| < draft-ietf-isis-yang-isis-cfg-23.txt | draft-ietf-isis-yang-isis-cfg-24.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 16 ¶ | skipping to change at page 1, line 16 ¶ | |||
| Expires: February 10, 2019 Arrcus, Inc | Expires: February 10, 2019 Arrcus, Inc | |||
| A. Lindem | A. Lindem | |||
| Cisco Systems | Cisco Systems | |||
| J. Zhang | J. Zhang | |||
| Juniper Networks | Juniper Networks | |||
| L. Lhotka | L. Lhotka | |||
| CZ.NIC | CZ.NIC | |||
| August 09, 2018 | August 09, 2018 | |||
| YANG Data Model for IS-IS protocol | YANG Data Model for IS-IS protocol | |||
| draft-ietf-isis-yang-isis-cfg-23 | draft-ietf-isis-yang-isis-cfg-24 | |||
| Abstract | Abstract | |||
| This document defines a YANG data model that can be used to configure | This document defines a YANG data model that can be used to configure | |||
| and manage IS-IS protocol on network elements. | and manage IS-IS protocol on network elements. | |||
| Requirements Language | Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| skipping to change at page 1, line 44 ¶ | skipping to change at page 1, line 44 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on January 17, 2019. | This Internet-Draft will expire on February 10, 2019. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. Tree diagram . . . . . . . . . . . . . . . . . . . . . . 3 | 1.1. Tree diagram . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Design of the Data Model . . . . . . . . . . . . . . . . . . 3 | 2. Design of the Data Model . . . . . . . . . . . . . . . . . . 4 | |||
| 2.1. IS-IS Configuration . . . . . . . . . . . . . . . . . . . 9 | 2.1. IS-IS Configuration . . . . . . . . . . . . . . . . . . . 10 | |||
| 2.2. Multitopology Parameters . . . . . . . . . . . . . . . . 10 | 2.2. Multitopology Parameters . . . . . . . . . . . . . . . . 10 | |||
| 2.3. Per-Level Parameters . . . . . . . . . . . . . . . . . . 10 | 2.3. Per-Level Parameters . . . . . . . . . . . . . . . . . . 10 | |||
| 2.4. Per-Interface Parameters . . . . . . . . . . . . . . . . 12 | 2.4. Per-Interface Parameters . . . . . . . . . . . . . . . . 12 | |||
| 2.5. Authentication Parameters . . . . . . . . . . . . . . . . 23 | 2.5. Authentication Parameters . . . . . . . . . . . . . . . . 23 | |||
| 2.6. IGP/LDP synchronization . . . . . . . . . . . . . . . . . 23 | 2.6. IGP/LDP synchronization . . . . . . . . . . . . . . . . . 23 | |||
| 2.7. ISO parameters . . . . . . . . . . . . . . . . . . . . . 24 | 2.7. ISO parameters . . . . . . . . . . . . . . . . . . . . . 24 | |||
| 2.8. IP FRR . . . . . . . . . . . . . . . . . . . . . . . . . 24 | 2.8. IP FRR . . . . . . . . . . . . . . . . . . . . . . . . . 24 | |||
| 2.9. Operational States . . . . . . . . . . . . . . . . . . . 24 | 2.9. Operational States . . . . . . . . . . . . . . . . . . . 24 | |||
| 3. RPC Operations . . . . . . . . . . . . . . . . . . . . . . . 25 | 3. RPC Operations . . . . . . . . . . . . . . . . . . . . . . . 25 | |||
| 4. Notifications . . . . . . . . . . . . . . . . . . . . . . . . 25 | 4. Notifications . . . . . . . . . . . . . . . . . . . . . . . . 25 | |||
| 5. Interaction with Other YANG Modules . . . . . . . . . . . . . 26 | 5. Interaction with Other YANG Modules . . . . . . . . . . . . . 26 | |||
| 6. IS-IS YANG Module . . . . . . . . . . . . . . . . . . . . . . 27 | 6. IS-IS YANG Module . . . . . . . . . . . . . . . . . . . . . . 27 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 95 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 95 | |||
| 8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 96 | 8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 96 | |||
| 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 96 | 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 96 | |||
| 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 96 | 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 96 | |||
| 11. Change log for ietf-isis YANG module . . . . . . . . . . . . 96 | 11. Change log for ietf-isis YANG module . . . . . . . . . . . . 96 | |||
| 11.1. From version -21 to version -22 . . . . . . . . . . . . 96 | 11.1. From version -22 to version -24 . . . . . . . . . . . . 96 | |||
| 11.2. From version -20 to version -21 . . . . . . . . . . . . 96 | 11.2. From version -21 to version -22 . . . . . . . . . . . . 96 | |||
| 11.3. From version -19 to version -20 . . . . . . . . . . . . 96 | 11.3. From version -20 to version -21 . . . . . . . . . . . . 96 | |||
