<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dhody-teas-te-traffic-yang-04" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Traffic-TE-YANG">Traffic Mapping YANG model for Traffic Engineering (TE)</title>
    <seriesInfo name="Internet-Draft" value="draft-dhody-teas-te-traffic-yang-04"/>
    <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>IN</country>
        </postal>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <date/>
    <area>Routing</area>
    <workgroup>TEAS Working Group</workgroup>
    <abstract>
      <?line 46?>

<t>This document provides a YANG data model to map traffic to Traffic Engineering (TE) paths. This model providers operator a seamless control and management of which traffic to send on the underlying TE resources.</t>
    </abstract>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Data models are a representation of objects that can be configured or monitored within a system.  Within the IETF, YANG <xref target="RFC7950"/> is the language of choice for documenting data models, and YANG models have been produced to allow configuration or modeling of a variety of network devices, protocol instances, and network services.</t>
      <t>There are various YANG models to establish paths in the network, such as:</t>
      <ul spacing="normal">
        <li>
          <t>TE Tunnels <xref target="I-D.ietf-teas-yang-te"/></t>
        </li>
        <li>
          <t>Segment Routing (SR) Policy <xref target="I-D.ietf-spring-sr-policy-yang"/></t>
        </li>
        <li>
          <t>Service Function Chaining (SFC)</t>
        </li>
        <li>
          <t>Virtual Network (VN)</t>
        </li>
        <li>
          <t>IETF Network Slice</t>
        </li>
      </ul>
      <t>These models do not include an exact mechanism to describe the traffic that needs to be mapped to the paths. Thus an operator lacks a way to simply use the YANG model to tell requirements such as the traffic from source X on port Y should go on a TE path with delay less than Z. The YANG model defined in this document fills this gap.</t>
      <t>To achieve this goal, the YANG model defined in this document utilizes the concept borrowed from:</t>
      <ul spacing="normal">
        <li>
          <t>BGP FlowSpec: Where the description of traffic flows is done by the combination of multiple Flow Specification Components and their dissemination as traffic flow specifications (Flow Specifications) is described for BGP in <xref target="RFC8955"/>.  In BGP, a Flow Specification is comprised of traffic filtering rules and is associated with actions to perform on the packets that match the Flow Specification.  The BGP routers that receive a Flow Specification can classify received packets according to the traffic filtering rules and can direct packets based on the associated actions.</t>
        </li>
        <li>
          <t>Path Computation Element (PCE) FlowSpec: Extends the idea to PCE Communication Protocol (PCEP) <xref target="RFC9168"/>.</t>
        </li>
        <li>
          <t>Access Control List (ACL): A basic elements used to configure device-forwarding behavior in form of a user-ordered set of rules that is used to filter traffic on a networking device.  Each rule is represented by an Access Control Entry (ACE). Each ACE has a group of match criteria and a group of actions <xref target="RFC8519"/>.</t>
        </li>
        <li>
          <t>Flow: Elements in the packet in IP/UDP/TCP header to match particular flows.</t>
        </li>
      </ul>
      <t>The YANG model includes two key concepts:</t>
      <ul spacing="normal">
        <li>
          <t>Traffic Description: The various fields that needs to be matched to identify a traffic flow.</t>
        </li>
        <li>
          <t>Action: The associated action that needs to be taken. For the purpose of this YANG model the action is to simply point to the TE resource in form of the TE tunnel, SR Policy etc.</t>
        </li>
      </ul>
      <t>Note: The RFC Editor will replace XXXX with the number assigned to the RFC once this draft becomes an RFC.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <section anchor="tree-diagrams">
        <name>Tree Diagrams</name>
        <t>A simplified graphical representation of the data model is used in this document.  The meaning of the symbols in these diagrams is defined in <xref target="RFC8340"/>.</t>
      </section>
      <section anchor="prefixes-in-data-node-names">
        <name>Prefixes in Data Node Names</name>
        <t>In this document, names of data nodes and other data model objects are often used without a prefix, as long as it is clear from the context in which YANG module each name is defined.  Otherwise, names are prefixed using the standard prefix associated with the corresponding YANG module, as shown in Table 1.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="center">YANG module</th>
