<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dhody-teas-te-traffic-yang-03" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="Traffic-TE-YANG">Traffic Mapping YANG model for Traffic Engineering (TE)</title>
    <seriesInfo name="Internet-Draft" value="draft-dhody-teas-te-traffic-yang-03"/>
    <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>Divyashree Techno Park, Whitefield</street>
          <city>Bangalore</city>
          <code>560066</code>
          <country>IN</country>
        </postal>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <date/>
    <area>Routing</area>
    <workgroup>TEAS Working Group</workgroup>
    <abstract>
      <t>This document provides a YANG data model to map traffic to Traffic Engineering (TE) paths. This model providers operator a seamless control and management of which traffic to send on the underlying TE resources.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Data models are a representation of objects that can be configured or monitored within a system.  Within the IETF, YANG <xref target="RFC7950"/> is the language of choice for documenting data models, and YANG models have been produced to allow configuration or modeling of a variety of network devices, protocol instances, and network services.</t>
      <t>There are various YANG models to establish paths in the network, such as:</t>
      <ul spacing="normal">
        <li>TE Tunnels <xref target="I-D.ietf-teas-yang-te"/></li>
        <li>Segment Routing (SR) Policy <xref target="I-D.ietf-spring-sr-policy-yang"/></li>
        <li>Service Function Chaining (SFC)</li>
        <li>Virtual Network (VN)</li>
        <li>IETF Network Slice</li>
      </ul>
      <t>These models do not include an exact mechanism to describe the traffic that needs to be mapped to the paths. Thus an operator lacks a way to simply use the YANG model to tell requirements such as the traffic from source X on port Y should go on a TE path with delay less than Z. The YANG model defined in this document fills this gap.</t>
      <t>To achieve this goal, the YANG model defined in this document utilizes the concept borrowed from:</t>
      <ul spacing="normal">
        <li>BGP FlowSpec: Where the description of traffic flows is done by the combination of multiple Flow Specification Components and their dissemination as traffic flow specifications (Flow Specifications) is described for BGP in <xref target="RFC8955"/>.  In BGP, a Flow Specification is comprised of traffic filtering rules and is associated with actions to perform on the packets that match the Flow Specification.  The BGP routers that receive a Flow Specification can classify received packets according to the traffic filtering rules and can direct packets based on the associated actions.</li>
        <li>Path Computation Element (PCE) FlowSpec: Extends the idea to PCE Communication Protocol (PCEP) <xref target="RFC9168"/>.</li>
        <li>Access Control List (ACL): A basic elements used to configure device-forwarding behavior in form of a user-ordered set of rules that is used to filter traffic on a networking device.  Each rule is represented by an Access Control Entry (ACE). Each ACE has a group of match criteria and a group of actions <xref target="RFC8519"/>.</li>
        <li>Flow: Elements in the packet in IP/UDP/TCP header to match particular flows.</li>
      </ul>
      <t>The YANG model includes two key concepts:</t>
      <ul spacing="normal">
        <li>Traffic Description: The various fields that needs to be matched to identify a traffic flow.</li>
        <li>Action: The associated action that needs to be taken. For the purpose of this YANG model the action is to simply point to the TE resource in form of the TE tunnel, SR Policy etc.</li>
      </ul>
      <t>Note: The RFC Editor will replace XXXX with the number assigned to the RFC once this draft becomes an RFC.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <section anchor="tree-diagrams">
        <name>Tree Diagrams</name>
        <t>A simplified graphical representation of the data model is used in this document.  The meaning of the symbols in these diagrams is defined in <xref target="RFC8340"/>.</t>
      </section>
      <section anchor="prefixes-in-data-node-names">
        <name>Prefixes in Data Node Names</name>
        <t>In this document, names of data nodes and other data model objects are often used without a prefix, as long as it is clear from the context in which YANG module each name is defined.  Otherwise, names are prefixed using the standard prefix associated with the corresponding YANG module, as shown in Table 1.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="center">YANG module</th>
