< draft-ietf-ippm-ioam-direct-export-03.txt   draft-ietf-ippm-ioam-direct-export-04.txt >
IPPM H. Song IPPM H. Song
Internet-Draft Futurewei Internet-Draft Futurewei
Intended status: Standards Track B. Gafni Intended status: Standards Track B. Gafni
Expires: August 21, 2021 Nvidia Expires: January 2, 2022 Nvidia
T. Zhou T. Zhou
Z. Li Z. Li
Huawei Huawei
F. Brockners F. Brockners
Cisco Cisco
S. Bhandari, Ed. S. Bhandari, Ed.
Thoughtspot Thoughtspot
R. Sivakolundu R. Sivakolundu
Cisco Cisco
T. Mizrahi, Ed. T. Mizrahi, Ed.
Huawei Huawei
February 17, 2021 July 1, 2021
In-situ OAM Direct Exporting In-situ OAM Direct Exporting
draft-ietf-ippm-ioam-direct-export-03 draft-ietf-ippm-ioam-direct-export-04
Abstract Abstract
In-situ Operations, Administration, and Maintenance (IOAM) is used In-situ Operations, Administration, and Maintenance (IOAM) is used
for recording and collecting operational and telemetry information. for recording and collecting operational and telemetry information.
Specifically, IOAM allows telemetry data to be pushed into data Specifically, IOAM allows telemetry data to be pushed into data
packets while they traverse the network. This document introduces a packets while they traverse the network. This document introduces a
new IOAM option type called the Direct Export (DEX) option, which is new IOAM option type called the Direct Export (DEX) option, which is
used as a trigger for IOAM data to be directly exported without being used as a trigger for IOAM data to be directly exported or locally
pushed into in-flight data packets. aggregated without being pushed into in-flight data packets. The
exporting method and format are outside the scope of this document.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 21, 2021. This Internet-Draft will expire on January 2, 2022.
Copyright Notice Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 28 skipping to change at page 2, line 28
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Requirement Language . . . . . . . . . . . . . . . . . . 3 2.1. Requirement Language . . . . . . . . . . . . . . . . . . 3
2.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 2.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3
3. The Direct Exporting (DEX) IOAM Option Type . . . . . . . . . 3 3. The Direct Exporting (DEX) IOAM Option Type . . . . . . . . . 3
3.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 3 3.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 3
3.2. The DEX Option Format . . . . . . . . . . . . . . . . . . 5 3.1.1. DEX Packet Selection . . . . . . . . . . . . . . . . 5
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 3.1.2. Responding to the DEX Trigger . . . . . . . . . . . . 5
4.1. IOAM Type . . . . . . . . . . . . . . . . . . . . . . . . 6 3.2. The DEX Option Format . . . . . . . . . . . . . . . . . . 6
4.2. IOAM DEX Flags . . . . . . . . . . . . . . . . . . . . . 6 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
5. Performance Considerations . . . . . . . . . . . . . . . . . 6 4.1. IOAM Type . . . . . . . . . . . . . . . . . . . . . . . . 7
6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 4.2. IOAM DEX Flags . . . . . . . . . . . . . . . . . . . . . 8
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 5. Performance Considerations . . . . . . . . . . . . . . . . . 8
7.1. Normative References . . . . . . . . . . . . . . . . . . 8 6. Security Considerations . . . . . . . . . . . . . . . . . . . 8
7.2. Informative References . . . . . . . . . . . . . . . . . 8 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 9
Appendix A. Hop Limit and Hop Count in Direct Exporting . . . . 8 7.1. Normative References . . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 7.2. Informative References . . . . . . . . . . . . . . . . . 10
Appendix A. Hop Limit and Hop Count in Direct Exporting . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11
1. Introduction 1. Introduction
IOAM [I-D.ietf-ippm-ioam-data] is used for monitoring traffic in the IOAM [I-D.ietf-ippm-ioam-data] is used for monitoring traffic in the
network, and for incorporating IOAM data fields into in-flight data network, and for incorporating IOAM data fields into in-flight data
packets. packets.
IOAM makes use of four possible IOAM options, defined in IOAM makes use of four possible IOAM options, defined in
[I-D.ietf-ippm-ioam-data]: Pre-allocated Trace Option, Incremental [I-D.ietf-ippm-ioam-data]: Pre-allocated Trace Option, Incremental
Trace Option, Proof of Transit (POT) Option, and Edge-to-Edge Option. Trace Option, Proof of Transit (POT) Option, and Edge-to-Edge Option.
