Open Shortest Path First IGPInternet Engineering Task Force (IETF) S. HegdeInternet-DraftRequest for Comments: 7777 Juniper Networks, Inc.Intended status:Category: Standards Track R. ShakirExpires: May 20, 2016 IndividualISSN: 2070-1721 Jive Communications, Inc. A. Smirnov Cisco Systems, Inc. Z. Li Huawei Technologies B. Decraene OrangeNovember 17, 2015February 2016 Advertisingper-node administrative tagsNode Administrative Tags in OSPFdraft-ietf-ospf-node-admin-tag-09Abstract This document describes an extension to the OSPF protocol to add an optional operationalcapability,capability that allows tagging and grouping of the nodes in an OSPF domain. This allows simplification, ease of management and control over route and path selection based on configured policies. This document describes an extension to the OSPF protocol to advertiseper-nodenode administrative tags. Thenode-node tags can be used to express and applylocally-definedlocally defined networkpoliciespolicies, whichisare a very useful operational capability. Node tags may be usedeitherby either OSPF itself orbyother applications consuming information propagated via OSPF. This document describes the protocol extensions to disseminateper-node administrative tags to the OSPFv2 and OSPFv3 protocol. It provides example use cases of administrative node tags.Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].Status of This Memo ThisInternet-Draftissubmitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsan Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved fora maximumpublication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status ofsix monthsthis document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on May 20, 2016.http://www.rfc-editor.org/info/rfc7777. Copyright Notice Copyright (c)20152016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . .32 2. Administrative Tag TLV . . . . . . . . . . . . . . . . . . . 3 3. OSPFper-node administrative tagNode Administrative Tag TLV . . . . . . . . . . . . . . 3 3.1. TLVformatFormat . . . . . . . . . . . . . . . . . . . . . . . 3 3.2. Elements ofprocedureProcedure . . . . . . . . . . . . . . . . . . 4 3.2.1. Interpretation of Node Administrative Tags . . . . . 4 3.2.2. Use of Node Administrative Tags . . . . . . . . . . . 5 3.2.3. Processing Node Administrative TagchangesChanges . . . . . 5 4. Applications . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1. Serviceauto-discoveryAuto-Discovery . . . . . . . . . . . . . . . . . 6 4.2.Fast-Re-routing policyFast-Rerouting Policy . . . . . . . . . . . . . . . . . . 6 4.3. Controlling Remote LFAtunnel terminationTunnel Termination . . . . . . . .87 4.4. Mobileback-haul network service deploymentBackhaul Network Service Deployment . . . . . . . 8 4.5. Explicitrouting policyRouting Policy . . . . . . . . . . . . . . . . . 9 5. Security Considerations . . . . . . . . . . . . . . . . . . . 11 6. Operational Considerations . . . . . . . . . . . . . . . . . 11 7. Manageability Considerations . . . . . . . . . . . . . . . .1211 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 9.ContributorsReferences . . . . . . . . . . . . . . . . . . . . . . . . . 1210. Acknowledgements9.1. Normative References . . . . . . . . . . . . . . . . . . 12 9.2. Informative References . . . . .12 11. References. . . . . . . . . . . . 12 Contributors . . . . . . . . . . . . .12 11.1. Normative References. . . . . . . . . . . . . 14 Acknowledgements . . . . . .12 11.2. Informative References. . . . . . . . . . . . . . . . .13. 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 1. Introduction It is useful to assign aper-nodenode administrative tag to a router in the OSPF domain and use it as an attribute associated with the node. Theper-nodenode administrative tag can be used in a variety of applications, for example: (a)Traffic-engineeringTraffic Engineering (TE) applications to provide different path- selection criteria. (b) Prefer or prune certain paths inLoop FreeLoop-Free Alternate (LFA) backup selection via local policies as defined in[I-D.ietf-rtgwg-lfa-manageability].