              <th align="right">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">inet</td>
              <td align="center">ietf-inet-types</td>
              <td align="right">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">yang</td>
              <td align="center">ietf-yang-types</td>
              <td align="right">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">te</td>
              <td align="center">ietf-te</td>
              <td align="right">
                <xref target="I-D.ietf-teas-yang-te"/></td>
            </tr>
            <tr>
              <td align="left">rt</td>
              <td align="center">ietf-routing</td>
              <td align="right">
                <xref target="RFC8349"/></td>
            </tr>
            <tr>
              <td align="left">sr-policy</td>
              <td align="center">ietf-sr-policy</td>
              <td align="right">
                <xref target="I-D.ietf-spring-sr-policy-yang"/></td>
            </tr>
            <tr>
              <td align="left">ietf-nss</td>
              <td align="center">ietf-network-slice-service</td>
              <td align="right">
                <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/></td>
            </tr>
            <tr>
              <td align="left">acl</td>
              <td align="center">ietf-access-control-list</td>
              <td align="right">
                <xref target="RFC8519"/></td>
            </tr>
            <tr>
              <td align="left">packet-fields</td>
              <td align="center">ietf-packet-fields</td>
              <td align="right">
                <xref target="RFC8519"/></td>
            </tr>
            <tr>
              <td align="left">vpn-common</td>
              <td align="center">ietf-vpn-common</td>
              <td align="right">
                <xref target="RFC9181"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="references-in-the-model">
        <name>References in the Model</name>
        <t>Following documents are referenced in the model defined in this document -</t>
        <table>
          <thead>
            <tr>
              <th align="left">Document</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">YANG Data Model for Network Access Control Lists (ACLs)</td>
              <td align="center">
                <xref target="RFC8519"/></td>
            </tr>
            <tr>
              <td align="left">A YANG Data Model for Traffic Engineering Tunnels and Interfaces</td>
              <td align="center">
                <xref target="I-D.ietf-teas-yang-te"/></td>
            </tr>
            <tr>
              <td align="left">YANG Data Model for Segment Routing Policy</td>
              <td align="center">
                <xref target="I-D.ietf-spring-sr-policy-yang"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="discussion-items">
      <name>Discussion Items</name>
      <t>For describing the traffic, currently the YANG models uses:</t>
      <ul spacing="normal">
        <li>
          <t>The match criteria grouping from the <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>. If this document gets WG backing, then it might be a good idea to move the grouping to this document instead.</t>
        </li>
        <li>
          <t>The ACL Name. Should that be ACE instead?</t>
        </li>
        <li>
          <t>The match action granularity in case of IETF network slice and VN needs to be discussed.</t>
        </li>
        <li>
          <t>The match action for SFC is not handled yet.</t>
        </li>
      </ul>
    </section>
    <section anchor="tree-structure">
      <name>Tree Structure</name>
      <sourcecode type="Tree"><![CDATA[
module: ietf-traffic-map
  +--rw traffic-map
     +--rw maps* [id]
        +--rw id         string
        +--rw traffic
        |  +--rw id?                      string
        |  +--rw (type)?
        |     +--:(match-criteria)
        |     |  +--rw match-criterion* [index]
        |     |     +--rw index         uint32
        |     |     +--rw match-type    identityref
        |     |     +--rw value*        string
        |     +--:(acl)
        |     |  +--rw acl?               -> /acl:acls/acl/name
        |     +--:(flowspec)
        |     +--:(interface)
        |     |  +--rw node?              string
        |     |  +--rw if-name?           string
        |     +--:(flow)
        |     |  +--rw (l3)?
        |     |  |  +--:(ipv4)
        |     |  |  |  +--rw ipv4
        |     |  |  |        ...
        |     |  |  +--:(ipv6)
        |     |  |     +--rw ipv6
        |     |  |           ...
        |     |  +--rw (l4)?
        |     |     +--:(tcp)
        |     |     |  +--rw tcp
        |     |     |        ...
        |     |     +--:(udp)
        |     |        +--rw udp
        |     |              ...
