draft-ietf-mpls-app-aware-tldp-09v3.original | draft-ietf-mpls-app-aware-tldp-09v3.txt | |||
---|---|---|---|---|
MPLS Working Group Santosh Esale | MPLS Working Group S. Esale | |||
INTERNET-DRAFT Raveendra Torvi | Internet-Draft R. Torvi | |||
Updates: 7473 (if approved) Juniper Networks | Updates: 7473 (if approved) Juniper Networks | |||
Intended Status: Proposed Standard Luay Jalil | Intended status: Standards Track L. Jalil | |||
Expires: December 29, 2017 Verizon | Expires: December 29, 2017 Verizon | |||
Uma Chunduri | U. Chunduri | |||
Huawei | Huawei | |||
Kamran Raza | K. Raza | |||
Cisco Systems, Inc. | Cisco Systems, Inc. | |||
June 27, 2017 | June 27, 2017 | |||
Application-aware Targeted LDP | Application-aware Targeted LDP | |||
draft-ietf-mpls-app-aware-tldp-09 | draft-ietf-mpls-app-aware-tldp-09 | |||
Abstract | Abstract | |||
Recent targeted Label Distribution Protocol (tLDP) applications such | Recent targeted Label Distribution Protocol (tLDP) applications such | |||
as remote loop-free alternate (LFA) and BGP auto discovered | as remote loop-free alternate (LFA) and BGP auto discovered | |||
pseudowire may automatically establish a tLDP session to any Label | pseudowire may automatically establish a tLDP session to any Label | |||
Switching Router (LSR) in a network. The initiating LSR has | Switching Router (LSR) in a network. The initiating LSR has | |||
information about the targeted applications to administratively | information about the targeted applications to administratively | |||
control initiation of the session. However, the responding LSR has no | control initiation of the session. However, the responding LSR has | |||
such information to control acceptance of this session. This document | no such information to control acceptance of this session. This | |||
defines a mechanism to advertise and negotiate Targeted Applications | document defines a mechanism to advertise and negotiate Targeted | |||
Capability (TAC) during LDP session initialization. As the | Applications Capability (TAC) during LDP session initialization. As | |||
responding LSR becomes aware of targeted applications, it may | the responding LSR becomes aware of targeted applications, it may | |||
establish a limited number of tLDP sessions for certain applications. | establish a limited number of tLDP sessions for certain applications. | |||
In addition, each targeted application is mapped to LDP Forwarding | In addition, each targeted application is mapped to LDP Forwarding | |||
Equivalence Class (FEC) Elements to advertise only necessary LDP FEC- | Equivalence Class (FEC) Elements to advertise only necessary LDP FEC- | |||
label bindings over the session. This document updates RFC 7473 for | label bindings over the session. This document updates RFC 7473 for | |||
enabling advertisement of LDP FEC-label bindings over the session. | enabling advertisement of LDP FEC-label bindings over the session. | |||
Status of this Memo | Status of This Memo | |||
This Internet-Draft is submitted to IETF in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF). Note that other groups may also distribute | |||
other groups may also distribute working documents as | working documents as Internet-Drafts. The list of current Internet- | |||
Internet-Drafts. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | This Internet-Draft will expire on December 29, 2017. | |||
http://www.ietf.org/1id-abstracts.html | ||||
The list of Internet-Draft Shadow Directories can be accessed at | ||||
http://www.ietf.org/shadow.html | ||||
Copyright and License Notice | Copyright Notice | |||
Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2017 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
1.1 Conventions Used in This Document . . . . . . . . . . . . . 4 | 1.1. Conventions Used in This Document . . . . . . . . . . . . 4 | |||
1.2 Terminology . . . . . . . . . . . . . . . . . . . . . . . . 5 | 1.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
2. Targeted Application Capability . . . . . . . . . . . . . . . . 5 | 2. Targeted Application Capability . . . . . . . . . . . . . . . 4 | |||
2.1 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2.1. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
2.2 Procedures . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 2.2. Procedures . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
2.3 LDP message procedures . . . . . . . . . . . . . . . . . . . 8 | 2.3. LDP message procedures . . . . . . . . . . . . . . . . . 8 | |||
2.3.1 Initialization message . . . . . . . . . . . . . . . . . 8 | 2.3.1. Initialization message . . . . . . . . . . . . . . . 8 | |||
2.3.2 Capability message . . . . . . . . . . . . . . . . . . . 9 | 2.3.2. Capability message . . . . . . . . . . . . . . . . . 8 | |||
3. Targeted Application FEC Advertisement Procedures . . . . . . . 9 | 3. Targeted Application FEC Advertisement Procedures . . . . . . 8 | |||
4. Interaction of Targeted Application Capabilities and State | 4. Interaction of Targeted Application Capabilities and State | |||
Advertisement Control Capabilities . . . . . . . . . . . . . . 10 | Advertisement Control Capabilities . . . . . . . . . . . . . 10 | |||
5. Use cases . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 5. Use cases . . . . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
5.1 Remote LFA Automatic Targeted session . . . . . . . . . . . 12 | 5.1. Remote LFA Automatic Targeted session . . . . . . . . . . 12 | |||
5.2 FEC 129 Auto Discovery Targeted session . . . . . . . . . . 13 | 5.2. FEC 129 Auto Discovery Targeted session . . . . . . . . . 12 | |||
5.3 LDP over RSVP and Remote LFA targeted session . . . . . . . 13 | 5.3. LDP over RSVP and Remote LFA targeted session . . . . . . 13 | |||
5.4 mLDP node protection targeted session . . . . . . . . . . . 13 | 5.4. mLDP node protection targeted session . . . . . . . . . . 13 | |||
6. Security Considerations . . . . . . . . . . . . . . . . . . . . 14 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 13 | |||
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 14 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 | |||
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 15 | 8. Contributing Authors . . . . . . . . . . . . . . . . . . . . 15 | |||
9. Contributing Authors . . . . . . . . . . . . . . . . . . . . . 15 | 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 15 | |||
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 16 | 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 16 | |||
10.1 Normative References . . . . . . . . . . . . . . . . . . . 16 | 10.1. Normative References . . . . . . . . . . . . . . . . . . 16 | |||
10.2 Informative References . . . . . . . . . . . . . . . . . . 16 | 10.2. Informative References . . . . . . . . . . . . . . . . . 16 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 17 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17 | |||
1 Introduction | 1. Introduction | |||
LDP uses the extended discovery mechanism to establish the tLDP | LDP uses the extended discovery mechanism to establish the tLDP | |||
adjacency and subsequent session as described in [RFC5036]. A LSR | adjacency and subsequent session as described in [RFC5036]. A LSR | |||
initiates extended discovery by sending tLDP Hello to specific | initiates extended discovery by sending tLDP Hello to specific | |||
address. The remote LSR decides to either accept or ignore the tLDP | address. The remote LSR decides to either accept or ignore the tLDP | |||
Hello based on local configuration only. Targeted LDP application is | Hello based on local configuration only. Targeted LDP application is | |||
an application that uses tLDP session to exchange information such as | an application that uses tLDP session to exchange information such as | |||
FEC-Label bindings with a peer LSR in the network. For an application | FEC-Label bindings with a peer LSR in the network. For an | |||
