| < draft-ietf-idr-ls-distribution-09.txt | draft-ietf-idr-ls-distribution-10.txt > | |||
|---|---|---|---|---|
| Inter-Domain Routing H. Gredler | Inter-Domain Routing H. Gredler | |||
| Internet-Draft Juniper Networks, Inc. | Internet-Draft Juniper Networks, Inc. | |||
| Intended status: Standards Track J. Medved | Intended status: Standards Track J. Medved | |||
| Expires: July 25, 2015 S. Previdi | Expires: July 30, 2015 S. Previdi | |||
| Cisco Systems, Inc. | Cisco Systems, Inc. | |||
| A. Farrel | A. Farrel | |||
| Juniper Networks, Inc. | Juniper Networks, Inc. | |||
| S. Ray | S. Ray | |||
| Cisco Systems, Inc. | Cisco Systems, Inc. | |||
| January 21, 2015 | January 26, 2015 | |||
| North-Bound Distribution of Link-State and TE Information using BGP | North-Bound Distribution of Link-State and TE Information using BGP | |||
| draft-ietf-idr-ls-distribution-09 | draft-ietf-idr-ls-distribution-10 | |||
| Abstract | Abstract | |||
| In a number of environments, a component external to a network is | In a number of environments, a component external to a network is | |||
| called upon to perform computations based on the network topology and | called upon to perform computations based on the network topology and | |||
| current state of the connections within the network, including | current state of the connections within the network, including | |||
| traffic engineering information. This is information typically | traffic engineering information. This is information typically | |||
| distributed by IGP routing protocols within the network. | distributed by IGP routing protocols within the network. | |||
| This document describes a mechanism by which links state and traffic | This document describes a mechanism by which links state and traffic | |||
| skipping to change at page 2, line 12 ¶ | skipping to change at page 2, line 12 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on July 25, 2015. | This Internet-Draft will expire on July 30, 2015. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2015 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 3, line 10 ¶ | skipping to change at page 3, line 10 ¶ | |||
| 3.7. Router-ID Anchoring Example: OSPF Pseudonode . . . . . . 32 | 3.7. Router-ID Anchoring Example: OSPF Pseudonode . . . . . . 32 | |||
| 3.8. Router-ID Anchoring Example: OSPFv2 to IS-IS Migration . 33 | 3.8. Router-ID Anchoring Example: OSPFv2 to IS-IS Migration . 33 | |||
| 4. Link to Path Aggregation . . . . . . . . . . . . . . . . . . 33 | 4. Link to Path Aggregation . . . . . . . . . . . . . . . . . . 33 | |||
| 4.1. Example: No Link Aggregation . . . . . . . . . . . . . . 34 | 4.1. Example: No Link Aggregation . . . . . . . . . . . . . . 34 | |||
| 4.2. Example: ASBR to ASBR Path Aggregation . . . . . . . . . 34 | 4.2. Example: ASBR to ASBR Path Aggregation . . . . . . . . . 34 | |||
| 4.3. Example: Multi-AS Path Aggregation . . . . . . . . . . . 35 | 4.3. Example: Multi-AS Path Aggregation . . . . . . . . . . . 35 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 35 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 35 | |||
| 6. Manageability Considerations . . . . . . . . . . . . . . . . 36 | 6. Manageability Considerations . . . . . . . . . . . . . . . . 36 | |||
| 6.1. Operational Considerations . . . . . . . . . . . . . . . 36 | 6.1. Operational Considerations . . . . . . . . . . . . . . . 36 | |||
| 6.1.1. Operations . . . . . . . . . . . . . . . . . . . . . 36 | 6.1.1. Operations . . . . . . . . . . . . . . . . . . . . . 36 | |||
| 6.1.2. Installation and Initial Setup . . . . . . . . . . . 36 | 6.1.2. Installation and Initial Setup . . . . . . . . . . . 37 | |||
| 6.1.3. Migration Path . . . . . . . . . . . . . . . . . . . 37 | 6.1.3. Migration Path . . . . . . . . . . . . . . . . . . . 37 | |||
| 6.1.4. Requirements on Other Protocols and Functional | 6.1.4. Requirements on Other Protocols and Functional | |||
| Components . . . . . . . . . . . . . . . . . . . . . 37 | Components . . . . . . . . . . . . . . . . . . . . . 37 | |||
| 6.1.5. Impact on Network Operation . . . . . . . . . . . . . 37 | 6.1.5. Impact on Network Operation . . . . . . . . . . . . . 37 | |||
| 6.1.6. Verifying Correct Operation . . . . . . . . . . . . . 37 | 6.1.6. Verifying Correct Operation . . . . . . . . . . . . . 37 | |||
| 6.2. Management Considerations . . . . . . . . . . . . . . . . 37 | 6.2. Management Considerations . . . . . . . . . . . . . . . . 37 | |||
| 6.2.1. Management Information . . . . . . . . . . . . . . . 37 | 6.2.1. Management Information . . . . . . . . . . . . . . . 37 | |||
| 6.2.2. Fault Management . . . . . . . . . . . . . . . . . . 37 | 6.2.2. Fault Management . . . . . . . . . . . . . . . . . . 38 | |||
| 6.2.3. Configuration Management . . . . . . . . . . . . . . 38 | 6.2.3. Configuration Management . . . . . . . . . . . . . . 38 | |||