        |     +--:(other)
        +--rw action
        |  +--rw te-tunnel*   te:tunnel-ref
        |  +--rw sr-policy* [headend policy-color-ref policy-endpoint-ref]
        |  |  +--rw headend                inet:ip-address-no-zone
        |  |  +--rw policy-color-ref       leafref
        |  |  +--rw policy-endpoint-ref    leafref
        |  +--rw other
        +--ro stats
           +--ro matched-packets?   yang:counter64
           +--ro matched-octets?    yang:counter64
]]></sourcecode>
    </section>
    <section anchor="yang-model">
      <name>YANG Model</name>
      <sourcecode type="YANG"><![CDATA[
<CODE BEGINS> file "ietf-traffic-map@2024-03-04.yang"
module ietf-traffic-map {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-traffic-map";
  prefix tm;

  import ietf-inet-types {
    prefix inet;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-te {
    prefix te;
    reference
      "I-D.ietf-teas-yang-te: A YANG Data Model for Traffic
       Engineering Tunnels and Interfaces";
  }
  import ietf-routing {
    prefix rt;
    reference
      "RFC8349: A YANG Data Model for Routing Management";
  }
  import ietf-sr-policy {
    prefix sr-policy;
    reference
      "I-D.ietf-spring-sr-policy-yang: YANG Data Model for Segment
       Routing Policy";
  }
  import ietf-network-slice-service {
    prefix ietf-nss;
    reference
      "I-D.ietf-teas-ietf-network-slice-nbi-yang: IETF
       Network Slice Service YANG Model";
  }
  import ietf-packet-fields {
    prefix packet-fields;
    reference
      "RFC 8519: YANG Data Model for Network Access
       Control Lists (ACLs)";
  }
  import ietf-access-control-list {
    prefix acl;
    reference
      "RFC 8519: YANG Data Model for Network Access Control
       Lists (ACLs)";
  }
  import ietf-vpn-common {
    prefix vpn-common;
    reference
      "RFC 9181: A Common YANG Data Model for Layer 2 and
       Layer 3 VPNs";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:  <https://datatracker.ietf.org/wg/teas/about/>
     WG List:  <mailto:teas@ietf.org>
     Editor: Dhruv Dhody <dhruv.ietf@gmail.com>";
  description
    "This module contains a YANG module to map traffic to
     Traffic Engineering (TE) paths.

     Copyright (c) 2022 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2024-03-04 {
    description
      "initial version.";
    reference
      "RFC XXXX: Traffic Mapping YANG model for Traffic
       Engineering (TE)";
  }

  grouping traffic-description {
    description
      "The traffic description";
    leaf id {
      type string;
      description
        "The identifier for Traffic Description";
    }
    choice type {
      description
        "The various ways the traffic can be described";
      case match-criteria {
        description
          "Use the match criteria";
        list match-criterion {
          key "index";
          description
            "List of traffic match criteria.";
          leaf index {
            type uint32;
            description
              "The entry index.";
          }
          leaf match-type {
            type identityref {
              base ietf-nss:service-match-type;
            }
            mandatory true;
            description
              "Identifies an entry in the list of the
               match criteria.";
          }
          leaf-list value {
            type string;
            description
              "Describes the slice service match criteria, e.g.
               IP address, VLAN, etc.";
          }
        }
      }
      case acl {
        description
          "Reference to ACL";
        leaf acl {
          type leafref {
            path "/acl:acls/acl:acl/acl:name";
          }
          description
            "The ACL Name. The action part of the ACL is not
             used.";
          reference
            "RFC8519: YANG Data Model for Network Access Control
             Lists (ACLs)";
        }
      }
      case flowspec {
        description
          "Based on FlowSpec component type - TODO";
      }
      case interface {
        description
          "All traffic received on an interface";
        leaf node {
          type string;
          description
            "The node identifier";
        }
        leaf if-name {
          type string;
          description
            "The interface name on the node";
        }
      }
      case flow {
        description
          "Match particular flows";
        choice l3 {
          description
            "Either IPv4 or IPv6.";
          container ipv4 {
            description
              "Rule set that matches the IPv4 header.";
            uses packet-fields:acl-ip-header-fields;
            uses packet-fields:acl-ipv4-header-fields;
          }
          container ipv6 {
            description
              "Rule set that matches the IPv6 header.";
            uses packet-fields:acl-ip-header-fields;
            uses packet-fields:acl-ipv6-header-fields;
          }
        }
        choice l4 {
          description
            "Includes Layer-4-specific information.
