)
Specification Version 3.1.
R-4-13 The device MUST support the ATM UBR service class, as defined by the ATM Forum.
R-4-14 The device SHOULD support the ATM UBR with MDCR service class, as defined by the ATM
Forum Traffic Management Specification 4.1, af-tm-0150.000.
R-4-15 The device MUST support the ATM nrt-VBR service class, as defined by the ATM Forum
Traffic Management Specification 4.1.
R-4-16 The device MUST support the ATM rt-VBR service class, as defined by the ATM Forum
Traffic Management Specification 4.1.
R-4-17 The device MUST support the ATM CBR service class, as defined by the ATM Forum Traffic
Management Specification 4.1.
R-4-18 The device SHOULD support ATM OAM VC Management per I.610.
R-4-19 The device MUST support the full range of VPI and VCI values. These ranges MUST be fully
configurable.
R-4-20 The device MUST support ATM F4 and F5 OAM loop back, AIS , and RDI (remote defect
indication) on all ATM interfaces per I.610 specification of the ITU-T.
Broadband Remote Access Server Requirements Document TR-092
4.4 PPP
R-4-27 The device MUST be able to terminate end user sessions using protocol stacks (C) and (D)
PPPoE (RFC 2516) and PPPoA (RFC 2364).
R-4-28 The device MUST support RFC 1661, The Point-to-Point Protocol (PPP).
R-4-29 The device MUST support RFC 1570, PPP LCP Extensions.
R-4-30 The device MUST support LCP based MTU re-negotiation.
R-4-31 The device MUST support RFC 1332, PPP IP Control Protocol (IPCP).
R-4-32 The device MUST support PAP as defined in RFC 1334, PPP Authentication Protocols.
R-4-33 The device MUST support CHAP as defined in RFC 1334, PPP Authentication Protocols.
R-4-34 The device MUST support the following authentication sequences:
a. PAP only
b. CHAP only
c. CHAP then PAP
R-4-35 The device SHOULD support extensions to IPCP to include primary DNS, secondary DNS
and NBNS IP addresses per RFC 1877 – PPP Internet Protocol Control Protocol Extensions
for Name Server Addresses.
R-4-36 IP subnet masks MUST be communicated with IPCP using the PPP IPCP option with option
code144, the length of the option being 6 and the mask being expressed as a32-bit mask
(e.g. 0xFFFFFF80), not as a number indicating the consecutive number of 1s in the mask
(from 0 to 32).
R-4-37 The device MUST be able to terminate PPP coming in using PPPoE and/or PPPoA and
forward the IP packets across any interface (excluding management interfaces) such that
there are no restrictions.
R-4-38 The device MUST be able to inter-work with PPPoE client implementations that support
PPPoE RFC 2516.
R-4-39 The device MUST properly establish the PPP (LCP) link (as described in RFC 1661) prior to
accepting user ID and authentication (this is standard operation for PPP).
Broadband Remote Access Server Requirements Document TR-092
R-4-40 The device MUST support a variety of delimiters for NAI parsing, including but not limited to /
and @ when examining the userid passed during PPP authentication.
R-4-41 If a PPP session is terminated for any reason, the device MUST gracefully shutdown the
associated PPPoE or PPPoA session.
R-4-42 The device MUST shutdown and clean-up all PPPoE or PPPoA sessions if the PVC is
deleted for any reason, and update any information related to these sessions (such as
RADIUS Accounting, routing, etc.).
R-4-43 The device MUST detect and drop any PPPoE packets if its session packets are found to be
inconsistent with the MAC address recorded during the discovery phase.
R-4-44 The device MUST gracefully shutdown a PPPoE or PPPoA session upon receiving a PADT
packet from the subscriber associated with the PPPoE or PPPoA session.
R-4-45 The device MUST drop (do nothing to process) PPPoE or PPPoA packets that refer to an
invalid (ended or unrecognized) session ID.
R-4-46 The device MUST be able to alarm or log the condition under which a subscriber sends
PPPoE or PPPoA messages with invalid session ID or MAC address.
R-4-47 The device MUST support the ability to control PPP session time limits based on NAI.
R-4-48 The device MUST support a configurable limit for the total number of PPP sessions on an
access VC.
R-4-49 The device MUST support multiple PPPoE sessions on a single subscriber PVC and have
the ability to encapsulate PPP packets from one PPPoE session onto a Layer 2 Tunneling
protocol (L2TP) tunnel while terminating the other PPP sessions.
R-4-50 The device MUST support a PPPoE subscriber receiving service from L2TP and PTA NSPs
simultaneously. One ADSL VC MUST support access to one or more L2TP NSPs and to one
or more PTA NSPs.
R-4-51 The device MUST be able to limit the number of PPPoE sessions for each FQDN
(domain/realm) on an access VC.
R-4-52 The device MUST support a PPP-based multiple destination selection service. Destinations
are identified by the NAI of the PPP session.
R-4-53 The device MUST support the ability to assign access lists to subscribers that attach to
specific FQDNs (domains/realms).
R-4-54 The device MUST support domain/realm/destination limiting/filtering. Each access VC is
configurable with a list of valid destinations and realms. On that VC, subscriber that attempts
to connect to a destination not in the list of valid destinations MUST be rejected.
R-4-55 The device MUST support using both the VPI/VCI of the ATM PVC that delivered the PPP
session and/or the NAI provided by the user during the PPP authentication phase, to
determine if a PPP session is to be L2TP tunneled.
R-4-56 The device MUST be able to determine the endpoint to which a PPP session is to be L2TP
tunneled (a particular tunneling endpoint i.e., LNS) either by equating the VPI/VCI of the ATM
PVC on which the PPP session was received or by using the NAI provided by the user during
the PPP authentication phase.
R-4-57 If both a NAI and a VPI/VCI association are found, the VPI/VCI association MUST by default
have precedence if the NAI points to different tunneled endpoints. However this behavior
could be overridden by the VPI/VCI RADIUS authentication server, which could reject the
session.
R-4-58 The device MUST support exception binding. PPP packets from all the PPPoE or PPPoA
sessions coming in on a subscriber PVC are forced onto a given L2TP tunnel by default
Broadband Remote Access Server Requirements Document TR-092
unless the NAI matches a predefined character string (e.g. “myISP”). In that case the PPP
session is terminated on the device and routed to the appropriate service provider.