[LFA-MANAGE]. This document provides mechanisms to advertiseper-nodenode administrative tags in OSPF for route and path selection. Route and path selection functionality applies to bothtoTE andnon Traffic Engineering (TE) applications and hencenon-TE applications; hence, a new TLV for carryingper-nodenode administrative tags is included in Router Information (RI) Link State Advertisement (LSA)[I-D.ietf-ospf-rfc4970bis]. 2. Administrative Tag TLV An administrative Tag is a 32-bit integer value that can be used to identify a group of nodes in[RFC7770]. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 2. Administrative Tag TLV An administrative tag is a 32-bit integer value that can be used to identify a group of nodes in the OSPF domain. Thenew TLVnewly definedwill beTLV is carried within an RI LSA for OSPFV2 and OSPFV3.Router information (RI)LSA [I-D.ietf-ospf-rfc4970bis]RI LSA [RFC7770] can havelink-, area-flooding scope at the link, area, or AutonomousSytemSystem (AS)level flooding scope.level. The choice of what scope at which to flood the group tags is a matter of localpolicy.Itpolicy. It is expected that node administrative tag values will not be portable across administrative domains. The TLV specifies one or more administrative tag values. An OSPF node advertises the set of groups it is part of in the OSPF domain (for example, allPE-nodesPE nodes are configured with a certain tag value, and allP-nodesP nodes are configured with a different tag value in the domain). Multiple TLVs MAY be added in sameRI-LSARI LSA or in a different instance of the RI LSA as defined in[I-D.ietf-ospf-rfc4970bis].[RFC7770]. 3. OSPFper-node administrative tagNode Administrative Tag TLV 3.1. TLVformat [I-D.ietf-ospf-rfc4970bis],Format [RFC7770] definesRouter Information (RI) LSAthe RI LSA, which may be used to advertise properties of the originating router. The payload of the RI LSA consists of one or more nestedType/Length/ ValueType/Length/Value (TLV) triplets. Node administrative tags are advertised in the NodeAdministrativeAdmin Tag TLV. The format of the NodeAdministrativeAdmin Tag TLV is: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Administrative Tag #1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Administrative Tag #2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ // // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Administrative Tag #N | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1: OSPFper-node AdministrativeNode Admin Tag TLVType : TBA, Suggested valueType: 10 Length: A 16-bit field that indicates the length of the value portion in octets and will bea multiple of4 octets dependent on the number of tags advertised. Value: A sequence of multiplefour4 octets defining the administrative tags. At least one tag MUST be carried if this TLV is included in theRI-LSA.RI LSA. 3.2. Elements ofprocedureProcedure 3.2.1. Interpretation of Node Administrative Tags The meaning of theNodenode administrative tags is generally opaque to OSPF. Routers advertising theper-nodenode administrative tag (or tags) may be configured to do so without knowing (or even without supporting processing of) the functionality implied by the tag. This section describes generalrules/ regulationsrules, regulations, and guidelines for using and interpreting an administrative tagwhichthat will facilitate interoperable implementations by vendors. Interpretation of tag values is specific to the administrative domain of a particular networkoperator, and henceoperator; hence, tag values SHOULD NOT be propagated outside the administrative domain to which they apply. The meaning of aper-nodenode administrative tag is defined by the network local policy and is controlled via the configuration. If a receiving node does not understand the tag value or does not have a local policy corresponding to the tag, it ignores the specific tag and floods the RI LSA without any change as defined in[I-D.ietf-ospf-rfc4970bis].[RFC7770]. The semantics of the tag order has no meaning. That is, there is no implied meaning to the ordering of the tags that indicates a certain operation or set of operations that need to be performed based on the ordering. Each tag must be treated as an independent identifier that may be used in the policy to perform a policy action. Each tag carried by theadministrative tagNode Admin Tag TLV should be used to indicate a characteristic of a node that is independent of the characteristics indicated by other administrative tags. Theadministrative tagadministrative-tag list within the TLV MUST be considered an unordered list.WhilstWhile policies may be implemented based on the presence of multiple tags (e.g., if tag A AND tag B are present), they MUST NOT be reliant upon the order of the tags (i.e., all policies should be considered commutative operations, such that tag A preceding or following tag B does not change their outcome). 3.2.2. Use of Node Administrative Tags Theper-nodenode administrative tags are not meant to be extended by future OSPF standards. New OSPF extensions are not expected to require use ofper-nodenode administrative tags or define well-known tag values. Node administrative tags are for generic use and do not require IANAregistry.registration. Future OSPF extensions requiringwell knownwell-known values MAY define their own datasignallingsignaling tailored to the needs of the feature or MAY use the capability TLV as defined in[I-D.ietf-ospf-rfc4970bis].[RFC7770]. Being part of the RI LSA, theper-node administrative tagNode Admin Tag TLV must be reasonably small and stable. In particular, implementations supportingper-nodenode administrative tags MUST NOT be used to convey attributes of the routing topology or associate tags with changes in the network topology (both within and outside the OSPF domain) or reachability of routes. 3.2.3. Processing Node Administrative TagchangesChanges Multiplenode administrative tagNode Admin Tag TLVs MAY appear in an RI LSA or multiplenode administrative tagNode Admin Tag TLVs MAY be contained in different instances of the RI LSA. Thenodeadministrative tags associated with a node that originates tags for the purpose of any computation or processing at a receiving node SHOULD be a superset of node administrative tags from all the TLVs in all the received RI LSA instances in the Link-State Database (LSDB) advertised by the corresponding OSPF router. When an RI LSA is received that changes the set of tags applicable to any originating node, which has features depending on node administrativetags ,tags, a receiving node MUST repeat any computation or processing that is based on those administrative tags. When there is a change or removal of an administrative affiliation of a node, the node MUST re-originate the RI LSA with the latest set of node administrative tags. On the receiver,Whenwhen there is a change in thenode administrative tagNode Admin Tag TLV orremoval/ additionremoval/addition of a TLV in any instance of theRI-LSA,RI LSA, implementations MUST take appropriate measures to update their state according to the changed set of tags. The exact actions needed depend on features working with administrative tags andisare outside of scope of this specification. 4. Applications This section lists several examples of how implementations might use theper-nodenode administrative tags. These examples are given only to demonstrate the generic usefulness of the router tagging mechanism. Implementations supporting this specification are not required to implement any of these use cases. It is also worth noting that in some described usecasescases, routers configured to advertise tags help other routers in their calculations but do not themselves implement the same functionality. 4.1. Serviceauto-discoveryAuto-Discovery Router tagging may be used to automatically discover a group of routers sharing a particular service. For example, a service provider might desire to establish a full mesh of MPLS TE tunnels between all PE routers in the area of the MPLS VPN network. Marking all PE routers with a tag and configuring devices with a policy to create MPLS TE tunnels to all other devices advertising this tag will automate maintenance of the full mesh. When a new PE router is added to the area, all other PE devices will open TE tunnels to it withoutthe need of reconfiguringneeding to reconfigure them. 4.2.Fast-Re-routing policyFast-Rerouting Policy Increased deployment ofLoop FreeLoop-Free Alternates (LFA) as defined in [RFC5286] poses operation and management challenges.[I-D.ietf-rtgwg-lfa-manageability][LFA-MANAGE] proposes policies which, when implemented, will ease LFA operation concerns. One of the proposed refinements is to be able to group the nodes in an IGP domain with administrative tags and engineer the LFA based on configured policies. (a) Administrative limitation of LFA scope Service provider access infrastructure is frequently designed in a layered approach with each layer of devices serving different purposes and thus having different hardware capabilities and configured software features. When LFA repair paths are being computed, it may be desirable to exclude devices from being considered as LFA candidates based on their layer. For example, if the access infrastructure is divided into the Access,DistributionDistribution, and Corelayerslayers, it may be desirable for a Distribution device to compute LFA only via Distribution or Core devices but not via Access devices. This may be due to features enabled on Access routers, due to capacitylimitationslimitations, or due to the security requirements. Managing such a policy via configuration of the router computing LFA is cumbersome and error prone. With theNodenode administrativetagstags, it is possible to assign a tag to each layer and implement LFA policy of computing LFA repair paths only via neighborswhichthat advertise the Core or Distribution tag. This requires minimal per-node configuration and the network automatically adapts when new links or routers are added. (b) LFA calculation optimization Calculation of LFA paths may require significant resources of the router. One execution of Dijkstra's algorithm is required for each neighbor eligible to become the next hop of repair paths. Thus, a router with a fewhundreds ofhundred neighbors may need to execute the algorithm hundreds of times before the best (or even valid) repair path is found. Manually excluding from the calculation neighbors that are known to provide no valid LFA (such assingle-connectedsingle- connected routers) may significantly reduce the number of Dijkstra algorithm runs. LFA calculation policy may be configured so that routers advertising certain tagvaluevalues are excluded from LFAcalculationcalculation, even if they are otherwise suitable. 4.3. Controlling Remote LFAtunnel terminationTunnel Termination [RFC7490] defined a method oftunnellingtunneling traffic after connected link failure to extend the basic LFA coverage and defined an algorithm to find tunnel tail-end routers fitting LFA requirement. In mostcasescases, the proposed algorithm finds more than one candidate tail-end router. In a real-lifenetworknetwork, it may be desirable to exclude some nodes from the list of candidates based on the local policy. This may be either due to known limitations of the node (the router does not accept the targeted LDP sessions required to implementRemoteremote LFAtunnelling)tunneling) or due to administrative requirements (for example, it may be desirable to choose the tail-end router amongco-locatedcolocated devices). TheNodenode administrative tag delivers a simple and scalable solution. Remote LFA can be configured with a policy to acceptduring the tail- end router calculation as candidatesonly routers advertising a certaintag.tag as candidates during the tail-end router calculation. Tagging routers allowstobothexcludeexclusion of nodes not capable of serving asRemoteremote LFA tunneltail-endstail ends andto definedefinition of a region from which a tail-end router must be selected. 