              <th align="right">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">inet</td>
              <td align="center">ietf-inet-types</td>
              <td align="right">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">yang</td>
              <td align="center">ietf-yang-types</td>
              <td align="right">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">te</td>
              <td align="center">ietf-te</td>
              <td align="right">
                <xref target="I-D.ietf-teas-yang-te"/></td>
            </tr>
            <tr>
              <td align="left">rt</td>
              <td align="center">ietf-routing</td>
              <td align="right">
                <xref target="RFC8349"/></td>
            </tr>
            <tr>
              <td align="left">sr-policy</td>
              <td align="center">ietf-sr-policy</td>
              <td align="right">
                <xref target="I-D.ietf-spring-sr-policy-yang"/></td>
            </tr>
            <tr>
              <td align="left">ietf-nss</td>
              <td align="center">ietf-network-slice-service</td>
              <td align="right">
                <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/></td>
            </tr>
            <tr>
              <td align="left">acl</td>
              <td align="center">ietf-access-control-list</td>
              <td align="right">
                <xref target="RFC8519"/></td>
            </tr>
            <tr>
              <td align="left">packet-fields</td>
              <td align="center">ietf-packet-fields</td>
              <td align="right">
                <xref target="RFC8519"/></td>
            </tr>
            <tr>
              <td align="left">vpn-common</td>
              <td align="center">ietf-vpn-common</td>
              <td align="right">
                <xref target="RFC9181"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="references-in-the-model">
        <name>References in the Model</name>
        <t>Following documents are referenced in the model defined in this document -</t>
        <table>
          <thead>
            <tr>
              <th align="left">Document</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">YANG Data Model for Network Access Control Lists (ACLs)</td>
              <td align="center">
                <xref target="RFC8519"/></td>
            </tr>
            <tr>
              <td align="left">A YANG Data Model for Traffic Engineering Tunnels and Interfaces</td>
              <td align="center">
                <xref target="I-D.ietf-teas-yang-te"/></td>
            </tr>
            <tr>
              <td align="left">YANG Data Model for Segment Routing Policy</td>
              <td align="center">
                <xref target="I-D.ietf-spring-sr-policy-yang"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="discussion-items">
      <name>Discussion Items</name>
      <t>For describing the traffic, currently the YANG models uses:</t>
      <ul spacing="normal">
        <li>The match criteria grouping from the <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>. If this document gets WG backing, then it might be a good idea to move the grouping to this document instead.</li>
        <li>The ACL Name. Should that be ACE instead?</li>
        <li>The match action granularity in case of IETF network slice and VN needs to be discussed.</li>
        <li>The match action for SFC is not handled yet.</li>
      </ul>
    </section>
    <section anchor="tree-structure">
      <name>Tree Structure</name>
      <sourcecode type="Tree"><![CDATA[
module: ietf-traffic-map
  +--rw traffic-map
     +--rw maps* [id]
        +--rw id         string
        +--rw traffic
        |  +--rw id?                      string
        |  +--rw (type)?
        |     +--:(match-criteria)
        |     |  +--rw match-criterion* [index]
        |     |     +--rw index         uint32
        |     |     +--rw match-type    identityref
        |     |     +--rw value*        string
        |     +--:(acl)
        |     |  +--rw acl?               -> /acl:acls/acl/name
        |     +--:(flowspec)
        |     +--:(interface)
        |     |  +--rw node?              string
        |     |  +--rw if-name?           string
        |     +--:(flow)
        |     |  +--rw (l3)?
        |     |  |  +--:(ipv4)
        |     |  |  |  +--rw ipv4
        |     |  |  |        ...
        |     |  |  +--:(ipv6)
        |     |  |     +--rw ipv6
        |     |  |           ...
        |     |  +--rw (l4)?
        |     |     +--:(tcp)
        |     |     |  +--rw tcp
        |     |     |        ...
        |     |     +--:(udp)
        |     |        +--rw udp
        |     |              ...