such as FEC 128 pseudowire, the remote LSR is configured with the | application such as FEC 128 pseudowire, the remote LSR is configured | |||
source LSR address so that it can use that information to accept or | with the source LSR address so that it can use that information to | |||
ignore given tLDP Hello. | accept or ignore given tLDP Hello. | |||
However, applications such as Remote LFA and BGP auto discovered | However, applications such as Remote LFA and BGP auto discovered | |||
pseudowire automatically initiate asymmetric extended discovery to | pseudowire automatically initiate asymmetric extended discovery to | |||
any LSR in a network based on local state only. With these | any LSR in a network based on local state only. With these | |||
applications, the remote LSR is not explicitly configured with the | applications, the remote LSR is not explicitly configured with the | |||
source LSR address. So the remote LSR either responds or ignores all | source LSR address. So the remote LSR either responds or ignores all | |||
tLDP Hellos. | tLDP Hellos. | |||
In addition, since the session is initiated and established after | In addition, since the session is initiated and established after | |||
adjacency formation, the responding LSR has no targeted applications | adjacency formation, the responding LSR has no targeted applications | |||
information available to choose a session with targeted application | information available to choose a session with targeted application | |||
that it is configured to support. Also, the initiating LSR may employ | that it is configured to support. Also, the initiating LSR may | |||
a limit per application on locally initiated automatic tLDP sessions, | employ a limit per application on locally initiated automatic tLDP | |||
however the responding LSR has no such information to employ a | sessions, however the responding LSR has no such information to | |||
similar limit on the incoming tLDP sessions. Further, the responding | employ a similar limit on the incoming tLDP sessions. Further, the | |||
LSR does not know whether the source LSR is establishing a tLDP | responding LSR does not know whether the source LSR is establishing a | |||
session for configured, automatic or both applications. | tLDP session for configured, automatic or both applications. | |||
This document proposes and describes a solution to advertise Targeted | This document proposes and describes a solution to advertise Targeted | |||
Application Capability (TAC), consisting of a targeted application | Application Capability (TAC), consisting of a targeted application | |||
list, during initialization of a tLDP session. It also defines a | list, during initialization of a tLDP session. It also defines a | |||
mechanism to enable an new application and disable an old application | mechanism to enable an new application and disable an old application | |||
after session establishment. This capability advertisement provides | after session establishment. This capability advertisement provides | |||
the responding LSR with the necessary information to control the | the responding LSR with the necessary information to control the | |||
acceptance of tLDP sessions per application. For instance, an LSR may | acceptance of tLDP sessions per application. For instance, an LSR | |||
accept all BGP auto discovered tLDP sessions as defined in [RFC6074] | may accept all BGP auto discovered tLDP sessions as defined in | |||
but may only accept limited number of Remote LFA tLDP sessions as | [RFC6074] but may only accept limited number of Remote LFA tLDP | |||
defined in [RFC7490] | sessions as defined in [RFC7490] | |||
Also, the targeted LDP application is mapped to LDP FEC element type | Also, the targeted LDP application is mapped to LDP FEC element type | |||
to advertise specific application FECs only, avoiding the | to advertise specific application FECs only, avoiding the | |||
advertisement of other unnecessary FECs over a tLDP session. | advertisement of other unnecessary FECs over a tLDP session. | |||
1.1 Conventions Used in This Document | 1.1. Conventions Used in This Document | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
"OPTIONAL" in this document are to be interpreted as described in RFC | "OPTIONAL" in this document are to be interpreted as described in RFC | |||
2119 [RFC2119] and RFC 8174 [RFC8174] when, and only when, they | 2119 [RFC2119] and RFC 8174 [RFC8174] when, and only when, they | |||
appear in all capitals, as shown here. | appear in all capitals, as shown here. | |||
1.2 Terminology | 1.2. Terminology | |||
In addition to the terminology defined in [RFC7473], this document | In addition to the terminology defined in [RFC7473], this document | |||
uses the following terms: | uses the following terms: | |||
tLDP : Targeted LDP | tLDP : Targeted LDP | |||
TAC : Targeted Application Capability | TAC : Targeted Application Capability | |||
TAE : Targeted Application Element | TAE : Targeted Application Element | |||
TA-Id : Targeted Application Identifier | TA-Id : Targeted Application Identifier | |||
SAC : State Advertisement Control Capability | SAC : State Advertisement Control Capability | |||
LSR : Label Switching Router | LSR : Label Switching Router | |||
skipping to change at page 5, line 32 | skipping to change at page 4, line 36 | |||
RSVP-TE : RSVP Traffic Engineering | RSVP-TE : RSVP Traffic Engineering | |||
P2MP : Point-to-Multipoint | P2MP : Point-to-Multipoint | |||
PW : Pseudowire | PW : Pseudowire | |||
P2P-PW : Point-to-point Psuedowire | P2P-PW : Point-to-point Psuedowire | |||
MP2MP : Multipoint-to-Multipoint | MP2MP : Multipoint-to-Multipoint | |||
HSMP LSP: Hub and Spoke Multipoint Label Switched Path | HSMP LSP: Hub and Spoke Multipoint Label Switched Path | |||
LSP : Label Switched Path | LSP : Label Switched Path | |||
MP2P : Multipoint-to-point | MP2P : Multipoint-to-point | |||
MPT : Merge Point | MPT : Merge Point | |||
2. Targeted Application Capability | 2. Targeted Application Capability | |||
2.1 Encoding | 2.1. Encoding | |||
An LSR MAY advertise that it is capable of negotiating a targeted LDP | An LSR MAY advertise that it is capable of negotiating a targeted LDP | |||
application list over a tLDP session by using the Capability | application list over a tLDP session by using the Capability | |||
Advertisement as defined in [RFC5561] and encoded as follows: | Advertisement as defined in [RFC5561] and encoded as follows: | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
|U|F| TLV Code Point | Length | | |U|F| TLV Code Point | Length | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
skipping to change at page 6, line 4 | skipping to change at page 5, line 15 | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
|U|F| TLV Code Point | Length | | |U|F| TLV Code Point | Length | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
|S| Reserved | | | |S| Reserved | | | |||
+-+-+-+-+-+-+-+-+ Capability Data | | +-+-+-+-+-+-+-+-+ Capability Data | | |||
| +-+-+-+-+-+-+-+-+ | | +-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
This document defines a new optional capability TLV of type TBD1 | This document defines a new optional capability TLV of type TBD1 | |||
called 'Targeted Application Capability (TAC)'. Flag "U" MUST be | called 'Targeted Application Capability (TAC)'. Flag "U" MUST be | |||
set to 1 to indicate that this capability must be silently ignored | set to 1 to indicate that this capability must be silently ignored | |||
if unknown. The TAC's Capability Data contains the Targeted | if unknown. The TAC's Capability Data contains the Targeted | |||
Application Element (TAE) information encoded as follows: | Application Element (TAE) information encoded as follows: | |||
Targeted Application Element(TAE) | Targeted Application Element(TAE) | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Targ. Appl. Id |E| Reserved | | | Targ. Appl. Id |E| Reserved | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Targeted Application Identifier (TA-Id): | Targeted Application Identifier (TA-Id): | |||
