<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cao-opsawg-ipfix-sav-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SAV IPFIX">Export of Source Address Validation (SAV) Information in IPFIX</title>
    <seriesInfo name="Internet-Draft" value="draft-cao-opsawg-ipfix-sav-00"/>
    <author initials="Q." surname="Cao" fullname="Qian Cao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>caoqian@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="B." surname="Claise" fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author initials="T." surname="Zhou" fullname="Tianran Zhou">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="23"/>
    <area>Operations and Management</area>
    <workgroup>opsawg</workgroup>
    <keyword>IPFIX, Source Address Validation (SAV)</keyword>
    <abstract>
      <?line 66?>

<t>This document specifies the IP Flow Information Export Information Elements to export the context and outcome of Source Address Validation enforcement data. These SAV-specific Information Elements provide detailed insight into why packets are identified as spoofed by capturing the specific SAV rules that triggered validation decisions. This operational visibility is essential for network operators to verify SAV effectiveness, audit rule correctness, and analyze source address spoofing events.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) serves as a fundamental defense mechanism against IP source address spoofing. Despite its critical role in network security, current SAV implementations lack operational visibility, making it difficult to answer essential operational questions:</t>
      <ul spacing="normal">
        <li>
          <t>How many packets are identified as spoofed and dropped by SAV?</t>
        </li>
        <li>
          <t>Which interfaces receive spoofed packets and which source prefixes are targeted?</t>
        </li>
        <li>
          <t>Which specific SAV rules trigger the enforcement actions?</t>
        </li>
        <li>
          <t>Are SAV rules functioning as intended or potentially misconfigured?</t>
        </li>
      </ul>
      <t>This document introduces a set of SAV-specific IP Flow Information Export (IPFIX) Information Elements (IEs) that enable detailed reporting of Source Address Validation enforcement actions. These elements align with the SAV concepts and operational models defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, and provide traffic observations that can be operationally correlated with the SAV configuration and state information available via the YANG data model <xref target="I-D.li-savnet-sav-yang"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This document makes use of the terms defined in <xref target="RFC7011"/>, and <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <t>The following terms are used as defined in <xref target="RFC7011"/>:</t>
      <ul spacing="normal">
        <li>
          <t>IPFIX</t>
        </li>
        <li>
          <t>IPFIX Information Elements</t>
        </li>
        <li>
          <t>Template</t>
        </li>
        <li>
          <t>Template Record</t>
        </li>
        <li>
          <t>Data Record</t>
        </li>
        <li>
          <t>Data Set</t>
        </li>
        <li>
          <t>Exporter</t>
        </li>
        <li>
          <t>Collector</t>
        </li>
      </ul>
      <t>The following terms are used as defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/></t>
      <ul spacing="normal">
        <li>
          <t>SAV rule</t>
        </li>
        <li>
          <t>Validation mode</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sav-overview">
      <name>SAV Overview and IPFIX Export Requirements</name>
      <t>This section outlines the operational requirements for SAV telemetry export using IPFIX, based on the generalized SAV architectural framework defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <t>The SAV framework establishes four canonical validation modes that model validation policies:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Interface-based prefix allowlist (Mode 1):</strong> Validates that a source prefix is explicitly permitted on the incoming interface.</t>
        </li>
        <li>
          <t><strong>Interface-based prefix blocklist (Mode 2):</strong> Validates that a source prefix is not explicitly blocked on the incoming interface.</t>
        </li>
        <li>
          <t><strong>Prefix-based interface allowlist (Mode 3):</strong> Validates that a packet is received on an interface explicitly permitted for its source prefix.</t>
        </li>
        <li>
          <t><strong>Prefix-based interface blocklist (Mode 4):</strong> Validates that a packet is not received on an interface explicitly blocked for its source prefix.</t>
        </li>
      </ul>
      <t>These modes can be applied independently or in combination on a router, following a defined validation procedure (Section 2 of <xref target="I-D.ietf-savnet-general-sav-capabilities"/>). Furthermore, when identifying a packet as spoofed, a range of traffic handling policies (e.g. discard, rate-limit, redirect) can be applied.</t>
      <t>However, the generalized SAV model requires corresponding operational visibility capabilities. Without integrated telemetry, operators face significant challenges in:</t>
      <ul spacing="normal">
        <li>
          <t>Operational Verification: Confirming SAV is actively and correctly enforcing policies</t>
        </li>
        <li>
          <t>Root-Cause Analysis: Determining why specific packets were deemed invalid</t>
        </li>
        <li>
          <t>Threat Intelligence: Quantifying spoofing attempts and analyzing attack patterns</t>
        </li>
      </ul>
      <t>To address these limitations, IPFIX <xref target="RFC7011"/> and <xref target="RFC7012"/> provides a vendor-neutral protocol for SAV telemetry. The exported data must provide insight into:</t>
      <ul spacing="normal">
        <li>
          <t>The validation outcome and specific reason for the decision</t>
        </li>
        <li>
          <t>The identity and type of SAV rule or rule set that influenced the decision</t>
        </li>
        <li>
          <t>The configured rule content that was evaluated during validation</t>
        </li>
        <li>
          <t>The enforcement action applied to spoofed packets</t>
        </li>
      </ul>
      <t>The following section defines the IPFIX IEs that meet these requirements.</t>
    </section>
    <section anchor="sec-IEs">
      <name>IPFIX SAV Information Elements</name>
      <t>This section defines the IEs used for SAV telemetry. These IEs have been specified in accordance with the guidelines in <xref target="RFC7013"/>.</t>
      <section anchor="design-rationale">
        <name>Design Rationale</name>
        <t>The SAV IPFIX IEs are designed to provide detailed visibility into SAV enforcement actions, enabling network operators and automation systems to monitor and troubleshoot SAV operations effectively. The design follows these principles:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Scope</strong>. The SAV-specific IEs are used to report the outcome and context of SAV processing for data plane traffic observations. Interface, device or network-level SAV configuration is out of scope for these IEs and is covered by the SAVNET YANG data model.</t>
          </li>
          <li>
            <t><strong>Conceptual Alignment</strong>. The elements align with the validation modes and rule types defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, ensuring consistency with the architectural SAV concepts.</t>
          </li>
          <li>
            <t><strong>Semantic Correlation</strong>. The IPFIX encoding preserves the semantic relationships defined in <xref target="I-D.li-savnet-sav-yang"/>, which enables correlation between IPFIX Data Record in data-plane and YANG configuration/state data in control-plane comprehensive analysis.</t>
          </li>
          <li>
            <t><strong>Structured Encoding</strong>. The <tt>savMatchedContentList</tt> is encoded as a <tt>subTemplateList</tt> to represent the multi-field tuples of SAV rules. The structure of <tt>subTemplateList</tt> was chosen because it can encapsulate heterogeneous fields (e.g., prefix, length, interface) within a single list element. The list semantics (<tt>allOf</tt>, <tt>exactlyOneOf</tt>) directly encode the SAV validation logic (e.g., matching all rules in an allowlist vs. exactly one in a blocklist) into the data structure.</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savRuleType">
        <name>savRuleType (unsigned8)</name>
        <t>The <tt>savRuleType</tt> element classifies the rule as either an allowlist or a blocklist. The values correspond to the check type concepts in the SAV architecture:</t>
        <ul spacing="normal">
          <li>
            <t>A value of <tt>0</tt> (allowlist) indicates the packet was validated against an allowlist.</t>
          </li>
          <li>
            <t>A value of <tt>1</tt> (blocklist) indicates the packet was validated against a blocklist.</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savTargetType">
        <name>savTargetType  (unsigned8)</name>
        <t>The <tt>savTargetType</tt> element specifies the lookup key used by the SAV rule. It may be used in conjunction with <tt>savRuleType</tt> to fully define the validation mode applied.</t>
        <ul spacing="normal">
          <li>
            <t>A value of <tt>0</tt> (interface-based) indicates the rule is indexed by an interface (e.g., "on interface X, what prefixes are allowed/blocked?").</t>
          </li>
          <li>
            <t>A value of <tt>1</tt> (prefix-based) indicates the rule is indexed by a source prefix (e.g., "for prefix Y, which interfaces are allowed/blocked?").</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savMatchedContentList">
        <name>savMatchedContentList (subTemplateList)</name>
        <t>The <tt>savMatchedContentList</tt> element carries the content of the rules that were relevant to the validation decision, encoded as a <tt>subTemplateList</tt> according to <xref target="RFC6313"/>. Each element in the list represents a complete SAV rule tuple. The content and semantics of the list are defined by the <tt>savRuleType</tt>:</t>
        <ul spacing="normal">
          <li>
            <t><strong>For Allowlist non-matches (<tt>savRuleType=0</tt>)</strong>: The <tt>savMatchedContentList</tt> consists of the set of all rule tuples from the consulted SAV allowlist at the time of the packet's processing. The subTemplateList semantic SHOULD be <tt>allOf</tt> (0x03), indicating that the packet was validated against all these rules and did not match any of them.</t>
          </li>
          <li>
            <t><strong>For Blocklist matches (<tt>savRuleType=1</tt>)</strong>: The <tt>savMatchedContentList</tt> contains the first rule tuple that matched the packet from the SAV blocklist. The subTemplateList semantic SHOULD be <tt>exactlyOneOf</tt> (0x01), indicating that the packet matched this specific rule.</t>
          </li>
        </ul>
        <t><strong>Semantic Interpretation of Standard Information Elements:</strong>
When standard IPFIX IEs (such as <tt>ingressInterface</tt>, <tt>sourceIPv4Prefix</tt>,<tt>sourceIPv4PrefixLength</tt> or their IPv6 equivalents) are used within the subTemplateList of <tt>savMatchedContentList</tt>, they represent values from the SAV rule configuration, rather than from the actual packet being validated. This contextual distinction is critical for correct interpretation:</t>
        <ul spacing="normal">
          <li>
            <t><strong>In the parent Data Record</strong>: These IEs describe attributes of the actual spoofed packets that were validated by SAV.</t>
          </li>
          <li>
            <t><strong>Within <tt>savMatchedContentList</tt></strong>: These same IEs describe the configured SAV rule parameters that were evaluated during validation.</t>
          </li>
        </ul>
        <t>This approach ensures clear semantic distinction by reusing existing IEs, without requiring definition of new elements for SAV rule parameters.</t>
      </section>
      <section anchor="subsec-IEs-savPolicyAction">
        <name>savPolicyAction (unsigned8)</name>
        <t>The <tt>savPolicyAction</tt> indicates the action applied to packets identified as spoofed. The action taken is a matter of local policy. This element reports the outcome.</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>The SAV-specific IPFIX IEs defined in this document enable network operators to answer critical operational questions that are currently unaddressable without telemetry for SAV:</t>
      <t><strong>SAV Effectiveness Monitoring:</strong> Use <tt>savRuleType</tt> (TBD1), <tt>savTargetType</tt> (TBD2), <tt>savPolicyAction</tt> (TBD4)  and standard IPFIX counters, to quantify spoofing attempt volumes, analyze their distribution across different validation modes, and identify applied enforcement actions (discard, rate-limit, redirect) to spoofed traffic.</t>
      <t><strong>Rule-Level Attribution and Troubleshooting:</strong> Use<tt>savMatchedContentList</tt> (TBD3)  to determine the specific SAV rule configuration that triggered enforcement decisions , including the exact rule parameters (interfaces, prefixes) evaluated during validation, whether for allowlist failures or blocklist matches.</t>
      <t><strong>Forensic Analysis and Compliance:</strong> Correlate SAV Data Records with packet-level details using <tt>selectionSequenceId</tt> for incident investigation and gather evidence to support external trust initiatives and regulatory compliance reporting.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>While this document defines new IPFIX IEs using standard IPFIX mechanisms, implementors should consider:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Exporter Implementation:</strong> Exporters MUST properly encode the <tt>subTemplateList</tt> structure for <tt>savMatchedContentList</tt> and ensure semantic consistency between <tt>savRuleType</tt> and list contents. Exporters MUST also define the sub-templates (e.g., 901-904) used in <tt>savMatchedContentList</tt> prior to exporting Data Records that use them.</t>
        </li>
        <li>
          <t><strong>Collector Processing:</strong> Collectors MUST be capable of parsing <tt>subTemplateList</tt> structure and understanding the context-dependent semantics of standard IEs within <tt>savMatchedContentList</tt>. Collectors MUST associate the sub-templates with the main template for correct interpretation.</t>
        </li>
      </ul>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The mappings between the SAV YANG data model and IPFIX IEs are considered based on the common foundation of the general SAV capabilities document <xref target="I-D.ietf-savnet-general-sav-capabilities"/>. The operational correlation is demonstrated in Table 1, which defines the values for the designed IEs mapped from the corresponding <xref target="I-D.li-savnet-sav-yang"/> SAV Management YANG Module.</t>
      <artwork><![CDATA[
+---------------------+---------------------------------------+
| YANG Elements       | IPFIX IEs                             |
+---------------------+---------------------------------------+
| sav-check-type      | savRuleType                           |
|   sav:sav-allow-list|     0 (allowlist)                     |
|   sav:sav-block-list|     1 (blocklist)                     |
+---------------------+---------------------------------------+
| sav-mode            | savTargetType                         |
|   sav:sav-im        |     0 (interface-based)               |
|   sav:sav-cm        |     1 (prefix-based)                  |
+---------------------+---------------------------------------+
| SAV Rules attributes| savMatchedContentList                 |
|   source-prefix     |     sourceIPv4Prefix/sourceIPv6Prefix |
|   incoming-interface|     ingressInterface                  |
+---------------------+---------------------------------------+
]]></artwork>
      <t>Table 1: Mappings between SAV YANG Data Model and IPFIX Information Elements</t>
      <t>The <tt>savPolicyAction</tt> element carries real-time SAV decisions applied to
spoofed packets. It does not directly map to YANG configuration node.</t>
      <t>The code points for these IEs are maintained by IANA in the corresponding subregistries of the IPFIX registry. Future additions or changes are managed via Expert Review as described in <xref target="IANA">IANA Considerations</xref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no additional security considerations regarding allocation of these new IPFIX IEs compared to <xref target="RFC7012"/>.
Other security considerations described in <xref target="I-D.ietf-savnet-general-sav-capabilities"/> apply to this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests IANA to create four new IEs under the "IPFIX Information Elements" registry <xref target="RFC7012"/> available at <xref target="IANA-IPFIX"/>.</t>
      <artwork><![CDATA[
+------------+-----------------------+
| Element ID | Name                  |
+------------+-----------------------+
| TBD1       | savRuleType           |
| TBD2       | savTargetType         |
| TBD3       | savMatchedContentList |
| TBD4       | savPolicyAction       |
+------------+-----------------------+
]]></artwork>
      <section anchor="savruletype">
        <name>savRuleType</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD1</t>
          </li>
          <li>
            <t><strong>Name</strong>: savRuleType</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Identifies the validation rule type triggered during SAV enforcement.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savRuleType">savRuleType</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savtargettype">
        <name>savTargetType</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD2</t>
          </li>
          <li>
            <t><strong>Name</strong>: savTargetType</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Specifies the entity type against which validation was performed.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savTargetType">savTargetType</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savmatchedcontentlist">
        <name>savMatchedContentList</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD3</t>
          </li>
          <li>
            <t><strong>Name</strong>: savMatchedContentList</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: subTemplateList</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: list</t>
          </li>
          <li>
            <t><strong>Description</strong>: The content of the SAV rules relevant to the validation decision.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savMatchedContentList">savMatchedContentList</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savpolicyaction">
        <name>savPolicyAction</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD4</t>
          </li>
          <li>
            <t><strong>Name</strong>: savPolicyAction</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Action applied to packets identified as spoofed.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savPolicyAction">savPolicyAction</xref></t>
          </li>
        </ul>
        <t>Additionally, IANA is requested to create new subregistries under the IPFIX IEs registries. The subregistries contain values for the <tt>savRuleType</tt>, <tt>savTargetType</tt> and <tt>savPolicyAction</tt> IEs. The allocation policy is Expert Review <xref target="RFC8126"/>. Experts should consult the SAVNET architecture <xref target="I-D.ietf-savnet-general-sav-capabilities"/> to ensure new values are consistent with SAV validation concepts and operational models.</t>
      </section>
      <section anchor="ipfix-savruletype-tbd1-subregistry">
        <name>IPFIX savRuleType (TBD1) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 2 (Validation Modes)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should ensure that new values are consistent with the SAV architecture concepts defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, particularly the validation modes and rule types (allowlist or blocklist).</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+-----------+--------------------------------------------------+
| Value |   Name    |                  Description                     |
+-------+-----------+--------------------------------------------------+
|   0   | allowlist |  The packet was validated against an allowlist   |
|   1   | blocklist |  The packet was validated against an blocklist   |
+-------+-----------+--------------------------------------------------+
]]></artwork>
      </section>
      <section anchor="ipfix-savtargettype-tbd2-subregistry">
        <name>IPFIX savTargetType (TBD2) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 2 (Validation Modes)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should consult <xref target="I-D.ietf-savnet-general-sav-capabilities"/> to ensure new values align with the defined target types (interface-based or prefix-based).</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+-----------------+----------------------------------------+
| Value |       Name      |              Description               |
+-------+-----------------+----------------------------------------+
|   0   | interface-based |   The rule is indexed by an interface  |
|   1   |   prefix-based  |   The rule is indexed by a prefix      |
+-------+-----------------+----------------------------------------+
]]></artwork>
      </section>
      <section anchor="ipfix-savpolicyaction-tbd4-subregistry">
        <name>IPFIX savPolicyAction (TBD4) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 4 (Traffic Handling Policies)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should ensure that new actions are consistent with the SAV traffic handling policies defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+----------+---------------------------------------------------+
| Value |   Name   |                  Description                      |
+-------+----------+---------------------------------------------------+
|   0   |  permit  |The packet was allowed to proceed (monitoring only)|
|   1   |  discard | Packet was discarded or dropped                   |
|   2   |rate-limit| Traffic was subjected to rate limiting            |
|   3   | redirect | Packet was redirected to alternative destination  |
| 4-255 |unassigned| Reserved for future assignment                    |
+-------+----------+---------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.li-savnet-sav-yang" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-sav-yang-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-sav-yang.xml">
          <front>
            <title>YANG Data Model for Intra-domain and Inter-domain Source Address Validation (SAVNET)</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Tianhao Wu" initials="T." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <date day="9" month="October" year="2025"/>
            <abstract>
              <t>This document describes a YANG data model for Intra-domain and Inter-domain Source Address Validation (SAVNET). The model serves as a base framework for configuring and managing an SAV subsystem, including SAV rule and SAV Tables, and expected to be augmented by other SAV technology models accordingly. Additionally, this document also specifies the model for the SAV Static application.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-sav-yang-07"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7011" target="https://www.rfc-editor.org/info/rfc7011" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7012" target="https://www.rfc-editor.org/info/rfc7012" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7012.xml">
          <front>
            <title>Information Model for IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document defines the data types and management policy for the information model for the IP Flow Information Export (IPFIX) protocol. This information model is maintained as the IANA "IPFIX Information Elements" registry, the initial contents of which were defined by RFC 5102. This information model is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and the Exporting Process. Although this model was developed for the IPFIX protocol, it is defined in an open way that allows it to be easily used in other protocols, interfaces, and applications. This document obsoletes RFC 5102.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7012"/>
          <seriesInfo name="DOI" value="10.17487/RFC7012"/>
        </reference>
        <reference anchor="RFC7013" target="https://www.rfc-editor.org/info/rfc7013" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7013.xml">
          <front>
            <title>Guidelines for Authors and Reviewers of IP Flow Information Export (IPFIX) Information Elements</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document provides guidelines for how to write definitions of new Information Elements for the IP Flow Information Export (IPFIX) protocol. It provides instructions on using the proper conventions for Information Elements to be registered in the IANA IPFIX Information Element registry, and provides guidelines for expert reviewers to evaluate new registrations.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="184"/>
          <seriesInfo name="RFC" value="7013"/>
          <seriesInfo name="DOI" value="10.17487/RFC7013"/>
        </reference>
        <reference anchor="RFC6313" target="https://www.rfc-editor.org/info/rfc6313" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6313.xml">
          <front>
            <title>Export of Structured Data in IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="G. Dhandapani" initials="G." surname="Dhandapani"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <author fullname="S. Yates" initials="S." surname="Yates"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies an extension to the IP Flow Information Export (IPFIX) protocol specification in RFC 5101 and the IPFIX information model specified in RFC 5102 to support hierarchical structured data and lists (sequences) of Information Elements in data records. This extension allows definition of complex data structures such as variable-length lists and specification of hierarchical containment relationships between Templates. Finally, the semantics are provided in order to express the relationship among multiple list elements in a structured data record. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6313"/>
          <seriesInfo name="DOI" value="10.17487/RFC6313"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-12"/>
        </reference>
        <reference anchor="IANA-IPFIX" target="https://www.iana.org/assignments/ipfix/ipfix.xhtml">
          <front>
            <title>IP Flow Information Export (IPFIX) Entities</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 339?>

<section anchor="ipfix-encoding-examples">
      <name>IPFIX Encoding Examples</name>
      <t>This appendix provides encoding examples for the SAV-specific IPFIX IEs defined in this document.</t>
      <section anchor="template-record-and-data-record-with-sub-template-list">
        <name>Template Record and Data Record with Sub-Template List</name>
        <t>This example demonstrates the encoding for two observed SAV enforcement events representing different validation scenarios and address families as shown in Table 2.</t>
        <artwork><![CDATA[
+-----+--------------+---------+---------+-----------+-------------+
|Event|Source Address|Interface|Rule Type|Target Type|Policy Action|
+-----+--------------+---------+---------+-----------+-------------+
|  1  | 192.0.2.100  |  5001   |Allowlist| Interface | Rate-limit  |
|  2  | 2001:db8::1  |  5001   |Blocklist| Prefix    | Discard     |
+-----+--------------+---------+---------+-----------+-------------+
]]></artwork>
        <t>Table 2: Two Observed SAV Validation Events</t>
        <t>The first event represents an IPv4 allowlist non-match event where a packet from source 192.0.2.100 arriving on interface 5001 failed to match any source prefixes configured in the interface-based allowlist.
The second event represents an IPv6 blocklist match event where a packet from source 2001:db8::1 was received on interface 5001, which matched a prefix-based blocklist rule.</t>
        <section anchor="sub-template-definitions">
          <name>Sub-Template Definitions</name>
          <t>The following sub-templates are defined for use within the <tt>savMatchedContentList</tt> element to encode different types of SAV rule mappings based on address family and validation target type. The <tt>savMatchedContentList</tt> element is encoded as a <tt>subTemplateList</tt> according to <xref target="RFC6313"/>.</t>
          <t>The template IDs used in these examples are exemplary and chosen arbitrarily. In actual implementations, exporters MUST assign unique template IDs within the IPFIX session for these sub-templates.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 901: IPv4 Interface-to-Prefix Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is used when <tt>savTargetType=0</tt>(interface-based validation mode) for IPv4 traffic. It contains the mapping from an interface to source IPv4 prefixes as defined in the SAV rule configuration. It can be used for both blocklist and allowlist.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 901       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv4Prefix = 44     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv4PrefixLength = 9  |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 902: IPv6 Interface-to-Prefix Mapping</strong>
This sub-template is the IPv6 equivalent of Sub-Template 901, used for interface-based validation with IPv6 traffic.</t>
            </li>
          </ul>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 902       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv6Prefix = 170    |        Field Length = 16      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv6PrefixLength = 29 |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 903: IPv4 Prefix-to-Interface Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is used when <tt>savTargetType=1</tt>(prefix-based validation mode) for IPv4 traffic. It contains the mapping from a source IPv4 prefixes to interface as defined in the SAV rule configuration. It can be used for both blocklist and allowlist.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 903       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv4Prefix = 44     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv4PrefixLength = 9  |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 904: IPv6 Prefix-to-Interface Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is the IPv6 equivalent of Sub-Template 903, used for prefix-based validation with IPv6 traffic.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 904       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv6Prefix = 170    |        Field Length = 16      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv6PrefixLength = 29 |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="main-template-record">
          <name>Main Template Record</name>
          <t>The main Template Record (ID 400) contains fields for exporting detailed SAV enforcement information including the validation outcome and the specific rule content that triggered the action. The template incorporates the <tt>savMatchedContentList</tt> element as a variable-length <tt>subTemplateList</tt> to carry the relevant SAV rule contents using the appropriate sub-templates defined above.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 28          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Template ID = 400      |        Field Count = 5        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|  observationTimeMicrosec=324|        Field Length = 8       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|      savRuleType = TBD1     |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|     savTargetType = TBD2    |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| savMatchedContentList=TBD3  |      Field Length = 0xFFFF    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   savPolicyAction = TBD4    |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="data-set-example">
          <name>Data Set Example</name>
          <t>The following Data Set contains two Data Records that represent the two SAV validation scenarios in Table 2. The <tt>savMatchedContentList</tt> element for the first record encodes the complete set of allowed prefixes using Sub-Template 901 with the <tt>allOf</tt> semantic (0x03). The allowlist includes three sav rules. The <tt>savMatchedContentList</tt> element for the second record encodes the specific blocked interface using Sub-Template 904 with the <tt>exactlyOneOf</tt> semantic (0x01), indicating the packet matched this particular rule.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 400         |          Length = 88          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              observationTimeMicrosec =                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      0x5D2F0A0000000000                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| savRuleType=0 | savTargetType=0|     255     |   List Length  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     = 33      |semantic=(allOf)|      Template ID = 901       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                ingressInterface[0] = 5001                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              sourceIPv4Prefix[0] = 198.51.100.0               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|sourceIPv4PrfLen[0]=24|         ingressInterface[1] =          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      5001     |         sourceIPv4Prefix[1] =                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  203.0.113.0  | sourceIPv4PrfLen[1]=24|  ingressInterface[2] =|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               5001            |       sourceIPv4Prefix[2] =   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         192.10.2.0   |sourceIPv4PrfLen[2]=24|savPolicyAction=2|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              observationTimeMicrosec =                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      0x5D2F0A0000000001                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| savRuleType=1 | savTargetType=1|     255     |   List Length  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     = 27      |semantic=exactlyOneOf|   Template ID = 904     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     sourceIPv6Prefix[0]                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|sourceIPv6PrfLen[0]=32||     ingressInterface[0] =             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       5001    |savPolicyAction=1|            padding          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
