<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cao-opsawg-ipfix-sav-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SAV IPFIX">Export of Source Address Validation (SAV) Information in IPFIX</title>
    <seriesInfo name="Internet-Draft" value="draft-cao-opsawg-ipfix-sav-01"/>
    <author initials="Q." surname="Cao" fullname="Qian Cao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>caoqian@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="B." surname="Claise" fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author initials="T." surname="Zhou" fullname="Tianran Zhou">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="02"/>
    <area>Operations and Management</area>
    <workgroup>opsawg</workgroup>
    <keyword>IPFIX, Source Address Validation (SAV)</keyword>
    <abstract>
      <?line 66?>

<t>This document specifies the IP Flow Information Export Information Elements to export the context and outcome of Source Address Validation enforcement data. These SAV-specific Information Elements provide detailed insight into why packets are identified as spoofed by capturing the specific SAV rules that triggered validation decisions. This operational visibility is essential for network operators to verify SAV effectiveness, audit rule correctness, and analyze source address spoofing events.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) serves as a fundamental defense mechanism against IP source address spoofing. Despite its critical role in network security, current SAV implementations lack operational visibility, making it difficult to answer essential operational questions:</t>
      <ul spacing="normal">
        <li>
          <t>How many packets are identified as spoofed and dropped by SAV?</t>
        </li>
        <li>
          <t>Which interfaces receive spoofed packets and which source prefixes are targeted?</t>
        </li>
        <li>
          <t>Which specific SAV rules trigger the enforcement actions?</t>
        </li>
        <li>
          <t>Are SAV rules functioning as intended or potentially misconfigured?</t>
        </li>
      </ul>
      <t>This document introduces a set of SAV-specific IP Flow Information Export (IPFIX) Information Elements (IEs) that enable detailed reporting of Source Address Validation enforcement actions. These elements align with the SAV concepts and operational models defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, and provide traffic observations that can be operationally correlated with the SAV configuration and state information available via the YANG data model <xref target="I-D.li-savnet-sav-yang"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This document makes use of the terms defined in <xref target="RFC7011"/>, and <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <t>The following terms are used as defined in <xref target="RFC7011"/>:</t>
      <ul spacing="normal">
        <li>
          <t>IPFIX</t>
        </li>
        <li>
          <t>IPFIX Information Elements</t>
        </li>
        <li>
          <t>Template</t>
        </li>
        <li>
          <t>Template Record</t>
        </li>
        <li>
          <t>Data Record</t>
        </li>
        <li>
          <t>Data Set</t>
        </li>
        <li>
          <t>Exporter</t>
        </li>
        <li>
          <t>Collector</t>
        </li>
      </ul>
      <t>The following terms are used as defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/></t>
      <ul spacing="normal">
        <li>
          <t>SAV rule</t>
        </li>
        <li>
          <t>Validation mode</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sav-overview">
      <name>SAV Overview and IPFIX Export Requirements</name>
      <t>This section outlines the operational requirements for SAV telemetry export using IPFIX, based on the generalized SAV architectural framework defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <t>The SAV framework establishes four canonical validation modes that model validation policies:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Interface-based prefix allowlist (Mode 1):</strong> Validates that a source prefix is explicitly permitted on the incoming interface.</t>
        </li>
        <li>
          <t><strong>Interface-based prefix blocklist (Mode 2):</strong> Validates that a source prefix is not explicitly blocked on the incoming interface.</t>
        </li>
        <li>
          <t><strong>Prefix-based interface allowlist (Mode 3):</strong> Validates that a packet is received on an interface explicitly permitted for its source prefix.</t>
        </li>
        <li>
          <t><strong>Prefix-based interface blocklist (Mode 4):</strong> Validates that a packet is not received on an interface explicitly blocked for its source prefix.</t>
        </li>
      </ul>
      <t>These modes can be applied independently or in combination on a router, following a defined validation procedure (Section 2 of <xref target="I-D.ietf-savnet-general-sav-capabilities"/>). Furthermore, when identifying a packet as spoofed, a range of traffic handling policies (e.g. discard, rate-limit, redirect) can be applied.</t>
      <t>However, the generalized SAV model requires corresponding operational visibility capabilities. Without integrated telemetry, operators face significant challenges in:</t>
      <ul spacing="normal">
        <li>
          <t>Operational Verification: Confirming SAV is actively and correctly enforcing policies</t>
        </li>
        <li>
          <t>Root-Cause Analysis: Determining why specific packets were deemed invalid</t>
        </li>
        <li>
          <t>Threat Intelligence: Quantifying spoofing attempts and analyzing attack patterns</t>
        </li>
      </ul>
      <t>To address these limitations, IPFIX <xref target="RFC7011"/> and <xref target="RFC7012"/> provides a vendor-neutral protocol for SAV telemetry. The exported data must provide insight into:</t>
      <ul spacing="normal">
        <li>
          <t>The validation outcome and specific reason for the decision</t>
        </li>
        <li>
          <t>The identity and type of SAV rule or rule set that influenced the decision</t>
        </li>
        <li>
          <t>The configured rule content that was evaluated during validation</t>
        </li>
        <li>
          <t>The enforcement action applied to spoofed packets</t>
        </li>
      </ul>
      <t>The following section defines the IPFIX IEs that meet these requirements.</t>
    </section>
    <section anchor="sec-IEs">
      <name>IPFIX SAV Information Elements</name>
      <t>This section defines the IEs used for SAV telemetry. These IEs have been specified in accordance with the guidelines in <xref target="RFC7013"/>.</t>
      <section anchor="design-rationale">
        <name>Design Rationale</name>
        <t>The SAV IPFIX IEs are designed to provide detailed visibility into SAV enforcement actions, enabling network operators and automation systems to monitor and troubleshoot SAV operations effectively. The design follows these principles:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Scope</strong>. The SAV-specific IEs are used to report the outcome and context of SAV processing for data plane traffic observations. Interface, device or network-level SAV configuration is out of scope for these IEs and is covered by the SAVNET YANG data model.</t>
          </li>
          <li>
            <t><strong>Conceptual Alignment</strong>. The elements align with the validation modes and rule types defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, ensuring consistency with the architectural SAV concepts.</t>
          </li>
          <li>
            <t><strong>Semantic Correlation</strong>. The IPFIX encoding preserves the semantic relationships defined in <xref target="I-D.li-savnet-sav-yang"/>, which enables correlation between IPFIX Data Record in data-plane and YANG configuration/state data in control-plane comprehensive analysis.</t>
          </li>
          <li>
            <t><strong>Structured Encoding</strong>. The <tt>savMatchedContentList</tt> is encoded as a <tt>subTemplateList</tt> to represent the multi-field tuples of SAV rules. The structure of <tt>subTemplateList</tt> was chosen because it can encapsulate heterogeneous fields (e.g., prefix, length, interface) within a single list element. The list semantics (<tt>allOf</tt>, <tt>exactlyOneOf</tt>) directly encode the SAV validation logic (e.g., matching all rules in an allowlist vs. exactly one in a blocklist) into the data structure.</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savRuleType">
