<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-discardmodel-10" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IM and DM for Packet Discard Reporting">Information and Data Models for Packet Discard Reporting</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-discardmodel-10"/>
    <author initials="J." surname="Evans" fullname="John Evans">
      <organization>Amazon</organization>
      <address>
        <postal>
          <street>1 Principal Place, Worship Street</street>
          <city>London</city>
          <code>EC2A 2FA</code>
          <country>UK</country>
        </postal>
        <email>jevanamz@amazon.co.uk</email>
      </address>
    </author>
    <author initials="O." surname="Pylypenko" fullname="Oleksandr Pylypenko">
      <organization>Amazon</organization>
      <address>
        <postal>
          <street>410 Terry Ave N</street>
          <city>Seattle</city>
          <region>WA</region>
          <code>98109</code>
          <country>US</country>
        </postal>
        <email>opyl@amazon.com</email>
      </address>
    </author>
    <author initials="J." surname="Haas" fullname="Jeffrey Haas">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <street>1133 Innovation Way</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94089</code>
          <country>US</country>
        </postal>
        <email>jhaas@juniper.net</email>
      </address>
    </author>
    <author initials="A." surname="Kadosh" fullname="Aviran Kadosh">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <street>170 West Tasman Dr.</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>akadosh@cisco.com</email>
      </address>
    </author>
    <author initials="M." surname="Boucadair" fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="26"/>
    <area>Operations and Management Area</area>
    <workgroup>Operations and Management Area Working Group</workgroup>
    <keyword>Troubleshooting</keyword>
    <keyword>Diagnostic</keyword>
    <keyword>Network Automation</keyword>
    <keyword>Network Service</keyword>
    <keyword>Resilience</keyword>
    <keyword>Robustness</keyword>
    <keyword>Root cause</keyword>
    <keyword>Anomaly</keyword>
    <keyword>Incident</keyword>
    <keyword>Customer experience</keyword>
    <abstract>
      <?line 100?>

<t>This document defines an Information Model and specifies a corresponding YANG data model for packet discard reporting. The Information Model provides an implementation-independent framework for classifying packet loss — both intended (e.g., due to policy) and unintended (e.g., due to congestion or errors) — to enable automated network mitigation of unintended packet loss. The YANG data model specifies an implementation of this Information Model for network elements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://o-pylypenko.github.io/draft-ietf-opsawg-discardmodel/draft-ietf-opsawg-discardmodel.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsawg-discardmodel/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operations and Management Area Working Group  mailing list (<eref target="mailto:opsawg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/opsawg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/o-pylypenko/draft-ietf-opsawg-discardmodel"/>.</t>
    </note>
  </front>
  <middle>
    <?line 104?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The primary function of a network is to transport and deliver packets according to service level objectives. For network operators, understanding both where and why packet loss occurs within a network is essential for effective operation. Device-reported packet loss provides the most direct signal for identifying service impact. While certain types of packet loss, such as policy-based discards, are intentional and part of normal network operation, unintended packet loss can impact customer services.  To automate network operations, operators must be able to detect customer-impacting packet loss, determine its root cause, and apply appropriate mitigation actions. Precise classification of packet loss is thus crucial to ensure that anomalous packet loss is easily detected and that the right action is taken to mitigate the impact. Taking the wrong action can make problems worse; for example, removing a congested device from service can exacerbate congestion by redirecting traffic to other already congested links or devices.</t>
      <t>Existing metrics for reporting packet loss, such as ifInDiscards, ifOutDiscards, ifInErrors, and ifOutErrors defined in "The Interfaces Group MIB" <xref target="RFC2863"/> and "A YANG Data Model for Interface Management" <xref target="RFC8343"/>, are insufficient for automating network operations. First, they lack precision; for instance, ifInDiscards aggregates all discarded inbound packets without specifying the cause, making it challenging to distinguish between intended and unintended discards. Second, these definitions are ambiguous, leading to inconsistent vendor implementations. For example, in some implementations ifInErrors accounts only for errored packets that are dropped, while in others, it includes all errored packets, whether they are dropped or not. Many implementations support more discard metrics than these, however, they have been inconsistently implemented due to the lack of a standardised classification scheme and clear semantics for packet loss reporting. For example, <xref target="RFC7270"/> provides support for reporting discards per flow in IP Flow Information Export (IPFIX) <xref target="RFC7011"/> using the forwardingStatus IPFIX Information Element, however, the defined drop reason codes also lack sufficient clarity to facilitate automated root cause analysis and impact mitigation (e.g., the "For us" reason code).</t>
      <t>This document defines an Information Model (IM) and specifies a corresponding YANG Data Model (DM) for packet loss reporting which address these issues.  The IM provides precise classification of packet loss to enable accurate automated mitigation. The DM specifies a YANG implementation of this framework for network elements, while maintaining consistency through clear semantics.</t>
      <t>The scope of this document is limited to reporting packet loss at Layer 3 and frames discarded at Layer 2. This document considers only the signals that may trigger automated mitigation actions and not how the actions are defined or executed.</t>
      <t><xref target="problem"/> describes the problem space and requirements. <xref target="infomodel"/> defines the IM and classification scheme. <xref target="datamodel"/> specifies the corresponding YANG data model and implementation requirements together with a set of usage examples, and the complete YANG module definition. The appendices provide additional context and implementation guidance.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Tree diagrams used in this document follow the notation defined in <xref target="RFC8340"/>.</t>
      <t>This document makes use of the following terms:</t>
      <dl>
        <dt>Packet discard:</dt>
        <dd>
          <t>It accounts for any instance where a packet is dropped by a device, regardless of whether the discard was intentional or unintentional.</t>
        </dd>
        <dt>Intended packet discards (Intended discards, for short):</dt>
        <dd>
          <t>Are packets dropped due to deliberate network policies or configurations designed to enforce security or Quality of Service (QoS). For example, packets dropped because they match an Access Control List (ACL) denying certain traffic types.</t>
        </dd>
        <dt>Unintended packet discards (Unintended discards, for short):</dt>
        <dd>
          <t>Are packets that were dropped, which the network operator otherwise intended to deliver, i.e. which indicates an error state.  There are many possible reasons for unintended packet loss, including: erroring links may corrupt packets in transit; incorrect routing tables may result in packets being dropped because they do not match a valid route; configuration errors may result in a valid packet incorrectly matching an ACL and being dropped.</t>
        </dd>
        <dt/>
        <dd>
          <t>Device discard counters do not by themselves establish operator intent. Discards reported under policy (e.g., ACL/policer) indicate only that traffic matched a configured rule; such discards may still be unintended if the configuration is in error. Determining intent for policy discards requires external context (e.g., configuration validation and change history) which is out of scope for this specification.</t>
        </dd>
      </dl>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <t>The fundamental problem for network operators is how to automatically detect when and where unintended packet loss is occurring and determine the appropriate action to mitigate it. For any network, there are a small set of potential actions that can be taken to mitigate customer impact when unintended packet loss is detected, for example:</t>
      <ol spacing="normal" type="1"><li>
          <t>Take a problematic device, link, or set of devices and/or links out of service.</t>
        </li>
        <li>
          <t>Return a device, link, or set of devices and/or links back into service.</t>
        </li>
        <li>
          <t>Move traffic to other links or devices to alleviate congestion or avoid problematic paths.</t>
        </li>
        <li>
          <t>Roll back a recent change to a device that might have caused the problem.</t>
        </li>
        <li>
          <t>Escalate to a network operator as a last resort when automated mitigation is not possible.</t>
        </li>
      </ol>
      <t>The ability to select the appropriate mitigation action depends on four key features of packet loss:</t>
      <dl>
        <dt>FEATURE-DISCARD-SCOPE:</dt>
        <dd>
          <t>Determines which devices, interfaces, and/or flows are impacted.</t>
        </dd>
        <dt>FEATURE-DISCARD-RATE:</dt>
        <dd>
          <t>The rate and/or magnitude of the discards, indicating the severity and urgency of the problem.  Rate may be expressed using absolute (e.g., pps (packets per second)) or relative (e.g., percent) values.</t>
        </dd>
        <dt>FEATURE-DISCARD-DURATION:</dt>
        <dd>
          <t>The duration of the discards which helps to distinguish transient from persistent issues.</t>
        </dd>
        <dt>FEATURE-DISCARD-CLASS:</dt>
        <dd>
          <t>The type or class of discards, which is crucial for selecting the appropriate type of mitigation. Examples may be:  error discards may require taking faulty components out of service, no-buffer discards may require traffic redistribution, or intended policy discards typically require no action. Refer to <xref target="ex-table"/> for more examples.</t>
        </dd>
      </dl>
      <t>While most of FEATURE-DISCARD-SCOPE, FEATURE-DISCARD-RATE, and FEATURE-DISCARD-DURATION are implicitly supported by the Interfaces Group MIB <xref target="RFC2863"/> and the YANG Data Model for Interface Management <xref target="RFC8343"/>, FEATURE-DISCARD-CLASS requires a more detailed classification scheme than they define. The IM provided in <xref target="infomodel"/> defines such a classification scheme to enable automated mapping from loss signals to appropriate mitigation actions.</t>
    </section>
    <section anchor="infomodel">
      <name>Information Model (IM)</name>
      <t>The IM is defined using YANG <xref target="RFC7950"/>, with Data Structure Extensions <xref target="RFC8791"/>, allowing the model to remain abstract and decoupled from specific implementations in accordance with <xref target="RFC3444"/>. This abstraction supports different DM implementations, such as YANG or IPFIX <xref target="RFC7011"/>, while ensuring consistency across implementations. Using YANG for the IM enables this abstraction, leverages the community's familiarity with its syntax, and ensures lossless translation to the corresponding YANG data model, which is defined in <xref target="datamodel"/>.</t>
      <section anchor="infomodel-structure">
        <name>Structure</name>
        <t>The IM defines a hierarchical classification scheme for packet discards, which captures where in a device the discards are accounted (component), in which direction they were flowing (direction), whether they were successfully processed or discarded (type), what protocol layer they belong to (layer), and the specific reason for any discards (sub-types). This structure enables both high-level monitoring of total discards and more detailed triage to map to mitigation actions.</t>
        <t>The abstract structure of the IM is depicted in <xref target="tree-im-abstract"/>. The full YANG tree diagram of the IM is provided in <xref target="sec-im-full-tree"/>.</t>
        <figure anchor="tree-im-abstract">
          <name>Abstract IM Tree Structure</name>
          <artwork><![CDATA[
module: ietf-packet-discard-reporting-sx

