<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-ac-lxsm-lxnm-glue-10" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="AC Glue for VPN Models">A YANG Data Model for Augmenting VPN Service and Network Models with Attachment Circuits</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ac-lxsm-lxnm-glue-10"/>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Richard Roberts">
      <organization>Juniper</organization>
      <address>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Samier Barguil Giraldo">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="10"/>
    <area>Operations and Management</area>
    <workgroup>OPSAWG</workgroup>
    <keyword>Slice Service</keyword>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Automation</keyword>
    <keyword>Network Automation</keyword>
    <keyword>Orchestration</keyword>
    <keyword>service delivery</keyword>
    <keyword>Service provisioning</keyword>
    <keyword>service segmentation</keyword>
    <keyword>service flexibility</keyword>
    <keyword>service simplification</keyword>
    <keyword>Network Service</keyword>
    <keyword>3GPP</keyword>
    <keyword>Network Slicing</keyword>
    <abstract>
      <?line 60?>

<t>The document specifies a module that updates existing service (i.e., the Layer 2 Service Model (L2SM) and the Layer 3 Service Model (L3SM)) and
   network (i.e., the Layer 2 Network Model (L2NM) and the Layer 3 Network Model (L3NM)) Virtual Private Network (VPN) modules with the required information to bind specific
   VPN services to Attachment Circuits (ACs) that are created using the AC service ("ietf-ac-svc") and network ("ietf-ac-ntw") models.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Operations and Management Area Working Group Working Group mailing list (opsawg@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/attachment-circuit-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 66?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The document specifies a YANG module ("ietf-ac-glue", <xref target="sec-glue"/>) that updates existing service and
network Virtual Private Network (VPN) modules with the required information to bind specific
services to Attachment Circuits (ACs) that are created using the AC service model <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. Specifically, the following modules are augmented:</t>
      <ul spacing="normal">
        <li>
          <t>The Layer 2 Service Model (L2SM) <xref target="RFC8466"/></t>
        </li>
        <li>
          <t>The Layer 3 Service Model (L3SM) <xref target="RFC8299"/></t>
        </li>
        <li>
          <t>The Layer 2 Network Model (L2NM) <xref target="RFC9291"/></t>
        </li>
        <li>
          <t>The Layer 3 Network Model (L3NM) <xref target="RFC9182"/></t>
        </li>
      </ul>
      <t>Likewise, the document augments the L2NM and L3NM with references to the ACs that are managed using the AC network model <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>The YANG data model in this document conforms to the Network
Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
      <t>An example to illustrate the use of the "ietf-ac-glue" model is provided in <xref target="sec-example"/>.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
        <t>This document contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this I-D</t>
          </li>
          <li>
            <t>SSSS --&gt; the assigned RFC number for <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/></t>
          </li>
          <li>
            <t>NNNN --&gt; the assigned RFC number for <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/></t>
          </li>
          <li>
            <t>2023-11-13 --&gt; the actual date of the publication of this document</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The meanings of the symbols in the YANG tree diagrams are defined in <xref target="RFC8340"/>.</t>
      <t>This document uses terms defined in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
      <t>LxSM refers to both the L2SM and the L3SM.</t>
      <t>LxNM refers to both the L2NM and the L3NM.</t>
      <t>The following terms are used in the modules prefixes:</t>
      <dl>
        <dt>ac:</dt>
        <dd>
          <t>Attachment circuit</t>
        </dd>
        <dt>ntw:</dt>
        <dd>
          <t>Network</t>
        </dd>
        <dt>ref:</dt>
        <dd>
          <t>Reference</t>
        </dd>
        <dt>svc:</dt>
        <dd>
          <t>Service</t>
        </dd>
      </dl>
      <t>The names of data nodes are prefixed using the prefix associated with the corresponding imported YANG module as shown in <xref target="pref"/>:</t>
      <table anchor="pref">
        <name>Modules and Their Associated Prefixes</name>
        <thead>
          <tr>
            <th align="left">Prefix</th>
            <th align="left">Module</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ac-svc</td>
            <td align="left">ietf-ac-svc</td>
            <td align="left">Section 5.2 of RFC SSSS</td>
          </tr>
          <tr>
            <td align="left">ac-ntw</td>
            <td align="left">ietf-ac-ntw</td>
            <td align="left">RFC NNNN</td>
          </tr>
          <tr>
            <td align="left">l2nm</td>
            <td align="left">ietf-l3vpn-ntw</td>
            <td align="left">
              <xref target="RFC9291"/></td>
          </tr>
          <tr>
            <td align="left">l2vpn-svc</td>
            <td align="left">ietf-l2vpn-svc</td>
            <td align="left">
              <xref target="RFC8466"/></td>
          </tr>
          <tr>
            <td align="left">l3nm</td>
            <td align="left">ietf-l3vpn-ntw</td>
            <td align="left">
              <xref target="RFC9182"/></td>
          </tr>
          <tr>
            <td align="left">l3vpn-svc</td>
            <td align="left">ietf-l3vpn-svc</td>
            <td align="left">
              <xref target="RFC8299"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="relationship-to-other-ac-data-models">
      <name>Relationship to Other AC Data Models</name>
      <t><xref target="ac-overview"/> depicts the relationship between the various AC data models:</t>
      <ul spacing="normal">
        <li>
          <t>"ietf-ac-common" (<xref target="I-D.ietf-opsawg-teas-common-ac"/>)</t>
        </li>
        <li>
          <t>"ietf-bearer-svc" (<xref section="5.1" sectionFormat="of" target="I-D.ietf-opsawg-teas-attachment-circuit"/>)</t>
        </li>
        <li>
          <t>"ietf-ac-svc" (<xref section="5.2" sectionFormat="of" target="I-D.ietf-opsawg-teas-attachment-circuit"/>)</t>
        </li>
        <li>
          <t>"ietf-ac-ntw" (<xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>)</t>
        </li>
        <li>
          <t>"ietf-ac-glue" (<xref target="sec-glue"/>)</t>
        </li>
      </ul>
      <figure anchor="ac-overview">
        <name>AC Data Models</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="256" width="368" viewBox="0 0 368 256" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 32,144 L 32,240" fill="none" stroke="black"/>
              <path d="M 56,80 L 56,112" fill="none" stroke="black"/>
              <path d="M 72,144 L 72,176" fill="none" stroke="black"/>
              <path d="M 144,48 L 144,80" fill="none" stroke="black"/>
              <path d="M 192,40 L 192,112" fill="none" stroke="black"/>
              <path d="M 240,48 L 240,80" fill="none" stroke="black"/>
              <path d="M 328,80 L 328,160" fill="none" stroke="black"/>
              <path d="M 328,192 L 328,240" fill="none" stroke="black"/>
              <path d="M 56,80 L 144,80" fill="none" stroke="black"/>
              <path d="M 240,80 L 328,80" fill="none" stroke="black"/>
              <path d="M 104,128 L 128,128" fill="none" stroke="black"/>
              <path d="M 72,176 L 264,176" fill="none" stroke="black"/>
              <path d="M 32,240 L 120,240" fill="none" stroke="black"/>
              <path d="M 240,240 L 328,240" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="336,192 324,186.4 324,197.6" fill="black" transform="rotate(270,328,192)"/>
              <polygon class="arrowhead" points="248,48 236,42.4 236,53.6" fill="black" transform="rotate(270,240,48)"/>
              <polygon class="arrowhead" points="200,40 188,34.4 188,45.6" fill="black" transform="rotate(270,192,40)"/>
              <polygon class="arrowhead" points="152,48 140,42.4 140,53.6" fill="black" transform="rotate(270,144,48)"/>
              <polygon class="arrowhead" points="136,128 124,122.4 124,133.6" fill="black" transform="rotate(0,128,128)"/>
              <polygon class="arrowhead" points="112,128 100,122.4 100,133.6" fill="black" transform="rotate(180,104,128)"/>
              <polygon class="arrowhead" points="80,144 68,138.4 68,149.6" fill="black" transform="rotate(270,72,144)"/>
              <polygon class="arrowhead" points="40,144 28,138.4 28,149.6" fill="black" transform="rotate(270,32,144)"/>
              <g class="text">
                <text x="188" y="36">ietf-ac-common</text>
                <text x="48" y="132">ietf-ac-svc</text>
                <text x="200" y="132">ietf-bearer-svc</text>
                <text x="320" y="180">ietf-ac-ntw</text>
                <text x="180" y="244">ietf-ac-glue</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
                ietf-ac-common
                 ^     ^     ^
                 |     |     |
      +----------+     |     +----------+
      |                |                |
      |                |                |
ietf-ac-svc <--> ietf-bearer-svc        |
   ^    ^                               |
   |    |                               |
   |    +------------------------ ietf-ac-ntw
   |                                    ^
   |                                    |
   |                                    |
   +----------- ietf-ac-glue -----------+
]]></artwork>
        </artset>
      </figure>
      <t>"ietf-ac-common" is imported  by "ietf-bearer-svc", "ietf-ac-svc", and "ietf-ac-ntw".
Bearers managed using "ietf-bearer-svc" may be referenced in the service ACs managed using "ietf-ac-svc".