a 16 bit Targeted Application Identifier value. | a 16 bit Targeted Application Identifier value. | |||
E-bit: The enable bit indicates whether the sender is | E-bit: The enable bit indicates whether the sender is advertising | |||
advertising or withdrawing the TAE. The E-bit value is used as | or withdrawing the TAE. The E-bit value is used as follows: | |||
follows: | ||||
1 - The TAE is advertising the targeted application. | 1 - The TAE is advertising the targeted application. 0 - The | |||
0 - The TAE is withdrawing the targeted application. | TAE is withdrawing the targeted application. | |||
2.2 Procedures | 2.2. Procedures | |||
At tLDP session establishment time, a LSR MAY include a new | At tLDP session establishment time, a LSR MAY include a new | |||
capability TLV, TAC TLV, as an optional TLV in the LDP Initialization | capability TLV, TAC TLV, as an optional TLV in the LDP Initialization | |||
message. The TAC TLV's Capability data MAY consist of zero or more | message. The TAC TLV's Capability data MAY consist of zero or more | |||
TAEs each pertaining to a unique TA-Id that a LSR supports over the | TAEs each pertaining to a unique TA-Id that a LSR supports over the | |||
session. If the receiver LSR receives the same TA-Id in more than one | session. If the receiver LSR receives the same TA-Id in more than | |||
TAE, it MUST process the first element and ignore the duplicate | one TAE, it MUST process the first element and ignore the duplicate | |||
elements. If the receiver LSR receives an unknown TA-Id in the TAE, | elements. If the receiver LSR receives an unknown TA-Id in the TAE, | |||
it MUST silently ignore such a TAE and continue processing the rest | it MUST silently ignore such a TAE and continue processing the rest | |||
of the TLV. | of the TLV. | |||
If the receiver LSR does not receive the TAC TLV in the | If the receiver LSR does not receive the TAC TLV in the | |||
Initialization message or it does not understand the TAC TLV, the TAC | Initialization message or it does not understand the TAC TLV, the TAC | |||
negotiation is considered unsuccessful and the session establishment | negotiation is considered unsuccessful and the session establishment | |||
proceeds as per [RFC5036]. On the receipt of a valid TAC TLV, an LSR | proceeds as per [RFC5036]. On the receipt of a valid TAC TLV, an LSR | |||
MUST generate its own TAC TLV with TAEs consisting of unique TA-Ids | MUST generate its own TAC TLV with TAEs consisting of unique TA-Ids | |||
that it supports over the tLDP session. If there is at least one TAE | that it supports over the tLDP session. If there is at least one TAE | |||
common between the TAC TLV it has received and its own, the session | common between the TAC TLV it has received and its own, the session | |||
MUST proceed to establishment as per [RFC5036]. If not, A LSR MUST | MUST proceed to establishment as per [RFC5036]. If not, A LSR MUST | |||
send a 'Session Rejected/Targeted Application Capability Mis-Match' | send a 'Session Rejected/Targeted Application Capability Mis-Match' | |||
Notification message to the peer and close the session. The | Notification message to the peer and close the session. The | |||
initiating LSR SHOULD tear down the corresponding tLDP adjacency | initiating LSR SHOULD tear down the corresponding tLDP adjacency | |||
after sent or receipt of a 'Session Rejected/Targeted Application | after sent or receipt of a 'Session Rejected/Targeted Application | |||
Capability Mis-Match' Notification message to or from the responding | Capability Mis-Match' Notification message to or from the responding | |||
LSR respectively. | LSR respectively. | |||
If both the peers support TAC TLV, an LSR decides to establish or | If both the peers support TAC TLV, an LSR decides to establish or | |||
close a tLDP session based on the negotiated targeted application | close a tLDP session based on the negotiated targeted application | |||
list. For example, an initiating LSR advertises A, B and C as TA-Ids, | list. For example, an initiating LSR advertises A, B and C as TA- | |||
and the responding LSR advertises C, D and E as TA-Ids. Then the | Ids, and the responding LSR advertises C, D and E as TA-Ids. Then the | |||
negotiated TA-Id as per both the LSRs is C. Another example, an | negotiated TA-Id as per both the LSRs is C. Another example, an | |||
initiating LSR advertises A, B and C as TA-Ids, and the responding | initiating LSR advertises A, B and C as TA-Ids, and the responding | |||
LSR, which acts as a passive LSR, advertises all the applications - | LSR, which acts as a passive LSR, advertises all the applications - | |||
A, B, C, D and E - as TA-Ids that it supports over this session. Then | A, B, C, D and E - as TA-Ids that it supports over this session. | |||
the negotiated targeted applications as per both the LSRs are A, B | Then the negotiated targeted applications as per both the LSRs are A, | |||
and C. Finally, If the initiating LSR advertises A, B and C as a TA- | B and C. Finally, If the initiating LSR advertises A, B and C as a | |||
Ids and the responding LSR advertises D and E as TA-Ids, then the | TA- Ids and the responding LSR advertises D and E as TA-Ids, then the | |||
negotiated targeted applications as per both the LSRs are none. | negotiated targeted applications as per both the LSRs are none. | |||
Therefore, if the intersection of the sets of received and sent TA-Id | Therefore, if the intersection of the sets of received and sent TA-Id | |||
is null, then LSR sends 'Session Rejected/Targeted Application | is null, then LSR sends 'Session Rejected/Targeted Application | |||
Capability Mis-Match' Notification message to the peer LSR and closes | Capability Mis-Match' Notification message to the peer LSR and closes | |||
the session. | the session. | |||
When the responding LSR playing the active role [RFC5036] in LDP | When the responding LSR playing the active role [RFC5036] in LDP | |||
session establishment receives a 'Session Rejected/Targeted | session establishment receives a 'Session Rejected/Targeted | |||
Application Capability Mis-Match' Notification message, it MUST set | Application Capability Mis-Match' Notification message, it MUST set | |||
its session setup retry interval to a maximum value, as such 0xffff. | its session setup retry interval to a maximum value, as such 0xffff. | |||
The session MAY stay in NON EXISTENT state. When it detects a change | The session MAY stay in NON EXISTENT state. When it detects a change | |||
in the initiating LSR or local LSR configuration pertaining to TAC | in the initiating LSR or local LSR configuration pertaining to TAC | |||
TLV, it MUST clear the session setup back off delay associated with | TLV, it MUST clear the session setup back off delay associated with | |||
the session to re-attempt the session establishment. A LSR detects | the session to re-attempt the session establishment. A LSR detects | |||
configuration change on the other LSR with the receipt of tLDP Hello | configuration change on the other LSR with the receipt of tLDP Hello | |||
message that has a higher configuration sequence number than the | message that has a higher configuration sequence number than the | |||
earlier tLDP Hello message. | earlier tLDP Hello message. | |||
When the initiating LSR playing the active role in LDP session | When the initiating LSR playing the active role in LDP session | |||
establishment receives a 'Session Rejected/Targeted Application | establishment receives a 'Session Rejected/Targeted Application | |||
Capability Mis-Match' Notification message, either it MUST close the | Capability Mis-Match' Notification message, either it MUST close the | |||
session and tear down the corresponding tLDP adjacency or it MUST set | session and tear down the corresponding tLDP adjacency or it MUST set | |||