This document defines a new IOAM option type (also known as an IOAM This document defines a new IOAM option type (also known as an IOAM
type) called the Direct Export (DEX) option. This option is used as type) called the Direct Export (DEX) option. This option is used as
a trigger for IOAM nodes to export IOAM data to a receiving entity a trigger for IOAM nodes to locally aggregate and process IOAM data,
(or entities). A "receiving entity" in this context can be, for and/or to export it to a receiving entity (or entities). A
example, an external collector, analyzer, controller, decapsulating "receiving entity" in this context can be, for example, an external
node, or a software module in one of the IOAM nodes. collector, analyzer, controller, decapsulating node, or a software
module in one of the IOAM nodes.
Note that even though the IOAM Option-Type is called "Direct Export",
it depends on the deployment whether the receipt of a packet with DEX
option type leads to the creation of another packet. Some
deployments might simply use the packet with the DEX option type to
trigger local processing of OAM data.
This draft has evolved from combining some of the concepts of PBT-I This draft has evolved from combining some of the concepts of PBT-I
from [I-D.song-ippm-postcard-based-telemetry] with immediate from [I-D.song-ippm-postcard-based-telemetry] with immediate
exporting from [I-D.ietf-ippm-ioam-flags]. exporting from [I-D.ietf-ippm-ioam-flags].
2. Conventions 2. Conventions
2.1. Requirement Language 2.1. Requirement Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
skipping to change at page 3, line 36 skipping to change at page 3, line 47
IOAM: In-situ Operations, Administration, and Maintenance IOAM: In-situ Operations, Administration, and Maintenance
OAM: Operations, Administration, and Maintenance OAM: Operations, Administration, and Maintenance
DEX: Direct EXporting DEX: Direct EXporting
3. The Direct Exporting (DEX) IOAM Option Type 3. The Direct Exporting (DEX) IOAM Option Type
3.1. Overview 3.1. Overview
The DEX option is used as a trigger for exporting telemetry data to a The DEX option is used as a trigger for collecting IOAM data locally
receiving entity (or entities). or for exporting it to a receiving entity (or entities).
Specifically, the DEX option can be used as a trigger for collecting
IOAM data by an IOAM node and locally aggregating it; thus, this
aggregated data can be periodically pushed to a receiving entity, or
pulled by a receiving entity on-demand.
This option is incorporated into data packets by an IOAM This option is incorporated into data packets by an IOAM
encapsulating node, and removed by an IOAM decapsulating node, as encapsulating node, and removed by an IOAM decapsulating node, as
illustrated in Figure 1. The option can be read but not modified by illustrated in Figure 1. The option can be read but not modified by
transit nodes. Note: the terms IOAM encapsulating, decapsulating and transit nodes. Note: the terms IOAM encapsulating, decapsulating and
transit nodes are as defined in [I-D.ietf-ippm-ioam-data]. transit nodes are as defined in [I-D.ietf-ippm-ioam-data].
^ ^
|Exported IOAM data |Exported IOAM data
| |
skipping to change at page 4, line 24 skipping to change at page 4, line 30
packets |Encapsu-| | Transit| | Transit| |Decapsu-| packets |Encapsu-| | Transit| | Transit| |Decapsu-|
--------->|lating |====>| Node |====>| Node |====>|lating |----> --------->|lating |====>| Node |====>| Node |====>|lating |---->
|Node | | A | | B | |Node | |Node | | A | | B | |Node |
+--------+ +--------+ +--------+ +--------+ +--------+ +--------+ +--------+ +--------+
Insert DEX Export Export Remove DEX Insert DEX Export Export Remove DEX
option and IOAM data IOAM data option and option and IOAM data IOAM data option and
export data export data export data export data
Figure 1: DEX Architecture Figure 1: DEX Architecture
The DEX option is used as a trigger to export IOAM data. The trigger The DEX option is used as a trigger to collect and/or export IOAM
applies to transit nodes, the decapsulating node, and the data. The trigger applies to transit nodes, the decapsulating node,
encapsulating node: and the encapsulating node:
o An IOAM encapsulating node configured to incorporate the DEX o An IOAM encapsulating node configured to incorporate the DEX
option encapsulates the packet with the DEX option, and MAY export option encapsulates (possibly a subset of) the packets it forwards
the requested IOAM data immediately. The IOAM encapsulating node with the DEX option, and MAY export and/or collect the requested
is the only type of node allowed to push the DEX option. IOAM data immediately. Only IOAM encapsulating nodes are allowed
to add the DEX option type to a packet.
o A transit node that processes a packet with the DEX option MAY o A transit node that processes a packet with the DEX option MAY
export the requested IOAM data. export and/or collect the requested IOAM data.
o An IOAM decapsulating node that processes a packet with the DEX o An IOAM decapsulating node that processes a packet with the DEX
option MAY export the requested IOAM data, and MUST decapsulate option MAY export and/or collect the requested IOAM data, and MUST
the IOAM header. decapsulate the IOAM header.