Similarly, a bearer managed using "ietf-bearer-svc" may list the set of ACs that use that bearer.
In order to ease correlation between an AC service request and the actual AC provisioned in the network, "ietf-ac-ntw" uses the AC references exposed by "ietf-ac-svc".
To bind Layer 2 VPN or Layer 3 VPN services with ACs, "ietf-ac-glue" augments the LxSM and LxNM with AC service references exposed by "ietf-ac-svc" and AC network references exposed by "ietf-ac-ntw".</t>
    </section>
    <section anchor="sample-uses-of-the-data-models">
      <name>Sample Uses of the Data Models</name>
      <section anchor="acs-terminated-by-one-or-multiple-customer-edges-ces">
        <name>ACs Terminated by One or Multiple Customer Edges (CEs)</name>
        <t><xref target="uc"/> depicts two target topology flavors that involve ACs. These topologies have the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>A Customer Edge (CE) can be either a physical device or a logical entity. Such logical entity is typically a software component (e.g., a virtual service function that is hosted within the provider's network or a third-party infrastructure). A CE is seen by the network as a peer Service Attachment Point (SAP) <xref target="RFC9408"/>.</t>
          </li>
          <li>
            <t>CEs may be either dedicated to one single connectivity service or host multiple connectivity services (e.g., CEs with roles of service functions <xref target="RFC7665"/>).</t>
          </li>
          <li>
            <t>A network provider may bind a single AC to one or multiple peer SAPs (e.g., CE1 and CE2 are tagged as peer SAPs for the same AC). For example, and as discussed in <xref target="RFC4364"/>, multiple CEs can be attached to a PE over the same attachment circuit. This scenario is typically implemented when the Layer 2 infrastructure between the CE and the network is a multipoint service.</t>
          </li>
          <li>
            <t>A single CE may terminate multiple ACs, which can be associated with the same bearer or distinct bearers (e.g., CE4).</t>
          </li>
          <li>
            <t>Customers may request protection schemes in which the ACs associated with their endpoints are terminated by the same PE (e.g., CE3), distinct PEs (e.g., CE4), etc. The network provider uses this request to decide where to terminate the AC in the service provider network and also whether to enable specific capabilities (e.g., Virtual Router Redundancy Protocol (VRRP)).</t>
          </li>
        </ul>
        <figure anchor="uc">
          <name>Examples of ACs</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="512" viewBox="0 0 512 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 8,176" fill="none" stroke="black"/>
                <path d="M 72,48 L 72,96" fill="none" stroke="black"/>
                <path d="M 72,128 L 72,176" fill="none" stroke="black"/>
                <path d="M 112,64 L 112,160" fill="none" stroke="black"/>
                <path d="M 176,96 L 176,128" fill="none" stroke="black"/>
                <path d="M 192,32 L 192,88" fill="none" stroke="black"/>
                <path d="M 192,136 L 192,192" fill="none" stroke="black"/>
                <path d="M 200,96 L 200,128" fill="none" stroke="black"/>
                <path d="M 280,176 L 280,208" fill="none" stroke="black"/>
                <path d="M 288,216 L 288,240" fill="none" stroke="black"/>
                <path d="M 304,176 L 304,208" fill="none" stroke="black"/>
                <path d="M 352,48 L 352,96" fill="none" stroke="black"/>
                <path d="M 352,128 L 352,176" fill="none" stroke="black"/>
                <path d="M 376,48 L 376,96" fill="none" stroke="black"/>
                <path d="M 376,128 L 376,176" fill="none" stroke="black"/>
                <path d="M 448,48 L 448,96" fill="none" stroke="black"/>
                <path d="M 448,128 L 448,176" fill="none" stroke="black"/>
                <path d="M 480,176 L 480,240" fill="none" stroke="black"/>
                <path d="M 504,48 L 504,96" fill="none" stroke="black"/>
                <path d="M 504,128 L 504,176" fill="none" stroke="black"/>
                <path d="M 192,32 L 360,32" fill="none" stroke="black"/>
                <path d="M 8,48 L 72,48" fill="none" stroke="black"/>
                <path d="M 352,48 L 376,48" fill="none" stroke="black"/>
                <path d="M 448,48 L 504,48" fill="none" stroke="black"/>
                <path d="M 72,64 L 112,64" fill="none" stroke="black"/>
                <path d="M 376,64 L 400,64" fill="none" stroke="black"/>
                <path d="M 424,64 L 448,64" fill="none" stroke="black"/>
                <path d="M 376,80 L 400,80" fill="none" stroke="black"/>
                <path d="M 424,80 L 448,80" fill="none" stroke="black"/>
                <path d="M 8,96 L 72,96" fill="none" stroke="black"/>
                <path d="M 176,96 L 200,96" fill="none" stroke="black"/>
                <path d="M 352,96 L 376,96" fill="none" stroke="black"/>
                <path d="M 448,96 L 504,96" fill="none" stroke="black"/>
                <path d="M 112,112 L 136,112" fill="none" stroke="black"/>
                <path d="M 160,112 L 176,112" fill="none" stroke="black"/>
                <path d="M 8,128 L 72,128" fill="none" stroke="black"/>
                <path d="M 176,128 L 200,128" fill="none" stroke="black"/>
                <path d="M 352,128 L 376,128" fill="none" stroke="black"/>
                <path d="M 448,128 L 504,128" fill="none" stroke="black"/>
                <path d="M 376,144 L 400,144" fill="none" stroke="black"/>
                <path d="M 424,144 L 448,144" fill="none" stroke="black"/>
                <path d="M 72,160 L 112,160" fill="none" stroke="black"/>
                <path d="M 376,160 L 400,160" fill="none" stroke="black"/>
                <path d="M 424,160 L 448,160" fill="none" stroke="black"/>
                <path d="M 8,176 L 72,176" fill="none" stroke="black"/>
                <path d="M 280,176 L 304,176" fill="none" stroke="black"/>
                <path d="M 352,176 L 376,176" fill="none" stroke="black"/>
                <path d="M 448,176 L 504,176" fill="none" stroke="black"/>
                <path d="M 192,192 L 280,192" fill="none" stroke="black"/>
                <path d="M 312,192 L 360,192" fill="none" stroke="black"/>
                <path d="M 280,208 L 304,208" fill="none" stroke="black"/>
                <path d="M 288,240 L 376,240" fill="none" stroke="black"/>
                <path d="M 400,240 L 480,240" fill="none" stroke="black"/>
                <g class="text">
                  <text x="412" y="52">(b1)</text>
                  <text x="412" y="68">AC</text>
                  <text x="40" y="84">CE1</text>
                  <text x="364" y="84">PE</text>
                  <text x="412" y="84">AC</text>
                  <text x="480" y="84">CE3</text>
                  <text x="412" y="100">(b2)</text>
                  <text x="148" y="116">AC</text>
                  <text x="188" y="116">PE</text>
                  <text x="272" y="116">Network</text>
                  <text x="360" y="116">|</text>
                  <text x="412" y="132">(b3)</text>
                  <text x="412" y="148">AC</text>
                  <text x="40" y="164">CE2</text>
                  <text x="364" y="164">PE</text>
                  <text x="412" y="164">AC</text>
                  <text x="480" y="164">CE4</text>
                  <text x="412" y="180">(b3)</text>
                  <text x="292" y="196">PE</text>
                  <text x="388" y="244">AC</text>
                  <text x="20" y="260">(bx)</text>
                  <text x="48" y="260">=</text>
                  <text x="84" y="260">bearer</text>
                  <text x="124" y="260">Id</text>
                  <text x="144" y="260">x</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                       .--------------------.
.-------.              |                   .--.  (b1)  .------.
|       +----.         |                   |  +---AC---+      |
|  CE1  |    |         |                   |PE+---AC---+  CE3 |
'-------'    |       .--.                  '--'  (b2)  '------'
             +---AC--+PE|     Network       |
.-------.    |       '--'                  .--.  (b3)  .------.
|       |    |         |                   |  +---AC---+      |
|  CE2  +----'         |                   |PE+---AC---+  CE4 |
'-------'              |          .--.     '--'  (b3)  '---+--'
                       '----------+PE|------'              |
                                  '--'                     |
                                   |                       |
                                   '-----------AC----------'
(bx) = bearer Id x                                     
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="separate-ac-provisioning-from-actual-vpn-service-provisioning">
        <name>Separate AC Provisioning From Actual VPN Service Provisioning</name>
        <t>The procedure to provision a service in a service provider network may depend on the practices adopted by a service provider. This includes the flow put in place for the provisioning of advanced network services and how they are bound to an attachment circuit. For example, a single attachment circuit may be used to host multiple connectivity services (e.g., Layer 2 VPN ("ietf-l2vpn-svc"), Layer 3 VPN ("ietf-l3vpn-svc"), Network Slice Service ("ietf-network-slice-service")). In order to avoid service interference and redundant information in various locations, a service provider may expose an interface to manage ACs network-wide using <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. Customers can request a bearer ("ietf-bearer-svc") or an attachment circuit ("ietf-ac-svc") to be put in place, and then refer to that bearer or AC when requesting VPN services that are bound to the bearer or AC ("ietf-ac-glue").</t>
        <t>Also, internal references ("ietf-ac-ntw") used within a service provider network to implement ACs can be used by network controllers to glue the L2NM ("ietf-l2vpn-ntw") or the L3NM ("ietf-l3vpn-ntw") services with relevant ACs.</t>