its session setup retry interval to a maximum value, as such 0xffff. | its session setup retry interval to a maximum value, as such 0xffff. | |||
If the initiating LSR decides to tear down the associated tLDP | If the initiating LSR decides to tear down the associated tLDP | |||
adjacency, the session is closed on the initiating as well as the | adjacency, the session is closed on the initiating as well as the | |||
responding LSR. It MAY also take appropriate actions. For instance, | responding LSR. It MAY also take appropriate actions. For instance, | |||
if an automatic session intended to support the Remote LFA | if an automatic session intended to support the Remote LFA | |||
application is rejected by the responding LSR, the initiating LSR may | application is rejected by the responding LSR, the initiating LSR may | |||
inform the IGP to calculate another PQ node [RFC7490] for the route | inform the IGP to calculate another PQ node [RFC7490] for the route | |||
or set of routes. More specific actions are a local matter and | or set of routes. More specific actions are a local matter and | |||
outside the scope of this document. | outside the scope of this document. | |||
If the initiating LSR sets the session setup retry interval to | If the initiating LSR sets the session setup retry interval to | |||
maximum, the session MAY stay in a non-existent state. When this LSR | maximum, the session MAY stay in a non-existent state. When this LSR | |||
detects a change in the responding LSR configuration or its own | detects a change in the responding LSR configuration or its own | |||
configuration pertaining to TAC TLV, it MUST clear the session setup | configuration pertaining to TAC TLV, it MUST clear the session setup | |||
back off delay associated with the session in order to re-attempt the | back off delay associated with the session in order to re-attempt the | |||
session establishment. | session establishment. | |||
After a tLDP session has been established with TAC capability, the | After a tLDP session has been established with TAC capability, the | |||
initiating and responding LSR MUST distribute FEC-label bindings for | initiating and responding LSR MUST distribute FEC-label bindings for | |||
the negotiated applications only. For instance, if the tLDP session | the negotiated applications only. For instance, if the tLDP session | |||
is established for BGP auto discovered pseudowire, only FEC 129 label | is established for BGP auto discovered pseudowire, only FEC 129 label | |||
bindings MUST be distributed over the session. Similarly, a LSR | bindings MUST be distributed over the session. Similarly, a LSR | |||
operating in downstream on demand mode MUST request FEC-label | operating in downstream on demand mode MUST request FEC-label | |||
bindings for the negotiated applications only. | bindings for the negotiated applications only. | |||
If the Targeted Application Capability and Dynamic Capability, | If the Targeted Application Capability and Dynamic Capability, | |||
described in [RFC5561], are negotiated during session initialization, | described in [RFC5561], are negotiated during session initialization, | |||
TAC MAY be re-negotiated after session establishment by sending an | TAC MAY be re-negotiated after session establishment by sending an | |||
updated TAC TLV in LDP Capability message. The updated TAC TLV | updated TAC TLV in LDP Capability message. The updated TAC TLV | |||
carries TA-Ids with incremental update only. The updated TLV MUST | carries TA-Ids with incremental update only. The updated TLV MUST | |||
consist of one or more TAEs with E-bit set or E-bit off to advertise | consist of one or more TAEs with E-bit set or E-bit off to advertise | |||
or withdraw the new and old application respectively. This may lead | or withdraw the new and old application respectively. This may lead | |||
to advertisements or withdrawals of certain types of FEC-Label | to advertisements or withdrawals of certain types of FEC-Label | |||
bindings over the session or tear down of the tLDP adjacency and | bindings over the session or tear down of the tLDP adjacency and | |||
subsequently the session. | subsequently the session. | |||
The Targeted Application Capability is advertised on tLDP session | The Targeted Application Capability is advertised on tLDP session | |||
only. If the tLDP session changes to link session, a LSR SHOULD | only. If the tLDP session changes to link session, a LSR SHOULD | |||
withdraw it with S bit set to 0. Similarly, if the link session | withdraw it with S bit set to 0. Similarly, if the link session | |||
changes to tLDP, a LSR SHOULD advertise it via the Capability | changes to tLDP, a LSR SHOULD advertise it via the Capability | |||
message. If the capability negotiation fails, this may lead to | message. If the capability negotiation fails, this may lead to | |||
destruction of the tLDP session. | destruction of the tLDP session. | |||
By default, LSR SHOULD accept tLDP hellos in order to then accept or | By default, LSR SHOULD accept tLDP hellos in order to then accept or | |||
reject the tLDP session based on the application information. | reject the tLDP session based on the application information. | |||
In addition, LSR SHOULD allow the configuration of any TA-Id in order | In addition, LSR SHOULD allow the configuration of any TA-Id in order | |||
to facilitate private TA-Id's usage by a network operator. | to facilitate private TA-Id's usage by a network operator. | |||
2.3 LDP message procedures | 2.3. LDP message procedures | |||
2.3.1 Initialization message | 2.3.1. Initialization message | |||
1. The S-bit of the Targeted Application Capability TLV MUST be | 1. The S-bit of the Targeted Application Capability TLV MUST be | |||
set to 1 to advertise Targeted Application Capability and | set to 1 to advertise Targeted Application Capability and | |||
SHOULD be ignored on the receipt as defined in [RFC5561] | SHOULD be ignored on the receipt as defined in [RFC5561] | |||
2. The E-bit of the Targeted Application Element MUST be set to 1 to | 2. The E-bit of the Targeted Application Element MUST be set to 1 to | |||
enable Targeted application and SHOULD be ignored on the receipt. | enable Targeted application and SHOULD be ignored on the receipt. | |||
3. An LSR MAY add State Control Capability by mapping Targeted | 3. An LSR MAY add State Control Capability by mapping Targeted | |||
Application Element to State Advertisement Control (SAC) Elements | Application Element to State Advertisement Control (SAC) Elements | |||
as defined in Section 4. | as defined in Section 4. | |||
2.3.2 Capability message | 2.3.2. Capability message | |||
The initiating or responding LSR may re-negotiate the TAC after local | The initiating or responding LSR may re-negotiate the TAC after local | |||
configuration change with the Capability message. | configuration change with the Capability message. | |||
1. The S-bit of TAC is set to 1 or 0 to advertise or withdraw it. | 1. The S-bit of TAC is set to 1 or 0 to advertise or withdraw it. | |||
2. After configuration change, If there is no common TAE between | 2. After configuration change, If there is no common TAE between | |||
its new TAE list and peers TAE list, the LSR MUST send a | its new TAE list and peers TAE list, the LSR MUST send a | |||
'Session Rejected/Targeted Application Capability Mis-Match' | 'Session Rejected/Targeted Application Capability Mis-Match' | |||
Notification message and close the session. | Notification message and close the session. | |||
3. If there is a common TAE, a LSR MAY also update SAC Capability | 3. If there is a common TAE, a LSR MAY also update SAC Capability | |||
based on updated TAC as described in section 4 and send the | based on updated TAC as described in section 4 and send the | |||
updated TAC and SAC capabilities in a Capability message to | updated TAC and SAC capabilities in a Capability message to | |||
