<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="4"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-ietf-dmm-udp-tunnel-acaas-extn-00" ipr="trust200902">

  <!-- ***** FRONT MATTER ***** -->

  <front>
    <title>A YANG Data Model Extension for Attachment Circuit as a Service with UDP Tunnel Support</title>

    <!-- add 'role="editor"' below for the editors if appropriate -->
    <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
      <organization>Futurewei</organization>
      <address>
      <postal>
      <country>USA</country>
      </postal>
      <email>john.kaippallimalil@futurewei.com</email>
      </address>
    </author>
    
   <author fullname="Luis M. Contreras" initials="L.M." surname="Contreras">
     <organization>Telefonica</organization>
     <address>
        <postal>
          <street>Telefonica Sur-3 building, 3rd floor</street>
          <city>Madrid</city>
          <code>28050</code>
          <country>Spain</country>
        </postal>
     <email>luismiguel.contrerasmurillo@telefonica.com</email>
     </address>
   </author>     
   
    <author fullname="Uma Chunduri" initials="U." surname="Chunduri">      
      <organization>Intel Corporation</organization>
      <address>
      <postal>
      <street>2191 Laurelwood Rd</street>
      <city>Santa Clara</city>
      <region>CA</region>
      <code>95054</code>
      <country>USA</country>
      </postal>
      <email>umac.ietf@gmail.com</email>
      </address>
    </author>   

 
 
        
    
    <date year="2026"/>
     
    <area>Internet</area>

    <workgroup>DMM Working Group</workgroup>

    <keyword>L3 Tunnel Attachment circuit as a Service</keyword>


    <abstract>
	<t>Delivery of network services over a Layer 3 tunnel assumes that the 
	appropriate setup is provisioned over links that connect the customer 
	termination points and provider network.
	The required setup to allow successful data exchange over these links is 
	referred to as an attachment circuit (AC) while the underlying link for carrying
	network services is referred to as "bearer", in this case a Layer 3 UDP tunnel.
	</t>
	<t>This document specifies an extension for UDP tunnel as Layer 3 bearer to the YANG service data model 
	for AC.</t>
	
    </abstract>

<!-- this section is out of date
    <note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref
      target="RFC2119">RFC2119</xref>.</t>
    </note>
-->
  </front>

  <middle>
  
    <section anchor="INTRO" title="Introduction">
    
    <t>Connectivity services provided by networks to customers ensure the transfer of
    data between termination points via a provider network.
    The objectives of the connectivity service can be negotiated and agreed between
    customers and network providers.
    To facilitate data transfer within the provider network, it is assumed that the 
    appropriate setup is provisioned over links that connect customer termination points
    and provider network (usually via Provider Edges (PEs)).
    This is referred to as attachment circuit (AC) and the underlying link defined in this 
    document is a UDP tunnel as Layer 3 bearer.
    In general, a bearer can be described as a physical or logical link that connects a customer node (or site) 
    to a provider network.
    <xref target="RFC9834"/> describes further details 
    on the description of the bearer service and the attachment circuit service.</t>
		  
    <t><xref target="RFC9834"/> specifies YANG data models 
    for the bearer service and the attachment circuit service. 
    Layer 3 UDP tunnel as bearer is not defined in the ACaaS specification and 
    is an extension defined in this document.
    An example of Layer 3 UDP tunnel as a bearer is in 5G networks where a GTP-U (UDP) bearer <xref target="TS.29.281-3GPP"/>
    is used to transport datagrams of a mobile end-user between 3GPP user plane functions.
    <xref target="AC_Extn_for_UDPT"/> describes the "ietf-ac-udpt" YANG module for Layer 3 UDP tunnel 
    service.
    <xref target="UDPT_Yang"/> describes the UDP tunnel YANG data model.
    An example of UDP Tunnel with source port number to identify bearers at the transport network
    Provider Edge (PE) is provided in <xref target="APPDX_B"/>.</t>			
	    
	</section>   <!-- end of chapter 1 Introduction -->	
	
	
    <!-- extended list of abbreviations -->   
	<section title="Terminology">
    <t><list hangIndent="9" style="hanging">