        <t><xref target="_u-ex"/> shows the positioning of the AC models in the overall service delivery process.</t>
        <figure anchor="_u-ex">
          <name>An Example of AC Models Usage</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="688" width="512" viewBox="0 0 512 688" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,592 L 8,624" fill="none" stroke="black"/>
                <path d="M 48,592 L 48,624" fill="none" stroke="black"/>
                <path d="M 96,464 L 96,512" fill="none" stroke="black"/>
                <path d="M 104,352 L 104,400" fill="none" stroke="black"/>
                <path d="M 120,576 L 120,640" fill="none" stroke="black"/>
                <path d="M 136,400 L 136,464" fill="none" stroke="black"/>
                <path d="M 136,512 L 136,568" fill="none" stroke="black"/>
                <path d="M 176,320 L 176,352" fill="none" stroke="black"/>
                <path d="M 176,464 L 176,512" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,64" fill="none" stroke="black"/>
                <path d="M 208,128 L 208,176" fill="none" stroke="black"/>
                <path d="M 208,240 L 208,288" fill="none" stroke="black"/>
                <path d="M 208,408 L 208,528" fill="none" stroke="black"/>
                <path d="M 232,352 L 232,400" fill="none" stroke="black"/>
                <path d="M 272,64 L 272,128" fill="none" stroke="black"/>
                <path d="M 272,176 L 272,240" fill="none" stroke="black"/>
                <path d="M 272,288 L 272,320" fill="none" stroke="black"/>
                <path d="M 296,352 L 296,400" fill="none" stroke="black"/>
                <path d="M 336,32 L 336,64" fill="none" stroke="black"/>
                <path d="M 336,128 L 336,176" fill="none" stroke="black"/>
                <path d="M 336,240 L 336,288" fill="none" stroke="black"/>
                <path d="M 368,320 L 368,352" fill="none" stroke="black"/>
                <path d="M 368,400 L 368,568" fill="none" stroke="black"/>
                <path d="M 384,576 L 384,640" fill="none" stroke="black"/>
                <path d="M 424,352 L 424,400" fill="none" stroke="black"/>
                <path d="M 456,592 L 456,624" fill="none" stroke="black"/>
                <path d="M 496,592 L 496,624" fill="none" stroke="black"/>
                <path d="M 208,32 L 336,32" fill="none" stroke="black"/>
                <path d="M 208,64 L 336,64" fill="none" stroke="black"/>
                <path d="M 208,128 L 336,128" fill="none" stroke="black"/>
                <path d="M 208,176 L 336,176" fill="none" stroke="black"/>
                <path d="M 208,240 L 336,240" fill="none" stroke="black"/>
                <path d="M 208,288 L 336,288" fill="none" stroke="black"/>
                <path d="M 176,320 L 368,320" fill="none" stroke="black"/>
                <path d="M 104,352 L 232,352" fill="none" stroke="black"/>
                <path d="M 296,352 L 424,352" fill="none" stroke="black"/>
                <path d="M 104,400 L 232,400" fill="none" stroke="black"/>
                <path d="M 296,400 L 424,400" fill="none" stroke="black"/>
                <path d="M 96,464 L 176,464" fill="none" stroke="black"/>
                <path d="M 96,512 L 176,512" fill="none" stroke="black"/>
                <path d="M 120,576 L 384,576" fill="none" stroke="black"/>
                <path d="M 8,592 L 48,592" fill="none" stroke="black"/>
                <path d="M 456,592 L 496,592" fill="none" stroke="black"/>
                <path d="M 48,608 L 120,608" fill="none" stroke="black"/>
                <path d="M 384,608 L 456,608" fill="none" stroke="black"/>
                <path d="M 8,624 L 48,624" fill="none" stroke="black"/>
                <path d="M 456,624 L 496,624" fill="none" stroke="black"/>
                <path d="M 120,640 L 384,640" fill="none" stroke="black"/>
                <g class="text">
                  <text x="268" y="52">Customer</text>
                  <text x="108" y="84">Customer</text>
                  <text x="176" y="84">Service</text>
                  <text x="232" y="84">Model</text>
                  <text x="72" y="100">ietf-l2vpn-svc,</text>
                  <text x="200" y="100">ietf-l3vpn-svc,</text>
                  <text x="392" y="100">ietf-network-slice-service,</text>
                  <text x="100" y="116">ietf-ac-svc,</text>
                  <text x="208" y="116">ietf-ac-glue,</text>
                  <text x="296" y="116">and</text>
                  <text x="376" y="116">ietf-bearer-svc</text>
                  <text x="272" y="148">Service</text>
                  <text x="272" y="164">Orchestration</text>
                  <text x="112" y="196">Network</text>
                  <text x="168" y="196">Model</text>
                  <text x="72" y="212">ietf-l2vpn-ntw,</text>
                  <text x="200" y="212">ietf-l3vpn-ntw,</text>
                  <text x="336" y="212">ietf-sap-ntw,</text>
                  <text x="448" y="212">ietf-ac-glue,</text>
                  <text x="96" y="228">and</text>
                  <text x="160" y="228">ietf-ac-ntw</text>
                  <text x="264" y="260">Network</text>
                  <text x="272" y="276">Orchestration</text>
                  <text x="56" y="308">Network</text>
                  <text x="144" y="308">Configuration</text>
                  <text x="224" y="308">Model</text>
                  <text x="164" y="372">Domain</text>
                  <text x="364" y="372">Domain</text>
                  <text x="168" y="388">Orchestration</text>
                  <text x="360" y="388">Orchestration</text>
                  <text x="36" y="420">Device</text>
                  <text x="64" y="436">Configuration</text>
                  <text x="32" y="452">Model</text>
                  <text x="132" y="484">Config</text>
                  <text x="136" y="500">Manager</text>
                  <text x="256" y="548">NETCONF/CLI................</text>
                  <text x="376" y="548">.</text>
                  <text x="208" y="564">|</text>
                  <text x="84" y="596">Bearer</text>
                  <text x="420" y="596">Bearer</text>
                  <text x="28" y="612">CE#1</text>
                  <text x="248" y="612">Network</text>
                  <text x="476" y="612">CE#2</text>
                  <text x="28" y="660">Site</text>
                  <text x="56" y="660">A</text>
                  <text x="476" y="660">Site</text>
                  <text x="504" y="660">B</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                          .---------------.
                          |   Customer    |
                          '-------+-------'
          Customer Service Model  |
  ietf-l2vpn-svc, ietf-l3vpn-svc, | ietf-network-slice-service,
       ietf-ac-svc, ietf-ac-glue, | and ietf-bearer-svc
                          .-------+-------.
                          |    Service    |
                          | Orchestration |
                          '-------+-------'
           Network Model          |
  ietf-l2vpn-ntw, ietf-l3vpn-ntw, | ietf-sap-ntw, ietf-ac-glue,
           and ietf-ac-ntw        |
                          .-------+-------.
                          |   Network     |
                          | Orchestration |
                          '-------+-------'
    Network Configuration Model   |
                      .-----------+-----------.
                      |                       |
             .--------+------.       .--------+------.
             |    Domain     |       |     Domain    |
             | Orchestration |       | Orchestration |
             '---+-----------'       '--------+------'
  Device         |        |                   |
  Configuration  |        |                   |
  Model          |        |                   |
            .----+----.   |                   |
            | Config  |   |                   |
            | Manager |   |                   |
            '----+----'   |                   |
                 |        |                   |
                 | NETCONF/CLI..................
                 |        |                   |
               .--------------------------------.
 .----. Bearer |                                | Bearer .----.
 |CE#1+--------+            Network             +--------+CE#2|
 '----'        |                                |        '----'
               '--------------------------------'
  Site A                                                  Site B
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="module-tree-structure">
      <name>Module Tree Structure</name>
      <t><xref target="RFC8299"/> specifies that a 'site-network-access' attachment is achieved through a
'bearer' with an 'ip-connection' on top. From that standpoint, a 'site-network-access' is mapped to an attachment circuit with both Layers 2 and 3 properties as per <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. <xref target="RFC8466"/> specifies that a 'site-network-access' represents a logical Layer 2 connection to a site. A 'site-network-access' can thus be mapped to an attachment circuit with  Layer 2 properties <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>. Similarly, 'vpn-network-access' defined in both <xref target="RFC9182"/> and <xref target="RFC9291"/> is mapped to an attachment circuit as per <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> or <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>As such, ACs created using the "ietf-ac-svc" module <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> can be referenced in other
VPN-related modules (e.g., L2SM, L3SM, L2NM, and L3NM). Also, ACs managed using the "ietf-ac-ntw" module <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> can be referenced in VPN-related network modules (mainly, the L2NM and the L3NM). The required augmentations to that aim are shown in <xref target="tree"/>.</t>
      <figure anchor="tree">
        <name>AC Glue Tree Structure</name>
        <artwork align="center"><![CDATA[
module: ietf-ac-glue

