| < draft-ietf-bier-isis-extensions-09.txt | draft-ietf-bier-isis-extensions-10.txt > | |||
|---|---|---|---|---|
| Internet Engineering Task Force L. Ginsberg, Ed. | Internet Engineering Task Force L. Ginsberg, Ed. | |||
| Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
| Intended status: Standards Track A. Przygienda | Intended status: Standards Track A. Przygienda | |||
| Expires: August 27, 2018 Juniper Networks | Expires: September 12, 2018 Juniper Networks | |||
| S. Aldrin | S. Aldrin | |||
| J. Zhang | J. Zhang | |||
| Juniper Networks, Inc. | Juniper Networks, Inc. | |||
| February 23, 2018 | March 11, 2018 | |||
| BIER support via ISIS | BIER support via ISIS | |||
| draft-ietf-bier-isis-extensions-09 | draft-ietf-bier-isis-extensions-10 | |||
| Abstract | Abstract | |||
| This document defines ISIS extensions to support multicast forwarding | This document defines ISIS extensions to support multicast forwarding | |||
| using the Bit Index Explicit Replication (BIER) architecture. | using the Bit Index Explicit Replication (BIER) architecture. | |||
| Requirements Language | Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| skipping to change at page 1, line 44 ¶ | skipping to change at page 1, line 44 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on August 27, 2018. | This Internet-Draft will expire on September 12, 2018. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 41 ¶ | skipping to change at page 2, line 41 ¶ | |||
| 5.3. Logging Misconfiguration . . . . . . . . . . . . . . . . 6 | 5.3. Logging Misconfiguration . . . . . . . . . . . . . . . . 6 | |||
| 5.4. Flooding Reduction . . . . . . . . . . . . . . . . . . . 6 | 5.4. Flooding Reduction . . . . . . . . . . . . . . . . . . . 6 | |||
| 6. Packet Formats . . . . . . . . . . . . . . . . . . . . . . . 6 | 6. Packet Formats . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 6.1. BIER Info sub-TLV . . . . . . . . . . . . . . . . . . . . 7 | 6.1. BIER Info sub-TLV . . . . . . . . . . . . . . . . . . . . 7 | |||
| 6.2. BIER MPLS Encapsulation sub-sub-TLV . . . . . . . . . . . 8 | 6.2. BIER MPLS Encapsulation sub-sub-TLV . . . . . . . . . . . 8 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 9 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 9 | |||
| 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 9 | 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 9 | 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . 9 | 9.1. Normative References . . . . . . . . . . . . . . . . . . 9 | |||
| 9.2. Informative References . . . . . . . . . . . . . . . . . 10 | 9.2. Informative References . . . . . . . . . . . . . . . . . 10 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 1. Introduction | 1. Introduction | |||
| Bit Index Explicit Replication (BIER) [RFC8279] defines an | Bit Index Explicit Replication (BIER) [RFC8279] defines an | |||
| architecture where all intended multicast receivers are encoded as | architecture where all intended multicast receivers are encoded as | |||
| bitmask in the Multicast packet header within different | bitmask in the Multicast packet header within different | |||
| encapsulations such as [RFC8296]. A router that receives such a | encapsulations such as [RFC8296]. A router that receives such a | |||
| packet will forward the packet based on the Bit Position in the | packet will forward the packet based on the Bit Position in the | |||
| packet header towards the receiver(s), following a precomputed tree | packet header towards the receiver(s), following a precomputed tree | |||
| for each of the bits in the packet. Each receiver is represented by | for each of the bits in the packet. Each receiver is represented by | |||
| skipping to change at page 8, line 40 ¶ | skipping to change at page 8, line 40 ¶ | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Type | Length | | | Type | Length | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Max SI |BS Len | Label | | | Max SI |BS Len | Label | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type: value of 1 indicating MPLS encapsulation. | Type: value of 1 indicating MPLS encapsulation. | |||
| Length: 4 | Length: 4 | |||
| Local BitString Length (BS Len): Encoded bitstring length as per | ||||
| [RFC8296]. 4 bits. | ||||
| Max SI Maximum Set Identifier (section 1 of [RFC8279]) used in the | Max SI Maximum Set Identifier (section 1 of [RFC8279]) used in the | |||
| encapsulation for this BIER sub-domain for this bitstring length, | encapsulation for this BIER sub-domain for this bitstring length, | |||
| 1 octet. Each SI maps to a single label in the label range. The | 1 octet. Each SI maps to a single label in the label range. The | |||
| first label is for SI=0, the second label is for SI=1, etc. | first label is for SI=0, the second label is for SI=1, etc. If | |||
| the label associated with the Maximum Set Identifier exceeds the | ||||
| 20 bit range the sub-sub-TLV MUST be ignored. | ||||
| Local BitString Length (BS Len): Encoded bitstring length as per | ||||
| [RFC8296]. 4 bits. | ||||
| Label: First label of the range, 20 bits. The labels are as defined | Label: First label of the range, 20 bits. The labels are as defined | |||
| in [RFC8296]. | in [RFC8296]. | |||
| 7. Security Considerations | 7. Security Considerations | |||
| Security concerns for IS-IS are addressed in [RFC5304] and [RFC5310]. | Security concerns for IS-IS are addressed in [RFC5304] and [RFC5310]. | |||
| Advertisement of the additional information defined in this document | Advertisement of the additional information defined in this document | |||
| introduces no new security concerns. | introduces no new security concerns. | |||
| End of changes. 7 change blocks. | ||||
| 9 lines changed or deleted | 11 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||