        |     +--:(other)
        +--rw action
        |  +--rw te-tunnel*   te:tunnel-ref
        |  +--rw sr-policy* [headend policy-color-ref policy-endpoint-ref]
        |  |  +--rw headend                inet:ip-address-no-zone
        |  |  +--rw policy-color-ref       leafref
        |  |  +--rw policy-endpoint-ref    leafref
        |  +--rw other
        +--ro stats
           +--ro matched-packets?   yang:counter64
           +--ro matched-octets?    yang:counter64
]]></sourcecode>
    </section>
    <section anchor="yang-model">
      <name>YANG Model</name>
      <sourcecode type="YANG"><![CDATA[
<CODE BEGINS> file "ietf-traffic-map@2022-10-24.yang"
module ietf-traffic-map {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-traffic-map";
  prefix tm;

  import ietf-inet-types {
    prefix inet;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-te {
    prefix te;
    reference
      "I-D.ietf-teas-yang-te: A YANG Data Model for Traffic
       Engineering Tunnels and Interfaces";
  }
  import ietf-routing {
    prefix rt;
    reference
      "RFC8349: A YANG Data Model for Routing Management";
  }
  import ietf-sr-policy {
    prefix sr-policy;
    reference
      "I-D.ietf-spring-sr-policy-yang: YANG Data Model for Segment
       Routing Policy";
  }
  import ietf-network-slice-service {
    prefix ietf-nss;
    reference
      "I-D.ietf-teas-ietf-network-slice-nbi-yang: IETF
       Network Slice Service YANG Model";
  }
  import ietf-packet-fields {
    prefix packet-fields;
    reference
      "RFC 8519: YANG Data Model for Network Access
       Control Lists (ACLs)";
  }
  import ietf-access-control-list {
    prefix acl;
    reference
      "RFC 8519: YANG Data Model for Network Access Control
       Lists (ACLs)";
  }
  import ietf-vpn-common {
    prefix vpn-common;
    reference
      "RFC 9181: A Common YANG Data Model for Layer 2 and
       Layer 3 VPNs";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:  <https://datatracker.ietf.org/wg/teas/about/>
     WG List:  <mailto:teas@ietf.org>
     Editor: Dhruv Dhody <dhruv.ietf@gmail.com>";
  description
    "This module contains a YANG module to map traffic to
     Traffic Engineering (TE) paths.

     Copyright (c) 2022 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2022-10-24 {
    description
      "initial version.";
    reference
      "RFC XXXX: Traffic Mapping YANG model for Traffic
       Engineering (TE)";
  }

  grouping traffic-description {
    description
      "The traffic description";
    leaf id {
      type string;
      description
        "The identifier for Traffic Description";
    }
    choice type {
      description
        "The various ways the traffic can be described";
      case match-criteria {
        description
          "Use the match criteria";
        list match-criterion {
          key "index";
          description
            "List of traffic match criteria.";
          leaf index {
            type uint32;
            description
              "The entry index.";
          }
          leaf match-type {
            type identityref {
              base ietf-nss:service-match-type;
            }
            mandatory true;
            description
              "Identifies an entry in the list of the
               match criteria.";
          }
          leaf-list value {
            type string;
            description
              "Describes the slice service match criteria, e.g.
               IP address, VLAN, etc.";
          }
        }
      }
      case acl {
        description
          "Reference to ACL";
        leaf acl {
          type leafref {
            path "/acl:acls/acl:acl/acl:name";
          }
          description
            "The ACL Name. The action part of the ACL is not
             used.";
          reference
            "RFC8519: YANG Data Model for Network Access Control
             Lists (ACLs)";
        }
      }
      case flowspec {
        description
          "Based on FlowSpec component type - TODO";
      }
      case interface {
        description
          "All traffic received on an interface";
        leaf node {
          type string;
          description
            "The node identifier";
        }
        leaf if-name {
          type string;
          description
            "The interface name on the node";
        }
      }
      case flow {
        description
          "Match particular flows";
        choice l3 {
          description
            "Either IPv4 or IPv6.";
          container ipv4 {
            description
              "Rule set that matches the IPv4 header.";
            uses packet-fields:acl-ip-header-fields;
            uses packet-fields:acl-ipv4-header-fields;
          }
          container ipv6 {
            description
              "Rule set that matches the IPv6 header.";
            uses packet-fields:acl-ip-header-fields;
            uses packet-fields:acl-ipv6-header-fields;
          }
        }
        choice l4 {
          description
            "Includes Layer-4-specific information.