  augment /l2vpn-svc:l2vpn-svc/l2vpn-svc:sites/l2vpn-svc:site
            /l2vpn-svc:site-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
  augment /l2vpn-svc:l2vpn-svc/l2vpn-svc:sites/l2vpn-svc:site
            /l2vpn-svc:site-network-accesses
            /l2vpn-svc:site-network-access:
    +--rw ac-svc-ref?   ac-svc:attachment-circuit-reference {ac-glue}?
  augment /l3vpn-svc:l3vpn-svc/l3vpn-svc:sites/l3vpn-svc:site
            /l3vpn-svc:site-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
  augment /l3vpn-svc:l3vpn-svc/l3vpn-svc:sites/l3vpn-svc:site
            /l3vpn-svc:site-network-accesses
            /l3vpn-svc:site-network-access:
    +--rw ac-svc-ref?   ac-svc:attachment-circuit-reference {ac-glue}?
  augment /l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service
            /l2nm:vpn-nodes/l2nm:vpn-node/l2nm:vpn-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
    +--rw ac-ntw-ref* [ac-ref]
       +--rw ac-ref         leafref
       +--rw node-ref?      leafref
       +--rw network-ref?   -> /nw:networks/network/network-id
  augment /l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service
            /l2nm:vpn-nodes/l2nm:vpn-node/l2nm:vpn-network-accesses
            /l2nm:vpn-network-access:
    +--rw ac-svc-ref?   ac-svc:attachment-circuit-reference {ac-glue}?
    +--rw ac-ntw-ref {ac-glue}?
       +--rw ac-ref?        leafref
       +--rw node-ref?      leafref
       +--rw network-ref?   -> /nw:networks/network/network-id
  augment /l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service
            /l3nm:vpn-nodes/l3nm:vpn-node/l3nm:vpn-network-accesses:
    +--rw ac-svc-ref*   ac-svc:attachment-circuit-reference
    +--rw ac-ntw-ref* [ac-ref]
       +--rw ac-ref         leafref
       +--rw node-ref?      leafref
       +--rw network-ref?   -> /nw:networks/network/network-id
  augment /l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service
            /l3nm:vpn-nodes/l3nm:vpn-node/l3nm:vpn-network-accesses
            /l3nm:vpn-network-access:
    +--rw ac-svc-ref?   ac-svc:attachment-circuit-reference {ac-glue}?
    +--rw ac-ntw-ref {ac-glue}?
       +--rw ac-ref?        leafref
       +--rw node-ref?      leafref
       +--rw network-ref?   -> /nw:networks/network/network-id
]]></artwork>
      </figure>
      <t>When an AC is referenced within a specific network access, then that AC information takes precedence over any overlapping information that is also enclosed for this network access.</t>
      <ul empty="true">
        <li>
          <t>This approach is consistent with the design in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> where an AC service reference, called 'ac-svc-name', is used to indicate the names of AC services. As per <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, when both 'ac-svc-name' and the attributes of 'attachment-circuits' are defined, the 'ac-svc-name' takes precedence.</t>
        </li>
      </ul>
      <t>The "ietf-ac-glue" module includes provisions to reference ACs within or outside a VPN network access to accommodate deployment contexts where an AC reference may be created before or after a VPN instance is created. <xref target="ref-within-access"/> illustrates how an AC reference can be included as part of a specific VPN network access, while <xref target="ref-outside-access"/> shows how AC references can be indicated outside individual VPN network access entries.</t>
    </section>
    <section anchor="sec-glue">
      <name>The AC Glue ("ietf-ac-glue") YANG Module</name>
      <t>This modules augments the L2SM <xref target="RFC8466"/>, the L3SM <xref target="RFC8299"/>, the L2NM <xref target="RFC9291"/>, and the L3NM <xref target="RFC9182"/>.</t>
      <t>This module uses references defined in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <sourcecode markers="true" name="ietf-ac-glue@2023-11-13.yang"><![CDATA[
module ietf-ac-glue {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-ac-glue";
  prefix ac-glue;