        <name>savRuleType (unsigned8)</name>
        <t>The <tt>savRuleType</tt> element classifies the rule as either an allowlist or a blocklist. The values correspond to the check type concepts in the SAV architecture:</t>
        <ul spacing="normal">
          <li>
            <t>A value of <tt>0</tt> (allowlist) indicates the packet was validated against an allowlist.</t>
          </li>
          <li>
            <t>A value of <tt>1</tt> (blocklist) indicates the packet was validated against a blocklist.</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savTargetType">
        <name>savTargetType  (unsigned8)</name>
        <t>The <tt>savTargetType</tt> element specifies the lookup key used by the SAV rule. It may be used in conjunction with <tt>savRuleType</tt> to fully define the validation mode applied.</t>
        <ul spacing="normal">
          <li>
            <t>A value of <tt>0</tt> (interface-based) indicates the rule is indexed by an interface (e.g., "on interface X, what prefixes are allowed/blocked?").</t>
          </li>
          <li>
            <t>A value of <tt>1</tt> (prefix-based) indicates the rule is indexed by a source prefix (e.g., "for prefix Y, which interfaces are allowed/blocked?").</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savMatchedContentList">
        <name>savMatchedContentList (subTemplateList)</name>
        <t>The <tt>savMatchedContentList</tt> element carries the content of the rules that were relevant to the validation decision, encoded as a <tt>subTemplateList</tt> according to <xref target="RFC6313"/>. Each element in the list represents a complete SAV rule tuple. The content and semantics of the list are defined by the <tt>savRuleType</tt>:</t>
        <ul spacing="normal">
          <li>
            <t><strong>For Allowlist non-matches (<tt>savRuleType=0</tt>)</strong>: The <tt>savMatchedContentList</tt> consists of the set of all rule tuples from the consulted SAV allowlist at the time of the packet's processing. The subTemplateList semantic SHOULD be <tt>allOf</tt> (0x03), indicating that the packet was validated against all these rules and did not match any of them.</t>
          </li>
          <li>
            <t><strong>For Blocklist matches (<tt>savRuleType=1</tt>)</strong>: The <tt>savMatchedContentList</tt> contains the first rule tuple that matched the packet from the SAV blocklist. The subTemplateList semantic SHOULD be <tt>exactlyOneOf</tt> (0x01), indicating that the packet matched this specific rule.</t>
          </li>
        </ul>
        <t><strong>Semantic Interpretation of Standard Information Elements:</strong>
When standard IPFIX IEs (such as <tt>ingressInterface</tt>, <tt>sourceIPv4Prefix</tt>,<tt>sourceIPv4PrefixLength</tt> or their IPv6 equivalents) are used within the subTemplateList of <tt>savMatchedContentList</tt>, they represent values from the SAV rule configuration, rather than from the actual packet being validated. This contextual distinction is critical for correct interpretation:</t>
        <ul spacing="normal">
          <li>
            <t><strong>In the parent Data Record</strong>: These IEs describe attributes of the actual spoofed packets that were validated by SAV.</t>
          </li>
          <li>
            <t><strong>Within <tt>savMatchedContentList</tt></strong>: These same IEs describe the configured SAV rule parameters that were evaluated during validation.</t>
          </li>
        </ul>
        <t>This approach ensures clear semantic distinction by reusing existing IEs, without requiring definition of new elements for SAV rule parameters.</t>
      </section>
      <section anchor="subsec-IEs-savPolicyAction">
        <name>savPolicyAction (unsigned8)</name>
        <t>The <tt>savPolicyAction</tt> indicates the action applied to packets identified as spoofed. The action taken is a matter of local policy. This element reports the outcome.</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>The SAV-specific IPFIX IEs defined in this document enable network operators to answer critical operational questions that are currently unaddressable without telemetry for SAV:</t>
      <t><strong>SAV Effectiveness Monitoring:</strong> Use <tt>savRuleType</tt> (TBD1), <tt>savTargetType</tt> (TBD2), <tt>savPolicyAction</tt> (TBD4)  and standard IPFIX counters, to quantify spoofing attempt volumes, analyze their distribution across different validation modes, and identify applied enforcement actions (discard, rate-limit, redirect) to spoofed traffic.</t>
      <t><strong>Rule-Level Attribution and Troubleshooting:</strong> Use<tt>savMatchedContentList</tt> (TBD3)  to determine the specific SAV rule configuration that triggered enforcement decisions , including the exact rule parameters (interfaces, prefixes) evaluated during validation, whether for allowlist failures or blocklist matches.</t>
      <t><strong>Forensic Analysis and Compliance:</strong> Correlate SAV Data Records with packet-level details using <tt>selectionSequenceId</tt> for incident investigation and gather evidence to support external trust initiatives and regulatory compliance reporting.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>While this document defines new IPFIX IEs using standard IPFIX mechanisms, implementors should consider:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Exporter Implementation:</strong> Exporters MUST properly encode the <tt>subTemplateList</tt> structure for <tt>savMatchedContentList</tt> and ensure semantic consistency between <tt>savRuleType</tt> and list contents. Exporters MUST also define the sub-templates (e.g., 901-904) used in <tt>savMatchedContentList</tt> prior to exporting Data Records that use them.</t>
        </li>
        <li>
          <t><strong>Collector Processing:</strong> Collectors MUST be capable of parsing <tt>subTemplateList</tt> structure and understanding the context-dependent semantics of standard IEs within <tt>savMatchedContentList</tt>. Collectors MUST associate the sub-templates with the main template for correct interpretation.</t>
        </li>
      </ul>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The mappings between the SAV YANG data model and IPFIX IEs are considered based on the common foundation of the general SAV capabilities document <xref target="I-D.ietf-savnet-general-sav-capabilities"/>. The operational correlation is demonstrated in Table 1, which defines the values for the designed IEs mapped from the corresponding <xref target="I-D.li-savnet-sav-yang"/> SAV Management YANG Module.</t>
      <artwork><![CDATA[
+---------------------+---------------------------------------+
| YANG Elements       | IPFIX IEs                             |
+---------------------+---------------------------------------+
| sav-check-type      | savRuleType                           |
|   sav:sav-allow-list|     0 (allowlist)                     |
|   sav:sav-block-list|     1 (blocklist)                     |
+---------------------+---------------------------------------+
| sav-mode            | savTargetType                         |
|   sav:sav-im        |     0 (interface-based)               |
|   sav:sav-cm        |     1 (prefix-based)                  |
+---------------------+---------------------------------------+
| SAV Rules attributes| savMatchedContentList                 |
|   source-prefix     |     sourceIPv4Prefix/sourceIPv6Prefix |
|   incoming-interface|     ingressInterface                  |
+---------------------+---------------------------------------+
]]></artwork>
      <t>Table 1: Mappings between SAV YANG Data Model and IPFIX Information Elements</t>
      <t>The <tt>savPolicyAction</tt> element carries real-time SAV decisions applied to
spoofed packets. It does not directly map to YANG configuration node.</t>
      <t>The code points for these IEs are maintained by IANA in the corresponding subregistries of the IPFIX registry. Future additions or changes are managed via Expert Review as described in <xref target="IANA">IANA Considerations</xref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no additional security considerations regarding allocation of these new IPFIX IEs compared to <xref target="RFC7012"/>.