R-4-59 The device SHOULD support the Exclusive PPP Session Feature (Enhanced security for
corporate access).
When the Exclusive PPP Session feature is activated, access to a particular secure
“exclusive” destination is allowed, but it is not possible to simultaneously access another
destination over the same DSL VC.
♦ If a session to an exclusive destination is active, attempts to set up sessions to other
destinations are rejected.
♦ If there are any active sessions to other destinations, attempts to set up a session to the
exclusive destination are rejected.
♦ Multiple sessions to the exclusive destination are allowed, provided this is consistent with
all other service specifications.
R-4-60 The device MUST support routing of IP datagrams recovered from terminated PPP sessions
using Policy Routing. At a minimum, the product MUST allow a policy whereby the source IP
address contained in the IP datagram is used to determine how to forward the IP datagram.
R-4-61 The device MUST be capable of supporting PPP termination and aggregation for sessions
carrying IP packets that have private IP addresses and routing them to the correct NSP
based on the NAI supplied during PPP authentication.
R-4-62 The device MUST be capable of supporting PPP termination and aggregation for sessions
carrying IP packets that have private IP addresses and routing them to the correct NSP
based on the incoming PVC’s VPI/VCI.
R-4-63 In PTA mode, the device MUST support per PPP session inactivity timers that can be
configured to trigger the tear down of an PPP session that has been inactive for a
configurable period of time.
R-4-64 The device MUST have the option to strip the domain name extension before forwarding the
user name to a RADIUS servers.
4.5 Ethernet
R-4-68 The device MUST learn dynamically any MAC address supported on the RFC 1483/2684
bridged ATM PVC by means of ARP.
R-4-69 The device MUST only send unicast traffic to a port where is has learned its MAC address to
keep subscriber MAC addresses from being snooped from other ports.
R-4-70 The device MUST support at least 1550 byte Ethernet payloads on physical Ethernet
interfaces for placing 1500 byte IP packets into L2TP without requiring fragmentation.
Broadband Remote Access Server Requirements Document TR-092
R-4-71 The device MUST support at least 1550 byte Ethernet payloads on logical RFC 2684
Ethernet Interfaces.
R-4-72 The device MUST support IEEE 802.1p (Traffic Class Expediting).
R-4-73 The device MUST support VLANs as specified in “IEEE Std 802.1Q-1998, Virtual Bridged
Local Area Networks” including classification, traffic management, and tagging.
R-4-74 The device SHOULD be able to use a 802.1Q VLAN interface as a logical IP interface (e.g.
for an IP VPN).
R-4-75 The device MUST not permit the association of a particular Ethernet MAC address on more
than one subscriber PVC at the same time.
R-4-76 The device MUST age MAC addresses that are dynamically learned and remove them from
the MAC address table if the device does not send traffic to the MAC address or receive
traffic from the MAC address for a certain period of time. This period of time is called the
“MAC address timeout interval”.
R-4-77 The device MUST allow a configurable value for the MAC address timeout interval.
4.6 MPLS
R-4-84 The device MUST support RFC 3031, Multiprotocol Label Switching Architecture.
R-4-85 The device MUST support RFC 3032, MPLS Label Stack Encoding.
R-4-86 The device SHOULD support 3 levels of labels (label stacking).
R-4-87 The device MUST support RFC 3036, LDP Specification.
R-4-88 The device MUST support Multi-protocol Label Switching OAM mechanisms (e.g. “Detecting
MPLS Data Plane Failures", draft-ietf-mpls-lsp-ping-05.txt).
R-4-89 The device MUST support fast re-route of LSPs capability (e.g. draft-ieft-mpls-rsvp-lsp-
fastreroute.01.txt).
R-4-90 The device MUST use liberal label retention per RFC 3031.
R-4-91 The device MUST use independent label distribution control in RFC 3036.
R-4-92 The device MUST support Downstream Unsolicited label distribution per RFC 3036
R-4-93 The device MUST support E-LSPs per RFC 3270
R-4-94 The device SHOULD support L-LSPs per RFC 3270
R-4-95 The device MUST support Multi-protocol Extensions for BGP-4 per RFC 2283.
R-4-96 The device MUST support BGP Site of Origin.
Broadband Remote Access Server Requirements Document TR-092
4.7 L2TP
R-4-107 The device MUST support L2TP over the User Datagram Protocol (UDP) over Internet
Protocol (IP) (UDP/IP) as defined in “Layer Two Tunneling Protocol ‘L2TP’,” RFC 2661.
R-4-108 The device MUST be able to function simultaneously as a LAC and LNS.
R-4-109 The device MUST support initiating and terminating L2TP tunnels on loop back addresses of
the device.
R-4-110 The device MUST support multiple loop back addresses per virtual router.
R-4-111 The device SHOULD support L2TP Disconnect Cause Information (RFC 3145)
R-4-119 The device when acting as a LAC MUST be able to aggregate PPP sessions from PPPoA,
PPPoE, and L2TP onto a single L2TP tunnel (RFC 2661).
R-4-120 The device MUST support L2TP tunneling of PPP frames from multiple PPP sessions.
R-4-121 The device MUST support multiple L2TP tunnels per physical or virtual interface.
R-4-122 The device MUST be able to support multiple L2TP tunnels to a single NSP.
R-4-123 The device MUST support tunnel groups where multiple L2TP tunnels can be created
between a pair of LAC and LNS and be assigned to a tunnel group. The device MUST
support the capability to configure a tunnel which can carry PPP sessions with multiple
FQDNs (domains/realms).
R-4-124 After a PPPoE or PPPoA session is established between a subscriber and the device, the
device MUST be able to select (or create) an L2TP tunnel to carry PPP traffic from the
PPPoE or PPPoA session based on the domain name provided as part of the NAI presented
during PPP authentication.
R-4-125 The device MUST not process or alter the NAI or authentication information other than
examining the user name extension so that the PPP session can be properly routed.
R-4-126 The device MUST pass all PPP user ID and authentication information to the SP over the
L2TP tunnel supporting the SP.
R-4-127 The device MUST not inhibit the use of IPCP between a NSP and a subscriber.
R-4-128 The device MUST establish a PPPoE or PPPoA session instance prior to establishing an
associated L2TP session.
R-4-129 The device MUST terminate a PPPoE or PPPoA session instance upon termination of an
associated L2TP session.
R-4-130 If a tunnel is not present the device MUST dynamically create a new one.
R-4-131 The device MUST refuse any new PPPoE or PPPoA sessions if the maximum number of
PPP sessions and L2TP tunnels is reached (per port, device, etc).
R-4-132 The device MUST support the routing of a PPP session to a particular tunnel group based on
RADIUS response fields.
R-4-133 The device MUST be able to terminate L2TP tunnels dynamically when L2TP tunnels are not
carrying any PPP sessions.
R-4-134 The device MUST gracefully shutdown all PPP sessions associated with an L2TP tunnel if
the L2TP tunnel is terminated for any reason.
R-4-135 The device MUST support load balancing of PPP sessions between L2TP tunnels in a tunnel
group or LNS Group.
R-4-136 The device MUST support directing PPP sessions across multiple tunnels on a strict priority
basis so that the first tunnel of the Tunnel Group or LNS Group fills, then the second tunnel of
the Tunnel Group or LNS Group, etc. The device MUST support load balancing of PPP
sessions across multiple tunnels on a weighted basis (e.g., 75% of session requests directed
to tunnel 1, 25% to tunnel 2).
R-4-137 If a tunnel in a tunnel group is not available, then the PPP sessions MUST continue to load
balance across the remaining tunnels.
R-4-138 The device MUST support the capability to add a tunnel to or delete a tunnel from a tunnel
group, without disruption of the other tunnels in the group or the PPP sessions in those
tunnels, and subsequently load balance over the resulting tunnels in the group.
R-4-139 The device MUST support the ability to cap the number of PPP sessions a L2TP tunnel can
support.
Broadband Remote Access Server Requirements Document TR-092
R-4-140 The device MUST support fail over configuration between L2TP tunnels in a tunnel group or
LNS Group.
R-4-141 The device MUST support the establishment of L2TP tunnels between loop back addresses.
R-4-142 The device MUST support the routing of a PPP session to an LNS or LNS Group based on
the RADIUS Tunnel Server Endpoint attribute defined in section 3.1 of RFC2868.
R-4-143 If a LNS in an LNS Group is not available, then the PPP sessions MUST continue to load
balance across the remaining LNSs
4.9.1 OSPF
R-4-167 The device MUST support OSPF version 2 as defined in RFC 2328.
R-4-168 The device MUST support RFC 2370, The OSPF Opaque LSA Option.
R-4-169 The device MUST support RFC 3137, OSPF Stub Router Advertisement.
R-4-170 The device MUST support RFC 1587, The OSPF Not-So-Stubby Area (NSSA) Option.
R-4-171 The device MUST be able to act as an ABR and an ASBR.
R-4-172 The device MUST support at least 100 OSPF adjacencies per instance of OSPF.
R-4-173 The device MUST support at least as many instances of OSPF on the platform as virtual
routers supported by the device.
R-4-174 The device MUST support at least 5000 routes within a given OSPF area.
R-4-175 The device SHOULD support an OSPF graceful restart capability (e.g. draft-ietf-ospf-hitless-
restart-08.txt).
R-4-176 The device SHOULD support OSPF sham links over 2547bis VPNs (e.g. draft-ietf-l3vpn-ospf-
2547-00.txt).
R-4-177 The OSPF version-2 protocol, if used, MUST employ cryptographic authentication, as
specified in RFC 2328.
4.9.2 BGP
R-4-178 The device MUST support BGP-4 as defined in RFC 1771 including the following BGP
features/attributes: extended communities, VPN-IP addresses, route acceptance and
announcement filters, multihop iBGP/eBGP, authentication, and OSPF or IS-IS LSA types in
the extended community attribute.
R-4-179 The device MUST support BGP Outbound Route Filter (ORF) per Cooperative Route Filtering
Capability for BGP-4 (e.g. draft-ietf-idr-route-filter-08.txt).
R-4-180 The device MUST support RFC 3065, Autonomous System Confederations for BGP.
R-4-181 The device MUST support BGP Policy-lists. This feature adds the capability for a network
operator to group route map match clauses into named lists called policy lists. A policy list
functions like a macro. When a policy list is referenced in a route map, all of the match
clauses are evaluated and processed as if they had been configured directly in the route
map.
R-4-182 The device MUST support RFC 1997, BGP Communities Attribute – these attributes MUST
be settable by the device.
R-4-183 The device MUST support RFC 2439, BGP Route Flap Damping.
R-4-184 The device MUST support RFC 2918, Route Refresh Capability for BGP-4.
R-4-185 The device MUST support RFC 2796, BGP Route Reflection – An Alternative to Full Mesh
IBGP.
R-4-186 The device MUST support capability negotiation per RFC 3392 (Capabilities Advertisement
with BGP-4)
R-4-187 The device MUST support exact matches for BGP community attributes for ingress/egress
route filtering/policies.
R-4-188 The device MUST support a minimum of 50 BGP Sessions per device.
Broadband Remote Access Server Requirements Document TR-092
R-4-189 The device SHOULD support BGP graceful restart (e.g. draft-ietf-idr-restart-08.txt).
R-4-190 The device MUST support RFC 2858, MBGP for VPN, multicast and IPv6.
R-4-191 The device SHOULD support for 4 byte AS numbers (draft-ietf-idr-as4bytes-07.txt).
R-4-192 The device MUST support RFC 2385, BGP MD5 authentication, and TTL scheme for security
4.9.3 ISIS
R-4-193 The device MUST support IS-IS routing protocol (ISO 10589).
R-4-194 The device MUST support configurable IS-IS Incremental SPF Algorithm.
R-4-195 The device MUST support IS-IS Administrative Tags (RT, ext community transparency)
R-4-196 The device MUST support at least 100 IS-IS adjacencies.
R-4-197 The device MUST support at least 5000 routes within a given ISIS area.
R-4-198 The device SHOULD support RFC 3567, ISIS hmac-md5 authentication.
R-4-199 The device SHOULD support draft-ietf-isis-restart-04.txt, ISIS graceful restart.
R-4-200 The device SHOULD support ISIS for multi-topology (e.g. draft-ietf-isis-wg-multi-topology-
06.txt).
R-4-201 The device SHOULD support ISIS for point-to-point over LAN (draft-ietf-isis-igp-p2p-over-lan-
03.txt).
R-4-202 The device MUST support RFC 2763, ISIS dynamic hostname.
R-4-203 The device MUST support ISIS Transient black hole avoidance (RFC 3277),
R-4-204 The device MUST support 3-way handshake for ISIS Point-to-Point Adjacency (RFC 3373).
4.9.4 RIP
R-4-205 The device MUST support RIP version 2 as defined in IETF STD 0056 for route
advertisements from the device to customer CPE.
R-4-206 The device MUST support sending RIP updates to customer CPE without listening to updates
from the CPE.
R-4-207 The device MUST support Triggered RIP as defined in IETF RFC 2091 for sending route
advertisements from the BRAS to the customer CPE
R-4-208 The device MUST support sending Triggered RIP or RIPv2 updates to as at least as many
hosts as specified in section 2.4 at a rate at least equivalent to the radius setup rate of the
device.
R-4-209 The device MAY support additional mechanisms to send IP routing information to the CPE
(e.g. TR-044).
4.10 IPv6
The intent of this section is to provide the high level requirements for IPv6 so that vendors will design
platforms with the system resources capable of supporting IPv6 when the set of requirements are better
understood. This section is not intended to be all encompassing of the requirements for supporting an
IPv6 service.
R-4-210 The device SHOULD support RFC 2460, Internet Protocol, Version 6 (IPv6) Specification.
R-4-211 The device SHOULD support RFC 2373, IP Version 6 Addressing Architecture.
Broadband Remote Access Server Requirements Document TR-092
5 IP Services
5.1.1 RADIUS
R-5-11 The device MUST support RADIUS as defined in RFC 2865.
R-5-12 The device MUST support RFC 2868, RADIUS attributes for tunnel protocol support.
R-5-13 The device MUST support RADIUS extensions as RFC 2869.
R-5-14 The device SHOULD support Dynamic Authorization Extensions to RADIUS as RFC 3576.
R-5-15 The device MUST be able to forward RADIUS accounting traffic to accounting servers that are
different than the RADIUS authentication servers
R-5-16 Multiple RADIUS accounting servers MUST be able to be specified.
R-5-17 The device MUST support configurable IP addresses for RADIUS requests - The source IP
address in the IP packets used to carry RADIUS request messages is configurable in the B-RAS.
For example, a B-RAS loop back address can be used as the source IP address, even though the
IP packets go through one of many IP interfaces (as in the case of load balancing).
Broadband Remote Access Server Requirements Document TR-092
R-5-18 The device MUST support a fail over mechanism for redundant RADIUS servers.
R-5-19 The device MUST be able to access at least 16 RADIUS Accounting and 16 Authorization
servers per VR. Each RADIUS server MUST be configurable to act as a primary, secondary,
tertiary, … servers.
R-5-20 The device MUST support load-balancing requests across multiple RADIUS servers.
R-5-21 The device MUST provide support for limiting the requests rate to a RADIUS server.
R-5-22 The device MUST drop RADIUS requests that exceed the configured maximum request rate.
R-5-23 RADIUS requests MUST be queued separately from other control traffic.
R-5-24 The device MUST support RADIUS responses indicating a profile or policy that the device then
implements.
R-5-25 A single RADIUS client MUST work across multiple virtual routers.
R-5-26 The device MUST support multiple RADIUS clients that can be used to forward and receive
authentication and IP address information to/from NSPs or Corporations. The determination as to
which RADIUS client to use for a given PPP session MUST be based on the NAI or the incoming
PVC.
R-5-27 If the VPI/VCI provides a mapping to a RADIUS client, the device MUST be configurable so that
this mapping will take precedence over any NAI provided with the PPP session.
R-5-28 If the VPI/VCI mapping to a RADIUS client conflicts with the NAI mapping to a RADIUS client, the
device MUST be configurable to reject the PPP session.
R-5-29 The device MUST support as the default behavior that the VPI/VCI mapping to a RADIUS client
takes precedence over any NAI provided with the PPP session.
R-5-30 The listening UDP port of the RADIUS server MUST be configurable out side the standard range
of ports.
R-5-31 Backup features such as the number of retries before the switch to the backup server, the time
out value, the dead time value MUST be configurable.
R-5-41 If the NSP specifies an un-named pool in their RADIUS response and assignment of an address
out of the default pool has not been configured then the subscriber MUST NOT be assigned an
address.
R-5-42 The device MUST support private addresses being assigned to a pool.
R-5-43 The device MUST support at least 20 address pools per VR or 2000 for the entire device.
6 Traffic Management
R-6-13 The device MUST support a variety of delimiters for NAI parsing, including but not limited to /
and @.
R-6-14 The parsing order for domain delimiters MUST be configurable.
R-6-15 The location of the domain string relative to the delimiter (before or after) MUST be
configurable.
R-6-36 The device MUST support Assured Forwarding per hop behavior per RFC 2597.
R-6-37 The device MUST support Expedited Forwarding per hop behavior per RFC 3246.
R-6-38 The device MUST support the default PHB (RFC 2474) for "best effort" traffic.
R-6-39 The device SHOULD support the Lower Effort PHB (RFC 3662) for “scavenger class” type
services.
R-6-40 All traffic parameters for rate limiting, traffic shaping, associated with the PHBs listed above
MUST be configurable.
R-6-41 The device MUST support per PPP session shaping for terminated and non-terminated
sessions.
R-6-42 The device MUST support per L2TP tunnel shaping.
R-6-43 The device MUST support PPP and IP session level fairness. The device MUST support a
configurable minimum through put per session to ensure that starvation below that level does
not occur.
R-6-44 The device MUST implement rate shaping capability for each queue.
R-6-45 The device MUST support shaping towards the network at the VR and domain levels (i.e. the
traffic aggregated over all PPP sessions and L2TP tunnels on the device for the given
@domain is shaped to a given level).
R-6-46 The device MUST meet a 30 ms delay target for queuing and transmission of EF traffic
towards the RG/DSL modem.
R-6-47 When required the device SHOULD be able to reduce the packet size in non-EF queues
when packets are present in the EF queue to support low jitter traffic.
R-6-48 When fragmentation is required, the device MUST fragment all sessions on an access VC
using MLPP interleaving (RFC 1990).
R-6-49 The device SHOULD support an EF window timer associated with fragmenting traffic using
MLPP. The EF window timer is required to support real time applications that exhibit a more
bursty nature (e.g. VoIP with silence suppression) so that LE, BE, and AF packets continue to
be resized even when EF packets are not present.
R-6-50 When no packets are queued in the EF class for a duration longer that the EF window timer,
the BE and AF packets MUST NOT be resized unless required for other reasons (negotiated
MTU size).
R-6-51 The device MUST support PATH MTU negotiation when operating in an IP aware Mode.
R-6-52 The device MUST be able to maintain separate MTU sizes on different sessions.
R-6-53 The device must be able to enforce MTU size settings (packet lengths) for both IP aware and
no IP aware sessions (i.e. layer 2 MTU). The device must be able to either discard or
fragment packets that exceed MTU size defined for that session.
R-6-54 If multiple PVCs are provisioned per subscriber, the device MUST support the mapping
between a Diffserv Code Point (DSCP) and a specific PVC
R-7-01 The device MUST be able to filter (silently discard) unsupported frames at the access
interface.
R-7-02 The device MUST support IP layer rate limiting according to RFC 2697, A Single Rate Three
Color Marker.
R-7-03 The device MUST support IP layer rate limiting according to RFC 2698, A Two Rate Three
Color Marker.
Broadband Remote Access Server Requirements Document TR-092
R-6-65 The device SHOULD support IS-IS Traffic Engineering (e.g. draft-ietf-isis-traffic-04.txt).
R-7-25 The device MUST support the policy route flows, which have been classified as per R-6-10.
R-7-26 The device MUST be able to associate a custom filter rule set with a given user profile, PVC
or session.
R-7-27 The device MUST allow a NSP connection configured such that it can specify whether or not
an end user is allowed to have simultaneous sessions with other NSPs while connected to it.
R-7-28 The device MUST be able to apply at least 4 ACLs, each containing multiple policies, per
interface (any physical or logical interface) without affecting the device’s performance.
8 Operations
R-8-01 The device MUST support hitless upgrades, i.e., the ability to upgrade operating system
software without interruption of service.
R-8-02 The device MUST support rollback procedures, i.e., the ability to rollback operating system
software to a previous version.
R-8-03 The device MUST support SNMPv1.
R-8-04 The device MUST support SNMPv2.
R-8-05 The device MUST support SNMPv3.
R-8-06 The device MUST support NTP.
R-8-07 The device MUST allow software images being downloaded from an EMS.”
R-8-08 The device MUST support the configurable option to set management traffic to be physically
or logically segregated from user traffic..
R-8-09 The device MUST continue to operate properly without interruption if an IP interface, PVC,
port, tunnel, VPN, tunnel group, or any other provision-able interface type or logical grouping
of sessions is deleted.
R-8-10 The management system MUST support the centralized provisioning of services that span
multiple network elements (i.e. VPNs).
R-8-11 The management system MUST support the collection and reporting of service related
statistics, including for example the configured VPNs and number of subscribers per VPN.
R-8-12 The device MUST support BGP v3 MIB per RFC 1269 or BGPv4 MIB (e.g. draft-ietf-idr-bgp4-
mibv2-03.txt).
R-8-13 The device MUST track instances where the same MAC address is received from two or
more PVCs. Both a counter and a syslog message is required. The syslog message MUST
specify the PVCs involved and the MAC address seen.
R-8-14 The device SHOULD support Layer Two Tunneling Protocol 'L2TP' Management Information
Base per RFC 3371.
R-8-15 If LDAP is supported, the device MUST support a fail over mechanism for redundant LDAP
servers.
R-8-16 If COPS is supported, the device MUST support a fail over mechanism for redundant COPS
servers.
R-8-17 The device MUST provide notification (e.g. alarms) to the EMS of changes in operational
state and provide supporting information regarding the state and what caused the change.
R-8-18 The device MUST provide acknowledgement to requests by the EMS, e.g., take circuit pack
out of service.
R-8-19 The device MUST provide an operations interface that is capable of being accessed remotely
in the event the EMS is out of service.
Broadband Remote Access Server Requirements Document TR-092
R-8-20 The device MUST support backup images of software releases and configuration parameters
that can be used as fallbacks.
R-8-21 The device SHOULD be fully manageable by an EMS that will allow technicians and
1
northbound OS to remotely perform all FCAPS functions. The device will provide standard
northbound interfaces and APIs so that EMS. Can provide the following functions:
• EMS will provide full configuration, inventory, auto-discovery and provisioning capabilities
via GUI menus.
• EMS will provide alarm management including collecting, thresholding, displaying,
sorting, filtering, assigning and clearing of alarms.
• EMS will provide accounting and billing aggregation functions for CDRs produced by the
device for collection by a northbound OS.
• EMS will collect, threshold, aggregate and display all capacity and performance
measurements associated with the device.
• EMS will provide security administration for the device including authentication, access
control and audit trail management capabilities.
R-8-22 The decision for setting which device, the NE or the EMS/NMS has the master copy MUST
be set through the EMS/NMS
R-8-23 The capability MUST exist to synchronize the databases of the EMS and the device, either by
applying the EMS database to the device, or by applying the device database to the EMS.
8.2 Provisioning
R-8-24 The device MUST be able to provision/limit the maximum number of sessions per tunnel.
R-8-25 The maximum number of sessions allowed from an end user across a single PVC MUST be
configurable, at least in the range 1-8. This is a property of the PVC. In this context,
“sessions” includes PPP sessions as well as DHCP assigned addresses.
R-8-26 Over the NMS-EMS interface, the operator MUST be able to specify an appropriate profile
when provisioning a service.
R-8-27 The EMS northbound interface MUST support flow-through provisioning and alarm
transmission. The CORBA protocol is desired. An API is preferred, to allow the operator’s
NMS to specify functions including but not limited to:
- checking the availability of a port and VPI/VCI before provisioning,
- returning the result of the above check, and
- provisioning a PVC.
R-8-28 The device MUST allow activated line cards or other modules to go into service with pre-
specified default configuration parameters.
1
FCAPS (fault, configuration, accounting, performance and security)
Broadband Remote Access Server Requirements Document TR-092
R-8-29 The device MUST support the auto detection of access ATM traffic with VPI/VCI in pre-
configured ranges, and automatically associates those VCs with a default “service profile”.
Properties of the default service profile, such as ATM VC traffic parameters, PPPoE, PPPoA,
or DHCP, are configurable.
R-8-61 The device MUST provide SNMP MIB defined capacity management measurements that are
accessible through the EMS. The measurements should at least include the following:
• Measure the number of simultaneous sessions per port, card, and system in 24-hour
period.
• Measure the number of sessions rejected due to tunnel maximum reached per tunnel in a
15-minute period including a 5-minute peak measurement.
• Measure the interface utilization as a percentage of maximum octets in a 15-minute
period including a 5-minute peak measurement.
• Measure discarded cells/packets due to congestion in a 15-minute period
R-8-62 The device MUST support DS3/DS1 physical layer performance monitoring (near end and far
end) data collection that is compliant with the applicable requirements of Telcordia GR-499.
R-8-63 The device MUST support a reporting mechanism to identify the IP address or addresses
being used by each subscriber.
R-8-64 The device MUST provide statistics for various IP packet sizes, for all types of supported
interfaces.
R-8-65 The device MUST provide PPS performance measurement for all types of supported
interfaces.
R-8-66 IP packets per second thresholds MUST be configurable on an interface basis and generate
notifications if the thresholds are exceeded
R-8-67 The device MUST be able to log to a syslog server a message when a subscriber exceeds
the maximum access session limit.
R-8-68 The device MUST be able to log to a syslog server a message when a subscriber fails to
authenticate their PPPoE or PPPoA session with summary details of the authentication
failure (invalid password, invalid domain, invalid username, etc…).
R-8-69 The device MUST support a command that would summarize the number of PVCs defined on
the device. The command should provide a second option to the command to show the
breakdown per encapsulation type.
R-8-70 There MUST be collection points available for ingress and egress data, as well as internal
CPU utilization of the device, so statistics can be analyzed for traffic engineering purposes.
Enabling these statistics does not impede the amount of PVCs, circuits, or any type of
session that may be provisioned on the device.
R-8-71 The device MUST count and measure all data associated with determining capacity utilization
and Quality of Service (QoS) metrics.
R-8-72 The device SHOULD retain traffic/performance data for a period of time as defined in the
EMS.
R-8-73 The device MUST support configurable thresholds for IP address pool usage high and low
water marks, and report threshold crossings to the management systems.
R-8-74 The device MUST support increasing of the IP address pool size, and decreasing of the IP
address pool size in order to reclaim unused resources. In the case of tools implemented in
external systems, the device MUST be able to process pool resize messages from those
systems. When the architecture includes egress routers between the device and NSP,
resized IP address pools MUST be reflected in the egress routers routing configuration.
R-8-75 The device MUST provide traffic mirroring feature at the subscriber session level, i.e. the
ability to copy upstream and/or downstream packets to a specified destination (locally or
preferably to a remote collection point) for at least 2% of the provisioned subscribers on the
device.
Broadband Remote Access Server Requirements Document TR-092
9 Security
The requirements in this section are specific to capabilities needed for the protection of the device itself
from external attacks.
R-9-01 The device MUST support the security requirements included in T1M1 T1.276.2003
requirements document. Where there are conflicting security requirements in this document,
the more stringent requirement should take precedence.
R-9-02 The device MUST support a mechanism (e.g. configurable rate limit) for traffic accessing the
control plane of the device to protect against (flooding) and other Denial of Service (DoS)
attacks from external sources.
R-9-03 The device MUST support a mechanism (e.g. configurable rate limit) for subscriber traffic
based on packet type (e.g. TCP SYN, ICMP etc.) to protect against distributed/flooding denial
of service attacks from external sources.
R-9-04 The device MUST support a mechanism (e.g. configurable rate limit) for flows to/from users
based on packet type (e.g. TCP SYN, ICMP etc.) to protect against flooding Denial of Service
attacks from hacked/malicious subscriber hosts.
R-9-05 The device MUST be able to identify hacked/malicious subscriber hosts by using source
address validating/filtering.
R-9-06 The device MUST support MAC layer ACLs to permit or deny based on source/destination
MAC address or the classification parameters specified in R-6-10.
R-9-07 The device MUST be able to filter/block/log traffic based on any field or combination of fields
of a packet header (layer 2 and above)
R-9-08 The device MUST support IP spoofing detection and blocking.
R-9-09 The device MUST support IP source route option detection and blocking.
R-9-10 The device SHOULD support port scan detection and blocking.
R-9-11 The device MUST support IP address sweep attack detection and blocking.
Broadband Remote Access Server Requirements Document TR-092
Figure 1 TR-
TR-59 compliant Multicast operational model
IGMP processing independent from
encapsulation on access network
Radius Server
(e.g. PPP, Bridged 1483) Radius Server
Radius Proxy Authentication & Authorization
leverages on existing Radius
Subscriber infrastructure, facilitating an
IGMP NSP/ISP/ASP logic
Authorization:
MC @ control list Control Plane
Data Plane
Access
Domain Broadcast Video
Video Provider 1
DSLAM Server
PPP Multicast-enabled
Backbone
Source-specific multicast (SSM) is a service model that identifies session traffic by both source and group
address. SSM is ideal for one-to-many multicast services such as network entertainment channels. SSM
builds shortest-path trees (SPTs) directly represented by (S,G) pairs. The "S" refers to the source's
unicast IP address, and the "G" refers to the specific multicast group address. The SSM (S,G) pairs are
called channels to differentiate them from any-source multicast (ASM) groups. While ASM supports both
one-to-many and many-to-many communications, ASM's complexity is in its method of source discovery.
For example, if you click on a link in a browser, the receiver is notified about the group information, but
not the source information. With SSM, the client receives both source and group information.
To deploy SSM successfully, you need an end-to-end multicast-enabled network and applications that
use an IGMPv3 stack.
Broadband Remote Access Server Requirements Document TR-092
The picture above shows a PIM-SM network with both ASM and SSM. Router 4 serves as an RP only for
ASM multicast groups. SSM channels do not need RP. Router 1 is the B-RAS, while the Receiver is one
of the subscribers wanting to receive the multicast content. IGMPv3 is enabled on the Router 1 interface
facing Receiver. All the routers in the distribution network connection to Source run PIM-SSM.
Requirements
R-10-01 The device MUST be configurable with the option to silently discard all subscriber upstream
multicast traffic.
R-10-02 The device MUST implement Host Extensions for IP Multicasting defined in RFC 1112.
R-10-03 The device MUST implement Internet Group Management Protocol, Version 2 (IGMP v2)
defined in RFC 2236.
R-10-04 The device MUST implement Internet Group Management Protocol, Version 3 (IGMP v3)
defined in RFC 3376.
R-10-05 The device MUST Support RFC 2362, Protocol Independent Multicast-Sparse Mode (PIM-
SM).
R-10-06 The device SHOULD support Protocol Independent Multicast - Dense Mode (PIM-DM) (e.g.
draft-ietf-pim-dm-new-v2-03.txt).
R-10-07 The device MUST support Rendezvous Point auto-discovery in PIM-SM.
R-10-08 The device MUST support, RFC 2365, Administratively Scoped IP Multicast
R-10-09 The device SHOULD support Multicast Source Discovery Protocol (MSDP).
R-10-10 The device MUST support Any-cast RP mechanism using PIM and MSDP.
R-10-11 The device MUST support Source-Specific Multicast for IP.
R-10-12 L3 features supported on the device MUST also be available for multicast, e.g. rate limiting
and filtering.
R-10-13 The device SHOULD support tunneling of PIM-SM.
R-10-14 When operating in an IP-routed mode the device MUST provide multicast access controls
including authentication and collect multicast usage information.
R-10-15 The device SHOULD support a user authentication protocol for joining multicast streams as
these standards mature i.e. IGAP: IGMP for User Authentication Protocol", IETF Internet
Draft, draft-hayashi-igap-00.txt,
R-10-16 The device MUST provide multicast functions without performance degradation.
R-10-17 The device must support at least 1000 multicast groups.
Broadband Remote Access Server Requirements Document TR-092
R-10-18 The device MUST support a mechanism to allow and disallow multicast groups via access
control list on per subscriber basis, such as using RADIUS returned attributes.
R-10-19 The device MUST process IGMP join and leave messages within 100 milliseconds.
R-10-20 The device MUST support QoS features for multicast traffic without performance degradation.
R-10-21 The device SHOULD be able to implement Multicast VPNs as described by RFC 2547bis
R-10-22 The device MUST support multi-protocol BGP to enable BGP distribution of multicast routing
information both within an AS and between ASs..
Broadband Remote Access Server Requirements Document TR-092
ATM
IP Encapsulated in MPLS Network Provider
VPN (Terminated/MPLS
based VPN) ATM PVCs
IP/ATM/Ethernet/
MPLS Network
BRAS
DSL
ISP Network Provider
ATM
L2TP VPN (Tunneled L2TP
Based VPN) IP/PPP over
ATM PVCs
DSLAMs
that the subscriber chooses to use. In addition, the IP VPN can be served over many WAN backbones
(i.e. Frame Relay, ATM, Switched Ethernet, IP/MPLS). IP VPNs may be between two points or among a
number of end points. As a network service offering, IP VPNs can be added to a transparent LAN
services, over the same connection to the customer's LANs.
As is shown in Figure B-1 - DSL Virtual Private Network, the IP VPN starts at the edge of the service
provider’s network (PE) at the BRAS and flows across the network end to end at the IP Layer (3). At the
BRAS, the subscriber’s connection can be virtually connected/routed to other virtual connections within
the same VPN. The BRAS has capabilities to maintain the Layer 3 connection for the VPN and
determine where traffic is forwarded. Each IP VPN may be identified by its ID allowing many virtual VPNs
to operate on the BRAS. In a typical DSL application, the subscriber access is via ATM PVC that
connects the subscriber CPE to the BRAS. Over the ATM PVC from the customer’s end device, the IP
VPN is carried over the PPPoE connection to the BRAS.
2
Figure B-2 shows the simplified protocol stacks and layout of a MPLS-based VPN. This method is used
when an MPLS-enabled core is available. PPP traffic from the originating user is terminated on the BRAS
and the retrieved IP packets are tagged with MPLS VPN labels for forwarding into the network core. The
user may choose to use IPSec to encrypt the actual data; this is transparent to the VPN as the IPSec
would be tunneled inside the IP layer implicitly in the figure. Using MPLS terms, the BRAS is a Provider
Edge (PE) router and the inner core router is a Provider router (P).
IP IP
2
In both figures the full protocol stacks are not shown, only the portions relevant to the discussion are
drawn.
Broadband Remote Access Server Requirements Document TR-092
IP
PPP IP
PPP
MPLS, ATM, PPP
L2TP L2TP
FR,
Gig E IP IP PPPoE PPPoE
POS MPLS, ATM, Ethernet Ethernet
MPLS, ATM, FR,
FR, GigE, POS GigE, POS ATM ATM
ATM ATM
PHY PHY PHY PHY PHY ADSL PHY ADSL ADSL
IP
IP
MPLS MPLS VPN Label PPP
PPP
MPLS
ATM, FR, ATM, FR, PPPoA
GigE, POS GigE, POS PPPoA
ATM, FR,
GigE, POS ATM ATM
ATM ATM
PHY PHY PHY PHY PHY PHY PHY ADSL ADSL
Ethernet IP
VLAN Label
MPLS MPLS MPLS RFC 2684 Ethernet
ATM, FR, ATM, FR, RFC 2684
ATM, FR,
GigE, POS GigE, POS ATM ATM
GigE, POS ATM ATM
PHY PHY PHY PHY PHY ADSL ADSL
PHY PHY
Requirements:
The following requirements support VPN capability on the BRAS
R-11-01 The device MUST provide a level of privacy and security for VPNs that is equivalent to that
obtainable from a pure Layer 2 infrastructure, such as Frame Relay or ATM. This includes IP
routing information and routing protocol separation.
R-11-02 The device MUST be able run its own routing protocol for VPNs.
R-11-03 The device MUST be capable of IP layer separation for VPNs (IP routing information and
routing protocol separation) such that there is no IP layer connectivity to other VPNs, or to
Service Provider’s network internals.
R-11-04 The device MUST be configurable to support limited and controlled exchange of IP layer
traffic between different VPNs (extranets).
R-11-05 The device MUST be configurable to support customers who require combined VPN and
Internet access services.
R-11-06 The device SHOULD support RFC 3022, Traditional IP Network Address Translator
(Traditional NAT). This includes IP address and TCP/UDP port translation.