  import ietf-l3vpn-svc {
    prefix l3vpn-svc;
    reference
      "RFC 8299: YANG Data Model for L3VPN Service Delivery";
  }
  import ietf-l2vpn-svc {
    prefix l2vpn-svc;
    reference
      "RFC 8466: A YANG Data Model for Layer 2 Virtual Private
                 Network (L2VPN) Service Delivery";
  }
  import ietf-l3vpn-ntw {
    prefix l3nm;
    reference
      "RFC 9182: A YANG Network Data Model for Layer 3 VPNs";
  }
  import ietf-l2vpn-ntw {
    prefix l2nm;
    reference
      "RFC 9291: A YANG Network Data Model for Layer 2 VPNs";
  }
  import ietf-ac-svc {
    prefix ac-svc;
    reference
      "RFC SSSS: YANG Data Models for Bearers and 'Attachment
                 Circuits'-as-a-Service (ACaaS)";
  }
  import ietf-ac-ntw {
    prefix ac-ntw;
    reference
      "RFC NNNN: A Network YANG Data Model for Attachment Circuits";
  }

  organization
    "IETF OPSAWG (Operations and Management Area Working Group)";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/opsawg/>
     WG List:  <mailto:opsawg@ietf.org>

     Editor:   Mohamed Boucadair
               <mailto:mohamed.boucadair@orange.com>
     Author:   Richard Roberts
               <mailto:rroberts@juniper.net>
     Author:   Samier Barguil
               <mailto:ssamier.barguil_giraldo@nokia.com>
     Author:   Oscar Gonzalez de Dios
               <mailto:oscar.gonzalezdedios@telefonica.com>";
  description
    "This YANG module defines a YANG model for augmenting the LxSM
     and the LxNM with attachment circuit references.

     Copyright (c) 2024 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2023-11-13 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A YANG Data Model for Augmenting VPN Service
                 and Network Models with Attachment Circuits";
  }

  feature ac-glue {
    description
      "The VPN implementation supports binding a specific VPN
       network access or site access to an attachment circuit.";
  }

  grouping single-ac-svc-ref {
    description
      "A grouping with single reference to a service AC.";
    leaf ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that was
         provisioned using the ACaaS module.";
    }
  }

  grouping single-ac-svc-ntw-ref {
    description
      "A grouping with single AC references.";
    leaf ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that was
         provisioned using the ACaaS module.";
    }
    container ac-ntw-ref {
      description
        "A reference to the AC that was provisioned using the AC
         network module.";
      uses ac-ntw:attachment-circuit-reference;
    }
  }

  grouping ac-svc-ref {
    description
      "A set of service-specific AC-related data.";
    leaf-list ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that was
         provisioned using the ACaaS module.";
    }
  }

  grouping ac-svc-ntw-ref {
    description
      "A set of AC-related data.";
    leaf-list ac-svc-ref {
      type ac-svc:attachment-circuit-reference;
      description
        "A reference to the AC as exposed at the service that was
         provisioned using the ACaaS module.";
    }
    list ac-ntw-ref {
      key "ac-ref";
      description
        "A reference to the AC that was provisioned using the AC
         network module.";
      uses ac-ntw:attachment-circuit-reference;
    }
  }

  augment "/l2vpn-svc:l2vpn-svc"
        + "/l2vpn-svc:sites/l2vpn-svc:site"
        + "/l2vpn-svc:site-network-accesses" {
    description
      "Augments VPN site network accesses with AC provisioning
       details. Concretely, it binds a site to a set of
       attachment circuits with Layer 2 properties that were
       created using the ACaaS module.";
    uses ac-svc-ref;
  }

  augment "/l2vpn-svc:l2vpn-svc"
        + "/l2vpn-svc:sites/l2vpn-svc:site"
        + "/l2vpn-svc:site-network-accesses"
        + "/l2vpn-svc:site-network-access" {
    if-feature "ac-glue";
    description
      "Augments VPN site network access with AC provisioning
       details. Concretely, it glues a 'site-network-access'
       to an attachment circuit with Layer 2 properties that was
       created using the ACaaS module.

       The ACaaS information takes precedence over any overlapping
       information that is also provided for a site network access.";
    uses single-ac-svc-ref;
  }

  augment "/l3vpn-svc:l3vpn-svc"
        + "/l3vpn-svc:sites/l3vpn-svc:site"
        + "/l3vpn-svc:site-network-accesses" {
    description
      "Augments VPN site network accesses with AC provisioning
       details. Concretely, it binds a site to a set of attachment
       circuits with both Layers 2 and 3 properties that were
       created using the ACaaS module.";
    uses ac-svc-ref;
  }

  augment "/l3vpn-svc:l3vpn-svc"
        + "/l3vpn-svc:sites/l3vpn-svc:site"
        + "/l3vpn-svc:site-network-accesses"
        + "/l3vpn-svc:site-network-access" {
    if-feature "ac-glue";
    description
      "Augments VPN site network access with AC provisioning
       details. Concretely, it glues a 'site-network-access' to an
       attachment circuit with both Layer 2 and Layer 3 properties
       that was created using the ACaaS module.