the peer. | the peer. | |||
4. A receiving LSR processes the Capability message with TAC TLV. | 4. A receiving LSR processes the Capability message with TAC TLV. | |||
If the S-bit is set to 0, the TAC is disabled for the session. | If the S-bit is set to 0, the TAC is disabled for the session. | |||
5. If the S-bit is set to 1, a LSR process a list of TAEs from | 5. If the S-bit is set to 1, a LSR process a list of TAEs from | |||
TACs capability data with E-bit set to 1 or 0 to update the | TACs capability data with E-bit set to 1 or 0 to update the | |||
peer's TAE. | peer's TAE. | |||
3. Targeted Application FEC Advertisement Procedures | 3. Targeted Application FEC Advertisement Procedures | |||
The targeted LDP application MUST be mapped to LDP FEC element types | The targeted LDP application MUST be mapped to LDP FEC element types | |||
as follows to advertise only necessary LDP FEC-Label bindings over | as follows to advertise only necessary LDP FEC-Label bindings over | |||
the tLDP session. | the tLDP session. | |||
Targeted Application Description FEC mappings | Targeted Application Description FEC mappings | |||
+----------------------+------------------------+------------------+ | +----------------------+------------------------+------------------+ | |||
|LDPv4 Tunneling | LDP IPv4 over RSVP-TE | IPv4 prefix | | |LDPv4 Tunneling | LDP IPv4 over RSVP-TE | IPv4 prefix | | |||
| | or other MPLS tunnel | | | | | or other MPLS tunnel | | | |||
+----------------------+------------------------+------------------+ | +----------------------+------------------------+------------------+ | |||
skipping to change at page 10, line 49 | skipping to change at page 10, line 12 | |||
| | | | | | | | | | |||
|IPv4 intra-area FECs | IPv4 intra-area FECs | IPv4 prefix | | |IPv4 intra-area FECs | IPv4 intra-area FECs | IPv4 prefix | | |||
+----------------------+------------------------+------------------+ | +----------------------+------------------------+------------------+ | |||
| | | | | | | | | | |||
|IPv6 intra-area FECs | IPv6 intra-area FECs | IPv6 prefix | | |IPv6 intra-area FECs | IPv6 intra-area FECs | IPv6 prefix | | |||
+----------------------+------------------------+------------------+ | +----------------------+------------------------+------------------+ | |||
Intra-area FECs : FECs that are on the shortest path tree and not | Intra-area FECs : FECs that are on the shortest path tree and not | |||
leafs of the shortest path tree. | leafs of the shortest path tree. | |||
4. Interaction of Targeted Application Capabilities and State | 4. Interaction of Targeted Application Capabilities and State | |||
Advertisement Control Capabilities | Advertisement Control Capabilities | |||
As described in this document, the set of TAEs negotiated between two | As described in this document, the set of TAEs negotiated between two | |||
LDP peers advertising TAC represents the willingness of both peers to | LDP peers advertising TAC represents the willingness of both peers to | |||
advertise state information for a set of applications. The set of | advertise state information for a set of applications. The set of | |||
applications negotiated by the TAC mechanism is symmetric between the | applications negotiated by the TAC mechanism is symmetric between the | |||
two LDP peers. In the absence of further mechanisms, two LDP peers | two LDP peers. In the absence of further mechanisms, two LDP peers | |||
will both advertise state information for the same set of | will both advertise state information for the same set of | |||
applications. | applications. | |||
As described in [RFC7473], State Advertisement Control(SAC) TLV can | As described in [RFC7473], State Advertisement Control(SAC) TLV can | |||
be used by an LDP speaker to communicate its interest or disinterest | be used by an LDP speaker to communicate its interest or disinterest | |||
in receiving state information from a given peer for a particular | in receiving state information from a given peer for a particular | |||
application. Two LDP peers can use the SAC mechanism to create | application. Two LDP peers can use the SAC mechanism to create | |||
asymmetric advertisement of state information between the two peers. | asymmetric advertisement of state information between the two peers. | |||
The TAC negotiation facilitates the awareness of targeted | The TAC negotiation facilitates the awareness of targeted | |||
applications to both the peers. It enables them to advertise only | applications to both the peers. It enables them to advertise only | |||
necessary LDP FEC-label bindings corresponding to negotiated | necessary LDP FEC-label bindings corresponding to negotiated | |||
applications. With the SAC, the responding LSR is not aware of | applications. With the SAC, the responding LSR is not aware of | |||
targeted applications. Thus it may be unable to communicate its | targeted applications. Thus it may be unable to communicate its | |||
interest or disinterest to receive state information from the peer. | interest or disinterest to receive state information from the peer. | |||
Therefore, when the responding LSR is not aware of targeted | Therefore, when the responding LSR is not aware of targeted | |||
applications such a remote LFA and BGP auto discovered pseudowires, | applications such a remote LFA and BGP auto discovered pseudowires, | |||
TAC mechanism should be used and when the responding LSR is aware | TAC mechanism should be used and when the responding LSR is aware | |||
(with appropriate configuration) of targeted applications such as FEC | (with appropriate configuration) of targeted applications such as FEC | |||
128 pseudowire, SAC mechanism should be used. Also after TAC | 128 pseudowire, SAC mechanism should be used. Also after TAC | |||
mechanism makes the responding LSR aware of targeted application, the | mechanism makes the responding LSR aware of targeted application, the | |||
SAC mechanism may be used to communicate its disinterest in receiving | SAC mechanism may be used to communicate its disinterest in receiving | |||
state information from the peer for a particular negotiated | state information from the peer for a particular negotiated | |||
application, creating asymmetric advertisements. | application, creating asymmetric advertisements. | |||
Thus, the TAC mechanism enables two LDP peers to symmetrically | Thus, the TAC mechanism enables two LDP peers to symmetrically | |||
advertise state information for negotiated targeted applications. | advertise state information for negotiated targeted applications. | |||
Further, the SAC mechanism enables both of them to asymmetrically | Further, the SAC mechanism enables both of them to asymmetrically | |||
disable receipt of state information for some of the already | disable receipt of state information for some of the already | |||
negotiated targeted applications. Collectively, both TAC and SAC | negotiated targeted applications. Collectively, both TAC and SAC | |||
mechanisms can be used to control the FEC-label bindings that are | mechanisms can be used to control the FEC-label bindings that are | |||
advertised over the tLDP session. For instance, suppose the | advertised over the tLDP session. For instance, suppose the | |||
initiating LSR establishes a tLDP session to the responding LSR for | initiating LSR establishes a tLDP session to the responding LSR for | |||
Remote LFA and FEC 129 PW targeted applications with TAC. So each LSR | Remote LFA and FEC 129 PW targeted applications with TAC. So each | |||
advertises the corresponding FEC-Label bindings. Further, suppose | LSR advertises the corresponding FEC-Label bindings. Further, | |||
the initiating LSR is not the PQ node for responding LSRs Remote LFA | suppose the initiating LSR is not the PQ node for responding LSRs | |||
IGP calculations. In such a case, the responding LSR may use the SAC | Remote LFA IGP calculations. In such a case, the responding LSR may | |||