             This version focuses on TCP and UDP.";
          container tcp {
            description
              "Rule set that matches the TCP header.";
            uses packet-fields:acl-tcp-header-fields;
            uses vpn-common:ports;
          }
          container udp {
            description
              "Rule set that matches the UDP header.";
            uses packet-fields:acl-udp-header-fields;
            uses vpn-common:ports;
          }
        }
      }
      case other {
        description
          "TODO";
      }
    }
  }

  grouping te-ref {
    description
      "Reference to TE paths";
    leaf-list te-tunnel {
      type te:tunnel-ref;
      description
        "Reference to TE Tunnels";
      reference
        "I-D.ietf-teas-yang-te: A YANG Data Model for Traffic
         Engineering Tunnels and Interfaces";
    }
    list sr-policy {
      key "headend policy-color-ref policy-endpoint-ref";
      description
        "SR Policy";
      reference
        "I-D.ietf-spring-sr-policy-yang: YANG Data Model for
         Segment Routing Policy";
      /*Headend needs to be added*/
      leaf headend {
        type inet:ip-address-no-zone;
        description
          "SR Policy headend";
      }
      leaf policy-color-ref {
        type leafref {
          path "/rt:routing/sr-policy:segment-routing"
             + "/sr-policy:traffic-engineering/sr-policy:policies"
             + "/sr-policy:policy/sr-policy:color";
        }
        description
          "Reference to sr-policy color";
      }
      leaf policy-endpoint-ref {
        type leafref {
          path "/rt:routing/sr-policy:segment-routing"
             + "/sr-policy:traffic-engineering/sr-policy:policies"
             + "/sr-policy:policy/sr-policy:endpoint";
        }
        description
          "Reference to sr-policy endpoint";
      }
    }
    container other {
      description
        "To dp - VN, IETF Network Slice, SFC etc";
    }
  }

  /* Configuration data nodes */

  container traffic-map {
    description
      "AP configurations";
    list maps {
      key "id";
      description
        "traffic map identifier";
      leaf id {
        type string;
        description
          "The identifier for Traffic Maps";
      }
      container traffic {
        description
          "The traffic description";
        uses traffic-description;
      }
      container action {
        description
          "The action is limited to identifying the TE resource";
        uses te-ref;
      }
      container stats {
        config false;
        description
          "Statistics";
        leaf matched-packets {
          type yang:counter64;
          description
            "The number of packets that matched the traffic
             description";
        }
        leaf matched-octets {
          type yang:counter64;
          description
            "The number of octets (byte) that matched the traffic
             description";
        }
      }
    }
  }
}

<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following allocation for the URIs in the "ns" subregistry within the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   URI: urn:ietf:params:xml:ns:yang:ietf-traffic-map
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace.