        <t hangText="AC       &ndash;">Attachment Circuit</t>
        <t hangText="CE       &ndash;">Customer Edge</t>
        <t hangText="GTP-U    &ndash;">General Packet Radio Service (GPRS) Tunneling Protocol - User plane (3GPP)</t>
        <t hangText="GW       &ndash;">Gateway</t>
        <t hangText="NSC      &ndash;">Network Slice Controller</t>
        <t hangText="PE       &ndash;">Provider Edge</t>
        <t hangText="SF       &ndash;">Service Function</t>
        <t hangText="SMO      &ndash;">Service Management and Orchestration</t>
        <t hangText="TN       &ndash;">Transport Network</t>
        <t hangText="UDP      &ndash;">User Datagram Protocol</t>
        <t hangText="Layer 3 UDP Tunnel      &ndash;">UDP tunnel as a bearer for data flows.</t>       

   </list></t>
   </section>	
	    
    
    <section anchor="AC_Extn_for_UDPT" title="Attachment Circuit for UDP Tunnel">
    
    <t><xref target="RFC9834"/> defines a YANG service model for AC
    based on underlying bearers.
    A bearer is a logical link with the appropriate level of resources, 
    QoS and priority for the data traffic it carries.
    This document extends the YANG service model for AC in 
    <xref target="RFC9834"/> to support UDP tunnel as the underlying bearer.</t>   
    
    <t>The 'l3-service' and 'l3-tunnel-service' in the AC
    structure in <xref target="RFC9834"/> is used to configure the 
    relevant layer 3 tunnel properties of a UDP tunnel AC.
    IPv4 and IPv6 properties of the UDP tunnel AC are provided in the "ip-connection" container
    (Section 5.2.5.2 of <xref target="RFC9834"/>).
    The extension below adds source port number and range for the UDP tunnel.</t>
    
    <t>The meanings of the symbols in the YANG tree diagram are defined in 
    "YANG Tree Diagrams" <xref target="RFC8340"/>.</t>
    
    <figure anchor="ENCAP_UDPT_TREE" 
   	 title="UDP Tunnel Yang Module">
              <artwork>
              
module: ietf-ac-udpt

  augment /ac-svc:attachment-circuits/ac-svc:ac/ac-svc:ip-connection
          /ac-svc:l3-service/ac-svc:l3-tunnel-service
          /ac-svc:l3-tunnel-service:

    +--rw (udp-port)?
       +--:(port-range-or-operator)
          +--rw source-port-range-or-operator
             +--rw (port-range-or-operator)?
                +--:(range)
                |  +--rw lower-port    inet:port-number
                |  +--rw upper-port    inet:port-number
                +--:(operator)
                   +--rw operator?     operator
                   +--rw port          inet:port-number
                                          
           </artwork>
      </figure>    
      
    <t>'l3-tunnel-service' in Section 5.2.5.2 of <xref target="RFC9834"/> is 
    extended in this document to specify UDP source port number or a range port numbers.</t>
    
    <t>Also, this document defines a new identity (called 'udp') based on the base 
    identity 'l3-tunnel-type' defined in Section 4.2 of <xref target="RFC9833"/>.</t>
    
    </section>   <!-- end of chapter 2 AC extn description --> 
    
    
    <section anchor="UDPT_Yang" title="ietf-ac-udp-tunnel YANG Module">
    
    <t>The "ietf-ac-udp-tunnel" module uses types and groupings defined in 
    <xref target="RFC9833"/>, <xref target="RFC9834"/>, 
    and <xref target="RFC8519"/>.</t>

        
    <figure anchor="Fig_UDPT_Yang" title="UDP Tunnel YANG Module">
              <artwork>
    <![CDATA[  
<CODE BEGINS> file "ietf-ac-udp-tunnel@2025-09-18.yang"

module ietf-ac-udp-tunnel {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-ac-udp-tunnel";
  prefix ac-udpt;

  import ietf-ac-common {
    prefix ac-common;
    reference
      "RFC 9833: A Common YANG Data Model for Attachment Circuits";
  }
  import ietf-ac-svc {
    prefix ac-svc;
    reference
      "RFC 9834: YANG Data Models for Bearers and 'Attachment
                 Circuits'-as-a-Service (ACaaS)";
  }
  import ietf-packet-fields {
    prefix packet-fields;
      reference
        "RFC 8519: YANG Data Model for Network Access
                   Control Lists (ACLs), Section 4.2";
  }

  organization
    "IETF DMM (Distributed Mobility Management)";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/dmm/>
     WG List:  <mailto:dmm@ietf.org>

     Author:   John Kaippallimalil
               <mailto:john.kaippallimalil@futurewei.com>";
  description
    "This YANG module defines a YANG model for augmenting 
     the ACaaS service model with UDP Encapsulation as 
     Layer 3 tunnel service.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).
  
     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2025-09-18 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A YANG Data Model for Attachment Circuit 
                 as a Service with UDP Tunnel Support";
  }

  identity udp {
    base ac-common:l3-tunnel-type;
    description
      "UDP Encapsulation.";
    reference
      "RFC 8085: UDP Usage Guidelines, Section 3.1.11";
  }

  augment "/ac-svc:attachment-circuits/ac-svc:ac"
        + "/ac-svc:ip-connection/ac-svc:l3-service"
        + "/ac-svc:l3-tunnel-service/ac-svc:l3-tunnel-service" {
    when "derived-from-or-self(./ac-svc:type, 'ac-udpt:udp')" {
      description
        "Only applicable if l3 service type is UDP encapsulation.";
    }
    description
      "Augments Layer 3 AC service with required data nodes for
       UDP encapsulation support.";
     choice udp-port {
       description
         "Choice of specifying the source port number or referring
          to a group of port numbers.";
       container source-port-range-or-operator {
         description
            "Indicates a set of source ports numbers.";
         uses packet-fields:port-range-or-operator;
      }
    }
  }
}

<CODE ENDS>
    ]]>                      
           </artwork>
    </figure>
    
    <t>Note to RFC Editor:</t>
    <list>
    <t>Replace "RFC XXXX" with the RFC number to be assigned to this document.</t>
    </list>    
    
    </section> <!-- end of chapter 3 UDPT YANG module -->  
    


  

    <section anchor="Acknowledgements" title="Acknowledgements">

    <t>Thanks to Mohamed Boucadair for the review and comments.
    Lionel Morand helped with the review and Yang structures in this document.
    Thanks to Linda and Tianji for the reivew and suggested updates.  
    </t>
			    
    </section>   <!-- Acknowledgements -->
    
    
    <section anchor="Security" title="Security Considerations">
    
    <t>This section is modeled after the template described in Section 3.7 of <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
    
    <t>The "ietf-ac-udp-tunnel" YANG module defines a data model that is
   designed to be accessed via YANG-based management protocols, such as
   NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. 
   These YANG-based management protocols (1) have to use a secure transport layer
   (e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>) 
   and (2) have to use mutual authentication.</t>
    
    <t>Servers MUST verify that requesting clients are entitled to access and manipulate 
    a given bearer or AC.  
    For example, a given customer must not have access to bearers (attachment circuits) of other customers.
    The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
    provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset 
    of all available NETCONF or RESTCONF protocol operations and content.</t>
    
    <t>The data nodes in the YANG model in this document inherits from <xref target="RFC9834"/>,
    and the security constraints to the data structures there apply.
    Data nodes defined in the ietf-ac-udp-tunnel YANG module are writable/creatable/deletable 
    (i.e., config true, which is the default).  
    These data nodes may be considered sensitive or vulnerable in some network environments. 
    Write operations (e.g., edit-config) and delete operations to these data nodes without proper protection 
    or authentication can have a negative effect on network operations.
    The 'udp-port' information may be used to track a customer of the slice service and may 
    be considered a violation of the customer-provider trust relationship.</t>
    
    </section>   <!-- Security considerations -->
	
	    

    <section anchor="IANA" title="IANA Considerations">
    
	<t>IANA is requested to register the following URI in the "ns" subregistry within the 
	"IETF XML Registry" <xref target="RFC3688"/>:</t>
	
	<t><list>
	<t>URI: urn:ietf:params:xml:ns:yang:ietf-ac-udp-tunnel</t>
	<t>Registrant Contact:  The IESG.</t>
	<t>XML: N/A; the requested URI is an XML namespace.</t>
	</list></t>
	
	<t>IANA is requested to register the following YANG module in the "YANG Module Names" subregistry 
	<xref target="RFC6020"/> within the "YANG parameters" registry.</t>
	
	<t><list>
	<t>Name: ietf-ac-udp-tunnel</t>
	<t>Maintained by IANA?  N</t>
	<t>Namespace: urn:ietf:params:xml:ns:yang:ietf-ac-udp-tunnel</t>
	<t>Prefix: ac-udp-tunnel</t>
	<t>Reference: RFC XXXX</t>
	</list></t>	
	
	
    </section>   <!-- IANA considerations -->



  </middle>

  <!-- *****BACK MATTER ***** -->

  <back>

    <references title="Normative References">
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.3688.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6020.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8341.xml"?>          
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8519.xml"?> 
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.9833.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.9834.xml"?>        
    </references>


    <references title="Informative References">

      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6241.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8040.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8792.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4252.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8446.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.9000.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8340.xml"?>
      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8085.xml"?>

      <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.9543.xml"?>
      <?rfc include="reference.I-D.ietf-netmod-rfc8407bis"?>

    <reference anchor='TS.29.281-3GPP'>
        <front>
        <title>GPRS Tunneling Protocol User Plane (GTPv1-U), 3GPP TS 29.281 v19.2.0</title>
        <author>
        <organization>3rd Generation Partnership Project (3GPP)</organization>
        </author>
        <date month="September" year="2025"/>
        </front>
	</reference>	


    </references>
   
   

   
   <section anchor="APPDX_B" title="Example">
   
   <t>This example is adapted from Appendix A.7 of <xref target="RFC9834"/>
   where details of the topology and service are described. 
   <xref target="EG-TOPOLOGY"/> describes the end-to-end network topology as well as
   orchestration scope:</t>
   
   <ul>
   <li>The topology is made up of two sites ("site1" and "site2"), interconnected via a 
   Transport Network (e.g., IP/MPLS network). An SF is deployed within each site in a dedicated IP subnet.</li>
   <li>A 5G Service Management and Orchestration (SMO) is responsible for the deployment of 
   SFs and the indirect management of a local Gateway (i.e., CE).</li>
   <li>An IETF Network Slice Controller (NSC) <xref target="RFC9543"/> is responsible
   for the deployment of IETF Network Slices across the Transport Network.</li>
   </ul>   
   
 <figure anchor="EG-TOPOLOGY" 
	 title="An example of a Network Topology to Deploy Slices with UDP Tunnel Bearer">
           <artwork>
    <![CDATA[
    
         5G SMO                 IETF NSC                 5G SMO
            |               (TN Orchestrator)               |
            |                        |                      |
      <-----+----->        <---------+-------->        <----+---->
          Site1             Transport Network              Site2
                             .--------------.                 
                             |              |                 
                           .---.          .---.  
      .---.   .---.        |   |          |   |        .---.  .---.
      |SF1+----------------+PE1|          |PE2+---------------|SF2|
      '---'   |GW1|  ^     |   |          |   |   ^    |GW2|  '---'
              '---'  |     '-+-'          '-+-'   |    '---'  
                     |       |              |     |
                     |       '--------------'     |
                     |                            |
                     |                            |
              UDP Tunnel Bearer:           UDP Tunnel Bearer:
                 bearerX@site1               bearerX@site2

    ]]> 	
           </artwork>
      </figure>    
   
   
   <t><xref target="EG-LOGICAL"/> describes the logical connectivity enforced with 
   IETF Network slice and ACaaS models with UDP tunnel bearer identified by the 
   UDP source port number.</t> 
   
 <figure anchor="EG-LOGICAL" 
	 title="Logical Overview">
           <artwork>
    <![CDATA[
    
                                AS 65536  <----BGP--> AS 65550
    .---.                     .--------.                     .---.
    |SF1|       192.0.2.0/30  |        |    192.0.2.4/30     |SF2|
    '-+-'   .---.           .-+-.    .-+-.           .---.   '-+-'
      |     |   |.1       .2|   |    |   |.6       .5|   |     |
    --+-----+GW1+-----------+PE1|    |PE2+-----------+GW2+-----+--
            |   |udp-src-prt|   |    |   |udp-src-prt|   |
            '---'    5678   '-+-'    '-+-'   7890    '---'
   198.51.100.0/24            |        |           203.0.113.0/24
                              '--------'
                           sdp1        sdp2
     <--------------------> <-----------> <------------------>
                Attachment  Network Slice  Attachment
   
     * "ac1" properties:
    - bearer-reference: bearerX@site1
    - udp-src-prt: 5678
    - CE address (SF1): 198.51.100.0/24
    - PE address: 192.0.2.2/30
    - Routing: static 198.51.100.0/24 via
               192.0.2.1 tag primary_UP_slice

    * "ac2" properties:
    - bearer-reference: bearerY@site2
    - udp-src-prt: 7890
    - CE address (SF2): 203.0.113.0/24
    - PE address: 192.0.2.6/30
    - Routing: BGP local-as: 65536 (Provider ASN)
                   peer-as: 65550 (customer ASN)
                   remote-address: 192.0.2.5 (Customer address)             
                
    ]]> 	
           </artwork>
      </figure>
      
      
   <t><xref target="MSG-BODY-CREATE"/> is an adaptation of 
   A.7, Figure 41 in <xref target="RFC9834"/>
   with a UDP Tunnel bearer identified by the source port number.</t>
      
  <figure anchor="MSG-BODY-CREATE" 
 	 title="Message Body of a Request to Create AC with UDP Tunnel">
            <artwork>
     <![CDATA[
   =============== NOTE: '\' line wrapping per RFC 8792 ================
     
   {
     "ietf-ac-svc:attachment-circuits": {
       "ac": [
         {
           "name": "ac1",
           "description": "Connection to site1 on vlan 100",
           "requested-start": "2023-12-12T05:00:00.00Z",
           "l2-connection": {
             "bearer-reference": "bearerX@site1"
           },
           "ip-connection": {
             "ipv4": {
               "address-allocation-type": "ietf-ac-common:static-\
                                                                address"
             },
             "l3-service" {
               "l3-tunnel-service": "ietf-ac-udpt:udp"
             }
           },
           "routing-protocols": {
             "routing-protocol": [
               {
                 "id": "1",
                 "type": "ietf-vpn-common:static-routing",
                 "static": {
                   "cascaded-lan-prefixes": {
                     "ipv4-lan-prefix": [
                       {
                         "lan": "198.51.100.0/24",
                         "next-hop": "192.0.2.1",
                         "lan-tag": "primary_UP_slice"
                       }
                     ]
                   }
                 }
               }
             ]
           }
         },
         {
           "name": "ac2",
           "description": "Connection to site2 on vlan 200",
           "requested-start": "2023-12-12T05:00:00.00Z",
           "l2-connection": {

             "bearer-reference": "bearerY@site2"
           },
           "ip-connection": {
             "ipv4": {
               "address-allocation-type": "ietf-ac-common:static-\
                                                                address"
             },
             "l3-service" {
               "l3-tunnel-service": "ietf-ac-udpt:udp"
             }
           },
           "routing-protocols": {
             "routing-protocol": [
               {
                 "id": "1",
                 "type": "ietf-vpn-common:bgp-routing",
                 "bgp": {
                   "neighbor": [
                     {
                       "id": "1",
                       "peer-as": 65550
                     }
                   ]
                 }
               }
             ]
           }
         }
       ]
     }
   }              
]]> 	
            </artwork>
       </figure>
       
       
   <t><xref target="MSG-GET"/> is an adaptation of 
   A.7, Figure 42 in <xref target="RFC9834"/>
   that shows the message body of that response to a GET request received from the controller.</t>
      
  <figure anchor="MSG-GET" 
 	 title="Example of a Message Body of a Response Indicating Creation of the ACs">
            <artwork>
     <![CDATA[  
    {
     "ietf-ac-svc:attachment-circuits": {
       "ac": [
         {
           "name": "ac1",
           "description": "Connection to site1 on vlan 100",
           "actual-start": "2023-12-12T05:00:00.00Z",
           "l2-connection": {
             "bearer-reference": "bearerX@site1"
           },
           "ip-connection": {
             "ipv4": {
               "local-address": "192.0.2.2",
               "prefix-length": 30,
               "address": [
                 {
                   "address-id": "1",
                   "customer-address": "192.0.2.1"
                 }
               ]
             },
             "l3-service" {
               "l3-tunnel-service": "ietf-udpt:udp",
                 "ietf-ac-udpt:source-port-range-or-operator" {
                     "port": 5678
                 }
               }
             }
           },
           "routing-protocols": {
             "routing-protocol": [
               {
                 "id": "1",
                 "type": "ietf-vpn-common:static-routing",
                 "static": {
                   "cascaded-lan-prefixes": {
                     "ipv4-lan-prefix": [
                       {
                         "lan": "198.51.100.0/24",
                         "next-hop": "192.0.2.1",
                         "lan-tag": "primary_UP_slice"
                       }
                     ]
                   }
                 }
               }
             ]
           }
         },
         {
           "name": "ac2",
           "description": "Connection to site2 on vlan 200",
           "actual-start": "2023-12-12T05:00:00.00Z",
           "l2-connection": {
             "bearer-reference": "bearerY@site2"
           },
           "ip-connection": {
             "ipv4": {
               "local-address": "192.0.2.6",
               "prefix-length": 30,
               "address": [
                 {
                   "address-id": "1",
                   "customer-address": "192.0.2.5"
                 }
               ]
             },
             "l3-service" {
               "l3-tunnel-service": "ietf-udpt:udp",
                 "ietf-ac-udpt:source-port-range-or-operator" {
                     "port": 7890
                 }
               }
             }
           },
           "routing-protocols": {
             "routing-protocol": [
               {
                 "id": "1",
                 "type": "ietf-vpn-common:bgp-routing",
                 "bgp": {
                   "neighbor": [
                     {
                       "id": "1",
                       "peer-as": 65550,
                       "local-as": 65536
                     }
                   ]
                 }
               }
             ]
           }
         }
       ]
     }         
]]> 	
            </artwork>
       </figure>       


   <t><xref target="MSG-SLICE"/> is derived from 
   A.7, Figure 43 in <xref target="RFC9834"/>.
   <xref target="MSG-SLICE"/> shows the message body of the request to create a Slice
   Service bound to the ACs created using <xref target="MSG-BODY-CREATE"/>.  Only references to
   these ACs are included in the Slice Service request.</t>
      
  <figure anchor="MSG-SLICE" 
 	 title="Example of a Message Body of a Response Indicating Creation of the ACs">
            <artwork>
     <![CDATA[ 

   {
     "ietf-network-slice-service:network-slice-services": {
       "slo-sle-templates": {
         "slo-sle-template": [
           {
             "id": "low-latency-template",
             "description": "Lowest latency forwarding behavior"
           }
         ]
       },
       "slice-service": [
         {
           "id": "Slice URLLC_UP",
           "description": "Dedicated TN Slice for URLLC-UP",
           "slo-sle-template": "low-latency-template",
           "status": {},
           "sdps": {
             "sdp": [
               {
                 "id": "sdp1",
                 "ac-svc-name": [
                   "ac1"
                 ]
               },
               {
                 "id": "sdp2",
                 "ac-svc-name": [
                   "ac2"
                 ]
               }
             ]
           }
         }
       ]
     }
   }
]]> 	
            </artwork>
       </figure>

             
   
   </section>     

  </back>
</rfc>