Other security considerations described in <xref target="I-D.ietf-savnet-general-sav-capabilities"/> apply to this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests IANA to create four new IEs under the "IPFIX Information Elements" registry <xref target="RFC7012"/> available at <xref target="IANA-IPFIX"/>.</t>
      <artwork><![CDATA[
+------------+-----------------------+
| Element ID | Name                  |
+------------+-----------------------+
| TBD1       | savRuleType           |
| TBD2       | savTargetType         |
| TBD3       | savMatchedContentList |
| TBD4       | savPolicyAction       |
+------------+-----------------------+
]]></artwork>
      <section anchor="savruletype">
        <name>savRuleType</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD1</t>
          </li>
          <li>
            <t><strong>Name</strong>: savRuleType</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Identifies the validation rule type triggered during SAV enforcement.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savRuleType">savRuleType</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savtargettype">
        <name>savTargetType</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD2</t>
          </li>
          <li>
            <t><strong>Name</strong>: savTargetType</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Specifies the entity type against which validation was performed.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savTargetType">savTargetType</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savmatchedcontentlist">
        <name>savMatchedContentList</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD3</t>
          </li>
          <li>
            <t><strong>Name</strong>: savMatchedContentList</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: subTemplateList</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: list</t>
          </li>
          <li>
            <t><strong>Description</strong>: The content of the SAV rules relevant to the validation decision.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savMatchedContentList">savMatchedContentList</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savpolicyaction">
        <name>savPolicyAction</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD4</t>
          </li>
          <li>
            <t><strong>Name</strong>: savPolicyAction</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Action applied to packets identified as spoofed.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savPolicyAction">savPolicyAction</xref></t>
          </li>
        </ul>
        <t>Additionally, IANA is requested to create new subregistries under the IPFIX IEs registries. The subregistries contain values for the <tt>savRuleType</tt>, <tt>savTargetType</tt> and <tt>savPolicyAction</tt> IEs. The allocation policy is Expert Review <xref target="RFC8126"/>. Experts should consult the SAVNET architecture <xref target="I-D.ietf-savnet-general-sav-capabilities"/> to ensure new values are consistent with SAV validation concepts and operational models.</t>
      </section>
      <section anchor="ipfix-savruletype-tbd1-subregistry">
        <name>IPFIX savRuleType (TBD1) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savRuleType">savRuleType</xref>; <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 2 (Validation Modes)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should ensure that new values are consistent with the SAV architecture concepts defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, particularly the validation modes and rule types (allowlist or blocklist).</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+------------+-------------------------------------------------+
| Value |   Name     |                 Description                     |
+-------+------------+-------------------------------------------------+
|   0   | allowlist  |  The packet was validated against an allowlist  |
|   1   | blocklist  |  The packet was validated against an blocklist  |
| 2-255 | unassigned |  Reserved for future assignment                 |
+-------+------------+-------------------------------------------------+
]]></artwork>
      </section>
      <section anchor="ipfix-savtargettype-tbd2-subregistry">
        <name>IPFIX savTargetType (TBD2) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savTargetType">savRuleType</xref>; <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 2 (Validation Modes)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should consult <xref target="I-D.ietf-savnet-general-sav-capabilities"/> to ensure new values align with the defined target types (interface-based or prefix-based).</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+-----------------+----------------------------------------+