   --------------------------------------------------------------------
]]></artwork>
      <t>IANA is requested to make the following allocation for the YANG module in the "YANG Module Names" registry <xref target="RFC6020"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   name:         ietf-traffic-map
   namespace:    urn:ietf:params:xml:ns:yang:ietf-traffic-map
   prefix:       tm
   reference:    RFC XXXX
   --------------------------------------------------------------------
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8349">
          <front>
            <title>A YANG Data Model for Routing Management (NMDA Version)</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document specifies three YANG modules and one submodule. Together, they form the core routing data model that serves as a framework for configuring and managing a routing subsystem. It is expected that these modules will be augmented by additional YANG modules defining data models for control-plane protocols, route filters, and other functions. The core routing data model provides common building blocks for such extensions -- routes, Routing Information Bases (RIBs), and control-plane protocols.</t>
              <t>The YANG modules in this document conform to the Network Management Datastore Architecture (NMDA). This document obsoletes RFC 8022.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8349"/>
          <seriesInfo name="DOI" value="10.17487/RFC8349"/>
        </reference>
        <reference anchor="RFC8519">
          <front>
            <title>YANG Data Model for Network Access Control Lists (ACLs)</title>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani"/>
            <author fullname="S. Agarwal" initials="S." surname="Agarwal"/>
            <author fullname="L. Huang" initials="L." surname="Huang"/>
            <author fullname="D. Blair" initials="D." surname="Blair"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a data model for Access Control Lists (ACLs). An ACL is a user-ordered set of rules used to configure the forwarding behavior in a device. Each rule is used to find a match on a packet and define actions that will be performed on the packet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8519"/>
          <seriesInfo name="DOI" value="10.17487/RFC8519"/>
        </reference>
        <reference anchor="RFC9181">
          <front>
            <title>A Common YANG Data Model for Layer 2 and Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines a common YANG module that is meant to be reused by various VPN-related modules such as Layer 3 VPN and Layer 2 VPN network models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9181"/>
          <seriesInfo name="DOI" value="10.17487/RFC9181"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="2" month="February" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-36"/>
        </reference>
        <reference anchor="I-D.ietf-spring-sr-policy-yang">
          <front>
            <title>YANG Data Model for Segment Routing Policy</title>
            <author fullname="Syed Raza" initials="S." surname="Raza">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Robert Sawaya" initials="R." surname="Sawaya">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Zhuang Shunwan" initials="Z." surname="Shunwan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Muhammad Durrani" initials="M." surname="Durrani">