       The ACaaS information takes precedence over any overlapping
       information that is also provided for a site network access.";
    uses single-ac-svc-ref;
  }

  augment "/l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service"
        + "/l2nm:vpn-nodes/l2nm:vpn-node"
        + "/l2nm:vpn-network-accesses" {
    description
      "Augments VPN network accesses with both service and network
       AC provisioning details. Concretely, it binds a site to (1)
       a set of attachment circuits with Layer 2 properties that were
       created using the ACaaS module and (2) a set of attachment
       circuits with Layer 2 properties that were provisioned using
       the AC network model.";
    uses ac-svc-ntw-ref;
  }

  augment "/l2nm:l2vpn-ntw/l2nm:vpn-services/l2nm:vpn-service"
        + "/l2nm:vpn-nodes/l2nm:vpn-node"
        + "/l2nm:vpn-network-accesses"
        + "/l2nm:vpn-network-access" {
    if-feature "ac-glue";
    description
      "Augments VPN network access with service and network
       references to an AC. Concretely, it glues a VPN network
       access to (1) an attachment circuit with Layer 2 properties
       that was created using the ACaaS module and (2) an attachment 
       circuit with Layer 2 properties that was created using the AC 
       network module.

       The AC service and network information takes precedence over
       any overlapping information that is also provided for a VPN
       network access.";
    uses single-ac-svc-ntw-ref;
  }

  augment "/l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service"
        + "/l3nm:vpn-nodes/l3nm:vpn-node"
        + "/l3nm:vpn-network-accesses" {
    description
      "Augments VPN network accesses with both service and network
       AC provisioning details. Concretely, it binds a site to (1)
       a set of attachment circuits with both Layer 2 and Layer 3 
       properties that were created using the ACaaS module and (2)
       a set of attachment circuits with both Layer 2 and Layer 3
       properties that were provisioned using the AC network model.";
    uses ac-svc-ntw-ref;
  }

  augment "/l3nm:l3vpn-ntw/l3nm:vpn-services/l3nm:vpn-service"
        + "/l3nm:vpn-nodes/l3nm:vpn-node"
        + "/l3nm:vpn-network-accesses"
        + "/l3nm:vpn-network-access" {
    if-feature "ac-glue";
    description
      "Augments VPN network access with service and network
       references to an AC. Concretely, it glues a VPN network
       access to (1) an attachment circuit with both Layer 2 and
       Layer 3 properties that was created using the ACaaS module
       and (2) an attachment circuit with both Layer 2 and Layer 3
       properties that was created using the AC network module.

       The AC service and network information takes precedence over
       any overlapping information that is also provided for a VPN
       network access.";
    uses single-ac-svc-ntw-ref;
  }
}
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section uses the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
      <t>The YANG module specified in this document defines schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>.  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) <xref target="RFC6242"/>.  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   <xref target="RFC8446"/>.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
   provides the means to restrict access for particular NETCONF or
   RESTCONF users to a preconfigured subset of all available NETCONF or
   RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   and delete operations to these data nodes without proper protection
   or authentication can have a negative effect on network operations.
   Specifically, the following subtrees and data nodes have particular
   sensitivities/vulnerabilities:</t>
      <dl>
        <dt>'ac-svc-ref' and 'ac-ntw-ref':</dt>
        <dd>
          <t>An attacker who is able to access network nodes can
undertake various attacks, such as deleting a running VPN
service, interrupting all the traffic of a client. Specifically,
an attacker may modify (including delete) the ACs that are bound to a running service, leading to
malfunctioning of the service and therefore to Service Level
Agreement (SLA) violations.
    : Such activity can be detected by adequately monitoring and tracking
network configuration changes.</t>
        </dd>
      </dl>
      <t>Some of the readable data nodes in this YANG module may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  Specifically, the following
subtrees and data nodes have particular sensitivities/vulnerabilities:</t>
      <dl>
        <dt>'ac-svc-ref' and 'ac-ntw-ref':</dt>
        <dd>
          <t>These references do not expose per se
privacy-related information, however 'ac-svc-ref' may be used to track
the set of VPN instances in which a given customer is involved.</t>
        </dd>
        <dt/>
        <dd>
          <t>Note that, unlike 'ac-svc-ref', 'ac-ntw-ref' is unique within the scope of
   a node and may multiplex many peer CEs.</t>
        </dd>
      </dl>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
   the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   URI:  urn:ietf:params:xml:ns:yang:ietf-ac-glue
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
   Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group:</t>
      <artwork><![CDATA[
   Name:  ietf-ac-glue
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-ac-glue
   Prefix:  ac-glue
   Maintained by IANA?  N
   Reference:  RFC XXXX
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="29" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-13"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="15" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-11"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-common-ac">
          <front>
            <title>A Common YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="14" month="May" year="2024"/>
            <abstract>
              <t>   The document specifies a common Attachment Circuits (ACs) YANG
   module, which is designed with the intent to be reusable by other
   models.  For example, this common model can be reused by service
   models to expose ACs as a service, service models that require
   binding a service to a set of ACs, network and device models to
   provision ACs, etc.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-common-ac-11"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-13"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="April" year="2024"/>
            <abstract>
              <t>   This memo provides guidelines for authors and reviewers of
   specifications containing YANG modules, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-11"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
      </references>
    </references>
    <?line 661?>