  structure packet-discard-reporting:
    +-- control-plane {control-plane-stats}?
    |  +-- traffic* [direction]
    |  |  ...
    |  +-- discards* [direction]
    |     ...
    +-- interface* [name] {interface-stats}?
    |  +-- name        string
    |  +-- traffic* [direction]
    |  |  +-- direction    identityref
    |  |  +-- l2
    |  |  |  ...
    |  |  +-- l3
    |  |  |  ...
    |  |  +-- qos
    |  |     +-- class* [id]
    |  |        ...
    |  +-- discards* [direction]
    |     +-- direction    identityref
    |     +-- l2
    |     |  ...
    |     +-- l3
    |     |  ...
    |     +-- errors
    |     |  +-- l2
    |     |  |  ...
    |     |  +-- l3
    |     |  |  ...
    |     |  +-- internal
    |     |     ...
    |     +-- policy
    |     |  +-- l2
    |     |  |  ...
    |     |  +-- l3
    |     |     ...
    |     +-- no-buffer
    |        +-- class* [id]
    |           ...
    +-- flow* [direction] {flow-reporting}?
    |  +-- direction    identityref
    |  +-- traffic
    |  |  +-- l2
    |  |  |  ...
    |  |  +-- l3
    |  |  |  ...
    |  |  +-- qos
    |  |     +-- class* [id]
    |  |        ...
    |  +-- discards
    |     +-- l2
    |     |  ...
    |     +-- l3
    |     |  ...
    |     +-- errors
    |     |  +-- l2
    |     |  |  ...
    |     |  +-- l3
    |     |  |  ...
    |     |  +-- internal
    |     |     ...
    |     +-- policy
    |     |  +-- l2
    |     |  |  ...
    |     |  +-- l3
    |     |     ...
    |     +-- no-buffer
    |        +-- class* [id]
    |           ...
    +-- device {device-stats}?
       +-- traffic
       |  +-- l2
       |  |  ...
       |  +-- l3
       |  |  ...
       |  +-- qos
       |     +-- class* [id]
       |        ...
       +-- discards
          +-- l2
          |  ...
          +-- l3
          |  ...
          +-- errors
          |  +-- l2
          |  |  ...
          |  +-- l3
          |  |  ...
          |  +-- internal
          |     ...
          +-- policy
          |  +-- l2
          |  |  ...
          |  +-- l3
          |     ...
          +-- no-buffer
             +-- class* [id]
                ...
]]></artwork>
        </figure>
        <t>The discard reporting can be organized into several types: control plane, interface, flow, and device. In order to allow for better mapping to underlying DMs, the IM supports a set of "features" to control the supported type.</t>
        <t>A complete classification path follows the pattern: component/direction/type/layer/sub-type/sub-sub-type/.../metric. <xref target="wheredropped"/> illustrates where these discards typically occur in a network device.  The elements of the tree are defined as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Component:
            </t>
            <ul spacing="normal">
              <li>
                <t>control-plane: discards of traffic to or from a device's control plane.</t>
              </li>
              <li>
                <t>interface: discards of traffic to or from a specific network interface.</t>
              </li>
              <li>
                <t>flow: discards of traffic associated with a specific traffic flow.</t>
              </li>
              <li>
                <t>device: discards of traffic transiting the device.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Direction:
            </t>
            <ul spacing="normal">
              <li>
                <t>ingress: counters for incoming packets or frames.</t>
              </li>
              <li>
                <t>egress: counters for outgoing packets or frames.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Type:
            </t>
            <ul spacing="normal">
              <li>
                <t>traffic: counters for successfully received or transmitted packets or frames.</t>
              </li>
              <li>
                <t>discards: counters for packets or frames that were dropped.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Layer:
            </t>
            <ul spacing="normal">
              <li>
                <t>l2: Layer 2 traffic and discards. This covers both frame and byte counts.</t>
              </li>
              <li>
                <t>l3: Layer 3 traffic and discards. This covers both packet and byte counts.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The hierarchical structure allows for future extension while maintaining backward compatibility. New discard types can be added as new branches without affecting existing implementations.</t>
        <t>The corresponding YANG module is defined in <xref target="infomodel-module"/>.</t>
      </section>
      <section anchor="sub-type-definitions">
        <name>Sub-type Definitions</name>
        <dl>
          <dt>discards/policy/:</dt>
          <dd>
            <t>These are intended discards, meaning packets dropped due to a configured policy, including: ACLs, traffic policers, unicast Reverse Path Forwarding (uRPF) checks, DDoS protection rules, and explicit null routes.  In practice, ingress DDoS protection policies are often realized using mechanisms such as ingress filtering and uRPF (<xref target="RFC2827"/>, <xref target="RFC3704"/>, <xref target="RFC8704"/>), remotely triggered blackholing (<xref target="RFC3882"/>, <xref target="RFC5635"/>), or BGP Flow Specification–based filters (<xref target="RFC8955"/>, <xref target="RFC8956"/>, <xref target="RFC9117"/>); all such policy-driven discards are reported under this class.</t>
          </dd>
          <dt>discards/error/:</dt>
          <dd>
            <t>These are unintended discards due to errors in processing packets or frames.  There are multiple sub-classes.
</t>
            <ul spacing="normal">
              <li>
                <dl>
                  <dt>discards/error/l2/rx/:</dt>
                  <dd>
                    <t>These are frames discarded due to errors in the received Layer 2 frame, including: CRC errors, invalid MAC addresses, invalid VLAN tags, frame size violations and other malformed frame conditions.</t>
                  </dd>
                </dl>
              </li>
              <li>
                <dl>
                  <dt>discards/error/l3/rx/:</dt>
                  <dd>
                    <t>These are discards which occur due to errors in the received packet, indicating an upstream problem rather than an issue with the device dropping the errored packets, including: header checksum errors,  MTU exceeded, invalid packet errors, i.e., incorrect version, incorrect header length, invalid options and other malformed packet conditions.</t>
                  </dd>
                </dl>
              </li>
              <li>
                <dl>
                  <dt>discards/error/l3/rx/ttl-expired:</dt>
                  <dd>
                    <t>These are discards due to TTL (or Hop limit) expiry, which can occur for the following reasons: normal trace-route operations, end-system TTL/Hop limit set too low, routing loops in the network.</t>
                  </dd>
                </dl>
              </li>
              <li>
                <dl>
                  <dt>discards/error/l3/no-route/:</dt>
                  <dd>
                    <t>These are discards which occur due to a packet not matching any route in the routing table, e.g., which may be due to routing configuration errors or may be transient discards during convergence.</t>
                  </dd>
                </dl>
              </li>
              <li>
                <dl>
                  <dt>discards/error/internal/:</dt>
                  <dd>
                    <t>These are discards due to internal device issues, including: parity errors in device memory or other internal hardware errors.  Any errored discards not explicitly assigned to other classes are also accounted for here.</t>
                  </dd>
                </dl>
              </li>
            </ul>
          </dd>
          <dt>discards/no-buffer/:</dt>
          <dd>
            <t>These are discards due to buffer exhaustion (that is congestion related discards). These can be tail-drop discards or due to an active queue management algorithm, such as Random Early Detection (RED) <xref target="RED93"/> or Controlled Delay (CoDel) <xref target="RFC8289"/>.</t>
          </dd>
        </dl>
        <t>An example of possible signal-to-mitigation action mapping is provided in <xref target="mapping"/>.</t>
      </section>
      <section anchor="infomodel-module">
        <name>"ietf-packet-discard-reporting-sx" YANG Module</name>
        <t>The "ietf-packet-discard-reporting-sx" module uses the "sx" structure defined in <xref target="RFC8791"/>.</t>
        <sourcecode markers="true"><![CDATA[
module ietf-packet-discard-reporting-sx {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-packet-discard-reporting-sx";
  prefix plr-sx;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-yang-structure-ext {
    prefix sx;
    reference
      "RFC 8791: YANG Data Structure Extensions";
  }

  organization
    "IETF OPSAWG (Operations and Management Area Working Group)";
  contact
    "WG Web:   https://datatracker.ietf.org/wg/opsawg/
     WG List:  mailto:opsawg@ietf.org

     Author:   John Evans
               <mailto:jevanamz@amazon.co.uk>

     Author:   Oleksandr Pylypenko
               <mailto:opyl@amazon.com>

     Author:   Jeffrey Haas
               <mailto:jhaas@juniper.net>

     Author:   Aviran Kadosh
               <mailto:akadosh@cisco.com>

     Author:   Mohamed Boucadair
               <mailto:mohamed.boucadair@orange.com>";
  description
    "This module defines an information model for packet discard
     reporting.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2024-06-04 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: Information and Data Models for Packet Discard
                 Reporting";
  }

  /*
   * Features
   */


  feature control-plane-stats {
    description
      "Indicates support of control plane statistics on this
       device.";
  }

  feature interface-stats {
    description
      "Indicates support of interface statistics on this
       device.";
  }

  feature flow-reporting {
    description
      "Indicates support of flow reporting on this device.";
  }

  feature device-stats {
    description
      "Indicates support of global device statistics on this
       device.";
  }

  /*
   * Identities
   */

  identity direction {
    description
      "Defines a direction for the reported statistics.";
  }

  identity ingress {
    base direction;
    description
      "Reports statistics for the received from the network
       packets.";
  }

  identity egress {
    base direction;
    description
      "Reports statistics for the sent to the network
       packets.";
  }

  identity address-family {
    description
      "Defines a type for the address family.";
  }

  identity ipv4 {
    base address-family;
    description
      "Identity for an IPv4 address family.";
  }

  identity ipv6 {
    base address-family;
    description
      "Identity for an IPv6 address family.";
  }

  identity all {
    base address-family;
    description
      "Identity for all address families.";
  }

  /*
   * Groupings
   */

  grouping basic-packets {
    description
      "Grouping for Layer 3 packet counters.";
    leaf packets {
      type yang:counter64;
      description
        "Number of Layer 3 packets.";
    }
  }

  grouping basic-packets-bytes {
    description
      "Grouping for Layer 3 packet and byte counters.";
    uses basic-packets;
    leaf bytes {
      type yang:counter64;
      description
        "Number of Layer 3 bytes.";
    }
  }

  grouping basic-frames {
    description
      "Grouping for Layer 2 frame counters.";
    leaf frames {
      type yang:counter64;
      description
        "Number of Layer 2 frames.";
    }
  }

  grouping basic-frames-bytes {
    description
      "Grouping for Layer 2 frame and byte counters.";
    uses basic-frames;
    leaf bytes {
      type yang:counter64;
      description
        "Number of Layer 2 bytes.";
    }
  }

  grouping l2-traffic {
    description
      "Layer 2 traffic counters.";
    uses basic-frames-bytes;
  }

  grouping ip {
    description
      "Layer 3 traffic counters per address family.";
    list address-family-stat {
      key "address-family";
      description
        "Reports per address family traffic counters.";
      leaf address-family {
        type identityref {
          base address-family;
        }
        description
          "Specifies an address family.";
      }
      uses basic-packets-bytes;
      container unicast {
        description
          "Unicast traffic counters.";
        uses basic-packets-bytes;
      }
      container multicast {
        description
          "Multicast traffic counters.";
        uses basic-packets-bytes;
      }
      container broadcast {
        when "derived-from-or-self(../address-family, "
           + "'plr-sx:ipv4')" {
          description
            "Only applicable for IPv4.";
        }
        description
          "Broadcast traffic counters.";
        uses basic-packets-bytes;
      }
    }
  }

  grouping l3-traffic {
    description
      "Layer 3 traffic counters.";
    uses ip;
  }

  grouping class-list {
    description
      "Class-based traffic counters.";
    list class {
      key "id";
      min-elements 1;
      description
        "Class traffic counters.";
      leaf id {
        type string;
        description
          "Class identifier.";
      }
      uses basic-packets-bytes;
    }
  }

  grouping qos {
    description
      "Quality of Service (QoS) traffic counters.";
    container qos {
      presence "QoS statistics are available.";
      description
        "Per-class QoS traffic counters.";
      uses class-list;
    }
  }

  grouping traffic {
    description
      "All traffic counters.";
    container l2 {
      description
        "Layer 2 traffic counters.";
      uses l2-traffic;
    }
    container l3 {
      description
        "Layer 3 traffic counters.";
      uses l3-traffic;
    }
    uses qos;
  }

  grouping errors-l2-rx {
    description
      "Layer 2 ingress frame error discard counters.";
    container rx {
      description
        "Layer 2 ingress frame receive error discard
         counters.";
      leaf frames {
        type yang:counter64;
        description
          "The number of frames discarded due to errors
           with the received frame.";
      }
      leaf crc-error {
        type yang:counter64;
        description
          "The number of received frames discarded due to
           CRC error.";
      }
      leaf invalid-mac {
        type yang:counter64;
        description
          "The number of received frames discarded due to
           an invalid MAC address.";
      }
      leaf invalid-vlan {
        type yang:counter64;
        description
          "The number of received frames discarded due to
           an invalid VLAN tag.";
      }
      leaf invalid-frame {
        type yang:counter64;
        description
          "The number of invalid received frames discarded due to
           other reasons, not limited to: malformed frames,
           frame-size violations.";
      }
    }
  }

  grouping errors-l3-rx {
    description
      "Layer 3 ingress packet error discard counters.";
    container rx {
      description
        "Layer 3 ingress packet receive error discard
         counters.";
      leaf packets {
        type yang:counter64;
        description
          "The number of Layer 3 packets discarded due to
           errors in the received packet.";
      }
      leaf checksum-error {
        type yang:counter64;
        description
          "The number of received packets discarded due
           to a checksum error.";
      }
      leaf mtu-exceeded {
        type yang:counter64;
        description
          "The number of received packets discarded due to
           MTU exceeded.";
      }
      leaf invalid-packet {
        type yang:counter64;
        description
          "The number of received invalid packets discarded due
           to other reasons, not limited to: invalid packet length,
           invalid header fields, invalid options, invalid protocol
           version, invalid flags or control bits, malformed
           packets.";
      }
    }
    leaf ttl-expired {
      type yang:counter64;
      description
        "The number of received packets discarded due to
         expired TTL.";
    }
    leaf no-route {
      type yang:counter64;
      description
        "The number of received packets discarded due to not
         matching a valid route.";
    }
    leaf invalid-sid {
      type yang:counter64;
      description
        "The number of received packets discarded due to an
         invalid Segment Routing over IPv6 (SRv6) SID.
         For SR-MPLS, invalid SIDs have to be accounted
         under invalid-label.";
    }
    leaf invalid-label {
      type yang:counter64;
      description
        "The number of received packets discarded due to an
         invalid MPLS label.";
    }
  }

  grouping errors-l3-int {
    description
      "Internal error discard counters.";
    leaf packets {
      type yang:counter64;
      description
        "The number of packets discarded due to internal
         errors.";
    }
    leaf parity-error {
      type yang:counter64;
      description
        "The number of packets discarded due to parity
         errors.";
    }
  }

  grouping errors-l2-tx {
    description
      "Layer 2 transmit error discard counters.";
    container tx {
      description
        "Layer 2 transmit frame error discard counters.";
      leaf frames {
        type yang:counter64;
        description
          "The number of Layer 2 frames discarded due to
           errors when transmitting.";
      }
    }
  }