              <organization>Equinix</organization>
            </author>
            <author fullname="Satoru Matsushima" initials="S." surname="Matsushima">
              <organization>SoftBank</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <date day="23" month="September" year="2022"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   Policy that can be used for configuring, instantiating, and managing
   SR policies.  The model is generic and apply equally to the MPLS and
   SRv6 instantiations of SR policies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-policy-yang-02"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC AAAA Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="17" month="February" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC AAAA Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC AAAA
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-09"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC9168">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extension for Flow Specification</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="January" year="2022"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a functional component capable of selecting paths through a traffic engineering (TE) network. These paths may be supplied in response to requests for computation or may be unsolicited requests issued by the PCE to network elements. Both approaches use the PCE Communication Protocol (PCEP) to convey the details of the computed path.</t>
              <t>Traffic flows may be categorized and described using "Flow Specifications". RFC 8955 defines the Flow Specification and describes how Flow Specification components are used to describe traffic flows. RFC 8955 also defines how Flow Specifications may be distributed in BGP to allow specific traffic flows to be associated with routes.</t>
              <t>This document specifies a set of extensions to PCEP to support dissemination of Flow Specifications. This allows a PCE to indicate what traffic should be placed on each path that it is aware of.</t>
              <t>The extensions defined in this document include the creation, update, and withdrawal of Flow Specifications via PCEP and can be applied to tunnels initiated by the PCE or to tunnels where control is delegated to the PCE by the Path Computation Client (PCC). Furthermore, a PCC requesting a new path can include Flow Specifications in the request to indicate the purpose of the tunnel allowing the PCE to factor this into the path computation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9168"/>
          <seriesInfo name="DOI" value="10.17487/RFC9168"/>
        </reference>
      </references>
    </references>
    <?line 516?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Adrian Farrel for the motivation behind this document.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>TO be added in future revisions.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9U723LbOJbv/Aqs+mHtjClf4vYkSle6FUtJq8q3tZRkeqe6
tiASkjDhbQjSjtpWf8t8y37ZnnMA8CZKcrY9UzWqSiyBwLlfAdB1XcfJZBaI
HutMUj6bSY9d8iSR0Zz90r/6wMLYFwGbxSmzj4fRXEZCpDhlbzLc7zh8Ok3F
Xc/OcCdDF9c6fuxFPATQPjzIXH8R+0s3E1zBf25mJi95NHePTh2fZzDzYdCf
DFeOBz/mcbrsMZX5jkzSHsvSXGUnR0evj04cngreY7dxngERzn2cfpmncZ4A
BcP+mH2G30jcBxxzHJXxyP8fHsQRwF8K5SSyx/6axd4BU3GapWKm4Nsy1F+A
5lDz/6vj8DxbxGnPcVyHMRmpHht02QDZgN+atcEize+KsTid99jPOb8XEn55
cR5lyMToCn6JkMsAZIELulJks5/mONL14tBxojgNeSbvRM9ht+/PT46PX+tv
L89evdLfzo5Ojsy316+P9bc/v/7ejL06/vOp+fby9Kj4ZqC8+t7Ce338CteO
3AHRoNVBOshEdVwlqGBXpW4SB9Jb0py1hfQtEhmqwFUwT7jRVJq5MprVuXr1
+vvvLRVnwBV9XNdlfKrAHLzMcSYLqVAHeSiijCVpfCd9oRjXxgg2wo1FZjED
PTFjRfhzk32yhGcL1WUEWi82cFPF4kSkPAPr5kwJHgZCKVAbaC0OGJgN4Ij4
XBAx8YzdL6S3qOJUAubEEcsWguURQAyWiHYyZKlQcZ56QnU1i6H0/UA4znds
hND93MtkHDnOoGAJuEwF0JGKBBYDRo4zEG08/ZvwMgVYeMY8HrGpQCJncp6n
AvCnACCSwAX8uJfZQkbIzlJlIuwy9lmPIImj4eT9gRblw4Mxn9WKSUVPA9Ba
DtwiSm8RgzLJ7602kLFSAeAqKJ8yRii24HcCSBMRyhcYBGpARDwI4vuCXMNT
qtcgSEDG2R1PwZSW+MNYE/PFHVAAaAAYOCvoAxwQXJnGELWdqERKM7toPQJF
CP8QYJyrGn1AjAAI00CqhTYKZuRiQEEYyEG/XIFpsheoxUkeRbj04aHVYVYr
nDcWczIQE4/Y3vh2n92Q11QXtnqUhUAssPd5RGbBzhdcRhrW+/N9nPJJplnO
A3ZluN77dEXjqNJicIweSGJQwnLtxyyKM+DUC3IfhBMx8RVcjYXCW/BIqhDl
Aj7mpRLMCqVR2DeaG3iST6KDhxgYtVJxWuFWIGaAWnhSwL0v6LH3fEkuIsMk
WLJcaeCVpIJwRBCAwf89lyk5mbIaqBEyS+OQaXdif0F3SyBus1+YWsR54LN5
jGMc9YU0kQsARwHgJ38GPiL230hpDb0vZhAnfG0D1agzkwFaC47NeYJmBVbs
LaS4E2Y05sFBk5uN4MAoAvmb0CyBH3giydg0TtP4HqYjb9rc3n24Ye/BV8aJ
8HrsM5kyLtG6SWwwKIQCUxUjRBG43dKAD6cyKgJHmAeZTAJBcBkClrBUPz6P
wwRWoszRm2C1BF+XSonQQkA1VLAxVQWg2N46VLVPFBlr8il+IF8gFAo4mAFW
KwhKowjHwZHbSJMYg0NwF4XRrcKyDDId19M8EJpumMuVij0JFYOOfqArTR/Y
F9gk5iAbohMwTWEDKWQmDOaLNukAhWgtSDoUERlmClqTCk9AOmsnGyOzFwA1
cra0M/0CJ/e8OPWReOM/27hCUD74BPipXT/lJA3NSIVlw20XTegGzR8Vm5vk
MQx07tq7OYdEWFrX8GsGmUubJCRCjjTBFFwb5pFl6MZGXlx+s69ViKkbVIjo
+p6H/nVu8uWFVICpf36x32N9pBeYE4Hx61zpyFHkLRPgXdDPPdeCmQpIIRJM
BsxFqw1zA6xMXRCdwPSmBCViLSlSiSxha0kWgqWgYEI7JS9CCKodgjcTCFxc
pFuAAV4Egm+wNcQaDvka7nf1UvgKyQ5jHJWd5GlkTGD1qEpOOqw8tRapfQBq
MSNAVEjPKqnIRlrj+Gt0c/hxcHM4Ob9hC8F95C02qBKeZtLLA57qSKCzXzUg
mYgPYrqP2RextLHHZjcjpUEZXnpk9DZ1zqQIfNWWBQC/FjiYDtQFYO28FiiM
cZQg18x1HWrGvwhwu/egfZJBniaxolKEomk1bSBAzwaKMsMksQRLN85VqcCq
1mQeZZTWD9j41uZpkXkgwasYexCkGPTEhj7WVBBTKEclkNcg/cBHRxmqG/Jw
CkpBl59HZWbExShrkwiw+QEWIaSRd+PjLhaCYGB3KD+wDK08VBIYK8ikc/lx
POkc6L/s6pq+3w7/6+PodjjA7+Of+xcXxRfHzBj/fP3xYlB+K1eeX19eDq8G
ejGMstqQ07ns/9LRZVXn+mYyur7qX3TWUxlWVlpdIGqRguOQSpVTRnxY8+78
5n//cXwK1v4fppWBGlP/wC4FftwvRKSxxRFoTv8EyS0drDA4BQCoGyEMJjLj
VGsqzPb3EcO0CNJzvvsOLFgINpB8nvIQJNjXhgDxGMiAsQSKdR60lNOUVMtO
wgaQJrcmB4SCR6ZOxYXQKE7jwPoqWKhvCNCJr6gBtKtDK4aujtTeQH8pvwpa
SUX/FWBnV9BEAu2jBu4D6i4VIiVKo9g3mSEGrGmVfNscoG7iGYR1zQ3aKGQu
8MyEEJMIoQee419JYdMLUNRUXJnSJBNfKe7oPsf6HAZKgXEPaaqwCQK6Rmru
IU9bgpEKjRBoyBWlO5Qa9uAQ5c2ztZSt8aegKKhJ/OrmAyCvaB9om0ABL9gx
CPXRyJTR57FGrx65FTMwF/RE+g0retiLMbsCPjjg9qoj+kOjuAI4zYoVVMjj
iJstE2D3UesZG3Iwa5yORX2JgObrZqFlviYpE3Xw8Ptxc8NBS6D6NbBT03M8
Fgb32swp+gw7tTqwuy3RvFN7D7mwwk292zfNVwvFW7YGDHTuBRYop5Trms7b
DbCSeKymS1qgE6NrEpNZ2hxsLrpLIoAbQodsV9RGTE3zSuuPPLWwmiIjX6Kn
Oc77GHtZKiWMn2qDT+0C3y7Y0RK4aLwD+8ua3jdbq2NsnsLJZbFRZ7vBlvJM
UX0GVXoBtCmufivItr0V2xtjVBphOphxz5j4NtttA9/soG++yU4hlQ6k8nLI
wqDSUSYwG2AhYbKSDUKmRDlgXg6RJsqCZaOHo0Rgy6OFaBZ1VM4hsCJkfpPN
d9lo1rCDORb2nz9ArexhhUo5MMLoHMr5AmsGLCLj2C9q9DC+001hQQuVHFWY
uEsCtWK34AIUTmmmy8a6X6baayqojDWzf2zwbOorSGwRlpgyW6IRe1xXZLTn
UGy/IJtkBJ+uahWdr3UiKqTUgJPioVIC4nGDApp0PwBnWYqMqiPK7uMszb0M
ugXH+f3333HI0QG+p13ZbiKHPHEY+5PrpvesPsbsMPxUL9hfpf+rY61fP5B+
EfRVhjbWeG7gOaXPFAt/ZK2fBphiwR4mgf0fqw80lt4eSca1prbfmPJYMlGZ
FkfIT+SLr7+uzy/ZwwkFaTkUbi9PtkzXGJBQHNMFfraECLdlzR0PcvFiM/eW
SQj4GzmDZ01pum/ZIQz34J/CL4dYYrTBpQYI+tomcHoobWjaiBqLqwbuVh5K
xYOTAyk/7lpQELcR9V7wcs0eHu1zoD25O21Z+1ilBaZsmqE/3W53K4azdgys
guFs04wtGCyDp20MWuFkXtKCvQoAZmyasAW5hZ/7G+AX3MGMTRM2wSfIVIfv
N0KFjmzrjo/HXZQt0UmgxdQ/3IZX6blFggPnpqYfIqvJeF4cxCmusgPwjLpe
HKvFgAKahdD4YAnbk4nLfT/FwiuK3d/iSLSCWEOuP9A8zBoMNJdUyduwRM8n
YdZkGWPLkKlirBg2uw+m7FPog3TaRGdtIj073bwk9jKzorkEcgumHKoETK0H
Q3SG+cP59WDI3g0/jK7Gb3GHSbBOM/X8dHJ0cuoevXSPTrsIuWOS1FqOYg+O
xu3eiZSqlePu8RtzlqgS3GDo5GnUw3W9hGNb2fsaBr1I9YjiJrwOrjUtVRa+
cfCUMqTN8Waj8kBiMVNx/A0NFJWrkVoHty7oeJG2AoHAslybICDCuGrgqTQ4
NTw4/px4oDOqwc/EBujtp5vba1trN7tL3FbabCNWIzDdImY6nN1Akq2DL4vT
x1acZUdXw1oM75JO+xnvtgrdCqleqLcS194n1u3QtJdP0uK2o2aqSC1ttcOw
4mit9O1WautdZI3K2qMt5kxn7E9oyCydbX1ZK21tzXGNQqiNnoEuS5Clbydd
lT66Rk45voUquocA5r/m/iV5F3wpUnaC3lfQREMv2aebK+uG+tYFj+RvvEi+
HepQ2prWfuotoHimnoLceiznEQ/MXYH+2GT02hUSQoTSxxsKBB5ats9iCn34
D4ssS1Tv8BA35PAKwxeRks12gabD+/khmu4hn4K7HL41oD+QZHExXv/I4h7O
+ckuMrP03nPtegn7oe3qyFuirnJGqCm0lx0wCxHp0OjZWxRmeO0Ghca84xqF
4xjjTZYpNal73j6D/HfCjMxzsE5zoIjHbwrPPcw5gdSbxQRAX61RdlvVA613
GevjVjuCxXMZjBm6e6SQI6ChhCp7muuzycinM2VoS802P47g4We6pO1+daC3
FmNTWNgNUeC+OLI7wOYTiAxlhluRSZ6qnNMhgt6dVjltrhayoVsSEE0iPMyG
ZcrKljZ59JHwrbijc8t34wEoWs9VwkROIAxIAprHQjfBp13PiqCU338qdiHm
PMADOABGBwRGBgHPTNdP0+0eknm+Z82RLksJUZqiodrFOzn7VqRkJLYSaZ60
mOMxPGfCZ+izePjxBpihLQhDETbwmRLBjFx2loMCA6Idenq6ldGhsiQVmhFW
lkomaDRNF4xXRjKTAMKQ1u1siSNIU3HzbMfVtbYUTzfYikhSbquYIqt6+L6R
3knlNLfy2JCNVS9uMjyY6dRb637xjRlah2mgFo6T1rbhBmtIVvS/ubVDGB52
wbbnfPd8Wb9uYW4YFWc6HUsm7f/UdyoKNO2IANVHc/GjvplWwAT5YD5rbGxU
wDI6FuvQNkZl1SZ8gJHOoSvXBuqYuzUgWjm0RfJQg0Iy1Lslb2oPNqE1UhV0
WkwQ65hWTayVnZYW1JWdl8ZjRlcBiuKpZ0ort4RXJ3hV+xXiQQykliVeqBRP
Zm1kDZFOMC2TJiAacS9EY9VWyTfloesa2kpqk0fdYXbSOzDGqy1b71HaGrRO
1QET3Xm3Sfnohpne+IB9uuhfHdAJ8QYG7LdV1U/wdGOnc5Rb/hDRodKqugXa
SB2IEYVpoxtSoqtPndqGGX6hv9hebhT+Rj+qbx5PymN3mxMyM0Hv4NZFiIeQ
dXk1w7cVgbmd+v+oUPVnrU7dohS7U7hbM+/sdRt7aYauJNGFKa0Fl02uB9cF
whqaYs9xNx6seGygKu4MUX1TQmlaBW5YrpvFuods1SwBKfNLi+RsdNS7nX8Y
YSkUAmduMiEZT9Habklett6LqcA22TF4WWNlI81DSUfto5u7U7ywCn/P6gZt
a7+UNmEb7rglNt1iaYUXmcpraCZOES5906eOivxJ1VtR9G5XJq6eX+tPdy66
O928bLWJxbNnYvHsX8Pi2VNYXK1Zx+nTrGNkb1dRS+qeuvZyJCuuvUPlWpdL
rd6eQemOtMNXvN+F7cbHwc0mC8u85DmkX94ke6LwAe9O6Zf9fg83B55gTLn/
LNyAvL6NG8D7TNy0xil9N2dnoGrJG6v1BkS4ZY5v6TlqlYO5+WyDXVlOFQcP
9e6jdgSxtQlpojE7ogX560n9D22+Pnn71QqOuGzug5qW4VtOTzpbpVDcE3wS
30/fVi3Zbr8BUaA7fPGzYaZ6wg4VqvBfHJo5lKwtz6UR6m6i/bznzS5TLS9I
GsBr9Q5hXZNwA31bxWrq1TTrma3zw0Jg0NKQNOymeqceEv4Ey8q5tlMXpeFU
ntIf6Fq2gtB/KgPESGtF9JQ6vjTHOpw2kdWOyP7NpWZ5eQbBrYFaVXy+zCP1
gNu+0xEzSDYu+wQt3Pq7Mgd0AwVau0pQoTh8+AKbjcorS5VrmOBxTi03Nw74
WuN1/6b+DlQRq/XuR6LqsUv62yNSubeRtBXxzT2nDRX7pgS1eefpEihd73ma
onhCDty6ZYYfSsYt23CbkZvu9Em4ywvkgQxlVr/Obi+MVS6RrxEmqqlznRY6
va6QonXPZjxQT4i6eFdZQRtT7V7KPaPy9Hu9J6sfbD+9GdQX2aGnX39FRvjV
3cF6RGhX3aqdaH3+/k+g2QDemy4zsf8slFerMogH+hLA8GowfmvvCoyFl9O9
OAgTCt8l5fYi/7sBveXZv+qvPaNBeufk77lQxupC/kXvkM6K66X4zqR5B2dm
Xoj4eDsqrqN2IHrg2UQq5ngksrQvfdIzCnJ/ubxgt+ZpR9/xxBeJV6se3WxA
7txn+CAcIKzHvuXSAi4ytOFZy7k+WNOvXYyG4w/UNAEDPXZ12NdnKqW8ABu9
8hURi8W1ie6zcUTq/QN6qh2fGJXYs2ccowv/HVaoTt8HPzo5+mfoRr+ibj9t
iigkSNO+VY36wNdiyEIcKypjGrZHNM+rH3qjGi/Noqf1vS9RfB8If65PwpzJ
gkdfqEbu+6kEU3nP09T0G/pydibvtNamAvzGb7z3gUCHX3mYBPhqxuS6KLXp
TaKcjo7teRYeiDr/B3dWsQRGQQAA

-->

</rfc>