mechanism to convey its disinterest in receiving state information | use the SAC mechanism to convey its disinterest in receiving state | |||
for Remote LFA targeted LDP application. | information for Remote LFA targeted LDP application. | |||
For a given tLDP session, the TAC mechanism can be used without the | For a given tLDP session, the TAC mechanism can be used without the | |||
SAC mechanism, and the SAC mechanism can be used without the TAC | SAC mechanism, and the SAC mechanism can be used without the TAC | |||
mechanism. It is useful to discuss the behavior when TAC and SAC | mechanism. It is useful to discuss the behavior when TAC and SAC | |||
mechanisms are used on the same tLDP session. The TAC mechanism MUST | mechanisms are used on the same tLDP session. The TAC mechanism MUST | |||
take precedence over the SAC mechanism with respect to enabling | take precedence over the SAC mechanism with respect to enabling | |||
applications for which state information will be advertised. For a | applications for which state information will be advertised. For a | |||
tLDP session using the TAC mechanism, the LDP peers MUST NOT | tLDP session using the TAC mechanism, the LDP peers MUST NOT | |||
advertise state information for an application that has not been | advertise state information for an application that has not been | |||
negotiated in the most recent TAE list (referred to as an un- | negotiated in the most recent TAE list (referred to as an un- | |||
negotiated application). This is true even if one of the peers | negotiated application). This is true even if one of the peers | |||
announces its interest in receiving state information that | announces its interest in receiving state information that | |||
corresponds to the un-negotiated application by sending a SAC TLV. | corresponds to the un-negotiated application by sending a SAC TLV. | |||
In other words, when TAC is being used, SAC cannot and should not | In other words, when TAC is being used, SAC cannot and should not | |||
enable state information advertisement for applications that have not | enable state information advertisement for applications that have not | |||
been enabled by TAC. | been enabled by TAC. | |||
On the other hand, the SAC mechanism MUST take precedence over the | On the other hand, the SAC mechanism MUST take precedence over the | |||
TAC mechanism with respect to disabling state information | TAC mechanism with respect to disabling state information | |||
advertisements. If an LDP speaker has announced its disinterest in | advertisements. If an LDP speaker has announced its disinterest in | |||
receiving state information for a given application to a given peer | receiving state information for a given application to a given peer | |||
using the SAC mechanism, its peer MUST NOT send state information for | using the SAC mechanism, its peer MUST NOT send state information for | |||
that application, even if the two peers have negotiated that the | that application, even if the two peers have negotiated that the | |||
corresponding application via the TAC mechanism. | corresponding application via the TAC mechanism. | |||
For the purposes of determining the correspondence between targeted | For the purposes of determining the correspondence between targeted | |||
applications defined in this document and application state as | applications defined in this document and application state as | |||
defined in [RFC7473] an LSR MUST use the following mappings: | defined in [RFC7473] an LSR MUST use the following mappings: | |||
LDPv4 Tunneling - IPv4 Prefix-LSPs | LDPv4 Tunneling - IPv4 Prefix-LSPs | |||
skipping to change at page 12, line 43 | skipping to change at page 12, line 8 | |||
LDP FEC 128 PW - FEC128 P2P-PW | LDP FEC 128 PW - FEC128 P2P-PW | |||
LDP FEC 129 PW - FEC129 P2P-PW | LDP FEC 129 PW - FEC129 P2P-PW | |||
An LSR MUST map Targeted Application to LDP capability as follows: | An LSR MUST map Targeted Application to LDP capability as follows: | |||
mLDP Tunneling - P2MP Capability, MP2MP Capability | mLDP Tunneling - P2MP Capability, MP2MP Capability | |||
and HSMP LSP Capability TLV | and HSMP LSP Capability TLV | |||
mLDP node protection - P2MP Capability, MP2MP Capability | mLDP node protection - P2MP Capability, MP2MP Capability | |||
and HSMP LSP Capability TLV | and HSMP LSP Capability TLV | |||
5. Use cases | 5. Use cases | |||
5.1 Remote LFA Automatic Targeted session | 5.1. Remote LFA Automatic Targeted session | |||
The LSR determines that it needs to form an automatic tLDP session to | The LSR determines that it needs to form an automatic tLDP session to | |||
remote LSR based on IGP calculation as described in [RFC7490] or some | remote LSR based on IGP calculation as described in [RFC7490] or some | |||
other mechanism, which is outside the scope of this document. The LSR | other mechanism, which is outside the scope of this document. The | |||
forms the tLDP adjacency and constructs an Initialization message | LSR forms the tLDP adjacency and constructs an Initialization message | |||
with TAC TLV with TAE as Remote LFA during session establishment. The | with TAC TLV with TAE as Remote LFA during session establishment. | |||
receiver LSR processes the LDP Initialization message and verifies | The receiver LSR processes the LDP Initialization message and | |||
whether it is configured to accept a Remote LFA tLDP session. If it | verifies whether it is configured to accept a Remote LFA tLDP | |||
is, it may further verify that establishing such a session does not | session. If it is, it may further verify that establishing such a | |||
exceed the configured limit for Remote LFA sessions. If all these | session does not exceed the configured limit for Remote LFA sessions. | |||
conditions are met, the receiver LSR may respond back with an | If all these conditions are met, the receiver LSR may respond back | |||
Initialization message with TAC corresponding to Remote LFA, and | with an Initialization message with TAC corresponding to Remote LFA, | |||
subsequently the session may be established. | and subsequently the session may be established. | |||
After the session has been established with TAC capability, the | After the session has been established with TAC capability, the | |||
sender and receiver LSR distribute IPv4 or IPv6 FEC label bindings | sender and receiver LSR distribute IPv4 or IPv6 FEC label bindings | |||
over the session. Further, the receiver LSR may determine that it | over the session. Further, the receiver LSR may determine that it | |||
does not need these FEC label bindings. So it may disable the receipt | does not need these FEC label bindings. So it may disable the | |||
of these FEC label bindings by mapping targeted application element | receipt of these FEC label bindings by mapping targeted application | |||
to state control capability as described in section 4. | element to state control capability as described in section 4. | |||
5.2 FEC 129 Auto Discovery Targeted session | 5.2. FEC 129 Auto Discovery Targeted session | |||
BGP auto discovery may determine whether the LSR needs to initiate an | BGP auto discovery may determine whether the LSR needs to initiate an | |||
auto-discovery tLDP session with a border LSR. Multiple LSRs may try | auto-discovery tLDP session with a border LSR. Multiple LSRs may try | |||
to form an auto discovered tLDP session with a border LSR. So, a | to form an auto discovered tLDP session with a border LSR. So, a | |||
service provider may want to limit the number of auto discovered tLDP | service provider may want to limit the number of auto discovered tLDP | |||
sessions a border LSR can accept. As described in Section 2, LDP may | sessions a border LSR can accept. As described in Section 2, LDP may | |||
convey targeted applications with TAC TLV to border LSR. A border LSR | convey targeted applications with TAC TLV to border LSR. A border | |||