<section anchor="sec-example">
      <name>Examples</name>
      <section anchor="ref-within-access">
        <name>A Service AC Reference within The VPN Network Access</name>
        <t>Let us consider the example depicted in <xref target="ex-vpws"/> which is inspired from <xref section="2.1" sectionFormat="of" target="RFC4664"/>. Each PE is servicing two CEs. Let us also assume that the service references to identify attachment circuits with these CEs are shown in the figure.</t>
        <figure anchor="ex-vpws">
          <name>VPWS Topology Example</name>
          <artwork align="center"><![CDATA[
.-----.                                           .-----.
|     |  AC1                                AC2   |     |
| CE1 |--+ 2001:db8:100::1     2001:db8:200::1 +--| CE2 |
|     |  |    .-----.   .-----.     .-----.    |  |     |
'-----'  +----|---- |   |  P  |     | ----+----+  '-----'
              |VPWS\----|-----|-----|/VPWS|
              | PE1 |===|=====|=====| PE2 |
              |    /|---|-----|-----|\\   |
.-----.  +----|---- |   |     |     | ----|----+  .-----.
|     |  |    '-----'   '-----'     '-----'    |  |     |
| CE3 |--+                                     +--| CE4 |
|     |  AC3                                 AC4  |     |
'-----'                                           '-----'
]]></artwork>
        </figure>
        <t>As shown in <xref target="ex-vpws-query"/>, the service AC references can be explicitly indicated in the L2NM query for the realization of the Virtual Private Wire Service (VPWS) <xref section="3.1.1" sectionFormat="of" target="RFC4664"/>).</t>
        <figure anchor="ex-vpws-query">
          <name>Example of VPWS Creation with AC Service References</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
   "ietf-l2vpn-ntw:l2vpn-ntw":{
      "vpn-services":{
         "vpn-service":[
            {
               "vpn-id":"vpws12345",
               "vpn-description":"Sample VPWS with AC service \
                                                         references",
               "customer-name":"customer-12345",
               "vpn-type":"ietf-vpn-common:vpws",
               "bgp-ad-enabled":true,
               "signaling-type":"ietf-vpn-common:ldp-signaling",
               "global-parameters-profiles":{
                  "global-parameters-profile":[
                     {
                        "profile-id":"simple-profile",
                        "local-autonomous-system":65550,
                        "rd-auto":{
                           "auto":[
                              null
                           ]
                        },
                        "vpn-target":[
                           {
                              "id":1,
                              "route-targets":[
                                 {
                                    "route-target":"0:65535:1"
                                 }
                              ],
                              "route-target-type":"both"
                           }
                        ]
                     }
                  ]
               },
               "vpn-nodes":{
                  "vpn-node":[
                     {
                        "vpn-node-id":"pe1",
                        "ne-id":"2001:db8:100::1",
                        "active-global-parameters-profiles":{
                           "global-parameters-profile":[
                              {
                                 "profile-id":"simple-profile"
                              }
                           ]
                        },
                        "bgp-auto-discovery":{
                           "vpn-id":"587"
                        },
                        "signaling-option":{
                           "advertise-mtu":true,
                           "ldp-or-l2tp":{
                              "saii":1,
                              "remote-targets":[
                                 {
                                    "taii":2
                                 }
                              ],
                              "t-ldp-pw-type":"ethernet"
                           }
                        },
                        "vpn-network-accesses":{
                           "vpn-network-access":[
                              {
                                 "id":"1/1/1.1",
                                 "interface-id":"1/1/1",
                                 "description":"Interface to CE1",
                                 "active-vpn-node-profile":"simple-\
                                                            profile",
                                 "status":{
                                    "admin-status":{
                                       "status":"ietf-vpn-common:\
                                                            admin-up"
                                    },
                                    "ietf-ac-glue:ac-svc-ref":"AC1"
                                 }
                              },
                              {
                                 "id":"1/1/3.1",
                                 "interface-id":"1/1/3",
                                 "description":"Interface to CE3",
                                 "active-vpn-node-profile":"simple-\
                                                            profile",
                                 "status":{
                                    "admin-status":{
                                       "status":"ietf-vpn-common:\
                                                            admin-up"
                                    },
                                    "ietf-ac-glue:ac-svc-ref":"AC3"
                                 }
                              }
                           ]
                        }
                     },
                     {
                        "vpn-node-id":"pe2",
                        "ne-id":"2001:db8:200::1",
                        "active-global-parameters-profiles":{
                           "global-parameters-profile":[
                              {
                                 "profile-id":"simple-profile"
                              }
                           ]
                        },
                        "bgp-auto-discovery":{
                           "vpn-id":"587"
                        },
                        "signaling-option":{
                           "advertise-mtu":true,
                           "ldp-or-l2tp":{
                              "saii":2,
                              "remote-targets":[
                                 {
                                    "taii":1
                                 }
                              ],
                              "t-ldp-pw-type":"ethernet"
                           }
                        },
                        "vpn-network-accesses":{
                           "vpn-network-access":[
                              {
                                 "id":"2/1/2.1",
                                 "interface-id":"2/1/2",
                                 "description":"Interface to CE2",
                                 "active-vpn-node-profile":"simple-\
                                                            profile",
                                 "status":{
                                    "admin-status":{
                                       "status":"ietf-vpn-common:\
                                                            admin-up"
                                    },
                                    "ietf-ac-glue:ac-svc-ref":"AC2"
                                 }
                              },
                              {
                                 "id":"2/1/4.1",
                                 "interface-id":"2/1/4",
                                 "description":"Interface to CE4",
                                 "active-vpn-node-profile":"simple-\
                                                            profile",
                                 "status":{
                                    "admin-status":{
                                       "status":"ietf-vpn-common:\
                                                            admin-up"
                                    },
                                    "ietf-ac-glue:ac-svc-ref":"AC4"
                                 }
                              }
                           ]
                        }
                     }
                  ]
               }
            }
         ]
      }
   }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="ref-outside-access">
        <name>Network and Service AC References</name>
        <t>Let us consider the example depicted in <xref target="ex-topo"/> with two customer terminating points (CE1 and CE2). Let us also assume that the bearers to attach these CEs to the service provider network are already in place. References to identify these bearers are shown in the figure.</t>
        <figure anchor="ex-topo">
          <name>Topology Example</name>
          <artwork align="center"><![CDATA[
            .-----.   .--------------.   .-----.
.----.      | PE1 +===+              +===+ PE2 |      .----.
| CE1+------+"450"|   |     MPLS     |   |"451"+------+ CE2|
'----'   ^  '-----'   |              |   '-----'   ^  '----'
         |            |     Core     |             |  
    Bearer:1234       '--------------'         Bearer:5678
]]></artwork>
        </figure>
        <t>The AC service model <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> can be used by the provider to manage and expose the ACs over existing bearers as shown in <xref target="ex-ac"/>.</t>
        <figure anchor="ex-ac">
          <name>ACs Created Using ACaaS</name>
          <artwork><![CDATA[
{
  "ietf-ac-svc:attachment-circuits": {
    "ac-group-profile": [
      {
        "name": "an-ac-profile",
        "l2-connection": {
          "encapsulation": {
            "type": "ietf-vpn-common:dot1q",
            "dot1q": {
              "tag-type": "ietf-vpn-common:c-vlan",
              "cvlan-id": 550
            }
          }
        },
        "service": {
          "mtu": 1550,
          "svc-pe-to-ce-bandwidth": {
            "bandwidth": [
              {
                "bw-type": "ietf-vpn-common:bw-per-port",
                "cir": "20480000"
              }
            ]
          },
          "svc-ce-to-pe-bandwidth": {
            "bandwidth": [
              {
                "bw-type": "ietf-vpn-common:bw-per-port",
                "cir": "20480000"
              }
            ]
          },
          "qos": {
            "qos-profiles": {
              "qos-profile": [
                {
                  "profile": "QoS_Profile_A",
                  "direction": "ietf-vpn-common:both"
                }
              ]
            }
          }
        }
      }
    ],
    "ac": [
      {
        "name": "ac-1",
        "description": "First attachment",
        "ac-group-profile": [
          "an-ac-profile"
        ],
        "l2-connection": {
          "bearer-reference": "1234"
        }
      },
      {
        "name": "ac-2",
        "description": "Second attachment",
        "ac-group-profile": [
          "an-ac-profile"
        ],
        "l2-connection": {
          "bearer-reference": "5678"
        }
      }
    ]
  }
}
]]></artwork>
        </figure>
        <t>Let us now consider that the customer wants to request a VPLS instance between the sites as shown in <xref target="ex-vpls"/>.</t>
        <figure anchor="ex-vpls">
          <name>Example of VPLS</name>
          <artwork align="center"><![CDATA[
            |----------  VPLS "1543" ----------|
            