As in [I-D.ietf-ippm-ioam-data], the DEX option may be incorporated As in [I-D.ietf-ippm-ioam-data], the DEX option can be incorporated
into all or a subset of the traffic that is forwarded by the into all or a subset of the traffic that is forwarded by the
encapsulating node. Moreover, IOAM nodes MAY export data for all encapsulating node, as further discussed in Section 3.1.1 below.
traversing packets that carry the DEX option, or MAY selectively Moreover, IOAM nodes respond to the DEX trigger by exporting and/or
export data only for a subset of these packets. collection IOAM data either for all traversing packets that carry the
DEX option, or selectively only for a subset of these packets, as
further discussed in Section 3.1.2 below.
The DEX option specifies which data fields should be exported, as 3.1.1. DEX Packet Selection
specified in Section 3.2. The format and encapsulation of the packet
If an IOAM encapsulating node incorporates the DEX option into all
the traffic it forwards it may lead to an excessive amount of
exported data, which may overload the network and the receiving
entity. Therefore, an IOAM encapsulating node that supports the DEX
option MUST support the ability to incorporate the DEX option
selectively into a subset of the packets that are forwarded by it.
Various methods of packet selection and sampling have been previously
defined, such as [RFC7014] and [RFC5475]. Similar techniques can be
applied by an IOAM encapsulating node to apply DEX to a subset of the
forwarded traffic.
The subset of traffic that is forwarded or transmitted with a DEX
option SHOULD not exceed 1/N of the interface capacity on any of the
IOAM encapsulating node's interfaces. It is noted that this
requirement applies to the total traffic that incorporates a DEX
option, including traffic that is forwarded by the IOAM encapsulating
node and probe packets that are generated by the IOAM encapsulating
node. In this context N is a parameter that can be configurable by
network operators. If there is an upper bound, M, on the number of
IOAM transit nodes in any path in the network, then it is recommended
to use an N such that N >> M. The rationale is that a packet that
includes a DEX option may trigger an exported packet from each IOAM
transit node along the path for a total of M exported packets. Thus,
if N >> M then the number of exported packets is significantly lower
than the number of data packets forwarded by the IOAM encapsulating
node. If there is no prior knowledge about the network topology or
size, it is recommended to use N>100.
3.1.2. Responding to the DEX Trigger
The DEX option specifies which data fields should be exported and/or
collected, as specified in Section 3.2. As mentioned above, the data
can be locally collected, and optionally can be aggregated and
exported to a receiving entity, either proactively or on-demand. If
IOAM data is exported, the format and encapsulation of the packet
that contains the exported data is not within the scope of the that contains the exported data is not within the scope of the
current document. For example, the export format can be based on current document. For example, the export format can be based on
[I-D.spiegel-ippm-ioam-rawexport]. [I-D.spiegel-ippm-ioam-rawexport].
An IOAM node that performs DEX-triggered exporting MUST support the
ability to limit the rate of the exported packets. The rate of
exported packets SHOULD be limited so that the number of exported
packets is significantly lower than the number of packets that are
exported by the device. The exported data rate SHOULD not exceed 1/N
of the interface capacity on any of the IOAM node's interfaces. It
is recommended to use N>100. Depending on the IOAM node's
architecture considerations, the export rate may be limited to a
lower number in order to avoid loading the IOAM node.
Exported packets SHOULD not be exported over a path or a tunnel that
is subject to IOAM direct exporting. Furthermore, IOAM encapsulating
nodes that push a DEX option into traversing packets MUST avoid
pushing an IOAM header into IOAM exported packets. This requirement
is intended to prevent nested exporting and/or exporting loops.
A transit IOAM node that does not support the DEX option SHOULD A transit IOAM node that does not support the DEX option SHOULD
ignore it. A decapsulating node that does not support the DEX option ignore it. A decapsulating node that does not support the DEX option
MUST remove it, along with any other IOAM options carried in the MUST remove it, along with any other IOAM options carried in the
packet if such exist. packet if such exist.
3.2. The DEX Option Format 3.2. The DEX Option Format
The format of the DEX option is depicted in Figure 2. The length of The format of the DEX option is depicted in Figure 2. The length of
the DEX option is either 8 octets or 16 octets, as the Flow ID and the DEX option is either 8 octets or 16 octets, as the Flow ID and
the Sequence Number fields (summing up to 8 octets) are optional. It the Sequence Number fields (summing up to 8 octets) are optional. It
skipping to change at page 6, line 46 skipping to change at page 8, line 13
If possible, IANA is requested to allocate code point 4 (TBD-type). If possible, IANA is requested to allocate code point 4 (TBD-type).
4.2. IOAM DEX Flags 4.2. IOAM DEX Flags
IANA is requested to define an "IOAM DEX Flags" registry. This IANA is requested to define an "IOAM DEX Flags" registry. This
registry includes 16 flag bits. Allocation should be performed based registry includes 16 flag bits. Allocation should be performed based
on the "RFC Required" procedure, as defined in [RFC8126]. on the "RFC Required" procedure, as defined in [RFC8126].
5. Performance Considerations 5. Performance Considerations
The DEX option triggers exported packets to be exported to a The DEX option triggers IOAM data to be collected and/or exported
receiving entity (or entities). In some cases this may impact the packets to be exported to a receiving entity (or entities). In some
receiving entity's performance, or the performance along the paths cases this may impact the receiving entity's performance, or the
leading to it. performance along the paths leading to it.
Therefore, rate limiting may be enabled so as to ensure that direct Therefore, the performance impact of these exported packets is
exporting is used at a rate that does not significantly affect the limited by taking two measures: at the encapsulating nodes, by
network bandwidth, and does not overload the receiving entity (or the selective DEX encapsulation (Section 3.1.1), and at the transit
source node in the case of loopback). It should be possible to use nodes, by limiting exporting rate (Section 3.1.2). These two
each DEX on a subset of the data traffic, and to load balance the measures ensure that direct exporting is used at a rate that does not
exported data among multiple receiving entities. significantly affect the network bandwidth, and does not overload the
receiving entity. Moreover, it is possible to load balance the
exported data among multiple receiving entities, although the
exporting method is not within the scope of this document.
6. Security Considerations 6. Security Considerations
The security considerations of IOAM in general are discussed in The security considerations of IOAM in general are discussed in
[I-D.ietf-ippm-ioam-data]. Specifically, an attacker may try to use [I-D.ietf-ippm-ioam-data]. Specifically, an attacker may try to use
the functionality that is defined in this document to attack the the functionality that is defined in this document to attack the
network. network.
An attacker may attempt to overload network devices by injecting An attacker may attempt to overload network devices by injecting
synthetic packets that include the DEX option. Similarly, an on-path synthetic packets that include the DEX option. Similarly, an on-path
skipping to change at page 7, line 37 skipping to change at page 9, line 7
The amplification effect of DEX may be worse in wide area networks in The amplification effect of DEX may be worse in wide area networks in
which there are multiple IOAM domains. For example, if DEX is used which there are multiple IOAM domains. For example, if DEX is used
in IOAM domain 1 for exporting IOAM data to a receiving entity, then in IOAM domain 1 for exporting IOAM data to a receiving entity, then
the exported packets of domain 1 can be forwarded through IOAM domain the exported packets of domain 1 can be forwarded through IOAM domain
2, in which they are subject to DEX. The exported packets of domain 2, in which they are subject to DEX. The exported packets of domain
2 may in turn be forwarded through another IOAM domain (or through 2 may in turn be forwarded through another IOAM domain (or through
domain 1), and theoretically this recursive amplification may domain 1), and theoretically this recursive amplification may
continue infinitely. continue infinitely.
In order to mitigate the attacks described above, it should be In order to mitigate the attacks described above, the following
possible for IOAM-enabled devices to limit the exported IOAM data to requirements (Section 3) have been defined:
a configurable rate.
o Selective DEX (Section 3.1.1) is applied by IOAM encpsulating
nodes in order to limit the potential impact of DEX attacks to a
small fraction of the traffic.
o Rate limiting of exported traffic (Section 3.1.2) is applied by
IOAM nodes in order to prevent overloading attacks and in order to
significantly limit the scale of amplification attacks.
o IOAM encapsulating nodes are required to avoid pushing the DEX
option into IOAM exported packets (Section 3.1.2), thus preventing
some of the amplification and export loop scenarios.
Although the exporting method is not within the scope of this
document, any exporting method MUST secure the exported data from the
IOAM node to the receiving entity. Specifically, an IOAM node that
performs DEX exporting MUST send the exported data to a pre-
configured trusted receiving entity.
IOAM is assumed to be deployed in a restricted administrative domain, IOAM is assumed to be deployed in a restricted administrative domain,
thus limiting the scope of the threats above and their affect. This thus limiting the scope of the threats above and their affect. This
is a fundamental assumption with respect to the security aspects of is a fundamental assumption with respect to the security aspects of
IOAM, as further discussed in [I-D.ietf-ippm-ioam-data]. IOAM, as further discussed in [I-D.ietf-ippm-ioam-data].
7. References 7. References
7.1. Normative References 7.1. Normative References
[I-D.ietf-ippm-ioam-data] [I-D.ietf-ippm-ioam-data]
Brockners, F., Bhandari, S., and T. Mizrahi, "Data Fields Brockners, F., Bhandari, S., and T. Mizrahi, "Data Fields
for In-situ OAM", draft-ietf-ippm-ioam-data-11 (work in for In-situ OAM", draft-ietf-ippm-ioam-data-12 (work in
progress), November 2020. progress), February 2021.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
[RFC5475] Zseby, T., Molina, M., Duffield, N., Niccolini, S., and F.
Raspall, "Sampling and Filtering Techniques for IP Packet
Selection", RFC 5475, DOI 10.17487/RFC5475, March 2009,
<https://www.rfc-editor.org/info/rfc5475>.
[RFC7014] D'Antonio, S., Zseby, T., Henke, C., and L. Peluso, "Flow
Selection Techniques", RFC 7014, DOI 10.17487/RFC7014,
September 2013, <https://www.rfc-editor.org/info/rfc7014>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
7.2. Informative References 7.2. Informative References
[I-D.ietf-ippm-ioam-flags] [I-D.ietf-ippm-ioam-flags]
Mizrahi, T., Brockners, F., Bhandari, S., Sivakolundu, R., Mizrahi, T., Brockners, F., Bhandari, S., Sivakolundu, R.,
Pignataro, C., Kfir, A., Gafni, B., Spiegel, M., and J. Pignataro, C., Kfir, A., Gafni, B., Spiegel, M., and J.
Lemon, "In-situ OAM Flags", draft-ietf-ippm-ioam-flags-03 Lemon, "In-situ OAM Flags", draft-ietf-ippm-ioam-flags-04
(work in progress), October 2020. (work in progress), February 2021.
[I-D.song-ippm-postcard-based-telemetry] [I-D.song-ippm-postcard-based-telemetry]
Song, H., Zhou, T., Li, Z., Mirsky, G., Shin, J., and K. Song, H., Mirsky, G., Filsfils, C., Abdelsalam, A., Zhou,
Lee, "Postcard-based On-Path Flow Data Telemetry using T., Li, Z., Shin, J., and K. Lee, "Postcard-based On-Path
Packet Marking", draft-song-ippm-postcard-based- Flow Data Telemetry using Packet Marking", draft-song-
telemetry-08 (work in progress), October 2020. ippm-postcard-based-telemetry-09 (work in progress),
February 2021.
[I-D.spiegel-ippm-ioam-rawexport] [I-D.spiegel-ippm-ioam-rawexport]
Spiegel, M., Brockners, F., Bhandari, S., and R. Spiegel, M., Brockners, F., Bhandari, S., and R.
Sivakolundu, "In-situ OAM raw data export with IPFIX", Sivakolundu, "In-situ OAM raw data export with IPFIX",
draft-spiegel-ippm-ioam-rawexport-04 (work in progress), draft-spiegel-ippm-ioam-rawexport-04 (work in progress),
November 2020. November 2020.
[RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
Writing an IANA Considerations Section in RFCs", BCP 26, Writing an IANA Considerations Section in RFCs", BCP 26,
RFC 8126, DOI 10.17487/RFC8126, June 2017, RFC 8126, DOI 10.17487/RFC8126, June 2017,
 End of changes. 24 change blocks. 
59 lines changed or deleted 159 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/