  grouping errors-l3-tx {
    description
      "Layer 3 transmit error discard counters.";
    container tx {
      description
        "Layer 3 transmit packet error discard counters.";
      leaf packets {
        type yang:counter64;
        description
          "The number of Layer 3 packets discarded due to
           errors when transmitting.";
      }
    }
  }

  grouping errors {
    description
      "Error discard counters.";
    container l2 {
      description
        "Layer 2 frame error discard counters.";
      uses errors-l2-rx;
      uses errors-l2-tx;
    }
    container l3 {
      description
        "Layer 3 packet error discard counters.";
      uses errors-l3-rx;
      uses errors-l3-tx;
    }
    container internal {
      description
        "Internal error discard counters.";
      uses errors-l3-int;
    }
  }

  grouping policy-l2 {
    description
      "Layer 2 policy frame discard counters.";
    leaf frames {
      type yang:counter64;
      description
        "The number of Layer 2 frames discarded due
         to policy.";
    }
    leaf acl {
      type yang:counter64;
      description
        "The number of frames discarded due to Layer 2 ACLs.";
    }
  }

  grouping policy-l3 {
    description
      "Layer 3 policy packet discard counters.";
    leaf packets {
      type yang:counter64;
      description
        "The number of Layer 3 packets discarded due to policy.";
    }
    leaf acl {
      type yang:counter64;
      description
        "The number of packets discarded due to Layer 3 ACLs.";
    }
    container policer {
      description
        "The number of packets discarded due to policer
         violations.";
      uses basic-packets-bytes;
      container classes {
        presence "Per-class policer statistics are available.";
        description
          "Per-class policer discard counters.";
        uses class-list;
      }
    }
    leaf null-route {
      type yang:counter64;
      description
        "The number of packets discarded due to matching
         a null route.";
    }
    leaf rpf {
      type yang:counter64;
      description
        "The number of packets discarded due to failing
         Reverse Path Forwarding (RPF) check.";
    }
    leaf ddos {
      type yang:counter64;
      description
        "The number of packets discarded due to DDoS
         protection policies.";
    }
  }

  grouping discards {
    description
      "Discard counters.";
    container l2 {
      description
        "Layer 2 frame discard counters.";
      uses l2-traffic;
    }
    container l3 {
      description
        "Layer 3 packet discard counters.";
      uses l3-traffic;
    }
    container errors {
      description
        "Error discard counters.";
      uses errors;
    }
    container policy {
      description
        "Policy-related discard counters.";
      uses policy;
    }
    container no-buffer {
      description
        "Discard counters due to buffer unavailability.";
      uses qos;
    }
  }

  grouping policy {
    description
      "Policy-related discard counters.";
    container l2 {
      description
        "Layer 2 policy frame discard counters.";
      uses policy-l2;
    }
    container l3 {
      description
        "Layer 3 policy packet discard counters.";
      uses policy-l3;
    }
  }

  grouping device {
    description
      "Device-level traffic and discard counters.";
    container traffic {
      description
        "Traffic counters.";
      uses traffic;
    }
    container discards {
      description
        "Discard counters.";
      uses discards;
    }
  }

  grouping interface {
    description
      "Interface-level traffic and discard counters.";
    list traffic {
      key "direction";
      description
        "Traffic counters.";
      leaf direction {
        type identityref {
          base direction;
        }
        description
          "Specifies a direction.";
      }
      uses traffic;
    }
    list discards {
      key "direction";
      description
        "Discard counters.";
      leaf direction {
        type identityref {
          base direction;
        }
        description
          "Specifies a direction.";
      }
      uses discards;
    }
  }

  grouping control-plane {
    description
      "Control plane packet counters.";
    list traffic {
      key "direction";
      description
        "Total control plane packets.";
      leaf direction {
        type identityref {
          base direction;
        }
        description
          "Specifies a direction.";
      }
      uses basic-packets-bytes;
    }
    list discards {
      key "direction";
      description
        "Control plane packet discard counters.";
      leaf direction {
        type identityref {
          base direction;
        }
        description
          "Specifies a direction.";
      }
      uses basic-packets-bytes;
      container policy {
        description
          "Number of control plane packets discarded due to policy.";
        uses basic-packets;
      }
    }
  }

  /*
   * Main structure definition
   */

  sx:structure packet-discard-reporting {
    description
      "Specifies the abstract structure of packet discard
       reporting data.";
    container control-plane {
      if-feature "control-plane-stats";
      description
        "Control plane packet counters.";
      uses control-plane;
    }
    list interface {
      if-feature "interface-stats";
      key "name";
      description
        "Indicates a list of interfaces for which packet
         discard reporting data is provided.";
      leaf name {
        type string;
        description
          "Indicates the name of the interface.";
      }
      uses interface;
    }
    list flow {
      if-feature "flow-reporting";
      key "direction";
      leaf direction {
        type identityref {
          base direction;
        }
        description
          "Specifies a direction.";
      }
      description
        "Flow packet counters.";
      uses device;
    }
    container device {
      if-feature "device-stats";
      description
        "Device level packet counters.";
      uses device;
    }
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="datamodel">
      <name>Data Model (DM)</name>
      <t>This DM implements the IM defined in <xref target="infomodel"/> for the interface, device, and control-plane components. It is a device model per <xref section="2.1" sectionFormat="of" target="RFC8969"/>. Specifically, it is a device-local (network element) operational state model: counters are scoped to a single device (interfaces and control plane).</t>
      <t>The IM defines the abstract classification tree using YANG data structure extensions <xref target="RFC8791"/>. This DM imports that module and reuses the same groupings and hierarchy of components, directions, layers, and discard classes, attaching them via augment statements to existing YANG modules for routing, interfaces, and logical network elements. The flow component is defined only in the IM for use by flow-oriented data models and are not instantiated in this DM.</t>
      <section anchor="datamodel-structure">
        <name>Structure</name>
        <t>There is a direct mapping between the IM components and their DM implementations, with each component in the hierarchy represented by corresponding YANG containers and leaf data nodes. The abstract tree is shown in <xref target="tree-dm-abstract"/>.</t>
        <figure anchor="tree-dm-abstract">
          <name>Abstract DM Tree Structure</name>
          <artwork><![CDATA[
module: ietf-packet-discard-reporting

  +--ro control-plane! {control-plane-stats}?
  |  +--ro traffic* [direction]
  |  |  ...
  |  +--ro discards* [direction]
  |     ...
  +--ro interface* [name] {interface-stats}?
  |  +--ro name        string
  |  +--ro traffic* [direction]
  |  |  +--ro direction    identityref
  |  |  +--ro l2
  |  |  |  ...
  |  |  +--ro l3
  |  |  |  ...
  |  |  +--ro qos
  |  |     +--ro class* [id]
  |  |        ...
  |  +--ro discards* [direction]
  |     +--ro direction    identityref
  |     +--ro l2
  |     |  ...
  |     +--ro l3
  |     |  ...
  |     +--ro errors
  |     |  +--ro l2
  |     |  |  ...
  |     |  +--ro l3
  |     |  |  ...
  |     |  +--ro internal
  |     |     ...
  |     +--ro policy
  |     |  +--ro l2
  |     |  |  ...
  |     |  +--ro l3
  |     |     ...
  |     +--ro no-buffer
  |        +--ro class* [id]
  |           ...
  +--ro device! {device-stats}?
     +--ro traffic
     |  +--ro l2
     |  |  ...
     |  +--ro l3
     |  |  ...
     |  +--ro qos
     |     +--ro class* [id]
     |        ...
     +--ro discards
        +--ro l2
        |  ...
        +--ro l3
        |  ...
        +--ro errors
        |  +--ro l2
        |  |  ...
        |  +--ro l3
        |  |  ...
        |  +--ro internal
        |     ...
        +--ro policy
        |  +--ro l2
        |  |  ...
        |  +--ro l3
        |     ...
        +--ro no-buffer
           +--ro class* [id]
              ...
]]></artwork>
        </figure>
        <t>The full tree structure is provided in <xref target="sec-dm-full-tree"/>.</t>
      </section>
      <section anchor="requirements">
        <name>Implementation Requirements</name>
        <t>The following requirements apply to the implementation of the DM and are intended to ensure consistent implementation across different vendors and platforms while allowing for platform-specific optimisations where needed. While the model defines a comprehensive set of counters and statistics, implementations <bcp14>MAY</bcp14> support a subset of the defined features based on device capabilities and operational requirements. However, implementations <bcp14>MUST</bcp14> clearly document which features are supported and how they map to the DM.</t>
        <t>Requirements 1-13 relate to packets forwarded or discarded by the device, while requirement 14 relates to packets destined for or originating from the device:</t>
        <ol spacing="normal" type="1"><li>
            <t>All instances of Layer 2 frame or Layer 3 packet receipt, transmission, and discards <bcp14>MUST</bcp14> be accounted for.</t>
          </li>
          <li>
            <t>All instances of Layer 2 frame or Layer 3 packet receipt, transmission, and discards <bcp14>SHOULD</bcp14> be attributed to the physical or logical interface of the device where they occur.  Where they cannot be attributed to the interface, they <bcp14>MUST</bcp14> be attributed to the device.</t>
          </li>
          <li>
            <t>An individual frame <bcp14>MUST</bcp14> only be accounted for by either the Layer 2 traffic class or the Layer 2 discard classes within a single direction or context, i.e., ingress or egress or device.  This is to avoid double counting.</t>
          </li>
          <li>
            <t>An individual packet <bcp14>MUST</bcp14> only be accounted for by either the Layer 3 traffic class or the Layer 3 discard classes within a single direction or context, i.e., ingress or egress or device.  This is to avoid double counting.</t>
          </li>
          <li>
            <t>A frame accounted for at Layer 2 <bcp14>SHOULD NOT</bcp14> be accounted for at Layer 3 and vice versa.  An implementation <bcp14>MUST</bcp14> indicate which layers traffic and discards are counted against.  This is to avoid double counting.</t>
          </li>
          <li>
            <t>The aggregate Layer 2 and Layer 3 traffic and discard classes <bcp14>SHOULD</bcp14> account for all underlying frames or packets received, transmitted, and discarded across all other classes.</t>
          </li>
          <li>
            <t>The aggregate QoS traffic and no-buffer discard classes <bcp14>MUST</bcp14> account for all underlying packets received, transmitted, and discarded across all other classes.</t>
          </li>
          <li>
            <t>In addition to the Layer 2 and Layer 3 aggregate classes, an individual discarded packet <bcp14>MUST</bcp14> only account against a single error, policy, or no-buffer discard subclass.</t>
          </li>
          <li>
            <t>When there are multiple reasons for discarding a packet, the ordering of discard class reporting <bcp14>MUST</bcp14> be defined. Typically, this can be exposed by an implementation by means of <tt>discard-order-capability</tt>.</t>
          </li>
          <li>
            <t>If Diffserv <xref target="RFC2475"/> is not used, no-buffer discards <bcp14>SHOULD</bcp14> be reported as class[id="0"], which represents the default class.</t>
          </li>
          <li>
            <t>When traffic is mirrored, the discard metrics <bcp14>MUST</bcp14> account for the original traffic rather than the reflected traffic.</t>
          </li>
          <li>
            <t>No-buffer discards can be realized differently with different memory architectures. Whether a no-buffer discard is attributed to ingress or egress can differ accordingly.  For successful auto-mitigation, discards due to an egress interface congestion <bcp14>MUST</bcp14> be reportable on <tt>egress</tt>, while discards due to device-level congestion (e.g., due to exceeding the device forwarding rate) <bcp14>MUST</bcp14> be reportable on <tt>ingress</tt>.</t>
          </li>
          <li>
            <t>When the ingress and egress headers differ—for example, at a tunnel endpoint—the discard class attribution <bcp14>MUST</bcp14> relate to the outer header at the point of discard.</t>
          </li>
          <li>
            <t>Traffic to the device control plane has its own class. However, traffic from the device control plane <bcp14>MUST</bcp14> be accounted for in the same way as other egress traffic.</t>
          </li>
        </ol>
      </section>
      <section anchor="examples">
        <name>Usage Examples</name>
        <t>If all of the requirements listed in <xref target="requirements"/> are met, a "good" unicast IPv4 packet received would increment:</t>
        <ul spacing="normal">
          <li>
            <t>interface/traffic[direction="ingress"]/l3/address-family-stat[address-family="ipv4"]/unicast/packets</t>
          </li>
          <li>
            <t>interface/traffic[direction="ingress"]/l3/address-family-stat[address-family="ipv4"]/unicast/bytes</t>
          </li>
          <li>
            <t>interface/traffic[direction="ingress"]/qos/class[id="0"]/packets</t>
          </li>
          <li>
            <t>interface/traffic[direction="ingress"]/qos/class[id="0"]/bytes</t>
          </li>
        </ul>
        <t>A received unicast IPv6 packet discarded due to Hop Limit expiry would increment:</t>
        <ul spacing="normal">
          <li>
            <t>interface/traffic[direction="ingress"]/l3/address-family-stat[address-family="ipv6"]/unicast/packets</t>
          </li>
          <li>
            <t>interface/traffic[direction="ingress"]/l3/address-family-stat[address-family="ipv6"]/unicast/bytes</t>
          </li>
          <li>
            <t>interface/discards[direction="ingress"]/l3/rx/ttl-expired/packets</t>
          </li>
        </ul>
        <t>An IPv4 packet discarded on egress due to no buffers would increment:</t>
        <ul spacing="normal">
          <li>
            <t>interface/discards[direction="egress"]/l3/address-family-stat[address-family="ipv4"]/unicast/packets</t>
          </li>
          <li>
            <t>interface/discards[direction="egress"]/l3/address-family-stat[address-family="ipv4"]/unicast/bytes</t>
          </li>
          <li>
            <t>interface/discards[direction="egress"]/no-buffer/class[id="0"]/packets</t>
          </li>
          <li>
            <t>interface/discards[direction="egress"]/no-buffer/class[id="0"]/bytes</t>
          </li>
        </ul>
        <t>A multicast IPv6 packet dropped due to RPF check failure would increment:</t>
        <ul spacing="normal">
          <li>
            <t>interface/discards[direction="ingress"]/l3/address-family-stat[address-family="ipv6"]/multicast/packets</t>
          </li>
          <li>
            <t>interface/discards[direction="ingress"]/l3/address-family-stat[address-family="ipv6"]/multicast/bytes</t>
          </li>
          <li>
            <t>interface/discards[direction="ingress"]/policy/l3/rpf/packets</t>
          </li>
        </ul>
        <t>A "good" Layer-2 frame received would increment:</t>
        <ul spacing="normal">
          <li>
            <t>interface/traffic[direction="ingress"]/l2/frames</t>
          </li>
          <li>
            <t>interface/traffic[direction="ingress"]/l2/bytes</t>
          </li>
          <li>
            <t>interface/traffic[direction="ingress"]/qos/class[id="0"]/packets</t>
          </li>
          <li>
            <t>interface/traffic[direction="ingress"]/qos/class[id="0"]/bytes</t>
          </li>
        </ul>
      </section>
      <section anchor="datamodel-module">
        <name>"ietf-packet-discard-reporting" YANG Module</name>
        <t>The "ietf-packet-discard-reporting" module imports "ietf-packet-discard-reporting-sx", "ietf-netconf-acm" <xref target="RFC8341"/>, "ietf-interfaces" <xref target="RFC8343"/>,
"ietf-routing" <xref target="RFC8349"/>, and "ietf-logical-network-element" <xref target="RFC8530"/>.</t>
        <sourcecode markers="true"><![CDATA[
module ietf-packet-discard-reporting {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-packet-discard-reporting";
  prefix plr;

  import ietf-packet-discard-reporting-sx {
    prefix plr-sx;
    reference
      "RFC XXXX: Information and Data Models for Packet Discard
                 Reporting";
  }
  import ietf-netconf-acm {
    prefix nacm;
    reference
      "RFC 8341: Network Configuration Access Control Model";
  }
  import ietf-interfaces {
    prefix if;
    reference
      "RFC 8343: A YANG Data Model for Interface Management";
  }
  import ietf-routing {
    prefix rt;
    reference
      "RFC 8349: A YANG Data Model for Routing Management
                 (NMDA Version)";
  }
  import ietf-logical-network-element {
    prefix lne;
    reference
      "RFC 8530: YANG Model for Logical Network Elements";
  }

  organization
    "IETF OPSAWG (Operations and Management Area Working Group)";
  contact
    "WG Web:   https://datatracker.ietf.org/wg/opsawg/
     WG List:  mailto:opsawg@ietf.org

     Author:   John Evans
               <mailto:jevanamz@amazon.co.uk>

     Author:   Oleksandr Pylypenko
               <mailto:opyl@amazon.com>

     Author:   Jeffrey Haas
               <mailto:jhaas@juniper.net>

     Author:   Aviran Kadosh
               <mailto:akadosh@cisco.com>

     Author:   Mohamed Boucadair
               <mailto:mohamed.boucadair@orange.com>";
  description
    "This module defines a data model for packet discard reporting.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2025-03-03 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: Information and Data Models for Packet Discard
                 Reporting";
  }

  /*
   * Features
   */

  feature control-plane-stats {
    description
      "Indicates support of control plane statistics on this
       device.";
  }

  feature interface-stats {
    description
      "Indicates support of interface statistics on this
       device.";
  }

  feature device-stats {
    description
      "Indicates support of global device statistics on this
       device.";
  }

  /*
   * Identities
   */

  identity discard-class {
    description
      "Base identity to identify the discard class.";
  }

  identity layer2 {
    base discard-class;
    description
      "Indicates a Layer 2 discard.";
  }

  identity layer3 {
    base discard-class;
    description
      "Indicates a Layer 3 discard.";
  }

  identity internal {
    base discard-class;
    description
      "Indicates an internal discard.";
  }

  identity policy {
    base discard-class;
    description
      "Indicates a discard due to a policy.";
  }

  /*
   * Groupings
   */

  grouping discard-order-policy {
    description
      "Defines the implementation-specific precedence of discard
       classes when multiple discard reasons apply to a single
       packet.

       The list is ordered from highest to lowest precedence.";

    leaf-list discard-order-capability {
      type identityref {
        base discard-class;
      }
      config false;
      description
        "The discard class identity that has this precedence.";
    }
  }

  /*
   * Main structure definition
   */

  augment "/rt:routing/rt:control-plane-protocols"
        + "/rt:control-plane-protocol" {
    if-feature "control-plane-stats";
    nacm:default-deny-all;
    description
      "Adds control plane discard counters.";
    uses discard-order-policy;
    uses plr-sx:control-plane;
  }
  augment "/if:interfaces-state/if:interface/if:statistics" {
    if-feature "interface-stats";
    nacm:default-deny-all;
    description
      "Adds packet discard reporting to the interface statistics.";
    uses discard-order-policy;
    uses plr-sx:interface;
  }
  augment "/lne:logical-network-elements"
        + "/lne:logical-network-element" {
    if-feature "device-stats";
    nacm:default-deny-all;
    description
      "Adds device level packet counters.";
    uses discard-order-policy;
    uses plr-sx:device;
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="experience">
      <name>Deployment Considerations Experience</name>
      <t>This section captures practical insights gained from implementing the model across multiple vendors' platforms, as guidance for future implementers and operators:</t>
      <ol spacing="normal" type="1"><li>
          <t>The number and granularity of discard classes defined in the IM represent a compromise. It aims to provide sufficient detail to enable appropriate automated actions while avoiding excessive detail, which may hinder quick problem identification.  Additionally, it helps to limit the quantity of data produced per interface, constraining the data volume and device CPU impacts.  While further granularity is possible, the defined schema has generally proven to be sufficient for the task of mitigating unintended packet loss.</t>
        </li>
        <li>
          <t>There are many possible ways to define the discard classification tree.  For example, an approach is to use a multi-rooted tree, rooted in each protocol. Instead, a better approach is to define a tree where protocol discards and causal discard classes are accounted for orthogonally.  This decision reduces the number of combinations of classes and has proven sufficient for determining mitigation actions.</t>
        </li>
        <li>
          <t>Platforms often account for the number of packets discarded where the TTL has expired (or IPv6 Hop Limit exceeded), and the device CPU has returned an ICMP Time Exceeded message <xref target="RFC4884"/>. There is typically a policer applied to limit the number of packets sent to the device CPU, however, which implicitly limits the rate of TTL discards that are processed.  One method to account for all packet discards due to TTL expired, even those that are dropped by a policer when being forwarded to the CPU, is to use accounting of all ingress packets received with TTL=1 as a proxy measure.</t>
        </li>
        <li>
          <t>Where no route discards are implemented with a default null route, separate discard accounting is required for any explicit null routes configured in order to differentiate between interface/ingress/discards/policy/null-route/packets and interface/ingress/discards/errors/no-route/packets.</t>
        </li>
        <li>
          <t>It is useful to account separately for transit packets discarded by ACLs or policers, and packets discarded by ACLs or policers which limit the number of packets to the device control plane.</t>
        </li>
        <li>
          <t>It is not possible to identify a configuration error (e.g., when intended discards are unintended) with device discard metrics alone. For example, additional context is needed to determine if ACL discards are intended or due to a misconfigured ACL (i.e., with configuration validation before deployment or by detecting a significant change in ACL discards after a configuration change compared to before).</t>
        </li>
        <li>
          <t>Aggregate counters need to be able to deal with the possibility of discontinuities in the underlying counters.</t>
        </li>
        <li>
          <t>While the classification tree is seven layers deep, a minimal implementation may only implement the top six layers.</t>
        </li>
      </ol>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: This section is to be removed before publication as an RFC.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in RFC 7942.  The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.  Please note that the listing of any individual implementation here does not imply endorsement by the IETF.  Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.  This is not intended as, and must not be construed to be, a catalog of available implementations or their features.  Readers are advised to note that other implementations may exist.</t>
      <section anchor="information-model-implementations">
        <name>Information Model Implementations</name>
        <t>The IM defined in <xref target="infomodel"/> has been implemented or mapped on at least nine hardware platforms across four vendors, including:</t>
        <ul spacing="normal">
          <li>
            <t>Broadcom: Trident, Tomahawk 1, Tomahawk 3, Tomahawk 5</t>
          </li>
          <li>
            <t>Cisco: Q200L</t>
          </li>
          <li>
            <t>Juniper: MX, PTX, QFX</t>
          </li>
          <li>
            <t>Marvell: TL7</t>
          </li>
        </ul>
      </section>
      <section anchor="data-model-implementations">
        <name>Data Model Implementations</name>
        <t>A YANG-compliant open-source SLAX script implements a subset of the DM defined in <xref target="datamodel"/> for Juniper MX routers.  This implementation is available at:</t>
        <ul spacing="normal">
          <li>
            <t><eref target="https://github.com/o-pylypenko-aws/draft-ietf-opsawg-discardmodel-sample/">https://github.com/o-pylypenko-aws/draft-ietf-opsawg-discardmodel-sample/</eref></t>
          </li>
        </ul>
        <t>Operational experience from these implementations is reflected in the deployment considerations in <xref target="experience"/>.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <section anchor="security-infomodel">
        <name>Information Model</name>
        <t>The IM defined in <xref target="infomodel-module"/> specifies a YANG module using <xref target="RFC8791"/> data extensions.  It defines a set of identities, types, and groupings. These nodes are intended to be reused by other YANG modules. The module by itself does not expose any data nodes that are writable, data nodes that contain read-only state, or RPCs. As such, there are no additional security issues related to the YANG module that need to be considered.</t>
      </section>
      <section anchor="security-datamodel">
        <name>Data Model</name>
        <t>This section is modeled after the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
        <t>The YANG module specified in <xref target="datamodel-module"/> defines a data model that is designed to be accessed via YANG-based management protocols, such as NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These YANG-based management protocols (1) have to use a secure transport layer (e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>) and (2) have to use mutual authentication.</t>
        <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
        <t>There are no particularly sensitive writable data nodes.</t>
        <t>Some of the readable data nodes in this YANG module may be considered sensitive or vulnerable in some network environments.  It is thus important to control read access (e.g., via get, get-config, or notification) to these data nodes. Specifically, the following subtrees and data nodes have particular sensitivities/vulnerabilities:</t>
        <dl>
          <dt>Control-plane, interfaces, and devices:</dt>
          <dd>
            <t>Access to these data nodes would reveal information about the attacks to which an element is subject, misconfigurations, etc.</t>
          </dd>
          <dt/>
          <dd>
            <t>Also, an attacker who can inject packets can infer the efficiency of its attack by monitoring (the increase of) some discard counters (e.g., policy) and adjust its attack strategy accordingly.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   URI:  urn:ietf:params:xml:ns:ietf-packet-discard-reporting-sx
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.