| Value |       Name      |              Description               |
+-------+-----------------+----------------------------------------+
|   0   | interface-based |   The rule is indexed by an interface  |
|   1   |   prefix-based  |   The rule is indexed by a prefix      |
| 2-255 |    unassigned   |   Reserved for future assignment       |
+-------+-----------------+----------------------------------------+
]]></artwork>
      </section>
      <section anchor="ipfix-savpolicyaction-tbd4-subregistry">
        <name>IPFIX savPolicyAction (TBD4) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savPolicyAction">savRuleType</xref>;  <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 4 (Traffic Handling Policies)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should ensure that new actions are consistent with the SAV traffic handling policies defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+----------+---------------------------------------------------+
| Value |   Name   |                  Description                      |
+-------+----------+---------------------------------------------------+
|   0   |  permit  |The packet was allowed to proceed (monitoring only)|
|   1   |  discard | Packet was discarded or dropped                   |
|   2   |rate-limit| Traffic was subjected to rate limiting            |
|   3   | redirect | Packet was redirected to alternative destination  |
| 4-255 |unassigned| Reserved for future assignment                    |
+-------+----------+---------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.li-savnet-sav-yang" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-sav-yang-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-sav-yang.xml">
          <front>
            <title>YANG Data Model for Intra-domain and Inter-domain Source Address Validation (SAVNET)</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Tianhao Wu" initials="T." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <date day="9" month="October" year="2025"/>
            <abstract>
              <t>This document describes a YANG data model for Intra-domain and Inter-domain Source Address Validation (SAVNET). The model serves as a base framework for configuring and managing an SAV subsystem, including SAV rule and SAV Tables, and expected to be augmented by other SAV technology models accordingly. Additionally, this document also specifies the model for the SAV Static application.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-sav-yang-07"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7011" target="https://www.rfc-editor.org/info/rfc7011" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7012" target="https://www.rfc-editor.org/info/rfc7012" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7012.xml">
          <front>
            <title>Information Model for IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document defines the data types and management policy for the information model for the IP Flow Information Export (IPFIX) protocol. This information model is maintained as the IANA "IPFIX Information Elements" registry, the initial contents of which were defined by RFC 5102. This information model is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and the Exporting Process. Although this model was developed for the IPFIX protocol, it is defined in an open way that allows it to be easily used in other protocols, interfaces, and applications. This document obsoletes RFC 5102.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7012"/>
          <seriesInfo name="DOI" value="10.17487/RFC7012"/>
        </reference>
        <reference anchor="RFC7013" target="https://www.rfc-editor.org/info/rfc7013" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7013.xml">
          <front>
            <title>Guidelines for Authors and Reviewers of IP Flow Information Export (IPFIX) Information Elements</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document provides guidelines for how to write definitions of new Information Elements for the IP Flow Information Export (IPFIX) protocol. It provides instructions on using the proper conventions for Information Elements to be registered in the IANA IPFIX Information Element registry, and provides guidelines for expert reviewers to evaluate new registrations.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="184"/>
          <seriesInfo name="RFC" value="7013"/>
          <seriesInfo name="DOI" value="10.17487/RFC7013"/>
        </reference>
        <reference anchor="RFC6313" target="https://www.rfc-editor.org/info/rfc6313" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6313.xml">
          <front>
            <title>Export of Structured Data in IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="G. Dhandapani" initials="G." surname="Dhandapani"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <author fullname="S. Yates" initials="S." surname="Yates"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies an extension to the IP Flow Information Export (IPFIX) protocol specification in RFC 5101 and the IPFIX information model specified in RFC 5102 to support hierarchical structured data and lists (sequences) of Information Elements in data records. This extension allows definition of complex data structures such as variable-length lists and specification of hierarchical containment relationships between Templates. Finally, the semantics are provided in order to express the relationship among multiple list elements in a structured data record. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6313"/>
          <seriesInfo name="DOI" value="10.17487/RFC6313"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-12" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-12"/>
        </reference>
        <reference anchor="IANA-IPFIX" target="https://www.iana.org/assignments/ipfix/ipfix.xhtml">
          <front>
            <title>IP Flow Information Export (IPFIX) Entities</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 341?>

<section anchor="ipfix-encoding-examples">
      <name>IPFIX Encoding Examples</name>
      <t>This appendix provides encoding examples for the SAV-specific IPFIX IEs defined in this document.</t>
      <section anchor="template-record-and-data-record-with-sub-template-list">
        <name>Template Record and Data Record with Sub-Template List</name>
        <t>This example demonstrates the encoding for two observed SAV enforcement events representing different validation scenarios and address families as shown in Table 2.</t>
        <artwork><![CDATA[
+-----+--------------+---------+---------+-----------+-------------+
|Event|Source Address|Interface|Rule Type|Target Type|Policy Action|
+-----+--------------+---------+---------+-----------+-------------+
|  1  | 192.0.2.100  |  5001   |Allowlist| Interface | Rate-limit  |
|  2  | 2001:db8::1  |  5001   |Blocklist| Prefix    | Discard     |
+-----+--------------+---------+---------+-----------+-------------+
]]></artwork>
        <t>Table 2: Two Observed SAV Validation Events</t>
        <t>The first event represents an IPv4 allowlist non-match event where a packet from source 192.0.2.100 arriving on interface 5001 failed to match any source prefixes configured in the interface-based allowlist.
The second event represents an IPv6 blocklist match event where a packet from source 2001:db8::1 was received on interface 5001, which matched a prefix-based blocklist rule.</t>
        <section anchor="sub-template-definitions">
          <name>Sub-Template Definitions</name>
          <t>The following sub-templates are defined for use within the <tt>savMatchedContentList</tt> element to encode different types of SAV rule mappings based on address family and validation target type. The <tt>savMatchedContentList</tt> element is encoded as a <tt>subTemplateList</tt> according to <xref target="RFC6313"/>.</t>
          <t>The template IDs used in these examples are exemplary and chosen arbitrarily. In actual implementations, exporters MUST assign unique template IDs within the IPFIX session for these sub-templates.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 901: IPv4 Interface-to-Prefix Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is used when <tt>savTargetType=0</tt>(interface-based validation mode) for IPv4 traffic. It contains the mapping from an interface to source IPv4 prefixes as defined in the SAV rule configuration. It can be used for both blocklist and allowlist.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 901       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv4Prefix = 44     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv4PrefixLength = 9  |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 902: IPv6 Interface-to-Prefix Mapping</strong>
This sub-template is the IPv6 equivalent of Sub-Template 901, used for interface-based validation with IPv6 traffic.</t>
            </li>
          </ul>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 902       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv6Prefix = 170    |        Field Length = 16      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv6PrefixLength = 29 |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 903: IPv4 Prefix-to-Interface Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is used when <tt>savTargetType=1</tt>(prefix-based validation mode) for IPv4 traffic. It contains the mapping from a source IPv4 prefixes to interface as defined in the SAV rule configuration. It can be used for both blocklist and allowlist.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 903       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv4Prefix = 44     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv4PrefixLength = 9  |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 904: IPv6 Prefix-to-Interface Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is the IPv6 equivalent of Sub-Template 903, used for prefix-based validation with IPv6 traffic.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 904       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv6Prefix = 170    |        Field Length = 16      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv6PrefixLength = 29 |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="main-template-record">
          <name>Main Template Record</name>
          <t>The main Template Record (ID 400) contains fields for exporting detailed SAV enforcement information including the validation outcome and the specific rule content that triggered the action. The template incorporates the <tt>savMatchedContentList</tt> element as a variable-length <tt>subTemplateList</tt> to carry the relevant SAV rule contents using the appropriate sub-templates defined above.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 28          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Template ID = 400      |        Field Count = 5        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|  observationTimeMicrosec=324|        Field Length = 8       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|      savRuleType = TBD1     |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|     savTargetType = TBD2    |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| savMatchedContentList=TBD3  |      Field Length = 0xFFFF    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   savPolicyAction = TBD4    |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="data-set-example">
          <name>Data Set Example</name>
          <t>The following Data Set contains two Data Records that represent the two SAV validation scenarios in Table 2. The <tt>savMatchedContentList</tt> element for the first record encodes the complete set of allowed prefixes using Sub-Template 901 with the <tt>allOf</tt> semantic (0x03). The allowlist includes three sav rules. The <tt>savMatchedContentList</tt> element for the second record encodes the specific blocked interface using Sub-Template 904 with the <tt>exactlyOneOf</tt> semantic (0x01), indicating the packet matched this particular rule.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 400         |          Length = 88          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              observationTimeMicrosec =                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      0x5D2F0A0000000000                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| savRuleType=0 | savTargetType=0|     255     |   List Length  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     = 33      |semantic=(allOf)|      Template ID = 901       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                ingressInterface[0] = 5001                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              sourceIPv4Prefix[0] = 198.51.100.0               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|sourceIPv4PrfLen[0]=24|         ingressInterface[1] =          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      5001     |         sourceIPv4Prefix[1] =                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  203.0.113.0  | sourceIPv4PrfLen[1]=24|  ingressInterface[2] =|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               5001            |       sourceIPv4Prefix[2] =   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         192.10.2.0   |sourceIPv4PrfLen[2]=24|savPolicyAction=2|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              observationTimeMicrosec =                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      0x5D2F0A0000000001                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| savRuleType=1 | savTargetType=1|     255     |   List Length  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     = 27      |semantic=exactlyOneOf|   Template ID = 904     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     sourceIPv6Prefix[0]                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|sourceIPv6PrfLen[0]=32||     ingressInterface[0] =             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       5001    |savPolicyAction=1|            padding          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1dW3PbyLF+V5X+w5T34UgOSZOU7LWZcmW1spxVlWV7Le1u
crZcJRAYkYhBgMZFsjZKfnv6NhdcKFG25OScLFOJYGAw09PT/fVlepB+v7+5
UcZloifq4NMyy0uVnanjrMpDrfaiKNdFoX4OkjgKyjhL1dbx3s/b6jA9y/IF
34lTdfj25eFfNjeC6TTX5xMFTcytKAvTYAF9R3lwVvbDIOtnyyK4mPXj5Vn8
qV8E5/3haHMjmxZZoktdTDY3qiWMRVf4F/6E8GeW5ZcTVZTR5kZRTRdxUcDY
J5dL6Prw4OTl5sbmRrzMJ6rMq6IcD4fPhmMgKNfBRL1Z6pxILVSQRuooSIOZ
Xui03Ny4yPIPszyrlhPFZG1ufNCXcDea8Ax6N7ECBw6qcp7lQKgCXipgSDFR
Pw7UfpDhP3n+P8ZBau5k+SxI49+ol4n633mWzmZVkIZVql4F0wyIhcliQ70I
4mSigGsf4fXvfpuFSTAd6KgahCk+D+MSmPK9jv8WpzO6kVVpiYzan8dpUCPo
aKB+gEFmjqQjeOkj/Nfdvy1hc3xx8fE7/Nfgi6j7HtiVBHGhHXnf6zSLS+92
nbqDc51flnOk/83bY4+oKb33nbbPUeIGqS5rJHyvk1lcLWpEnAxwzpUj4QS4
nsO6mbt1CoBtFzr2Rv4NmpX8yndzejgIs8VarNjcSFmhzlHglTrsvxgkMaoH
EE5acgmspkfvXu4/HX27a67Ho9Ezc/3tcDTyrsfe9Y65frLjrp+Oxk8mpDpG
n73hY12eGQJmOgUdSoiQMFgG0ziJy5h0tN04Tkud96MMmJL2l3k2TfSiX5Sg
xKh0/Mre670+KRj9UylBoMO36mWSXdTwRVBpi5pvq4O0pKH5Pad6ipZnQl3z
PwU9qPsgn+kSBLYsl8Xk0aOLi4sBLFQwgFceBYAlsxRpKx4RKvH/Dj7Ny0WC
3BkMBpsb/X5fBdOizIOwxJsn87hQAG8VvqiKpQ7jMyBLlXN93TRqtxLiCLyT
Kc2P8e0wAwZ+KgmsQKBAhPT1mKyxz5D6wkkHA3Uy14VGHO4LYWH3wLA653Gk
VaRLkGAdoR7Es3kJf4Gmi/mlWgbhBw0tAUoVtATmwywjFRQw5Sw7g8vpJQDU
sqxyVEWk3w6JdiCvEmJKAHPL49lM5/DKuaM9grYI5QUSDRzNDFgHiTqHJyRp
lwqewKRxeLgPE1EgaAje0j7LiYmg8vHZJY2rz850iPKcwns9kJMIsASJAfbm
OTyS+8BjkIPk8jegmxkcCINpfjgnQBLglYjAIo6iRKMAfAMsLfMsqkKayN+/
KXSIsp9n/8DHN5nQQufnwBlgZKDOqjQKcEVgcpE+0yks3kKHcwCbYqGCGShS
UaJUrSBxoF7oYhmXsESwVGEOChJCVzmYVDTPhldAIKxSedlT8DdHaUFOxYsl
i4PYyARWfMUy9NQi+IAsAV5G8RmscZWUyPggLS507i2R//7HShfUNUHNQ/UD
aMYiSNeRLVyeKM+WS5YzIPdP2MMv8zicK8KZsyAELsKCalhr+57tGd6/oMbC
uWWuQbU1j8mooCOvzy7ZZbEl0fY1LaB1L+jlvVx7b8By0jPkFEwG6UwjoArE
dpmVzKHkEkSpAFU/i2dVTjQ0MSUW8UJqYe3YMaup9M1o2an1W4cHxTbrpE4D
gGen/7nG15HwtRFH+GBAR5tRoPUsVRdxOSfWIXtguqFeyrr4IrLIIp0UKPtx
Siikfl3XBL1nJTZIBviMcqnAoQQFE5GmqYZgyKfaHxbWgMAgAUMRtSilheHp
4gBkwFTs8TM4B54R+87jgN78697rPxMC84R4Em0z/n7A+HGi80WcZkk2u+TV
1wq8T4XuZ6EeHP10fPKgx3/V6zd0/e7gx58O3x28wOvjH/ZevbIXpsXxD29+
evXCXbk3998cHR28fsEvw13VuHW099cHzMsHb96eHL55vffqAa5EWRNK0psM
GUnqB/pUsspGugDgmfLqfb//Vo121a/in7ynK/Ra3oM66pSHyVJYAP4nMO9S
BaDmQY6vw9KgTYkBDxGjAQ/m2UWq5mA8Bm09AUwCFakKspK4DEDXoi5M4huJ
rKwvWwOzLmdZAppGFo46RzbAiDLz9kACdRIFyUWnNuLTEw0YDOLlX6t3GoQz
wlsvUKIa/zxGf/ahqLvO8XofaATDluW3JXptdvCkDNDhtYcJKPIs19jgDdji
81hfEMN59gJN7/THKs4FJNhq4kCZvPAPu8CFZssKPlACtLJr5aNG7veETgEO
XBIAgW9tXKqqQA5INDcNcP5ZSn3JPOPf4Ba+GuThHIxoCL4Mehk5mGSym5/F
Kys62LPrC0whQEZczNFOAL4iLIGlQHN9XuelwBYjifdsmSVxyL43rsDDh4fG
DvZ5dmzjUImyCxgJjMER9KFG25OHdsFM70HdMJKf9WmJA5SgnEsEqLJ0HItT
8EbJATBjDm6gYppk4QePivGaVKRZ6VNC3axFx1vqQoiwj1vc2Ommgx0HJEBc
ChoySL2eOvmD0oe+V20eN9HU5M3uTTQhU9ahy3BrNVVsq1nMxDAC/CYx0Rfp
JTosKXaVESADt6cQp7I6wrjgWlYwbs+DmMCqiS+reRbqCPwbcHpFm8eI0uur
0fZAvaxyWPN8keW6R/bCOIuXPK7wx7mNPSQQ7CwbBHEIwJmOEnzB6I/a0gPw
nCPwwoIc3gFY0f0khgWFax3FGCRsN5hDvAP/FZMLvU4MYXUVZCrYvwCy0oh8
qu7gxp/wQP0Cfghwl1Z2lpNrYjGt58U7tOgYuaIvGIAdhHgBDABMG11OQYc3
3og/Y3QETTl7sY8eTk5KRFFAQY7cuYY1R8iWKAn+xb6ezzns+F2Wlf39AK3u
HsZPRVxMIAopyaXBxhg8Wk/V+OMQJKCzCZNBOSNBIZs3z3WAsTFMFLxGDV7i
RP1YBXaRbSwWgLYtjAfJgZvcxqhliY/ztCAJz2yYVJKw09KyQ9gTi2TNNbsF
kjV5b5xJ9Lsh9ouyvJ/qqkSjAE/KLMyStrkh/1dsDsyOvcAKdNt4pn5oLauD
b3jaYoJ9cjcN64AzBTzD8VDeTLxsXmdVKHnRysulliiBY114if5i9EBoAv5r
UiF/o87eXDxiYmWMXeTdC9AwDeRWJJMRB/yOfNNHOzaw0AKOYyNCa7sqxuoz
mph8CnlPB8YkapoOLqrvAohXzY0pB90V/LDHAX21HY3akAcF+0rdC11wi3kA
QedUAySZBBB5CUGIvloAbHZRxayCpWI/xjmKOxIKfIMBPIZL70RZte89uOkH
pD7YkrnZyt/4KRNM4VAqpB2s9TjwQ363EymkWlWZCeeKywJ0jvIrC/BUoAnL
GpgAiH3AM884j5C5NLtNviSiFkyzrLJRyCUIUBgvE8+VOQ6hl4cP+aV6rHvg
+a9ACgeq7BJ6amNyZ6IEZH8KcgBxHUkpwbtOu+PEgbJOTA9IPo9D0iDhUD8B
1E86okPMWlU0ZIHkG1UVEUGqYjQE55T6ml6aGPP1wUkzYBwwF/Y5TK4Ab/YS
SU0apqwKr1vOI45LOoyg8NmhtU4L1nOYMkA8gEF46QatO8x+hC8zOdYLBPEQ
rA3H2UCfmQlLNXSYkW0E50RSYpRDNC+at4p5vGzPoiO27knChzMbhY3wkTNT
WElUVh7aC6uwQ1yGPgsH8o6WprbQjzgFQMtFPhHmZxJ5BSQQZgDOSYF5qEBM
omFDmVfIJKD8QOZruHAKhB8FZTjX0T6D7Stg8yk54tiUo7UA2lVTExpyC1YC
5FrKerCokjLuAwYloCEV6pVvCzhBowpDCj5rd4oYH84z6BOYFZJ5jzl1AtQE
y6Ki0HSOdj5DsckqcERwRHGneuJk9hR6IuW85xzUbZIbREeFCpmgRQbzKALN
1NEds/bQ5Sl4NG/OTnvqVH8K0Bt5k2r497Zi94y8E2SSzdt4apBkM5AfoWqB
LCZPIUkkSxeT/+zignPgkIwCPi4lTgPnom8znpLRRAGwfDQADuv4DvrFLUm1
VaWM0U+30d5UUzE5fa/RPwzCn3o3Tw07VJjgtoTdUSBNRvsboytcJxwB2RE6
MF5FVXM/lRAPggaOEjkKNhsXp5Z/nkZrQeU97ozkZXiqtuzAyJII/UmhUfxw
FCFZBhReSV77FA+a3Y6g2xqn1+/Wm7hbiBNK7NJS1NaitRiuYW053G23IPUd
niTLPlRLSteRRXKwTksFlgTzUpcYOlQc9CG7/yaJYUbQ+sLD+pxVmJJkjOsC
9VoU0l6YuB6BN/lIIhQXFN99YpJr8aNoyoPMv/kXhNOgrOfNaSF19EjCzD89
2O5c0aUX9a5DTCMJYOhBcyq3/mrA3Uv9ryTICEMbXdVWA/faWtp+qSYgXYht
NTfIcyMmxn+WxKS3GUaREBgmcKjT0ihnx75Y7yYzwL4mJfkycitxg/f9QB0E
aASFJtFwggtrNLA/NFtYd+FCBrIcAxMNEPUUj1hQlrlQX+yPsk0WFahJtXXs
XsIi7lnESrO0T4iMUbj/wvPh6fbDh5NrLaN4IpYQ2RkxwG5M31meLcwagNkq
TY7PEhGw1SzjhU0cM9T8T+H5jWI161x37okk2UHNxVSpreGn4c52z8g7b4rK
WNdDGUxAghoSE9r7iiNK+hCzFO6ZMaWLgWPr9zaL1M3S0VosLZEIIvIszovS
Y6XEXPyaPw3LYeRrw/6sw7CaSSe+ja7nm6MBgzYbICPekpw5d/PQ7E1IYA1u
UAn8DMDT6woKJw8fbm78gpmlwjazMReABfK+UKdAE+YTbJCAfglj1uHb811O
8p32WrdekSd0qjgsiHPo+/yJwsAVhACH33aRjbhIZQcLyV/rXD/ZP3HeoFj/
2gKZeN75s5TymtPOJhgC2xgWBSMP4flUe1E+mB7epZcwC9tFQEEsZi32Np8R
tiWJ5LaKOPfkUsayurQX7bnjIq8SQZmdJczywN+q1Fb3hdbmtq9DWKdmvH0s
evMLs3kFP93wRbBo0FDWsySWszAJaAvT9Ee/Jlvi9rHAqOcZgTXGWui0JbgN
ZjXGZ/AUV5k3NPQnuj9D8nokNxiEcj4EbxMsx0b8U33hQkeT0mgQ7tnMt5jp
u9zjQa/zZv2GNQvpPzhtGP92VsgsXGcVACOKvFQGHzQJWoBwAGTj7AB7UGJp
SJFQY/k4T1D4iQLJE/0E67sPvknhpVr8vXWj/17MWd8Klb3zzkoUKYiw2tBZ
DyEJfhAUqccA769KJWtJfZtldZtasnYTATxYxQO/0kUdcYoGJAD3EnCOdTdz
6+T7FwizTTcX74/lfn3t8Mku+M6yCe7DI1WxgeT0cMofJV/bStaq8ywBjlG1
DVfaMAyiYJM+kzCEeQbkY1WJzgXDagkN3ro1mX8rPB3JLbV1Q07fS0NKGkjs
B7Kp/4rSPHulRxsMfOKluxxzVxlU5NkO8AxGiiQnrrtroxq5pEahVK2yy1RK
KTSSYVJFpuCKDGkLhlw8UPSs/759HSbR7gpZBJQy5ymdBXFCyAR3p01vQ1gH
ngjmPkK7G0Bc20f3MsZEKDLMJIHYIHl4X3BAxCggeTZOaRayfXta6ISztMeA
cJjAPoxOeX8rDUkocD8B9WrmSjZmbN40pkgxF4vrXi0pbwjGS+eojFQvrAgp
qfxREmd6hpmOLL9kD5mm4IpjBEH8zZV99EojkwHF57/MY3KefMgwGWaEY4cw
PMWGbtn6L1g9W6KF6AIiWCURu8EwoLWmphRAHdYKupDx5hHAAxaTgL0ByuvJ
k3Zg4TJFyOZVko7cYsPlLJafKzQptzoK4VskRBJiFIMmjUFSZH4oDOT1S6HP
5pqeDUf9Z0MAJxNjr6JymcfofZkyS2R3TfxI7TDZJb61ycNKQYV6a+MBlmO5
L7SCW0Bp04QCCVBBEdnVHMX5VxD65rToRo/Fq+rb/dd61OUE5KAwjuKKCQ9a
NAZFkYUx6l6bmzafixW7yty/xoNz8p+qw6KonA1dAC7DdAq77sb9bJZGubIQ
k9k3Ao2+ml+lAQq4oA0wLJI0/oy39cp5Zy9t7dTtFtUa5GP4VtrPG6MKayAC
q39LlrQTWu6RSUj4W0fG+7Y7drJfgxNF/uCmkgtO/f3hVTltmqI7t8DMPMoi
E/n885//3Nz4Q7/r1323o93mxhX3a3fK+HflLdN1v6s7oYAWBlOUfUpRCgV+
bvVaCq7gDzSeYDdkv/qIMlf0eFhLXa7RAZk6r4NRLUl5vzygdJ/fczOtuR4P
4oXrQHjQyhJe20HY6GDUTOvdEw9Q4N9xGsQGfVcrsnmreEBheF9Sh24KzfD8
kb3xhG+YDkyRUd+yjDtopgHuhwek04IyE1D+Bq5aTCU7dtTE1M5Cw1XRWTNz
mWuASMqL4SjO73QB2+ZGI+SmhHeUaa5RsrszAHdoddt7adAs0rZEjryQZRab
4NTbPc3ZKmF6ioN4PN9h8pl19ASjBn4bBRUuQ8D8kPuXWEzEBjiKYg4W0MjN
A6qa4cEQZSMq6QWXRFPBIhcyNmpcfyVK6n7f+61v8K6kn9WxFNx3eIcnWMxK
I6aZpQZTGeaVsPYKziDgNC+CWOgbwkI3/El0WYOcI2tb1AIkvSF3eNUIjcmt
azlJKi45g+25uqYYo80j9XfikSu/sOYakxcaM7v0FvQYYlmQ5jpJmiI6y+g2
0dI+WC3rD+yKe1U9rl47KHn1+AjS+xU2dJWyEkDJSOrwBcDKa0wT3YgC1/aH
YblF2m57dyXtxn67Dptg2u347Tpw07Tb9dvVMj+3ngcxsbkdinf6GKAwyw5f
UH4N5su3kXl4p/YGPtiT01YMcXgfm9lkFDeyz5RJ/hbYyiaScmlGwr3k+oOJ
OjSPrcdmcg22ZMKLwiVQbtTSDLjnd5oSFqHmrKEnzz31qzcngIbujeDtrn3L
VTwbt3jmv3PPXDuubYFK3RnxyuxhsDPssRO3OgBEUUNp33IdjrkZtXjmHm1f
t8G3ins7Le51vbuai42I7lpeJq5BnYv+zpoYKXd0aI0dwTW52J5Zi5vtJtvd
KeBV/Nxt8bP+1j3L494t88jrMc6fQotl/kNi1p413cllT5yTwlgyJkqsGBqw
uoviTJmz3e6x3Ujz3pCNumaIWUuutHO76Be2vT4YTTLrzqHgFDrOoO77/CqH
hd8P5EEtDUWHAF1Rm19DchtHAtMznElCVskUbWagIIWhVEWj0OeGU2VmW4N5
XCvToVy4OrYsvjSC/uWg/sdbldm54vgt70QNevXFtqiRWyReRqRsxSKJsvLD
P1cxVaK69nbthNuU/LqB5V31QY7xn1lcCE5qiUdIA8xFrlPEuFUrenLBOC3x
IeVwE5nFpOXTreXDrP6Rl/YzFbhgGGhdvquW3+ehVNsprPtTd0ETRvVIhuMN
0nRym4IsGzOPqCeX41+3J/8N7GncHz9+DC9XKR+uh9bQ0zuu8OSa6jMJxOzh
+/vlk/NMLQ54rjPvft0pEniuyv8FLDA4/sV4XS9LNsjAR62NGjdyUMpWeElW
6fb6fDvBaOiy8vW5qdCrtXmVfH4GLUaHm4zBJydr1O7V9VfVuKmu7UV5+bG6
7sLPU1/uZS0NvjO+dOhsvTCBd6bvUmtr/t0f1Wcp7i4QJqcLfjCHzt7K0amv
aM3Nbvh15nz14bjPP/N6C729PZKvssNtK3yjGV4hp59Nk9FhORUKlw3LKVWq
cm4n1HC5tbDlGnQcfruux1LHAJdvXTdyk2HTfByjc3bYEyaLrlwZxJUyoold
gez/DYRWTtRgkEKNkJp2TztEk6miqNNk7nJPQUKb67idjlnF0pwc5Z52GV8c
tlzd1jG467UTnIF/qCnMyT9GZo5rgLIFuK1e+GVbOo0AOe1hQXuURUtbG5/d
srLIRCyNTwGQN+wfWuFgqJr2bUOT/OASKCbD37o0mRshlOi7yOQQlJSz+TUn
/OkbV1lIhWVdJTpFqNMgjzM5PSYHL8+CBUADf+WGP+Fgd07HzaRrY+3+cO1V
szkq4AHSelX/ZsmV3aS5QsinFMMVe2Z8zegrmYSrO6OFNPhKjZ6NB8PBeDAa
DkmfHw+HpNm2EvrKnTiD5++smhqlG+NrY3hrEk2fTiajWi+28BdU0RrxK/VC
QKOmJl86I1ERWTuwqSA1b3yp8VxVWgh3spPKiUmQaqXneArrfNeLQWxRuDS+
4B2SWrWxnBDw+Yp7VueMn55DRDw64zOReHDR1k83vwPk1XLG5tsCdR/MP7ZC
GRlQPix66Z7Rk2aF1M2z8deXwdSd8K/PyFQbmELooO7ouZFtTfQ3ACM1hHhh
y0K7zt7WykL84n5ECqyP8eqTbzoHQeEB7ew5xGD/3z+h7ApGTM1HDTz4XLMH
NF4gcf0BOnv04caDdCtOUBj22HqYwxeFLTTibTcL9MgqcKmxYS7n5/kQXZBP
Y0DePMaTsIepKVhufHOrZ86Ne9U6GEZVafyxalDgrYB4xZq+heltnNaW0VYz
1cTgGYgcK6D7bkeZ9QVHZLcZq+LNEWmvS2QpF6vPpbDLxbrPh6et6K6R1dkm
SmlsU32Jm8e1MwgiFawmtUgHa/hYbagHdy6pYU5XFb3zWPxRB3u+e5qBIXXa
QybM03qBP/Lvmr9Rx71xx70den8Ez3YgQHisnqhv1VP17Db3EMu/8D/sycnv
WNP25fMavd5zPreAz72JX90pFSdOsmGcZ8NRk4qXdJp1H+uMocHOHVMx5DKP
RjnHczUadlFh+bF7D1Q0q1JwmN2vTEX3wRVcmNVUjO6UCnEzOuBqPGHregNc
dYIVY2XtzA3ZoAYg9hwgXANh5HRTb37t+O8AcceqKb01AWLcpOK/DyCeWIAY
fTu8jorRk7umokmDE4Bn/3aA2BF/Rr61BejgFuwL/JnRaa3g8cudmW73Bdwa
71tlv/sy64mkI+k/EKp2mlR8Baj63Yv4z4Ht1VC1K77M50HVet7MjufNrAKw
310Z+/s34MNuk4qviQ//1U7EfxQ+YIbuCGu6Wh/+NSeq2s/UFsjQ7nC47RwN
+QgTqrs742Y/C9fM68e1//8W/yzpis8R1s6utj8N6Gpl3fluTs855EqB8mXm
diFuStxRtu48yGPMOff5c1Ldn8HCcwtcQGTLJ32HiQ4YyiFLIg8P3C9zOgxX
z3garyuYZuf6dzBU46fe87uloo6Gu8Nhg4o6GD6+YyoQALwv/53EC30U4wl0
HT7fGe+uAoCnd08F/vyaxOfuJMDXBEPVKIh6bg8afD0qOvHgOR9kuOqkYfjp
JfzumhfNMpPn9pDEV41x0TCYT72b7ef2lo1t4ULOi6zjcHP9U4HYplFF63Zw
vT3atXZYzC63fDiILRTvuZivYMlHptynmqgQwka/jM3NfJwrVTHfVrInzPkj
S658mXcQ2ZLRoLnGj7ec+18+XHcasr/XMQ9rAM33tV3I3jmDXW8G9Y8d1SbS
+upR9wePXLWs2977/22erFVQ3ebp6f2ZJ/6tMBEw9IrfvVBhfsNPj1+MXw73
hvZ3z1TUPszWPG72XOwGFvOYBaJjZbI8d8oLCIckHroyqvN8i0BhW5i1cifp
flakGTz8OnyPbspw2KV390RFM9HCNIyePR08HmFpxKApH3dEhT/uGaw2jPvc
85navBm99zXmTnlhOe6Gb7GlPvxdUzEe7gyGg9FoZ0A1Pi3mjIQ5La6Mgaz7
kc6mGJrnLc6MmTN3TQWW54ywPocKIlscGRNHGl7W8/F/I4J3o8X9IPioheCj
r4rg429lbhbBfZ+IatQ7M2T3uSLNXBRC6L9BLtb+/U7FnVPhi4CxZjvjq+5P
fbCJvT9eGORuoeOoxq0lfjDCL9K+w8DzX6+7X34RegAA

-->

</rfc>