may establish or reject the tLDP session based on local | LSR may establish or reject the tLDP session based on local | |||
administrative policy. Also, as the receiver LSR becomes aware of | administrative policy. Also, as the receiver LSR becomes aware of | |||
targeted applications, it can also employ an administrative policy | targeted applications, it can also employ an administrative policy | |||
for security. For instance, it can employ a policy to accept all | for security. For instance, it can employ a policy to accept all | |||
auto-discovered session from source-list. | auto-discovered session from source-list. | |||
Moreover, the sender and receiver LSR must exchange FEC 129 label | Moreover, the sender and receiver LSR must exchange FEC 129 label | |||
bindings only over the tLDP session. | bindings only over the tLDP session. | |||
5.3 LDP over RSVP and Remote LFA targeted session | 5.3. LDP over RSVP and Remote LFA targeted session | |||
A LSR may want to establish a tLDP session to a remote LSR for LDP | A LSR may want to establish a tLDP session to a remote LSR for LDP | |||
over RSVP tunneling and Remote LFA applications. The sender LSR may | over RSVP tunneling and Remote LFA applications. The sender LSR may | |||
add both these applications as a unique Targeted Application Element | add both these applications as a unique Targeted Application Element | |||
in the Targeted Application Capability data of a TAC TLV. The | in the Targeted Application Capability data of a TAC TLV. The | |||
receiver LSR may have reached a configured limit for accepting Remote | receiver LSR may have reached a configured limit for accepting Remote | |||
LFA automatic tLDP sessions, but it may have been configured to | LFA automatic tLDP sessions, but it may have been configured to | |||
accept LDP over RSVP tunneling. In such a case, the tLDP session is | accept LDP over RSVP tunneling. In such a case, the tLDP session is | |||
formed for both LDP over RSVP and Remote LFA applications as both | formed for both LDP over RSVP and Remote LFA applications as both | |||
need same FECs - IPv4 or IPv6 or both. | need same FECs - IPv4 or IPv6 or both. | |||
5.4 mLDP node protection targeted session | 5.4. mLDP node protection targeted session | |||
A merge point LSR may determine that it needs to form automatic tLDP | A merge point LSR may determine that it needs to form automatic tLDP | |||
session to the upstream point of local repair (PLR) LSR for MP2P and | session to the upstream point of local repair (PLR) LSR for MP2P and | |||
MP2MP LSP [RFC6388] node protection as described in the [RFC7715]. | MP2MP LSP [RFC6388] node protection as described in the [RFC7715]. | |||
The MPT LSR may add a new targeted LDP application - mLDP protection | The MPT LSR may add a new targeted LDP application - mLDP protection | |||
- as a unique TAE in the Targeted Application Capability Data of a | - as a unique TAE in the Targeted Application Capability Data of a | |||
TAC TLV and send it in the Initialization message to the PLR. If the | TAC TLV and send it in the Initialization message to the PLR. If the | |||
PLR is configured for mLDP node protection and establishing this | PLR is configured for mLDP node protection and establishing this | |||
session does not exceed the limit of either mLDP node protection | session does not exceed the limit of either mLDP node protection | |||
sessions or automatic tLDP sessions, the PLR may decide to accept | sessions or automatic tLDP sessions, the PLR may decide to accept | |||
this session. Also, the PLR may respond back with the initialization | this session. Also, the PLR may respond back with the initialization | |||
message with a TAC TLV that has one of the TAEs as - mLDP protection, | message with a TAC TLV that has one of the TAEs as - mLDP protection, | |||
and the session proceeds to establishment as per [RFC5036]. | and the session proceeds to establishment as per [RFC5036]. | |||
6. Security Considerations | 6. Security Considerations | |||
The Capability procedure described in this document does not | The Capability procedure described in this document does not | |||
introduce any change to LDP Security Considerations section described | introduce any change to LDP Security Considerations section described | |||
in [RFC5036]. | in [RFC5036]. | |||
As described in [RFC5036], DoS attacks via Extended Hellos, which are | As described in [RFC5036], DoS attacks via Extended Hellos, which are | |||
required to establish a tLDP session, can be addressed by filtering | required to establish a tLDP session, can be addressed by filtering | |||
Extended Hellos using access lists that define addresses with which | Extended Hellos using access lists that define addresses with which | |||
Extended Discovery is permitted. Further, as described in section | Extended Discovery is permitted. Further, as described in section | |||
5.2 of this document, a LSR can employ a policy to accept all auto- | 5.2 of this document, a LSR can employ a policy to accept all auto- | |||
discovered Extended Hellos from the configured source addresses | discovered Extended Hellos from the configured source addresses list. | |||
list. | ||||
Also for the two LSRs supporting TAC, the tLDP session is only | Also for the two LSRs supporting TAC, the tLDP session is only | |||
established after successful negotiation of the TAC. The initiating | established after successful negotiation of the TAC. The initiating | |||
and receiving LSR MUST only advertise TA-Ids that they support. In | and receiving LSR MUST only advertise TA-Ids that they support. In | |||
other words, what they are configured for over the tLDP session. | other words, what they are configured for over the tLDP session. | |||
7. IANA Considerations | 7. IANA Considerations | |||
This document requires the assignment of a new code point for a | This document requires the assignment of a new code point for a | |||
Capability Parameter TLVs from the IANA managed LDP registry "TLV | Capability Parameter TLVs from the IANA managed LDP registry "TLV | |||
Type Name Space", corresponding to the advertisement of the Targeted | Type Name Space", corresponding to the advertisement of the Targeted | |||
Applications capability. IANA is requested to assign the lowest | Applications capability. IANA is requested to assign the lowest | |||
available value after 0x050B. | available value after 0x050B. | |||
Value Description Reference | Value Description Reference | |||
----- -------------------------------- --------- | ----- -------------------------------- --------- | |||
TBD1 Targeted Applications capability [this document] | TBD1 Targeted Applications capability [this document] | |||
This document requires the assignment of a new code point for a | This document requires the assignment of a new code point for a | |||
status code from the IANA managed registry "STATUS CODE NAME SPACE" | status code from the IANA managed registry "STATUS CODE NAME SPACE" | |||
on the Label Distribution Protocol (LDP) Parameters page, | on the Label Distribution Protocol (LDP) Parameters page, | |||
corresponding to the notification of session Rejected/Targeted | corresponding to the notification of session Rejected/Targeted | |||
Application Capability Mis-Match. IANA is requested to assign the | Application Capability Mis-Match. IANA is requested to assign the | |||
lowest available value after 0x0000004B. | lowest available value after 0x0000004B. | |||
Value E Description Reference | Value E Description Reference | |||
----- - -------------------------------- --------- | ----- - -------------------------------- --------- | |||
TBD2 1 Session Rejected/Targeted | TBD2 1 Session Rejected/Targeted | |||
Application Capability Mis-Match [this document] | Application Capability Mis-Match [this document] | |||
This document also creates a new name space 'the LDP Targeted | This document also creates a new name space 'the LDP Targeted | |||