   URI:  urn:ietf:params:xml:ns:ietf-packet-discard-reporting
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
   Names" subregistry <xref target="RFC6020"/> within the "YANG Parameters" registry:</t>
      <artwork><![CDATA[
   Name:  ietf-packet-discard-reporting-sx
   Namespace:  urn:ietf:params:xml:ns:ietf-packet-discard-reporting-sx
   Prefix:  plr-sx
   Maintained by IANA?  N
   Reference:  RFC XXXX

   Name:  ietf-packet-discard-reporting
   Namespace:  urn:ietf:params:xml:ns:ietf-packet-discard-reporting
   Prefix:  plr
   Maintained by IANA?  N
   Reference:  RFC XXXX
]]></artwork>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <artwork><![CDATA[
Nadav Chachmon
Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
United States of America
Email: nchachmo@cisco.com
]]></artwork>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgments</name>
      <t>The content of this document has benefitted from feedback from JR Rivers, Ronan Waide, Chris DeBruin, and Marcos Sanz.</t>
      <t>Thanks to Benoît Claise, Joe Clarke, Tom Petch, Mahesh Jethanandani, Paul Aitken, and Randy Bush for the review and comments.</t>
      <t>Thanks to Ladislav Lhotka for the YANGDOCTORS review, Sergio Belotti for the OPSDIR review, and Satoru Matsushima for the INTDIR review.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8791">
          <front>
            <title>YANG Data Structure Extensions</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Björklund" initials="M." surname="Björklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document describes YANG mechanisms for defining abstract data structures with YANG.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8791"/>
          <seriesInfo name="DOI" value="10.17487/RFC8791"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC8349">
          <front>
            <title>A YANG Data Model for Routing Management (NMDA Version)</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document specifies three YANG modules and one submodule. Together, they form the core routing data model that serves as a framework for configuring and managing a routing subsystem. It is expected that these modules will be augmented by additional YANG modules defining data models for control-plane protocols, route filters, and other functions. The core routing data model provides common building blocks for such extensions -- routes, Routing Information Bases (RIBs), and control-plane protocols.</t>
              <t>The YANG modules in this document conform to the Network Management Datastore Architecture (NMDA). This document obsoletes RFC 8022.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8349"/>
          <seriesInfo name="DOI" value="10.17487/RFC8349"/>
        </reference>
        <reference anchor="RFC8530">
          <front>
            <title>YANG Model for Logical Network Elements</title>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a logical network element (LNE) YANG module that is compliant with the Network Management Datastore Architecture (NMDA). This module can be used to manage the logical resource partitioning that may be present on a network device. Examples of common industry terms for logical resource partitioning are logical systems or logical routers. The YANG model in this document conforms with NMDA as defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8530"/>
          <seriesInfo name="DOI" value="10.17487/RFC8530"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RED93">
          <front>
            <title>Random Early Detection gateways for Congestion Avoidance</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="gMNI">
          <front>
            <title>gRPC Network Management Interface, IETF 98, March 2017, &lt;https://datatracker.ietf.org/meeting/98/materials/slides-98-rtgwg-gnmi-intro-draft-openconfig-rtgwg-gnmi-spec-00&gt;</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2863">
          <front>
            <title>The Interfaces Group MIB</title>
            <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
            <author fullname="F. Kastenholz" initials="F." surname="Kastenholz"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This memo discusses the 'interfaces' group of MIB-II, especially the experience gained from the definition of numerous media-specific MIB modules for use in conjunction with the 'interfaces' group for managing various sub-layers beneath the internetwork-layer. It specifies clarifications to, and extensions of, the architectural issues within the MIB-II model of the 'interfaces' group. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2863"/>
          <seriesInfo name="DOI" value="10.17487/RFC2863"/>
        </reference>
        <reference anchor="RFC7270">
          <front>
            <title>Cisco-Specific Information Elements Reused in IP Flow Information Export (IPFIX)</title>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document describes some additional IP Flow Information Export (IPFIX) Information Elements in the range of 1-127, which is the range compatible with field types used by NetFlow version 9 in RFC 3954, as specified in the IPFIX Information Model in RFC 7012.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7270"/>
          <seriesInfo name="DOI" value="10.17487/RFC7270"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC3444">
          <front>
            <title>On the Difference between Information Models and Data Models</title>
            <author fullname="A. Pras" initials="A." surname="Pras"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3444"/>
          <seriesInfo name="DOI" value="10.17487/RFC3444"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC3882">
          <front>
            <title>Configuring BGP to Block Denial-of-Service Attacks</title>
            <author fullname="D. Turk" initials="D." surname="Turk"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>This document describes an operational technique that uses BGP communities to remotely trigger black-holing of a particular destination network to block denial-of-service attacks. Black-holing can be applied on a selection of routers rather than all BGP-speaking routers in the network. The document also describes a sinkhole tunnel technique using BGP communities and tunnels to pull traffic into a sinkhole router for analysis. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3882"/>
          <seriesInfo name="DOI" value="10.17487/RFC3882"/>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="RFC9117">
          <front>
            <title>Revised Validation Procedure for BGP Flow Specifications</title>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="J. Alcaide" initials="J." surname="Alcaide"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="D. Smith" initials="D." surname="Smith"/>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>This document describes a modification to the validation procedure defined for the dissemination of BGP Flow Specifications. The dissemination of BGP Flow Specifications as specified in RFC 8955 requires that the originator of the Flow Specification match the originator of the best-match unicast route for the destination prefix embedded in the Flow Specification. For an Internal Border Gateway Protocol (iBGP) received route, the originator is typically a border router within the same autonomous system (AS). The objective is to allow only BGP speakers within the data forwarding path to originate BGP Flow Specifications. Sometimes it is desirable to originate the BGP Flow Specification from any place within the autonomous system itself, for example, from a centralized BGP route controller. However, the validation procedure described in RFC 8955 will fail in this scenario. The modification proposed herein relaxes the validation rule to enable Flow Specifications to be originated within the same autonomous system as the BGP speaker performing the validation. Additionally, this document revises the AS_PATH validation rules so Flow Specifications received from an External Border Gateway Protocol (eBGP) peer can be validated when such a peer is a BGP route server.</t>
              <t>This document updates the validation procedure in RFC 8955.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9117"/>
          <seriesInfo name="DOI" value="10.17487/RFC9117"/>
        </reference>
        <reference anchor="RFC8289">
          <front>
            <title>Controlled Delay Active Queue Management</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
            <author fullname="A. McGregor" initials="A." role="editor" surname="McGregor"/>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document describes CoDel (Controlled Delay) -- a general framework that controls bufferbloat-generated excess delay in modern networking environments. CoDel consists of an estimator, a setpoint, and a control loop. It requires no configuration in normal Internet deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8289"/>
          <seriesInfo name="DOI" value="10.17487/RFC8289"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC4884">
          <front>
            <title>Extended ICMP to Support Multi-Part Messages</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document redefines selected ICMP messages to support multi-part operation. A multi-part ICMP message carries all of the information that ICMP messages carried previously, as well as additional information that applications may require.</t>
              <t>Multi-part messages are supported by an ICMP extension structure. The extension structure is situated at the end of the ICMP message. It includes an extension header followed by one or more extension objects. Each extension object contains an object header and object payload. All object headers share a common format.</t>
              <t>This document further redefines the above mentioned ICMP messages by specifying a length attribute. All of the currently defined ICMP messages to which an extension structure can be appended include an "original datagram" field. The "original datagram" field contains the initial octets of the datagram that elicited the ICMP error message. Although the original datagram field is of variable length, the ICMP message does not include a field that specifies its length. Therefore, in order to facilitate message parsing, this document allocates eight previously reserved bits to reflect the length of the "original datagram" field.</t>
              <t>The proposed modifications change the requirements for ICMP compliance. The impact of these changes on compliant implementations is discussed, and new requirements for future implementations are presented.</t>
              <t>This memo updates RFC 792 and RFC 4443. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4884"/>
          <seriesInfo name="DOI" value="10.17487/RFC4884"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
      </references>
    </references>
    <?line 1490?>

<section anchor="wheredropped">
      <name>Where Do Packets Get Dropped?</name>
      <t>Understanding where packets are discarded in a network device is essential for interpreting discard signals and determining appropriate mitigation actions.  <xref target="ex-drop"/> depicts an example of where and why packets may be discarded in a typical single-ASIC, shared-buffered type device. While actual device architectures vary between vendors and platforms, with some using multiple ASICs, distributed forwarding, or different buffering architectures, this example illustrates the common processing stages where packets may be dropped. The logical model for classifying and reporting discards remains consistent regardless of the underlying hardware architecture.</t>
      <t>Packets ingress on the left and egress on the right:</t>
      <figure anchor="ex-drop">
        <name>Example of where packets get dropped</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="448" width="600" viewBox="0 0 600 448" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 40,176 L 40,192" fill="none" stroke="black"/>
              <path d="M 40,224 L 40,240" fill="none" stroke="black"/>
              <path d="M 80,144 L 80,176" fill="none" stroke="black"/>
              <path d="M 120,176 L 120,240" fill="none" stroke="black"/>
              <path d="M 144,176 L 144,192" fill="none" stroke="black"/>
              <path d="M 144,224 L 144,240" fill="none" stroke="black"/>
              <path d="M 232,176 L 232,240" fill="none" stroke="black"/>
              <path d="M 248,32 L 248,96" fill="none" stroke="black"/>
              <path d="M 256,176 L 256,192" fill="none" stroke="black"/>
              <path d="M 256,224 L 256,240" fill="none" stroke="black"/>
              <path d="M 280,96 L 280,144" fill="none" stroke="black"/>
              <path d="M 312,96 L 312,144" fill="none" stroke="black"/>
              <path d="M 336,176 L 336,240" fill="none" stroke="black"/>
              <path d="M 344,32 L 344,96" fill="none" stroke="black"/>
              <path d="M 360,176 L 360,192" fill="none" stroke="black"/>
              <path d="M 360,224 L 360,240" fill="none" stroke="black"/>
              <path d="M 448,176 L 448,240" fill="none" stroke="black"/>
              <path d="M 472,176 L 472,192" fill="none" stroke="black"/>
              <path d="M 472,224 L 472,240" fill="none" stroke="black"/>
              <path d="M 512,144 L 512,176" fill="none" stroke="black"/>
              <path d="M 552,176 L 552,240" fill="none" stroke="black"/>
              <path d="M 248,32 L 344,32" fill="none" stroke="black"/>
              <path d="M 248,96 L 304,96" fill="none" stroke="black"/>
              <path d="M 320,96 L 344,96" fill="none" stroke="black"/>
              <path d="M 80,144 L 272,144" fill="none" stroke="black"/>
              <path d="M 288,144 L 512,144" fill="none" stroke="black"/>
              <path d="M 40,176 L 120,176" fill="none" stroke="black"/>
              <path d="M 144,176 L 232,176" fill="none" stroke="black"/>
              <path d="M 256,176 L 336,176" fill="none" stroke="black"/>
              <path d="M 360,176 L 448,176" fill="none" stroke="black"/>
              <path d="M 472,176 L 552,176" fill="none" stroke="black"/>
              <path d="M 24,208 L 40,208" fill="none" stroke="black"/>
              <path d="M 120,208 L 144,208" fill="none" stroke="black"/>
              <path d="M 232,208 L 256,208" fill="none" stroke="black"/>
              <path d="M 336,208 L 360,208" fill="none" stroke="black"/>
              <path d="M 448,208 L 472,208" fill="none" stroke="black"/>
              <path d="M 552,208 L 568,208" fill="none" stroke="black"/>
              <path d="M 40,240 L 120,240" fill="none" stroke="black"/>
              <path d="M 144,240 L 232,240" fill="none" stroke="black"/>
              <path d="M 256,240 L 336,240" fill="none" stroke="black"/>
              <path d="M 360,240 L 448,240" fill="none" stroke="black"/>
              <path d="M 472,240 L 552,240" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="576,208 564,202.4 564,213.6" fill="black" transform="rotate(0,568,208)"/>
              <polygon class="arrowhead" points="480,208 468,202.4 468,213.6" fill="black" transform="rotate(0,472,208)"/>
              <polygon class="arrowhead" points="368,208 356,202.4 356,213.6" fill="black" transform="rotate(0,360,208)"/>
              <polygon class="arrowhead" points="320,96 308,90.4 308,101.6" fill="black" transform="rotate(270,312,96)"/>
              <polygon class="arrowhead" points="288,144 276,138.4 276,149.6" fill="black" transform="rotate(90,280,144)"/>
              <polygon class="arrowhead" points="264,208 252,202.4 252,213.6" fill="black" transform="rotate(0,256,208)"/>
              <polygon class="arrowhead" points="152,208 140,202.4 140,213.6" fill="black" transform="rotate(0,144,208)"/>
              <polygon class="arrowhead" points="48,208 36,202.4 36,213.6" fill="black" transform="rotate(0,40,208)"/>
              <g class="text">
                <text x="296" y="68">Control</text>
                <text x="288" y="84">Plane</text>
                <text x="236" y="116">from_cpu</text>
                <text x="348" y="116">to_cpu</text>
                <text x="12" y="212">Rx</text>
                <text x="80" y="212">PHY/MAC</text>
                <text x="184" y="212">Ingress</text>
                <text x="296" y="212">Buffers</text>
                <text x="396" y="212">Egress</text>
                <text x="512" y="212">PHY/MAC</text>
                <text x="588" y="212">Tx</text>
                <text x="188" y="228">Pipeline</text>
                <text x="404" y="228">Pipeline</text>
                <text x="48" y="276">Unintended:</text>
                <text x="80" y="292">error/rx/l2</text>
                <text x="184" y="292">error/l3/rx</text>
                <text x="288" y="292">no-buffer</text>
                <text x="400" y="292">error/l3/tx</text>
                <text x="208" y="308">error/l3/no-route</text>
                <text x="232" y="324">error/l3/rx/ttl-expired</text>
                <text x="196" y="340">error/internal</text>
                <text x="40" y="356">Intended:</text>
                <text x="180" y="372">policy/acl</text>
                <text x="396" y="372">policy/acl</text>
                <text x="196" y="388">policy/policer</text>
                <text x="412" y="388">policy/policer</text>
                <text x="184" y="404">policy/urpf</text>
                <text x="208" y="420">policy/null-route</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                              +-----------+
                              |           |
                              |  Control  |
                              |  Plane    |
                              +---+---^---+
                         from_cpu |   | to_cpu
                                  |   |
         +------------------------v---+------------------------+
         |                                                     |
    +----+----+  +----------+  +---------+  +----------+  +----+----+
    |         |  |          |  |         |  |          |  |         |
Rx--> PHY/MAC +--> Ingress  +--> Buffers +--> Egress   +--> PHY/MAC +-> Tx
    |         |  | Pipeline |  |         |  | Pipeline |  |         |
    +---------+  +----------+  +---------+  +----------+  +---------+