             This version focuses on TCP and UDP.";
          container tcp {
            description
              "Rule set that matches the TCP header.";
            uses packet-fields:acl-tcp-header-fields;
            uses vpn-common:ports;
          }
          container udp {
            description
              "Rule set that matches the UDP header.";
            uses packet-fields:acl-udp-header-fields;
            uses vpn-common:ports;
          }
        }
      }
      case other {
        description
          "TODO";
      }
    }
  }

  grouping te-ref {
    description
      "Reference to TE paths";
    leaf-list te-tunnel {
      type te:tunnel-ref;
      description
        "Reference to TE Tunnels";
      reference
        "I-D.ietf-teas-yang-te: A YANG Data Model for Traffic
         Engineering Tunnels and Interfaces";
    }
    list sr-policy {
      key "headend policy-color-ref policy-endpoint-ref";
      description
        "SR Policy";
      reference
        "I-D.ietf-spring-sr-policy-yang: YANG Data Model for
         Segment Routing Policy";
      /*Headend needs to be added*/
      leaf headend {
        type inet:ip-address-no-zone;
        description
          "SR Policy headend";
      }
      leaf policy-color-ref {
        type leafref {
          path "/rt:routing/sr-policy:segment-routing"
             + "/sr-policy:traffic-engineering/sr-policy:policies"
             + "/sr-policy:policy/sr-policy:color";
        }
        description
          "Reference to sr-policy color";
      }
      leaf policy-endpoint-ref {
        type leafref {
          path "/rt:routing/sr-policy:segment-routing"
             + "/sr-policy:traffic-engineering/sr-policy:policies"
             + "/sr-policy:policy/sr-policy:endpoint";
        }
        description
          "Reference to sr-policy endpoint";
      }
    }
    container other {
      description
        "To dp - VN, IETF Network Slice, SFC etc";
    }
  }

  /* Configuration data nodes */

  container traffic-map {
    description
      "AP configurations";
    list maps {
      key "id";
      description
        "traffic map identifier";
      leaf id {
        type string;
        description
          "The identifier for Traffic Maps";
      }
      container traffic {
        description
          "The traffic description";
        uses traffic-description;
      }
      container action {
        description
          "The action is limited to identifying the TE resource";
        uses te-ref;
      }
      container stats {
        config false;
        description
          "Statistics";
        leaf matched-packets {
          type yang:counter64;
          description
            "The number of packets that matched the traffic
             description";
        }
        leaf matched-octets {
          type yang:counter64;
          description
            "The number of octets (byte) that matched the traffic
             description";
        }
      }
    }
  }
}

<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following allocation for the URIs in the "ns" subregistry within the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   URI: urn:ietf:params:xml:ns:yang:ietf-traffic-map
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace.
   --------------------------------------------------------------------
]]></artwork>
      <t>IANA is requested to make the following allocation for the YANG module in the "YANG Module Names" registry <xref target="RFC6020"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   name:         ietf-traffic-map
   namespace:    urn:ietf:params:xml:ns:yang:ietf-traffic-map
   prefix:       tm
   reference:    RFC XXXX
   --------------------------------------------------------------------
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3688" target="https://www.rfc-editor.org/info/rfc3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020" target="https://www.rfc-editor.org/info/rfc6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6991" target="https://www.rfc-editor.org/info/rfc6991">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language.  This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8340" target="https://www.rfc-editor.org/info/rfc8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8349" target="https://www.rfc-editor.org/info/rfc8349">
          <front>
            <title>A YANG Data Model for Routing Management (NMDA Version)</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka">
              <organization/>
            </author>
            <author fullname="A. Lindem" initials="A." surname="Lindem">
              <organization/>
            </author>
            <author fullname="Y. Qu" initials="Y." surname="Qu">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document specifies three YANG modules and one submodule. Together, they form the core routing data model that serves as a framework for configuring and managing a routing subsystem.  It is expected that these modules will be augmented by additional YANG modules defining data models for control-plane protocols, route filters, and other functions.  The core routing data model provides common building blocks for such extensions -- routes, Routing Information Bases (RIBs), and control-plane protocols.</t>
              <t>The YANG modules in this document conform to the Network Management Datastore Architecture (NMDA).  This document obsoletes RFC 8022.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8349"/>
          <seriesInfo name="DOI" value="10.17487/RFC8349"/>
        </reference>
        <reference anchor="RFC8519" target="https://www.rfc-editor.org/info/rfc8519">
          <front>
            <title>YANG Data Model for Network Access Control Lists (ACLs)</title>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani">
              <organization/>
            </author>
            <author fullname="S. Agarwal" initials="S." surname="Agarwal">
              <organization/>
            </author>
            <author fullname="L. Huang" initials="L." surname="Huang">
              <organization/>
            </author>