            .-----.   .--------------.   .-----.
.----.  AC1 | PE1 +===+              +===+ PE2 |  AC2 .----.
| CE1+------+"450"|   |     MPLS     |   |"451"+------+ CE2|
'----'   ^  '-----'   |              |   '-----'   ^  '----'
         |            |     Core     |             |  
    Bearer:1234       '--------------'         Bearer:5678
]]></artwork>
        </figure>
        <t>To that aim, existing ACs are referenced during the creation of the VPLS instance using the L2NM <xref target="RFC9291"/> and the "ietf-ac-glue" as shown in <xref target="ex-vpls-req"/>.</t>
        <figure anchor="ex-vpls-req">
          <name>Example of a VPLS Request Using L2NM and AC Glue (Message Body)</name>
          <artwork><![CDATA[
{
  "ietf-l2vpn-ntw:l2vpn-ntw": {
    "vpn-services": {
      "vpn-service": [
        {
          "vpn-id": "1543",
          "vpn-name": "CORPO-EXAMPLE",
          "customer-name": "EXAMPLE",
          "vpn-type": "ietf-vpn-common:vpls",
          "vpn-service-topology": "ietf-vpn-common:hub-spoke",
          "bgp-ad-enabled": false,
          "signaling-type": "ietf-vpn-common:ldp-signaling",
          "global-parameters-profiles": {
            "global-parameters-profile": [
              {
                "profile-id": "simple-profile",
                "ce-vlan-preservation": true,
                "ce-vlan-cos-preservation": true
              }
            ]
          },
          "vpn-nodes": {
            "vpn-node": [
              {
                "vpn-node-id": "450",
                "ne-id": "2001:db8:5::1",
                "role": "ietf-vpn-common:hub-role",
                "status": {
                  "admin-status": {
                    "status": "ietf-vpn-common:admin-up"
                  }
                },
                "active-global-parameters-profiles": {
                  "global-parameters-profile": [
                    {
                      "profile-id": "simple-profile"
                    }
                  ]
                },
                "signaling-option": {
                  "ldp-or-l2tp": {
                    "t-ldp-pw-type": "vpls-type",
                    "pw-peer-list": [
                      {
                        "peer-addr": "2001:db8:50::1",
                        "vc-id": "1543"
                      }
                    ]
                  }
                },
                "vpn-network-accesses": {
                  "ietf-ac-glue:ac-svc-ref": ["ac-1"]
                }
              },
              {
                "vpn-node-id": "451",
                "ne-id": "2001:db8:50::1",
                "role": "ietf-vpn-common:spoke-role",
                "status": {
                  "admin-status": {
                    "status": "ietf-vpn-common:admin-up"
                  }
                },
                "active-global-parameters-profiles": {
                  "global-parameters-profile": [
                    {
                      "profile-id": "simple-profile"
                    }
                  ]
                },
                "signaling-option": {
                  "ldp-or-l2tp": {
                    "t-ldp-pw-type": "vpls-type",
                    "pw-peer-list": [
                      {
                        "peer-addr": "2001:db8:5::1",
                        "vc-id": "1543"
                      }
                    ]
                  }
                },
                "vpn-network-accesses": {
                  "ietf-ac-glue:ac-svc-ref": ["ac-2"]
                }
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
        </figure>
        <t>Note that before implementing the VPLS instance creation request, the provider service orchestrator may first check if the VPLS service can be provided to the customer using the target delivery locations. The orchestrator uses the SAP model <xref target="RFC9408"/> as exemplified in <xref target="ex-sap-query"/>. This example assumes that the query concerns only PE1. A similar query can be issued for PE2.</t>
        <figure anchor="ex-sap-query">
          <name>Example of SAP Response (Message Body)</name>
          <artwork><![CDATA[
{
   "ietf-sap-ntw:service":[
      {
         "service-type":"ietf-vpn-common:vpls",
         "sap":[
            {
               "sap-id":"sap#1",
               "peer-sap-id":[
                  "ce-1"
               ],
               "description":"A parent SAP",
               "attachment-interface":"GE0/6/1",
               "interface-type":"ietf-sap-ntw:phy",
               "role":"ietf-sap-ntw:uni",
               "allows-child-saps":true,
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               }
            }
         ]
      }
   ]
}
]]></artwork>
        </figure>
        <t>The response in <xref target="ex-sap-query"/> indicates that the VPLS service can be delivered to CE1. <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> can be also used to access AC-related details that are bound to the target SAP (<xref target="ex-acntw-query-2"/>).</t>
        <figure anchor="ex-acntw-query-2">
          <name>Example of AC Network Response with SAP (Message Body)</name>
          <artwork><![CDATA[
{
   "ietf-sap-ntw:service":[
      {
         "service-type":"ietf-vpn-common:vpls",
         "sap":[
            {
               "sap-id":"sap#1",
               "peer-sap-id":[
                  "ce-1"
               ],
               "description":"A parent SAP",
               "attachment-interface":"GE0/6/1",
               "interface-type":"ietf-sap-ntw:phy",
               "role":"ietf-sap-ntw:uni",
               "allows-child-saps":true,
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               }
            },
            {
               "sap-id":"sap#11",
               "description":"A child SAP",
               "parent-termination-point":"GE0/6/4",
               "attachment-interface":"GE0/6/4.2",
               "interface-type":"ietf-sap-ntw:logical",
               "encapsulation-type":"ietf-vpn-common:vlan-type",
               "sap-status":{
                  "status":"ietf-vpn-common:op-up"
               },
               "ietf-ac-ntw:ac":[
                  {
                     "ac-ref":"ac-1",
                     "node-ref":"example:pe2",
                     "network-ref":"example:an-id"
                  }
               ]
            }
         ]
      }
   ]
}
]]></artwork>
        </figure>
        <t>The provisioned AC at PE1 can be retrieved using the AC network model <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> as depicted in <xref target="ex-acntw-query"/>.</t>
        <figure anchor="ex-acntw-query">
          <name>Example of AC Network Response (Message Body)</name>
          <artwork><![CDATA[
{
   "ietf-ac-ntw:ac":[
      {
         "name":"ac-11",
         "ac-svc-ref":"ac-1",
         "peer-sap-id":[
            "ce-1"
         ],
         "status":{
            "admin-status":{
               "status":"ietf-vpn-common:admin-up"
            },
            "oper-status":{
               "status":"ietf-vpn-common:op-up"
            }
         },
         "l2-connection":{
            "encapsulation":{
               "encap-type":"ietf-vpn-common:dot1q",
               "dot1q":{
                  "tag-type":"ietf-vpn-common:c-vlan",
                  "cvlan-id":550
               }
            },
            "bearer-reference":"1234"
         },
         "service":{
            "mtu":1550,
            "svc-pe-to-ce-bandwidth":{
               "bandwidth":[
                  {
                     "bw-type": "ietf-vpn-common:bw-per-port",
                     "cir":"20480000"
                  }
               ]
            },
            "svc-ce-to-pe-bandwidth":{
               "bandwidth":[
                  {
                     "bw-type": "ietf-vpn-common:bw-per-port",
                     "cir":"20480000"
                  }
               ]
            },
            "qos":{
               "qos-profiles":{
                  "qos-profile":[
                     {
                        "qos-profile-ref":"QoS_Profile_A",
                        "network-ref":"example:an-id",
                        "direction":"ietf-vpn-common:both"
                     }
                  ]
               }
            }
         }
      }
   ]
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bo Wu and Qin Wu for the review and comments.</t>
      <t>Thanks to Martin Björklund for the yangdoctors review and Gyan Mishra for the rtg-dir review.</t>
      <t>Thanks to Mahesh Jethanandani for the AD review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