Unintended:
    error/rx/l2  error/l3/rx   no-buffer    error/l3/tx
                 error/l3/no-route
                 error/l3/rx/ttl-expired
                 error/internal
Intended:
                 policy/acl                 policy/acl
                 policy/policer             policy/policer
                 policy/urpf
                 policy/null-route

]]></artwork>
        </artset>
      </figure>
      <t>See Appendix B for examples of how these discard signals map to root causes and mitigation actions.</t>
    </section>
    <section anchor="mapping">
      <name>Example Signal-to-mitigation Action Mapping</name>
      <t>The effectiveness of automated mitigation depends on correctly mapping discard signals to root causes and appropriate actions.  <xref target="ex-table"/> gives example discard signal-to-mitigation action mappings based on the features described in section 3.</t>
      <table anchor="ex-table">
        <name>Example Signal-Cause-Mitigation Mapping</name>
        <thead>
          <tr>
            <th align="left">DISCARD-CLASS</th>
            <th align="left">Discard cause</th>
            <th align="left">DISCARD-RATE</th>
            <th align="center">DISCARD-DURATION</th>
            <th align="center">Unintended?</th>
            <th align="left">Possible actions</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ingress/discards/errors/l2/rx</td>
            <td align="left">Upstream device or link error</td>
            <td align="left">&gt;Baseline</td>
            <td align="center">O(1min)</td>
            <td align="center">Y</td>
            <td align="left">Take upstream link or device out-of-service</td>
          </tr>
          <tr>
            <td align="left">ingress/discards/errors/l3/rx/ttl-expired</td>
            <td align="left">Tracert</td>
            <td align="left">&lt;=Baseline</td>
            <td align="center"> </td>
            <td align="center">N</td>
            <td align="left">no action</td>
          </tr>
          <tr>
            <td align="left">ingress/discards/errors/l3/rx/ttl-expired</td>
            <td align="left">Convergence</td>
            <td align="left">&gt;Baseline</td>
            <td align="center">O(1s)</td>
            <td align="center">Y</td>
            <td align="left">No action</td>
          </tr>
          <tr>
            <td align="left">ingress/discards/errors/l3/rx/ttl-expired</td>
            <td align="left">Routing loop</td>
            <td align="left">&gt;Baseline</td>
            <td align="center">O(1min)</td>
            <td align="center">Y</td>
            <td align="left">Roll-back change</td>
          </tr>
          <tr>
            <td align="left">.*/policy/.*</td>
            <td align="left">Policy</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center">N</td>
            <td align="left">No action</td>
          </tr>
          <tr>
            <td align="left">ingress/discards/errors/l3/no-route</td>
            <td align="left">Convergence</td>
            <td align="left">&gt;Baseline</td>
            <td align="center">O(1s)</td>
            <td align="center">Y</td>
            <td align="left">No action</td>
          </tr>
          <tr>
            <td align="left">ingress/discards/errors/l3/no-route</td>
            <td align="left">Config error</td>
            <td align="left">&gt;Baseline</td>
            <td align="center">O(1min)</td>
            <td align="center">Y</td>
            <td align="left">Roll-back change</td>
          </tr>
          <tr>
            <td align="left">ingress/discards/errors/l3/no-route</td>
            <td align="left">Invalid destination</td>
            <td align="left">&gt;Baseline</td>
            <td align="center">O(10min)</td>
            <td align="center">N</td>
            <td align="left">Escalate to operator</td>
          </tr>
          <tr>
            <td align="left">ingress/discards/errors/internal</td>
            <td align="left">Device errors</td>
            <td align="left">&gt;Baseline</td>
            <td align="center">O(1min)</td>
            <td align="center">Y</td>
            <td align="left">Take device out-of-service</td>
          </tr>
          <tr>
            <td align="left">egress/discards/no-buffer</td>
            <td align="left">Congestion</td>
            <td align="left">&lt;=Baseline</td>
            <td align="center"> </td>
            <td align="center">N</td>
            <td align="left">No action</td>
          </tr>
          <tr>
            <td align="left">egress/discards/no-buffer</td>
            <td align="left">Congestion</td>
            <td align="left">&gt;Baseline</td>
            <td align="center">O(1min)</td>
            <td align="center">Y</td>
            <td align="left">Bring capacity back into service or move traffic</td>
          </tr>
        </tbody>
      </table>
      <t>The 'Baseline' in the 'DISCARD-RATE' column is both DISCARD-CLASS and network dependent.</t>
    </section>
    <section anchor="sec-im-full-tree">
      <name>Full Information Model Tree</name>
      <t>The following YANG tree diagram shows the complete IM structure:</t>
      <artwork><![CDATA[
module: ietf-packet-discard-reporting-sx

  structure packet-discard-reporting:
    +-- control-plane {control-plane-stats}?
    |  +-- traffic* [direction]
    |  |  +-- direction    identityref
    |  |  +-- packets?     yang:counter64
    |  |  +-- bytes?       yang:counter64
    |  +-- discards* [direction]
    |     +-- direction    identityref
    |     +-- packets?     yang:counter64
    |     +-- bytes?       yang:counter64
    |     +-- policy
    |        +-- packets?   yang:counter64
    +-- interface* [name] {interface-stats}?
    |  +-- name        string
    |  +-- traffic* [direction]
    |  |  +-- direction    identityref
    |  |  +-- l2
    |  |  |  +-- frames?   yang:counter64
    |  |  |  +-- bytes?    yang:counter64
    |  |  +-- l3
    |  |  |  +-- address-family-stat* [address-family]
    |  |  |     +-- address-family    identityref
    |  |  |     +-- packets?          yang:counter64
    |  |  |     +-- bytes?            yang:counter64
    |  |  |     +-- unicast
    |  |  |     |  +-- packets?   yang:counter64
    |  |  |     |  +-- bytes?     yang:counter64
    |  |  |     +-- multicast
    |  |  |     |  +-- packets?   yang:counter64
    |  |  |     |  +-- bytes?     yang:counter64
    |  |  |     +-- broadcast
    |  |  |        +-- packets?   yang:counter64
    |  |  |        +-- bytes?     yang:counter64
    |  |  +-- qos!
    |  |     +-- class* [id]
    |  |        +-- id         string
    |  |        +-- packets?   yang:counter64
    |  |        +-- bytes?     yang:counter64
    |  +-- discards* [direction]
    |     +-- direction    identityref
    |     +-- l2
    |     |  +-- frames?   yang:counter64
    |     |  +-- bytes?    yang:counter64
    |     +-- l3
    |     |  +-- address-family-stat* [address-family]
    |     |     +-- address-family    identityref
    |     |     +-- packets?          yang:counter64
    |     |     +-- bytes?            yang:counter64
    |     |     +-- unicast
    |     |     |  +-- packets?   yang:counter64
    |     |     |  +-- bytes?     yang:counter64
    |     |     +-- multicast
    |     |     |  +-- packets?   yang:counter64
    |     |     |  +-- bytes?     yang:counter64
    |     |     +-- broadcast
    |     |        +-- packets?   yang:counter64
    |     |        +-- bytes?     yang:counter64
    |     +-- errors
    |     |  +-- l2
    |     |  |  +-- rx
    |     |  |  |  +-- frames?          yang:counter64
    |     |  |  |  +-- crc-error?       yang:counter64
    |     |  |  |  +-- invalid-mac?     yang:counter64
    |     |  |  |  +-- invalid-vlan?    yang:counter64
    |     |  |  |  +-- invalid-frame?   yang:counter64
    |     |  |  +-- tx
    |     |  |     +-- frames?   yang:counter64
    |     |  +-- l3
    |     |  |  +-- rx
    |     |  |  |  +-- packets?          yang:counter64
    |     |  |  |  +-- checksum-error?   yang:counter64
    |     |  |  |  +-- mtu-exceeded?     yang:counter64
    |     |  |  |  +-- invalid-packet?   yang:counter64
    |     |  |  +-- ttl-expired?     yang:counter64
    |     |  |  +-- no-route?        yang:counter64
    |     |  |  +-- invalid-sid?     yang:counter64
    |     |  |  +-- invalid-label?   yang:counter64
    |     |  |  +-- tx
    |     |  |     +-- packets?   yang:counter64
    |     |  +-- internal
    |     |     +-- packets?        yang:counter64
    |     |     +-- parity-error?   yang:counter64
    |     +-- policy
    |     |  +-- l2
    |     |  |  +-- frames?   yang:counter64
    |     |  |  +-- acl?      yang:counter64
    |     |  +-- l3
    |     |     +-- packets?      yang:counter64
    |     |     +-- acl?          yang:counter64
    |     |     +-- policer
    |     |     |  +-- packets?   yang:counter64
    |     |     |  +-- bytes?     yang:counter64
    |     |     |  +-- classes!
    |     |     |     +-- class* [id]
    |     |     |        +-- id         string
    |     |     |        +-- packets?   yang:counter64
    |     |     |        +-- bytes?     yang:counter64
    |     |     +-- null-route?   yang:counter64
    |     |     +-- rpf?          yang:counter64
    |     |     +-- ddos?         yang:counter64
    |     +-- no-buffer
    |        +-- qos!
    |           +-- class* [id]
    |              +-- id         string
    |              +-- packets?   yang:counter64
    |              +-- bytes?     yang:counter64
    +-- flow* [direction] {flow-reporting}?
    |  +-- direction    identityref
    |  +-- traffic
    |  |  +-- l2
    |  |  |  +-- frames?   yang:counter64
    |  |  |  +-- bytes?    yang:counter64
    |  |  +-- l3
    |  |  |  +-- address-family-stat* [address-family]
    |  |  |     +-- address-family    identityref
    |  |  |     +-- packets?          yang:counter64
    |  |  |     +-- bytes?            yang:counter64
    |  |  |     +-- unicast
    |  |  |     |  +-- packets?   yang:counter64
    |  |  |     |  +-- bytes?     yang:counter64
    |  |  |     +-- multicast
    |  |  |     |  +-- packets?   yang:counter64
    |  |  |     |  +-- bytes?     yang:counter64
    |  |  |     +-- broadcast
    |  |  |        +-- packets?   yang:counter64
    |  |  |        +-- bytes?     yang:counter64
    |  |  +-- qos!
    |  |     +-- class* [id]
    |  |        +-- id         string
    |  |        +-- packets?   yang:counter64
    |  |        +-- bytes?     yang:counter64
    |  +-- discards
    |     +-- l2
    |     |  +-- frames?   yang:counter64
    |     |  +-- bytes?    yang:counter64
    |     +-- l3
    |     |  +-- address-family-stat* [address-family]
    |     |     +-- address-family    identityref
    |     |     +-- packets?          yang:counter64
    |     |     +-- bytes?            yang:counter64
    |     |     +-- unicast
    |     |     |  +-- packets?   yang:counter64
    |     |     |  +-- bytes?     yang:counter64
    |     |     +-- multicast
    |     |     |  +-- packets?   yang:counter64
    |     |     |  +-- bytes?     yang:counter64
    |     |     +-- broadcast
    |     |        +-- packets?   yang:counter64
    |     |        +-- bytes?     yang:counter64
    |     +-- errors
    |     |  +-- l2
    |     |  |  +-- rx
    |     |  |  |  +-- frames?          yang:counter64
    |     |  |  |  +-- crc-error?       yang:counter64
    |     |  |  |  +-- invalid-mac?     yang:counter64
    |     |  |  |  +-- invalid-vlan?    yang:counter64
    |     |  |  |  +-- invalid-frame?   yang:counter64
    |     |  |  +-- tx
    |     |  |     +-- frames?   yang:counter64
    |     |  +-- l3
    |     |  |  +-- rx
    |     |  |  |  +-- packets?          yang:counter64
    |     |  |  |  +-- checksum-error?   yang:counter64
    |     |  |  |  +-- mtu-exceeded?     yang:counter64
    |     |  |  |  +-- invalid-packet?   yang:counter64
    |     |  |  +-- ttl-expired?     yang:counter64
    |     |  |  +-- no-route?        yang:counter64
    |     |  |  +-- invalid-sid?     yang:counter64
    |     |  |  +-- invalid-label?   yang:counter64
    |     |  |  +-- tx
    |     |  |     +-- packets?   yang:counter64
    |     |  +-- internal
    |     |     +-- packets?        yang:counter64
    |     |     +-- parity-error?   yang:counter64
    |     +-- policy
    |     |  +-- l2
    |     |  |  +-- frames?   yang:counter64
    |     |  |  +-- acl?      yang:counter64
    |     |  +-- l3
    |     |     +-- packets?      yang:counter64
    |     |     +-- acl?          yang:counter64
    |     |     +-- policer
    |     |     |  +-- packets?   yang:counter64
    |     |     |  +-- bytes?     yang:counter64
    |     |     |  +-- classes!
    |     |     |     +-- class* [id]
    |     |     |        +-- id         string
    |     |     |        +-- packets?   yang:counter64
    |     |     |        +-- bytes?     yang:counter64
    |     |     +-- null-route?   yang:counter64
    |     |     +-- rpf?          yang:counter64
    |     |     +-- ddos?         yang:counter64
    |     +-- no-buffer
    |        +-- qos!
    |           +-- class* [id]
    |              +-- id         string
    |              +-- packets?   yang:counter64
    |              +-- bytes?     yang:counter64
    +-- device {device-stats}?
       +-- traffic
       |  +-- l2
       |  |  +-- frames?   yang:counter64
       |  |  +-- bytes?    yang:counter64
       |  +-- l3
       |  |  +-- address-family-stat* [address-family]
       |  |     +-- address-family    identityref
       |  |     +-- packets?          yang:counter64
       |  |     +-- bytes?            yang:counter64
       |  |     +-- unicast
       |  |     |  +-- packets?   yang:counter64
       |  |     |  +-- bytes?     yang:counter64
       |  |     +-- multicast
       |  |     |  +-- packets?   yang:counter64
       |  |     |  +-- bytes?     yang:counter64
       |  |     +-- broadcast
       |  |        +-- packets?   yang:counter64
       |  |        +-- bytes?     yang:counter64
       |  +-- qos!
       |     +-- class* [id]
       |        +-- id         string
       |        +-- packets?   yang:counter64
       |        +-- bytes?     yang:counter64
       +-- discards
          +-- l2
          |  +-- frames?   yang:counter64
          |  +-- bytes?    yang:counter64
          +-- l3
          |  +-- address-family-stat* [address-family]
          |     +-- address-family    identityref
          |     +-- packets?          yang:counter64
          |     +-- bytes?            yang:counter64
          |     +-- unicast
          |     |  +-- packets?   yang:counter64
          |     |  +-- bytes?     yang:counter64
          |     +-- multicast
          |     |  +-- packets?   yang:counter64
          |     |  +-- bytes?     yang:counter64
          |     +-- broadcast
          |        +-- packets?   yang:counter64
          |        +-- bytes?     yang:counter64
          +-- errors
          |  +-- l2
          |  |  +-- rx
          |  |  |  +-- frames?          yang:counter64
          |  |  |  +-- crc-error?       yang:counter64
          |  |  |  +-- invalid-mac?     yang:counter64
          |  |  |  +-- invalid-vlan?    yang:counter64
          |  |  |  +-- invalid-frame?   yang:counter64
          |  |  +-- tx
          |  |     +-- frames?   yang:counter64
          |  +-- l3
          |  |  +-- rx
          |  |  |  +-- packets?          yang:counter64
          |  |  |  +-- checksum-error?   yang:counter64
          |  |  |  +-- mtu-exceeded?     yang:counter64
          |  |  |  +-- invalid-packet?   yang:counter64
          |  |  +-- ttl-expired?     yang:counter64
          |  |  +-- no-route?        yang:counter64
          |  |  +-- invalid-sid?     yang:counter64
          |  |  +-- invalid-label?   yang:counter64
          |  |  +-- tx
          |  |     +-- packets?   yang:counter64
          |  +-- internal
          |     +-- packets?        yang:counter64
          |     +-- parity-error?   yang:counter64
          +-- policy
          |  +-- l2
          |  |  +-- frames?   yang:counter64
          |  |  +-- acl?      yang:counter64
          |  +-- l3
          |     +-- packets?      yang:counter64
          |     +-- acl?          yang:counter64
          |     +-- policer
          |     |  +-- packets?   yang:counter64
          |     |  +-- bytes?     yang:counter64
          |     |  +-- classes!
          |     |     +-- class* [id]
          |     |        +-- id         string
          |     |        +-- packets?   yang:counter64
          |     |        +-- bytes?     yang:counter64
          |     +-- null-route?   yang:counter64
          |     +-- rpf?          yang:counter64
          |     +-- ddos?         yang:counter64
          +-- no-buffer
             +-- qos!
                +-- class* [id]
                   +-- id         string
                   +-- packets?   yang:counter64
                   +-- bytes?     yang:counter64
]]></artwork>
    </section>
    <section anchor="sec-dm-full-tree">
      <name>Full Data Model Tree</name>
      <t>The following YANG tree diagram shows the complete DM structure:</t>
      <artwork><![CDATA[
module: ietf-packet-discard-reporting

  augment /rt:routing/rt:control-plane-protocols
            /rt:control-plane-protocol:
    +--ro discard-order-capability*   identityref
    |       {control-plane-stats}?
    +--rw traffic* [direction] {control-plane-stats}?
    |  +--rw direction    identityref
    |  +--rw packets?     yang:counter64
    |  +--rw bytes?       yang:counter64
    +--rw discards* [direction] {control-plane-stats}?
       +--rw direction    identityref
       +--rw packets?     yang:counter64
       +--rw bytes?       yang:counter64
       +--rw policy
          +--rw packets?   yang:counter64
  augment /if:interfaces-state/if:interface/if:statistics:
    +--ro discard-order-capability*   identityref {interface-stats}?
    +--ro traffic* [direction] {interface-stats}?
    |  +--ro direction    identityref
    |  +--ro l2
    |  |  +--ro frames?   yang:counter64
    |  |  +--ro bytes?    yang:counter64
    |  +--ro l3
    |  |  +--ro address-family-stat* [address-family]
    |  |     +--ro address-family    identityref
    |  |     +--ro packets?          yang:counter64
    |  |     +--ro bytes?            yang:counter64
    |  |     +--ro unicast
    |  |     |  +--ro packets?   yang:counter64
    |  |     |  +--ro bytes?     yang:counter64
    |  |     +--ro multicast
    |  |     |  +--ro packets?   yang:counter64
    |  |     |  +--ro bytes?     yang:counter64
    |  |     +--ro broadcast
    |  |        +--ro packets?   yang:counter64
    |  |        +--ro bytes?     yang:counter64
    |  +--ro qos!
    |     +--ro class* [id]
    |        +--ro id         string
    |        +--ro packets?   yang:counter64
    |        +--ro bytes?     yang:counter64
    +--ro discards* [direction] {interface-stats}?
       +--ro direction    identityref
       +--ro l2
       |  +--ro frames?   yang:counter64
       |  +--ro bytes?    yang:counter64
       +--ro l3
       |  +--ro address-family-stat* [address-family]
       |     +--ro address-family    identityref
       |     +--ro packets?          yang:counter64
       |     +--ro bytes?            yang:counter64
       |     +--ro unicast
       |     |  +--ro packets?   yang:counter64
       |     |  +--ro bytes?     yang:counter64
       |     +--ro multicast
       |     |  +--ro packets?   yang:counter64
       |     |  +--ro bytes?     yang:counter64
       |     +--ro broadcast
       |        +--ro packets?   yang:counter64
       |        +--ro bytes?     yang:counter64
       +--ro errors
       |  +--ro l2
       |  |  +--ro rx
       |  |  |  +--ro frames?          yang:counter64
       |  |  |  +--ro crc-error?       yang:counter64
       |  |  |  +--ro invalid-mac?     yang:counter64
       |  |  |  +--ro invalid-vlan?    yang:counter64
       |  |  |  +--ro invalid-frame?   yang:counter64
       |  |  +--ro tx
       |  |     +--ro frames?   yang:counter64
       |  +--ro l3
       |  |  +--ro rx
       |  |  |  +--ro packets?          yang:counter64
       |  |  |  +--ro checksum-error?   yang:counter64
       |  |  |  +--ro mtu-exceeded?     yang:counter64
       |  |  |  +--ro invalid-packet?   yang:counter64
       |  |  +--ro ttl-expired?     yang:counter64
       |  |  +--ro no-route?        yang:counter64
       |  |  +--ro invalid-sid?     yang:counter64
       |  |  +--ro invalid-label?   yang:counter64
       |  |  +--ro tx
       |  |     +--ro packets?   yang:counter64
       |  +--ro internal
       |     +--ro packets?        yang:counter64
       |     +--ro parity-error?   yang:counter64
       +--ro policy
       |  +--ro l2
       |  |  +--ro frames?   yang:counter64
       |  |  +--ro acl?      yang:counter64
       |  +--ro l3
       |     +--ro packets?      yang:counter64
       |     +--ro acl?          yang:counter64
       |     +--ro policer
       |     |  +--ro packets?   yang:counter64
       |     |  +--ro bytes?     yang:counter64
       |     |  +--ro classes!
       |     |     +--ro class* [id]
       |     |        +--ro id         string
       |     |        +--ro packets?   yang:counter64
       |     |        +--ro bytes?     yang:counter64
       |     +--ro null-route?   yang:counter64
       |     +--ro rpf?          yang:counter64
       |     +--ro ddos?         yang:counter64
       +--ro no-buffer
          +--ro qos!
             +--ro class* [id]
                +--ro id         string
                +--ro packets?   yang:counter64
                +--ro bytes?     yang:counter64
  augment /lne:logical-network-elements/lne:logical-network-element:
    +--ro discard-order-capability*   identityref {device-stats}?
    +--rw traffic {device-stats}?
    |  +--rw l2
    |  |  +--rw frames?   yang:counter64
    |  |  +--rw bytes?    yang:counter64
    |  +--rw l3
    |  |  +--rw address-family-stat* [address-family]
    |  |     +--rw address-family    identityref
    |  |     +--rw packets?          yang:counter64
    |  |     +--rw bytes?            yang:counter64
    |  |     +--rw unicast
    |  |     |  +--rw packets?   yang:counter64
    |  |     |  +--rw bytes?     yang:counter64
    |  |     +--rw multicast
    |  |     |  +--rw packets?   yang:counter64
    |  |     |  +--rw bytes?     yang:counter64
    |  |     +--rw broadcast
    |  |        +--rw packets?   yang:counter64
    |  |        +--rw bytes?     yang:counter64
    |  +--rw qos!
    |     +--rw class* [id]
    |        +--rw id         string
    |        +--rw packets?   yang:counter64
    |        +--rw bytes?     yang:counter64
    +--rw discards {device-stats}?
       +--rw l2
       |  +--rw frames?   yang:counter64
       |  +--rw bytes?    yang:counter64
       +--rw l3
       |  +--rw address-family-stat* [address-family]
       |     +--rw address-family    identityref
       |     +--rw packets?          yang:counter64
       |     +--rw bytes?            yang:counter64
       |     +--rw unicast
       |     |  +--rw packets?   yang:counter64
       |     |  +--rw bytes?     yang:counter64
       |     +--rw multicast
       |     |  +--rw packets?   yang:counter64
       |     |  +--rw bytes?     yang:counter64
       |     +--rw broadcast
       |        +--rw packets?   yang:counter64
       |        +--rw bytes?     yang:counter64
       +--rw errors
       |  +--rw l2
       |  |  +--rw rx
       |  |  |  +--rw frames?          yang:counter64
       |  |  |  +--rw crc-error?       yang:counter64
       |  |  |  +--rw invalid-mac?     yang:counter64
       |  |  |  +--rw invalid-vlan?    yang:counter64
       |  |  |  +--rw invalid-frame?   yang:counter64
       |  |  +--rw tx
       |  |     +--rw frames?   yang:counter64
       |  +--rw l3
       |  |  +--rw rx
       |  |  |  +--rw packets?          yang:counter64
       |  |  |  +--rw checksum-error?   yang:counter64