| 11.4. From version -18 to version -19 . . . . . . . . . . . . 97 | 11.4. From version -19 to version -20 . . . . . . . . . . . . 97 | |||
| 11.5. From version -17 to version -18 . . . . . . . . . . . . 97 | 11.5. From version -18 to version -19 . . . . . . . . . . . . 97 | |||
| 11.6. From version -16 to version -17 . . . . . . . . . . . . 97 | 11.6. From version -17 to version -18 . . . . . . . . . . . . 97 | |||
| 11.7. From version -15 to version -16 . . . . . . . . . . . . 97 | 11.7. From version -16 to version -17 . . . . . . . . . . . . 97 | |||
| 11.8. From version -14 to version -15 . . . . . . . . . . . . 97 | 11.8. From version -15 to version -16 . . . . . . . . . . . . 97 | |||
| 11.9. From version -13 to version -14 . . . . . . . . . . . . 98 | 11.9. From version -14 to version -15 . . . . . . . . . . . . 97 | |||
| 11.10. From version -12 to version -13 . . . . . . . . . . . . 98 | 11.10. From version -13 to version -14 . . . . . . . . . . . . 98 | |||
| 11.11. From version -09 to version -12 . . . . . . . . . . . . 98 | 11.11. From version -12 to version -13 . . . . . . . . . . . . 98 | |||
| 11.12. From version -08 to version -09 . . . . . . . . . . . . 98 | 11.12. From version -09 to version -12 . . . . . . . . . . . . 98 | |||
| 11.13. From version -07 to version -08 . . . . . . . . . . . . 98 | 11.13. From version -08 to version -09 . . . . . . . . . . . . 98 | |||
| 11.14. From version -05 to version -07 . . . . . . . . . . . . 99 | 11.14. From version -07 to version -08 . . . . . . . . . . . . 99 | |||
| 11.15. From version -03 to version -05 . . . . . . . . . . . . 99 | 11.15. From version -05 to version -07 . . . . . . . . . . . . 99 | |||
| 11.16. From version -02 to version -03 . . . . . . . . . . . . 99 | 11.16. From version -03 to version -05 . . . . . . . . . . . . 99 | |||
| 11.17. From version -01 to version -02 . . . . . . . . . . . . 99 | 11.17. From version -02 to version -03 . . . . . . . . . . . . 99 | |||
| 11.18. From version -00 to version -01 . . . . . . . . . . . . 100 | 11.18. From version -01 to version -02 . . . . . . . . . . . . 100 | |||
| 11.19. From version -00 to version -01 . . . . . . . . . . . . 100 | ||||
| 12. Normative References . . . . . . . . . . . . . . . . . . . . 101 | 12. Normative References . . . . . . . . . . . . . . . . . . . . 101 | |||
| Appendix A. Example of IS-IS configuration in XML . . . . . . . 102 | Appendix A. Example of IS-IS configuration in XML . . . . . . . 102 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 104 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 104 | |||
| 1. Introduction | 1. Introduction | |||
| This document defines a YANG data model for IS-IS routing protocol. | This document defines a YANG data model for IS-IS routing protocol. | |||
| The data model covers configuration of an IS-IS routing protocol | The data model covers configuration of an IS-IS routing protocol | |||
| instance as well as operational states. | instance as well as operational states. | |||
| skipping to change at page 96, line 34 ¶ | skipping to change at page 96, line 34 ¶ | |||
| This document also requests one new YANG module name in the YANG | This document also requests one new YANG module name in the YANG | |||
| Module Names registry ([RFC6020]) with the following suggestion: | Module Names registry ([RFC6020]) with the following suggestion: | |||
| name: ietf-isis | name: ietf-isis | |||
| namespace: urn:ietf:params:xml:ns:yang:ietf-isis | namespace: urn:ietf:params:xml:ns:yang:ietf-isis | |||
| prefix: isis | prefix: isis | |||
| reference: RFC XXXX | reference: RFC XXXX | |||
| 11. Change log for ietf-isis YANG module | 11. Change log for ietf-isis YANG module | |||
| 11.1. From version -22 to version -23 | 11.1. From version -22 to version -24 | |||
| o Fix revision date of the module | o Fix revision date of the module | |||
| 11.2. From version -21 to version -22 | 11.2. From version -21 to version -22 | |||
| o TE router-id modeling alignment with OSPF. | o TE router-id modeling alignment with OSPF. | |||
| o Add max-ecmp + feature in spf-control container (alignment with | o Add max-ecmp + feature in spf-control container (alignment with | |||
| OSPF). | OSPF). | |||
| End of changes. 5 change blocks. | ||||
| 23 lines changed or deleted | 24 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||