4.4. Mobileback-haul network service deploymentBackhaul Network Service Deployment Mobileback-haulbackhaul networks usually adopt a ring topology to save fibre resources; it is usually divided into the aggregate network and the access network. Cell SiteGateways(CSGs)Gateways (CSGs) connects theeNodeBsLTE Evolved NodeBs (eNodeBs) andRNC(RadioRNC (Radio Network Controller) SiteGateways(RSGs)Gateways (RSGs) connects the RNCs. The mobile traffic is transported from CSGs to RSGs. The network takes a typical aggregate traffic model that more than one accessringsring will attach to one pair of aggregate sitegateways(ASGs)gateways (ASGs) and more than one aggregateringsring will attach to one pair of RSGs. ---------------- / \ / \ / \ +------+ +----+ Access +----+ |eNodeB|---|CSG1| Ring 1 |ASG1|------------ +------+ +----+ +----+ \ \ / \ \ / +----+ +---+ \ +----+ |RSG1|----|RNC| -------------| | Aggregate +----+ +---+ |ASG2| Ring | -------------| | +----+ +---+ / +----+ |RSG2|----|RNC| / \ +----+ +---+ / \ / +------+ +----+ Access +----+ / |eNodeB|---|CSG2| Ring 2 |ASG3|----------- +------+ +----+ +----+ \ / \ / \ / ----------------- Figure 2: Mobile Backhaul Network A typical mobileback-haulbackhaul network with access rings and aggregate links is shown in the figure above. The mobileback-haulbackhaul networks deploy traffic engineering due to strict Service LevelAgreements(SLA).Agreements (SLAs). TheTraffic Engineering(TE)TE paths may have additional constraints to avoid passing via different access rings or to get completely disjoint backup TE paths. The mobileback-haulbackhaul networks towards the access side change frequently due to the growing mobile traffic and addition of newLTE Evolved NodeBs (eNodeB).eNodeBs. It's complex to satisfy the requirements using cost, linkcolorcolor, or explicit path configurations. The node administrative tag defined in this document can be effectively used to solve the problem for mobileback-haulbackhaul networks. The nodes in different rings can be assigned with specific tags. TE path computation can be enhanced to consider additional constraints based on node administrative tags. 4.5. Explicitrouting policyRouting Policy A partially meshed network provides multiple paths between any two nodes in the network. In a data centre environment, the topology is usually highly symmetric with many/all paths having equal cost. In a long distance network, this is usuallylessnot the case, for a variety of reasons(e.g.(e.g., historic, fibre availability constraints, different distances between transit nodes, and differentroles ...). Henceroles). Hence, between a given source and destination, a path is typically preferred over the others, while between the same source and another destination, a different path may be preferred. +----------------------+ +----------------+ | \ / | | +-----------------+ x +---------+ | | | \/ \/ | | | | +-T-10-T | | | | / | /| | | | | / 100 / | | | | | / | | 100 | | | | / +-+-+ | | | | | / / | | | | | | / / R-18-R | | | | 10 10 /\ /\ | | | | / / / \ / \ | | | | / / / x \ | | | | / / 10 10 \ \ | | | | / / / / 10 10 | | | | / / / / \ \ | | | | A-25-A A-25-A A-25-A | | | | | | \ \ / / | | | | | | 201 201 201 201 | | | | | | \ \ / / | | | | 201 201 \ x / | | | | | | \ / \ / | | | | | | \/ \/ | | | | I-24-I I-24-I 100 100 | | / / | | | | | +-+ / | +-----------+ | +---------+ +---------------------+ Figure 3: Explicit Routing topology In the above topology, an operator may want to enforce the followinghigh levelhigh-level explicit routing policies:-o Traffic from A nodes to A nodes should preferably go through R or T nodes (rather than through I nodes);-o Traffic from A nodes to I nodes must not go through R and T nodes. With node admin tags, tag A (resp. I, R, T) can be configured on all A (resp. I, R, T) nodes to advertise their role. The first policy is about preferring one path over another. Given the chosen metrics, it is achieved with regular SPF routing. The second policy is about prohibiting (pruning) some paths. It requires an explicit routing policy. With the use of node tags, this may be achieved with a genericCSPFConstrained Shortest Path First (CSPF) policy configured on A nodes: for destinationnodesnodes, having the tag "A" runs a CSPF with the exclusion of nodes having the tag "I". 5. Security Considerations Node administrative tags may be used by operators to indicate geographical location or other sensitive information. As indicated in [RFC2328] and[RFC5340][RFC5340], OSPF authentication mechanisms do not provide confidentiality and the information carried in node administrative tags could be leaked to an IGP snooper. Confidentiality for the OSPF control packets can be achieved by either running OSPF on top of IP Security(IPSEC)(IPsec) tunnels or by applyingIPSEC basedIPsec-based security mechanisms as described in [RFC4552]. Advertisement of tag values for one administrative domain into another risks misinterpretation of the tag values (if the two domains have assigned different meanings to the same values), which may have undesirable and unanticipated side effects. [RFC4593] and [RFC6863] discuss the generic threats to routing protocols andOSPFOSPF, respectively. These security threats are also applicable to the mechanisms described in thisdocument.OSPFdocument. OSPF authentication described in [RFC2328] and [RFC5340] or extended authentication mechanisms described in [RFC7474] or [RFC7166] SHOULD be used in deployments where attackers have access to the physical networks and nodes included in the OSPF domain are vulnerable. 6. Operational Considerations Operators can assign meaning to the node administrativetagstags, whichisare local to the operator's administrative domain. The operational use of node administrative tags is analogical to the IS-IS prefix tags [RFC5130] and BGP communities [RFC1997]. Operational discipline and procedures followed in configuring and using BGP communities andISIS PrefixIS-IS prefix tags is also applicable to the usage of node administrative tags. Defining language for local policies is outside the scope of this document. Asinis the case of other policy applications, the pruning policies can cause the path to be completely removed from forwarding plane, and hence have the potential for more severe operational impact (e.g., node unreachability due to path removal) by comparison to preference policies that only affect path selection. 7. Manageability Considerations Node administrative tags are configured and managed using routing policy enhancements. The YANG data definition language is the latest model to describe and define configuration for network devices. The OSPF YANG data model is described in[I-D.ietf-ospf-yang][OSPF-YANG] and the routing policy configuration model is described in[I-D.ietf-rtgwg-policy-model].[RTG-POLICY]. These two documents will be enhanced to include the configurations related to the node administrativetag related configurations.tag. 8. IANA Considerations This specification updatesone OSPF registry: OSPFthe "OSPF Router Information (RI)TLVs Registry i)TLVs" registry. IANA has registered the following value: Node Admin Tag TLV -Suggested value10** RFC Editor**: Please replace above suggested value with the IANA- assigned value.9.Contributors Thanks to Hannes Gredler for his substantial review,guidance and to the editing of this document. Thanks to Harish Raguveer for his contributions to initial versions of the draft. 10. Acknowledgements Thanks to Bharath R, Pushpasis Sarakar and Dhruv Dhody for useful inputs. Thanks to Chris Bowers for providing useful inputs to remove ambiguity related to tag-ordering. Thanks to Les Ginsberg and Acee Lindem for the inputs. Thanks to David Black for careful review and valuable suggestions for the document especially for the operations section. 11.References11.1.9.1. Normative References[I-D.ietf-ospf-rfc4970bis] Lindem, A., Shen, N., Vasseur, J., Aggarwal, R., and S. Shaffer, "Extensions to OSPF for Advertising Optional Router Capabilities", draft-ietf-ospf-rfc4970bis-07 (work in progress), October 2015.[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <http://www.rfc-editor.org/info/rfc2119>. [RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, DOI 10.17487/RFC2328, April 1998, <http://www.rfc-editor.org/info/rfc2328>.[RFC4970] Lindem, A., Ed., Shen, N., Vasseur, JP., Aggarwal, R., and S. Shaffer, "Extensions to OSPF for Advertising Optional Router Capabilities", RFC 4970, DOI 10.17487/RFC4970, July 2007, <http://www.rfc-editor.org/info/rfc4970>.[RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008, <http://www.rfc-editor.org/info/rfc5340>. [RFC7490] Bryant, S., Filsfils, C., Previdi, S., Shand, M., and N. So, "Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)", RFC 7490, DOI 10.17487/RFC7490, April 2015, <http://www.rfc-editor.org/info/rfc7490>.11.2. Informative References [I-D.ietf-ospf-yang] Yeung, D., Qu, Y., Zhang, J., Bogdanovic, D.,[RFC7770] Lindem, A., Ed., Shen, N., Vasseur, JP., Aggarwal, R., andK. Koushik, "Yang Data Model forS. Shaffer, "Extensions to OSPFProtocol", draft-ietf- ospf-yang-03 (work in progress), October 2015. [I-D.ietf-rtgwg-lfa-manageability]for Advertising Optional Router Capabilities", RFC 7770, DOI 10.17487/RFC7770, February 2016, <http://www.rfc-editor.org/info/rfc7770>. 9.2. Informative References [LFA-MANAGE] Litkowski, S., Decraene, B., Filsfils, C., Raza, K., Horneffer, M., and P. Sarkar, "Operational management of Loop Free Alternates",draft-ietf-rtgwg-lfa- manageability-11 (workWork inprogress),Progress, draft-ietf-rtgwg- lfa-manageability-11, June 2015.[I-D.ietf-rtgwg-policy-model] Shaikh, A., rjs@rob.sh, r., D'Souza, K.,[OSPF-YANG] Yeung, D., Qu, Y., Zhang, J., Bogdanovic, D., andC. Chase, "Routing Policy ConfigurationK. Koushik, "Yang Data Model forService Provider Networks", draft-ietf-rtgwg-policy-model-00 (workOSPF Protocol", Work inprogress),Progress, draft-ietf-ospf-yang-02, September 2015. [RFC1997] Chandra, R., Traina, P., and T. Li, "BGP Communities Attribute", RFC 1997, DOI 10.17487/RFC1997, August 1996, <http://www.rfc-editor.org/info/rfc1997>. [RFC4552] Gupta, M. and N. Melam, "Authentication/Confidentiality for OSPFv3", RFC 4552, DOI 10.17487/RFC4552, June 2006, <http://www.rfc-editor.org/info/rfc4552>. [RFC4593] Barbir, A., Murphy, S., and Y. Yang, "Generic Threats to Routing Protocols", RFC 4593, DOI 10.17487/RFC4593, October 2006, <http://www.rfc-editor.org/info/rfc4593>. [RFC5130] Previdi, S., Shand, M., Ed., and C. Martin, "A Policy Control Mechanism in IS-IS Using Administrative Tags", RFC 5130, DOI 10.17487/RFC5130, February 2008, <http://www.rfc-editor.org/info/rfc5130>. [RFC5286] Atlas, A., Ed. and A. Zinin, Ed., "Basic Specification for IP Fast Reroute: Loop-Free Alternates", RFC 5286, DOI 10.17487/RFC5286, September 2008, <http://www.rfc-editor.org/info/rfc5286>. [RFC6863] Hartman, S. and D. Zhang, "Analysis of OSPF Security According to the Keying and Authentication for Routing Protocols (KARP) Design Guide", RFC 6863, DOI 10.17487/RFC6863, March 2013, <http://www.rfc-editor.org/info/rfc6863>. [RFC7166] Bhatia, M., Manral, V., and A. Lindem, "Supporting Authentication Trailer for OSPFv3", RFC 7166, DOI 10.17487/RFC7166, March 2014, <http://www.rfc-editor.org/info/rfc7166>. [RFC7474] Bhatia, M., Hartman, S., Zhang, D., and A. Lindem, Ed., "Security Extension for OSPFv2 When Using Manual Key Management", RFC 7474, DOI 10.17487/RFC7474, April 2015, <http://www.rfc-editor.org/info/rfc7474>. [RTG-POLICY] Shaikh, A., Shakir, R., D'Souza, K., and C. Chase, "Routing Policy Configuration Model for Service Provider Networks", Work in Progress, draft-ietf-rtgwg-policy- model-00, September 2015. Contributors Thanks to Hannes Gredler for his substantial review, guidance, and editing of this document. Thanks to Harish Raguveer for his contributions to initial draft versions of this document. Acknowledgements Thanks to Bharath R, Pushpasis Sarakar, and Dhruv Dhody for useful input. Thanks to Chris Bowers for providing useful input to remove ambiguity related to tag ordering. Thanks to Les Ginsberg and Acee Lindem for the input. Thanks to David Black for careful review and valuable suggestions for the document, especially for the operations section. Authors' Addresses Shraddha Hegde Juniper Networks, Inc. Embassy Business Park Bangalore, KA 560093 India Email: shraddha@juniper.net Rob ShakirIndividualJive Communications, Inc. 1275 W 1600 N, Suite 100 Orem, UT 84057 United States Email: rjs@rob.sh Anton Smirnov Cisco Systems, Inc. De Kleetlaan 6a Diegem 1831 Belgium Email: as@cisco.com Li zhenbin Huawei Technologies Huawei Bld. No.156 Beiqing Rd Beijing 100095 China Email: lizhenbin@huawei.com Bruno Decraene Orange Email: bruno.decraene@orange.com