Application Identifier' on the Label Distribution Protocol (LDP) | Application Identifier' on the Label Distribution Protocol (LDP) | |||
Parameters page, that is to be managed by IANA. The range is 0x0001- | Parameters page, that is to be managed by IANA. The range is 0x0001- | |||
0xFFFE, with the following values requested in this document. | 0xFFFE, with the following values requested in this document. | |||
Value Description Reference | Value Description Reference | |||
-------- ------------------------- --------------- | -------- ------------------------- --------------- | |||
0x0000 Reserved [this document] | 0x0000 Reserved [this document] | |||
0x0001 LDPv4 Tunneling [this document] | 0x0001 LDPv4 Tunneling [this document] | |||
0x0002 LDPv6 Tunneling [this document] | 0x0002 LDPv6 Tunneling [this document] | |||
0x0003 mLDP Tunneling [this document] | 0x0003 mLDP Tunneling [this document] | |||
0x0004 LDPv4 Remote LFA [this document] | 0x0004 LDPv4 Remote LFA [this document] | |||
0x0005 LDPv6 Remote LFA [this document] | 0x0005 LDPv6 Remote LFA [this document] | |||
skipping to change at page 15, line 41 | skipping to change at page 15, line 29 | |||
0x000C LDPv4 Intra-area FECs [this document] | 0x000C LDPv4 Intra-area FECs [this document] | |||
0x000D LDPv6 Intra-area FECs [this document] | 0x000D LDPv6 Intra-area FECs [this document] | |||
0x0001 - 0x1FFF Available for assignment | 0x0001 - 0x1FFF Available for assignment | |||
by IETF Review | by IETF Review | |||
0x2000 - 0F7FF Available for assignment | 0x2000 - 0F7FF Available for assignment | |||
as first come first served | as first come first served | |||
0xF800 - 0xFBFF Available for private use | 0xF800 - 0xFBFF Available for private use | |||
0xFC00 - 0xFFFE Available for experimental use | 0xFC00 - 0xFFFE Available for experimental use | |||
0xFFFF Reserved [this document] | 0xFFFF Reserved [this document] | |||
8. Acknowledgments | 8. Contributing Authors | |||
The authors wish to thank Nischal Sheth, Hassan Hosseini, Kishore | ||||
Tiruveedhul, Loa Andersson, Eric Rosen, Yakov Rekhter, Thomas | ||||
Beckhaus, Tarek Saad, Lizhong Jin and Bruno Decraene for doing the | ||||
detailed review. Thanks to Manish Gupta and Martin Ehlers for their | ||||
input to this work and many helpful suggestions. | ||||
9. Contributing Authors | ||||
Chris Bowers | Chris Bowers | |||
Juniper Networks | Juniper Networks | |||
1133 Innovation Way | 1133 Innovation Way | |||
Sunnyvale, CA 94089 | Sunnyvale, CA 94089 | |||
USA | USA | |||
EMail: cbowers@juniper.net | EMail: cbowers@juniper.net | |||
Zhenbin Li | Zhenbin Li | |||
Huawei | Huawei | |||
Bld No.156 Beiqing Rd | Bld No.156 Beiqing Rd | |||
Beijing 100095 | Beijing 100095 | |||
China | China | |||
Email: lizhenbin@huawei.com | Email: lizhenbin@huawei.com | |||
9. Acknowledgments | ||||
The authors wish to thank Nischal Sheth, Hassan Hosseini, Kishore | ||||
Tiruveedhul, Loa Andersson, Eric Rosen, Yakov Rekhter, Thomas | ||||
Beckhaus, Tarek Saad, Lizhong Jin and Bruno Decraene for doing the | ||||
detailed review. Thanks to Manish Gupta and Martin Ehlers for their | ||||
input to this work and many helpful suggestions. | ||||
10. References | 10. References | |||
10.1 Normative References | 10.1. Normative References | |||
[RFC5036] Andersson, L., Ed., Minei, I., Ed., and B. Thomas, Ed., | [RFC5036] Andersson, L., Ed., Minei, I., Ed., and B. Thomas, Ed., | |||
"LDP Specification", RFC 5036, October 2007, | "LDP Specification", RFC 5036, DOI 10.17487/RFC5036, | |||
<http://www.rfc-editor.org/info/rfc5036>. | October 2007, <http://www.rfc-editor.org/info/rfc5036>. | |||
[RFC5561] Thomas, B., Raza, K., Aggarwal, S., Aggarwal, R., and JL. | [RFC5561] Thomas, B., Raza, K., Aggarwal, S., Aggarwal, R., and JL. | |||
Le Roux, "LDP Capabilities", RFC 5561, July 2009, | Le Roux, "LDP Capabilities", RFC 5561, | |||
DOI 10.17487/RFC5561, July 2009, | ||||
<http://www.rfc-editor.org/info/rfc5561>. | <http://www.rfc-editor.org/info/rfc5561>. | |||
[RFC7473] Kamran Raza, Sami Boutros, "Controlling State | [RFC7473] Kamran Raza, Sami Boutros, "Controlling State | |||
Advertisements of Non-negotiated LDP Applications", RFC | Advertisements of Non-negotiated LDP Applications", | |||
7473, March 2015, <http://www.rfc- | RFC 7473, March 2015, | |||
editor.org/info/rfc7473>. | <http://www.rfc-editor.org/info/rfc7473>. | |||
[RFC7715] IJ. Wijnands, E. Rosen, K. Raza, J. Tantsura, A. Atlas, Q. | [RFC7715] Wijnands, IJ., Ed., Raza, K., Atlas, A., Tantsura, J., and | |||
Zhao, "mLDP Node Protection", RFC 7715, January 2016, | Q. Zhao, "Multipoint LDP (mLDP) Node Protection", | |||
RFC 7715, DOI 10.17487/RFC7715, January 2016, | ||||
<http://www.rfc-editor.org/info/rfc7715>. | <http://www.rfc-editor.org/info/rfc7715>. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, March 1997, | Requirement Levels", BCP 14, RFC 2119, | |||
DOI 10.17487/RFC2119, March 1997, | ||||
<http://www.rfc-editor.org/info/rfc2119>. | <http://www.rfc-editor.org/info/rfc2119>. | |||
[RFC8174] B. Leiba, "Ambiguity of Uppercase vs Lowercase in RFC 2119 | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
Key Words", BCP 14, RFC8174, May 2017, <http://www.rfc- | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
editor.org/info/rfc8174>. | May 2017, <http://www.rfc-editor.org/info/rfc8174>. | |||
10.2 Informative References | 10.2. Informative References | |||
[RFC7490] S. Bryant, C. Filsfils, S. Previdi, M. Shand, N. So, | [RFC7490] Bryant, S., Filsfils, C., Previdi, S., Shand, M., and N. | |||
"Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)", | So, "Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)", | |||
April 2015. | April 2015, <http://www.rfc-editor.org/info/rfc7490>. | |||
[RFC6074] E. Rosen, B. Davie, V. Radoaca, and W. Luo, "Provisioning, | [RFC6074] Rosen, E., Davie, B., Radoaca, V., and W. Luo, | |||
Auto-Discovery, and Signaling in Layer 2 Virtual Private | "Provisioning, Auto-Discovery, and Signaling in Layer 2 | |||
Networks (L2VPNs)", January 2011. | Virtual Private Networks (L2VPNs)", January 2011. | |||
[RFC6388] IJ. Wijnands, I. Minei, K. Kompella, B. Thomas, "Label | [RFC6388] Wijnands, IJ., Minei, I., Kompella, K., and B. Thomas, | |||
Distribution Protocol Extensions for Point-to-Multipoint | "Label Distribution Protocol Extensions for Point-to- | |||
and Multipoint-to-Multipoint Label Switched Paths", | Multipoint and Multipoint-to-Multipoint Label Switched | |||
November 2011. | Paths", November 2011. | |||
Authors' Addresses | Authors' Addresses | |||
Santosh Esale | Santosh Esale | |||
Juniper Networks | Juniper Networks | |||
1133 Innovation Way | 1133 Innovation Way | |||
Sunnyvale, CA 94089 | Sunnyvale, CA 94089 | |||
USA | USA | |||
EMail: sesale@juniper.net | ||||
Raveendra Torvi | Email: sesale@juniper.net | |||
Juniper Networks | ||||
10 Technology Park Drive | ||||
Westford, MA 01886 | ||||
USA | ||||
EMail: rtorvi@juniper.net | ||||
Luay Jalil | Raveendra Torvi | |||
Verizon | Juniper Networks | |||
1201 E Arapaho Rd | 10 Technology Park Drive | |||
Richardson, TX 75081 | Westford, MA 01886 | |||
USA | USA | |||
Email: luay.jalil@verizon.com | ||||
Uma Chunduri | Email: rtorvi@juniper.net | |||
Huawei | ||||
2330 Central Expy | ||||
Santa Clara, CA 95050 | ||||
USA | ||||
Email: uma.chunduri@huawei.com | ||||
Kamran Raza | Luay Jalil | |||
Cisco Systems, Inc. | Verizon | |||
2000 Innovation Drive | 1201 E Arapaho Rd | |||
Ottawa, ON K2K-3E8 | Richardson, TX 75081 | |||
Canada | USA | |||
E-mail: skraza@cisco.com | ||||
Email: luay.jalil@verizon.com | ||||
Uma Chunduri | ||||
Huawei | ||||
2330 Central Expy | ||||
Santa Clara, CA 95050 | ||||
USA | ||||
Email: uma.chunduri@huawei.com | ||||
Kamran Raza | ||||
Cisco Systems, Inc. | ||||
2000 Innovation Drive | ||||
Ottawa, ON K2K-3E8 | ||||
Canada | ||||
Email: skraza@cisco.com | ||||
End of changes. 123 change blocks. | ||||
258 lines changed or deleted | 249 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |