Recall that this model is not a device model and is not about how a VPN is
implemented or realized in a network, but is about how the VPN service is
discussed between a service provider and their customer.
In view of this, review from three perspectives would be particularly useful:
- customers (e.g., enterprises) to let us know that the description of the
service is how you would request a service
- service providers to let us know if the model fits with how you describe
the services you sell
- implementers of management systems to understand that whether they
could map from the service description to the network configuration that
is needed to operate the VPN.
Of course, all other reviews are also welcome.
Please send comments to the L2SM list (not this list!).