R-11-07 When Network Based IP VPNs are provided using 2547, the device MUST support the
following protocols on the PE-CE link:
• BGP
• OSPF
• RIP
• Static routes
R-11-08 When Network Based IP VPNs are provided using 2547, the device SHOULD support ISIS
on the PE-CE link.
R-11-09 The device MUST support BGP4/MPLS VPNs per Internet RFC 2547 bis.
R-11-10 The device MUST be able to support VPNs with overlapping address spaces.
R-11-11 The device MUST maintain a separate forwarding information per VPN.
R-11-12 The device MUST allow the viewing of VPN specific route tables.
R-11-13 The device MUST allow routes that are learned on a particular interface that is associated
with a VPN to be placed into the forwarding table supporting that VPN.
R-11-14 The device MUST allow a default route to be configured on a per VPN basis.
R-11-15 The device MUST allow the association of a packet to a VPN to be based on the ATM PVC
on which it arrived.
R-11-16 The device MUST allow the association of a packet to a VPN to be based on the physical
interface on which it arrived.
R-11-17 The device MUST function simultaneously as a Service Provider Edge (PE) router and a
Service Provider Backbone (P) Router as defined in RFC 2547.
R-11-18 The device MUST support customer routers that are dual attached to the IP-VPN network for
reliability reasons. (Site of origin? Is so delete)
R-11-19 The device MUST use a single (e.g., global) BGP instance to peer with other Autonomous
Systems (AS) and then filters the route information on a per VPN basis.
R-11-20 The device MUST allow each interface used to peer with an external network (different AS)
to be configured as part of a specific VPN.
Broadband Remote Access Server Requirements Document TR-092
Site 1 Site 3
Regional Broadband
Network
Emulated LAN
Site 2 Site 4
Multi-Point Logical View
Virtual Bridging
Instance
Access
Network
ATM Host
Switch PC
A10 Interface RG
BRAS DSLAM
IP
802.3
(MPLS) option
PHY
Figure C-3 - Protocol Stack for connection to and from NSPs and ASPs
Broadband Remote Access Server Requirements Document TR-092
Requirements:
The following is minimum list of requirements in support of TLS and VPLS capability on the BRAS and
are in addition to requirements already identified in the main body of this document in section 4.5:
R-12-01 The device MUST support multi-port Ethernet bridge functionality (802.1D)
R-12-02 The device MUST support tunneling of Ethernet control frames (e.g., Spanning Tree
Protocol).
R-12-03 The device MUST support Jumbo Ethernet frames on physical Ethernet Interfaces.
R-12-04 The device MUST support VLAN stacking (the ability to put customer 802.1q VLANs inside a
provider’s VLAN). The IEEE standard MUST be implemented when finalized in IEEE
802.1AD working group.
R-12-05 The device MUST support a configurable use of the ethertype field when performing VLAN
stacking until such time that the IEEE standard is finalized.
R-12-06 The device MUST comply with the 802.3ad Gigabit Ethernet Link Aggregation Trunking
Standard. The device must support this functionality on physical ports.
R-12-07 The device SHOULD support VPLS (Virtual Private LAN Service) multipoint Ethernet frame
transport over MPLS when standardized (RFC status).
R-12-08 The device SHOULD be able to map VLANs IDs to VPLS bridge groups.
R-12-09 The device SHOULD be able to rewrite IEEE 802.1q VLAN ID when connecting multiple TLS
islands using Layer 2 VPLS.
R-12-10 The device MUST maintain a static VLAN to PVC mapping and a dynamically learned ATM
PVC to MAC address mapping.
R-12-11 The device MUST allow the timeout interval on dynamically learned MAC address to ATM
PVC mappings to be adjusted.
R-12-12 The device MUST support the mapping of multiple MAC addresses to a single ATM PVC.
R-12-13 The device MUST support bridge groups.
R-12-14 The device MUST support isolation between services.
R-12-15 The device MUST have ability to block all direct communication between two users in the
same bridge group (either based on L2 or L3 mechanisms).
R-12-16 The device MUST support MAC layer ACLs to permit or deny based on Ethertype if the
implementation allows customer traffic to be bridged between different subscribers.
R-12-17 The device MUST allow the Operator to clear a single user from the bridge table without
clearing the entire table.
R-12-18 The device MUST allow lookup of all sessions within a VLAN by: user Login, IP Address (if
applicable), and MAC Address
Broadband Remote Access Server Requirements Document TR-092
Standard Attributes
Following table lists RFC 2865, 2866, 2867, 2688 and 2869 standard attributes that are used in BRAS
environment.
specified by DSLF.
Tunnel-Client-Endpoint This attribute contains the address of the initiator end 2868 66
of the tunnel.
Tunnel-Server- This attribute indicates the address of the server end 2868 67
Endpoint of the tunnel.
Acct-Tunnel- This attribute indicates the identifier assigned to the 2867 68
Connection-ID tunnel session.
Tunnel-Password This attribute may contain a password to be used to 2868 69
authenticate to a remote server.
Tunnel-Assignment-ID This attribute is used to indicate to the tunnel initiator 2868 82
the particular tunnel to which a session is to be
assigned.
Tunnel-Preference This attribute indicates the relative preference 2868 83
assigned to each tunnel.
NAS-Port-Id This attribute contains the text string which identifies 2869 87
the port of NAS which is authenticating the user.
Framed-Pool This attribute indicates the name of an assigned 2869 88
address pool.
Tunnel-Client-Auth-ID This attribute specifies the name used by the tunnel 2868 90
initiator during the authentication phase of tunnel
establishment.
Tunnel-Server-Auth-ID This attribute specifies the name used by the tunnel 2868 91
terminator during the authentication phase of tunnel
establishment.
Broadband Remote Access Server Requirements Document TR-092
Appendix D References
[1] RFC 2865 - Remote Authentication Dial In User Service (RADIUS). (IETF, June 2000)
[2] RFC 2866 – RADIUS Accounting (IETF, June 2000)
[3] RFC 2867 – RADIUS Accounting Modifications for Tunnel Protocol Support (IETF, June 2000)
[4] RFC 2868 – RADIUS Attributes for Tunnel Protocol Support (IETF, June 2000)
[5] RFC 2869 – RADIUS Extensions. (IETF, June 2000)