            <author fullname="D. Blair" initials="D." surname="Blair">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a data model for Access Control Lists (ACLs). An ACL is a user-ordered set of rules used to configure the forwarding behavior in a device.  Each rule is used to find a match on a packet and define actions that will be performed on the packet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8519"/>
          <seriesInfo name="DOI" value="10.17487/RFC8519"/>
        </reference>
        <reference anchor="RFC9181" target="https://www.rfc-editor.org/info/rfc9181">
          <front>
            <title>A Common YANG Data Model for Layer 2 and Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil">
              <organization/>
            </author>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios">
              <organization/>
            </author>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
              <organization/>
            </author>
            <author fullname="Q. Wu" initials="Q." surname="Wu">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines a common YANG module that is meant to be reused by various VPN-related modules such as Layer 3 VPN and Layer 2 VPN network models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9181"/>
          <seriesInfo name="DOI" value="10.17487/RFC9181"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te" target="https://www.ietf.org/archive/id/draft-ietf-teas-yang-te-31.txt">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-31"/>
        </reference>
        <reference anchor="I-D.ietf-spring-sr-policy-yang" target="https://www.ietf.org/archive/id/draft-ietf-spring-sr-policy-yang-02.txt">
          <front>
            <title>YANG Data Model for Segment Routing Policy</title>
            <author fullname="Syed Raza" initials="S." surname="Raza">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Robert Sawaya" initials="R." surname="Sawaya">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Zhuang Shunwan" initials="Z." surname="Shunwan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Muhammad Durrani" initials="M." surname="Durrani">
              <organization>Equinix</organization>
            </author>
            <author fullname="Satoru Matsushima" initials="S." surname="Matsushima">
              <organization>SoftBank</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <date day="23" month="September" year="2022"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   Policy that can be used for configuring, instantiating, and managing
   SR policies.  The model is generic and apply equally to the MPLS and
   SRv6 instantiations of SR policies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-policy-yang-02"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang" target="https://www.ietf.org/archive/id/draft-ietf-teas-ietf-network-slice-nbi-yang-03.txt">
          <front>
            <title>IETF Network Slice Service YANG Model</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Liuyan Han" initials="L." surname="Han">
              <organization>China Mobile</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document defines a YANG model for the IETF Network Slice
   service.  The model can be used by an IETF Network Slice customer to
   manage IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-03"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl">
              <organization/>
            </author>
            <author fullname="S. Hares" initials="S." surname="Hares">
              <organization/>
            </author>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk">
              <organization/>
            </author>
            <author fullname="D. McPherson" initials="D." surname="McPherson">
              <organization/>
            </author>
            <author fullname="M. Bacher" initials="M." surname="Bacher">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix. </t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI.  Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t> This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC9168" target="https://www.rfc-editor.org/info/rfc9168">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extension for Flow Specification</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody">
              <organization/>
            </author>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <author fullname="Z. Li" initials="Z." surname="Li">
              <organization/>
            </author>
            <date month="January" year="2022"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a functional component capable of selecting paths through a traffic engineering (TE) network.  These paths may be supplied in response to requests for computation or may be unsolicited requests issued by the PCE to network elements.  Both approaches use the PCE Communication Protocol (PCEP) to convey the details of the computed path.</t>
              <t>Traffic flows may be categorized and described using "Flow Specifications".  RFC 8955 defines the Flow Specification and describes how Flow Specification components are used to describe traffic flows.  RFC 8955 also defines how Flow Specifications may be distributed in BGP to allow specific traffic flows to be associated with routes.</t>
              <t>This document specifies a set of extensions to PCEP to support dissemination of Flow Specifications.  This allows a PCE to indicate what traffic should be placed on each path that it is aware of.</t>
              <t>The extensions defined in this document include the creation, update, and withdrawal of Flow Specifications via PCEP and can be applied to tunnels initiated by the PCE or to tunnels where control is delegated to the PCE by the Path Computation Client (PCC). Furthermore, a PCC requesting a new path can include Flow Specifications in the request to indicate the purpose of the tunnel allowing the PCE to factor this into the path computation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9168"/>
          <seriesInfo name="DOI" value="10.17487/RFC9168"/>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Adrian Farrel for the motivation behind this document.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>TO be added in future revisions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