| 6.2.4. Accounting Management . . . . . . . . . . . . . . . . 38 | 6.2.4. Accounting Management . . . . . . . . . . . . . . . . 39 | |||
| 6.2.5. Performance Management . . . . . . . . . . . . . . . 38 | 6.2.5. Performance Management . . . . . . . . . . . . . . . 39 | |||
| 6.2.6. Security Management . . . . . . . . . . . . . . . . . 39 | 6.2.6. Security Management . . . . . . . . . . . . . . . . . 39 | |||
| 7. TLV/Sub-TLV Code Points Summary . . . . . . . . . . . . . . . 39 | 7. TLV/Sub-TLV Code Points Summary . . . . . . . . . . . . . . . 39 | |||
| 8. Security Considerations . . . . . . . . . . . . . . . . . . . 40 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 41 | |||
| 9. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 41 | 9. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 41 | |||
| 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 41 | 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 41 | |||
| 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 41 | 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 42 | |||
| 11.1. Normative References . . . . . . . . . . . . . . . . . . 41 | 11.1. Normative References . . . . . . . . . . . . . . . . . . 42 | |||
| 11.2. Informative References . . . . . . . . . . . . . . . . . 43 | 11.2. Informative References . . . . . . . . . . . . . . . . . 43 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 44 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 44 | |||
| 1. Introduction | 1. Introduction | |||
| The contents of a Link State Database (LSDB) or a Traffic Engineering | The contents of a Link State Database (LSDB) or a Traffic Engineering | |||
| Database (TED) has the scope of an IGP area. Some applications, such | Database (TED) has the scope of an IGP area. Some applications, such | |||
| as end-to-end Traffic Engineering (TE), would benefit from visibility | as end-to-end Traffic Engineering (TE), would benefit from visibility | |||
| outside one area or Autonomous System (AS) in order to make better | outside one area or Autonomous System (AS) in order to make better | |||
| decisions. | decisions. | |||
| skipping to change at page 12, line 9 ¶ | skipping to change at page 12, line 9 ¶ | |||
| NLRIs representing Link-state objects (nodes, links or prefixes) from | NLRIs representing Link-state objects (nodes, links or prefixes) from | |||
| the same routing universe MUST have the same 'Identifier' value; | the same routing universe MUST have the same 'Identifier' value; | |||
| NLRIs with different 'Identifier' values MUST be considered to be | NLRIs with different 'Identifier' values MUST be considered to be | |||
| from different routing universes. Table Table 3 lists the | from different routing universes. Table Table 3 lists the | |||
| 'Identifier' values that are defined as well-known in this draft. | 'Identifier' values that are defined as well-known in this draft. | |||
| +------------+----------------------------------+ | +------------+----------------------------------+ | |||
| | Identifier | Routing Universe | | | Identifier | Routing Universe | | |||
| +------------+----------------------------------+ | +------------+----------------------------------+ | |||
| | 0 | Default Layer 3 Routing topology | | | 0 | Default Layer 3 Routing topology | | |||
| | 1-31 | Reserved for future use | | | 1-31 | Reserved | | |||
| +------------+----------------------------------+ | +------------+----------------------------------+ | |||
| Table 3: Well-known Instance Identifiers | Table 3: Well-known Instance Identifiers | |||
| If a given Protocol does not support multiple routing universes then | If a given Protocol does not support multiple routing universes then | |||
| it SHOULD set the 'Identifier' field according to Table 3. However | it SHOULD set the 'Identifier' field according to Table 3. However | |||
| an implementation MAY make the 'Identifier' configurable, for a given | an implementation MAY make the 'Identifier' configurable, for a given | |||
| protocol. | protocol. | |||
| Each Node Descriptor and Link Descriptor consists of one or more TLVs | Each Node Descriptor and Link Descriptor consists of one or more TLVs | |||
| skipping to change at page 35, line 34 ¶ | skipping to change at page 35, line 34 ¶ | |||
| 5. IANA Considerations | 5. IANA Considerations | |||
| This document requests a code point from the registry of Address | This document requests a code point from the registry of Address | |||
| Family Numbers. As per early allocation procedure this is AFI 16388. | Family Numbers. As per early allocation procedure this is AFI 16388. | |||
| This document requests a code point from the registry of Subsequent | This document requests a code point from the registry of Subsequent | |||
| Address Family Numbers named 'BGP-LS'. As per early allocation | Address Family Numbers named 'BGP-LS'. As per early allocation | |||
| procedure this is SAFI 71. | procedure this is SAFI 71. | |||
| This document requests a code point from the registry of Subsequent | This document requests a code point from the registry of Subsequent | |||
| Address Family Numbers named 'BGP-LS-VPN'. | Address Family Numbers named 'BGP-LS-VPN'. The SAFI assignment does | |||
| NOT need to be out of the range 1-63. | ||||
| This document requests a code point from the BGP Path Attributes | This document requests a code point from the BGP Path Attributes | |||
| registry. As per early allocation procedure this is Path Attribute | registry. As per early allocation procedure this is Path Attribute | |||
| 29. | 29. | |||
| All the following Registries are BGP-LS specific and shall be | ||||
| acessible under the following URL: "http://www.iana.org/assignments/ | ||||
| bgp-ls-parameters" Title "Border Gateway Protocol - Link State (BGP- | ||||
| LS) Parameters" | ||||
| This document requests creation of a new registry for BGP-LS NLRI- | This document requests creation of a new registry for BGP-LS NLRI- | |||
| Types. Value 0 is reserved. The registry will be initialized as | Types. Value 0 is reserved. The maximum value is 65535. The | |||
| shown in Table 1. Allocations within the registry will require | registry will be initialized as shown in Table 1. Allocations within | |||
| documentation of the proposed use of the allocated value and approval | the registry will require documentation of the proposed use of the | |||
| by the Designated Expert assigned by the IESG (see [RFC5226]). | allocated value (=Specification required) and approval by the | |||
| Designated Expert assigned by the IESG (see [RFC5226]). | ||||
| This document requests creation of a new registry for BGP-LS | This document requests creation of a new registry for BGP-LS | |||
| Protocol-IDs. Value 0 is reserved. The registry will be initialized | Protocol-IDs. Value 0 is reserved. The maximum value is 255. The | |||
| as shown in Table 2. Allocations within the registry will require | registry will be initialized as shown in Table 2. Allocations within | |||
| documentation of the proposed use of the allocated value and approval | the registry will require documentation of the proposed use of the | |||
| by the Designated Expert assigned by the IESG (see [RFC5226]). | allocated value (=Specification required) and approval by the | |||
| Designated Expert assigned by the IESG (see [RFC5226]). | ||||
| This document requests creation of a new registry for BGP-LS Well- | This document requests creation of a new registry for BGP-LS Well- | |||
| known Instance-IDs. The registry will be initialized as shown in | known Instance-IDs. The registry will be initialized as shown in | |||
| Table 3. Allocations within the registry will require documentation | Table 3. Allocations within the registry will require documentation | |||
| of the proposed use of the allocated value and approval by the | of the proposed use of the allocated value (=Specification required) | |||
| Designated Expert assigned by the IESG (see [RFC5226]). | and approval by the Designated Expert assigned by the IESG (see | |||
| [RFC5226]). | ||||
| This document requests creation of a new registry for node anchor, | This document requests creation of a new registry for node anchor, | |||
| link descriptor and link attribute TLVs. Values 0-255 are reserved. | link descriptor and link attribute TLVs. Values 0-255 are reserved. | |||
| Values 256-65535 will be used for code points. The registry will be | Values 256-65535 will be used for code points. The registry will be | |||
| initialized as shown in Table 13. Allocations within the registry | initialized as shown in Table 13. Allocations within the registry | |||
| will require documentation of the proposed use of the allocated value | will require documentation of the proposed use of the allocated value | |||
| and approval by the Designated Expert assigned by the IESG (see | (=Specification required) and approval by the Designated Expert | |||
| [RFC5226]). | assigned by the IESG (see [RFC5226]). | |||
| Note to RFC Editor: this section may be removed on publication as an | Note to RFC Editor: this section may be removed on publication as an | |||
| RFC. | RFC. | |||
| 6. Manageability Considerations | 6. Manageability Considerations | |||
| This section is structured as recommended in [RFC5706]. | This section is structured as recommended in [RFC5706]. | |||
| 6.1. Operational Considerations | 6.1. Operational Considerations | |||
| End of changes. 16 change blocks. | ||||
| 25 lines changed or deleted | 34 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||