       |  |  |  +--rw mtu-exceeded?     yang:counter64
       |  |  |  +--rw invalid-packet?   yang:counter64
       |  |  +--rw ttl-expired?     yang:counter64
       |  |  +--rw no-route?        yang:counter64
       |  |  +--rw invalid-sid?     yang:counter64
       |  |  +--rw invalid-label?   yang:counter64
       |  |  +--rw tx
       |  |     +--rw packets?   yang:counter64
       |  +--rw internal
       |     +--rw packets?        yang:counter64
       |     +--rw parity-error?   yang:counter64
       +--rw policy
       |  +--rw l2
       |  |  +--rw frames?   yang:counter64
       |  |  +--rw acl?      yang:counter64
       |  +--rw l3
       |     +--rw packets?      yang:counter64
       |     +--rw acl?          yang:counter64
       |     +--rw policer
       |     |  +--rw packets?   yang:counter64
       |     |  +--rw bytes?     yang:counter64
       |     |  +--rw classes!
       |     |     +--rw class* [id]
       |     |        +--rw id         string
       |     |        +--rw packets?   yang:counter64
       |     |        +--rw bytes?     yang:counter64
       |     +--rw null-route?   yang:counter64
       |     +--rw rpf?          yang:counter64
       |     +--rw ddos?         yang:counter64
       +--rw no-buffer
          +--rw qos!
             +--rw class* [id]
                +--rw id         string
                +--rw packets?   yang:counter64
                +--rw bytes?     yang:counter64
]]></artwork>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+196XrbRrbgfz5FtfIjUkJQqze6O2lakhPlSrZakm+6v57M
bYgESbRBgAFA0Wzb8913mPsA8wTzEDNvcp9kzlIrNoLy0pkZ6+t2JABVderU
qbPXKc/zOnmYR0FfnMXjJJ35eZjEwo9H4sTPfXGRjIIoE/BGXPrD10EuTsJs
6KcjcRXMkzQP40nHv71Ngzvo4ILbXTR/PkqGsT+DAUepP869MMjHXjLP/OXE
G/HHMxzU29/rDP08mCTpqi+yfNTphPO0L/J0keUHe3tP9g46fhr4ffFyHqQE
dkbjX/ixPwlmQZyLAbzvLJP09SRNFvO+2Gr+VPwMnwKI4gf8fKvzOlhB41G/
IzxxA49uoyCbJgnNAh6dhP4kTrI8HOJfL4IcRxKDRZ4wFu2n10F6Fw4DfHQV
ZGEUBrH8K7mF+cRBlvFfSS6G/iKjd4MYeopW+OtZPAxHACf+fgwNklmQiuAN
TId76twF8SIASMX9pipEvprDmmzhrzM/jOBXXpQ/4gL1knSCb/x0OIU30zyf
Z/3dXfwQH4V3QU99tosPdm/TZJkFu9zFLjadhPl0cYvdevNVBIPFr5PdZhLA
ZhGQQJZbY1rNe9xnL1zX0ZrXvWk+g8E6WQ6Y+jc/SmLAxCrIOvOwL/6aJ8Ou
yIB402CcwW+rGf7yS6fjL/JpkiJ1AJxChHHWFz/1xOmdH2f0hMn8p2QaWw8B
RX0xmPn/QAKBnwz6DWCC++IyDWGV534kLiN/GHRxjbJpOBfX9Al9PQxz2A3n
STySzYcwgb44PT4YiIPnA/loEee4aV79C/0d8Hr+PQAY/Nk//ujT4L1h0lu8
7jjQv+yJS4VcawYvo+B1BqhJC2/rpnK0vydugjRdicFdIF5YgF8Hfg7Mhp6k
wQSosy9+HlgTefJ4f+9JYRbX9iwSWH0zg1mniP0ffd9BfjAep8HKPCaYf1rE
IWwPtTszdyH2Dw9hv8XJHfPCn/2VPYNFHK/u/MIcjp05HO09bpzD36cAzR//
zkD0YlxaaxKDnvgXf5RkU2sag7sw9WP7Oc3jGIg4EderLA9mQJrAJHruVB7t
iZ9h+4gbP5tB+5O0Z08FnvyUZE0zebB/eNQ0E/81QfTHIQJC62HP5KInniWL
oT/yw9SazEUyhf+OCu9oQi9hlpPAHfE5PBsG9qgz7qB3qzr4Y0LtmCBilmJ3
wA07oZJpd8Qb4efq9OTJofydfqT0uwL6Tmbi1E+jlTgJ8mBIiz8B9rP0VywB
jxMYJKPng7skHGm4+If5QWZ3LjQurnvieZSsRpUv/7UnfvKHyW0mN5KYXLw4
qwBycnV5rEWKxdHP4jxIx8Qzzk5vnsMu6sJr4MPiYG//UVf8XjHPEcj0PEXJ
nBqGPQNaAVGw++QxMHToKPSjbDeLQN5k3pPHXppPgF9O4lnohbAiicfMNAE+
MEzicTixv8jmwdDb2/uuNVqm/usw7YqrXt3r8PW0C3ui8vUzXNy4Ky6rX/8Y
glwFTFS/PQ9uM8BEVxxXvz/uIQ5BjnU6nucJ/zZDzOWdzs00zARoMQvC/SgY
4zAgZB0NihQnkryIknAc4idA1GkaZHNg3yh7/zJ48YPAJREkhojG5qw2SfEE
21KqTT1xMw0qRpinyR2uFI4fzuYREQR9AKs1CmCRUG0Q4xR2DJENDjKM/CwL
xysEQg4YJVkm/vPf/0PcJvkUEJBjw5HYDnqTXleMFoHIEzFPonC42qFpAfeq
/mhodgkMBWIAFn+HuoaXQeyDFoU0gUoStI0lNc/CPJzwxJKx3bkFH+OgiDUL
v0UUYFc5rlYZb4gGNXbATbIer/QsHI2Av3e+wn2VJqMFswL58/ar0Hr6Hskh
gFUIZz7Iu/EiHqqBfd0/AABTB+qJM1xNQh/AAExJrTfAPgTaIKqATzPWFkUU
3AGoye3fkRvdBYCA5xbYCWl4gN0u4GsUpKS+YA+0hMtpkAY01HK6clY5GQ4X
aSaWoDyFsQsmqKGACGAAhB+QnTywHAom1gPeiKB5TJju+hhizAEnM1CNgY5T
6EJk4SSWnZIaK2lPzRNWDXZWT/w8DYE4hkGa+wAZaqQZYtIaAvSvBbA1P5O0
6N36GQAhtwu8BpOAqReh9XkHzn1AOvRDkiEq4A8+69bQG2jisYRNDJXSLWGG
tRA3iSbkcqcAi14gMYPW4haWA4kfFnhEAkZ36vEghe3Ypc/SGbAXEQKJpNo4
6NK0/PkcZBX8myZAfwiEtYl8okOA8hIWIMwCtefDod4Z9kyRRKcLmHG6GOLy
01bNFoDMfOojxaIlksAHhUaBD8bMSs4HsIdwUQukgDScTHMJCY3gvw5i7FrC
GdBXavFvfDJI8NEyBR6iGuIizKAlUhegbwaUCygNnjKJvvFxx3eBUc6A9rCV
YkBIFkSrwPxAsitaw+6gFRDZLUJgcavbFfTCBEuAgJgDdCG8sJ9g5f0IDKfR
yuo/CuPXGXI5HggZyOmbMKPmsyBPwyErDpqLV5NyOD6LTzQFh+OXi9z+8yw+
JSbKq06v+YGUPfAsFlssHqQekLFdJy7Onm2Jt2+/v3p+fPD44eH799TF1oCZ
qLHwCUrd2lItVOvHh0fQWm2vbIGYCUmwQEO5CXB+5W0APCsE1tTFhV2BOTd8
DQuJJAkveQ2hvxxVqa6DCOFPJqCUovkHmI/UFqfZguIXjzTrREaWLHIpCFaK
iOROmTFZhbB1ptBPEE8kkx3xQi3CbApbM18GQJuaCxQknOIvPbBgYPlHNBvY
VLQAobSykd3ObsPJAvZJF3i3r9h5iIpSBsMhwsBQH+GkHUElObumZljQDBhD
8SuLGEhggIYM5BfDBhwrURsYvPDOBahGwCDmAQC9JP4KnRNBI3HlCFy0GEkk
F7rAFgHRPi2e1RcSfZzkqCLFqxKY2WJOgm6WYAupyqgNAWDFjL6umCZLEHGp
JI6pD6LmltfBYCyy+selYC0DV5iIiSQtiT4YJERhUOB02XAKbWlFh7AoyMFB
aczV3rQZmqVtOcvBe+DRwaM92EFayKlZujtckYpAA3McJUvE99klav9LRw85
fUOtt88un5/9eUeNsbe/D2MsMkXF8P3SJ8XgGrALDJg+dzti3LjY1LwBFwzA
8zNkpQkvdJYw7qx9DEhLwSpE1AILCKMwR+5o9DQjfACTfrSCxWF2xOLRkjxS
G0QYthCLi2zLHn+nt5EGvX12sdNGjbZ42fYJNKldWtwEyHZHI+gik/s4zLIF
i3TkohdmjeetpKel2KJu5WLOoIb115MLZy4EfY3a6mrtRXVV7WcwimNUmHBy
etsMYSmnIAMm0yLV91hlBYN9HuiR9GLA71EIIAPgMKtKwSWArZz7KyDvQ1oZ
gjKzGLR+f4Aztnsn8FBVZa6FNMKqoeRWMx8egtowCdJKDCq1hsYF/oMkT73o
56mhfNrBwXABXcCc376V+gNsL1jZYRreSkVVPodVQdmHPafBrwvQA9gogJ2J
bgQyNqgtU2vOlMJspYLhYDu0UlQ7s+YknBoNQbmxbJKwQYKVmTBbRtGH7C8g
/XaRgdRWXEuqCzwYPsil6QRDLCJbdDFZgh4Jkgm1GEX9uEdCqUbDwuXBm7wK
MpCg5AnpocV0Q/pqEiWTFVhKuflLGkqvgc2jTz0TWxevrm+2uvxf8eIl/X51
+qdXZ1enJ/j79Y+D83P9S0d+cf3jy1fnJ+Y30/L45cXF6YsTbgxPhfOos3Ux
+MsW42Tr5eXN2csXg/Mt5M0u/SMBAeHfshWRwv4ntTbrKJohbevZ8eX/+h/7
R7DEv0PVan//Caww//F4/9ER/AGCM+bRiNL5T5RyHUS0j1oPSdyhPwdWG+Fq
gUQBco4FGm6AzG/+ipj5pS9+fzuc7x99Jx/ghJ2HCmfOQ8JZ+UmpMSOx4lHF
MBqbzvMCpl14B39x/lZ4tx7+/vsI7Rtv//H333WARtIANQZ/AjwlA4JmdLtL
NE6iSG57YAFMhJYmrBVWENYlWYOGBPXLnC+QnZG0BWLN+p3OpeOB6Xf64iw3
2hbpu6jySKVV2dmKQeJgUkUCe8KXlgHaJxPoLUKRAyNbapXWj5ZoCViWK4rO
2HoAczkrGKla19g+K2qqXYIUCCrNd3AOAwBSKYYKQKlKoSviNkhtK5aMa+RV
6CwiJ99CBZNgHwDHZvEQoLgGHGTAZUl7gM//tPAj+nWsgl5i+0/J9U5BpSrC
chuwckGKILB9FNGxGAyHiLHjBF0ukTgH0Sa2B8fnOwBGTJq+dhYoaw2dBoCq
VyWL3iDrVVmxb0IXSaZlUFCkAUCiwIIzhlXrJeoMehCJY1LNwh5IBm4eIrtl
+yZmzRv12DxgNQSJKkXhDsQ2B6kbonrBehRTYbXPoisVesBNnztFLLGhitIV
Bc9inuvJMepAKudPSetOyV8DigPbwKjUcEMQV4sIzQXd9DYgfbdqAUcJSWe5
juIOSGJEnYLZ7tCT9A8WRlAt1J5ScEWSNMjOB+o4PicO6wDSg9VjH5XeWbR1
UemQYN2S5jHLguguQJ8XzhKtQL2GvOt6Qtui2ttFjjbpe1KaLoCxS0+CdEcv
qlJw0BUiSZNAR2GiUYB6Ncjip+wJ0ASKyADbFKQDiCFrmcOxFOc2AkNaQ0Jj
jwIXKHLJ4qVJsCLM8I7MdEiZgLm/ge9t+S6n5A5Bi2ESA8COjkHPAL4KuFrt
KGoGZrEgNYQ1SxyX+LZUfFg5IiXhUipcaNFwAAPdqko9Y0VhDJj2ScmItIJm
K8HGtwZDkBaonXEwVKR9UiR5pRsU91SNpy+UbtGUSWtkud5yVo60k026pWw3
Vpgzd8O9KgEkYS/3MChoM5T1Uk2bJ7l0siqtlcgEHVOw3mUnmXY9SluLZlQ/
D+WL69oOMpBr++RiI1HF+ERMafmEHKKL/FsCKT1aiItdeCo9XXKBma/3OqDf
XwX5Io0tQdeqo1u0PmECienrsAfmG9j/Jbdb0clGKx1F8EfBf4cLgGE5Z35z
P5+CPDgCSBPcUDiwDxtgSOYIUzJ2qHyFbIaQ45LcEcTURrad0Os86IlT2EkR
eTATy4OuGYiPlh1YBTkyNbTymQqrLBpYMeRJisVL68y/DSNpjgObQjoukmHJ
KBIc7UHTClZ+kZKuPQ58WJ+SGx3I4fnp4ObV1al3cnZ9PLg68a6PX16e9ol5
SsrP5M6WeO+yRkzuxa5aTnRwsNXFxEmmVrHrq8EN9YwTY+OYG8/8CVggi5FW
xow0lmxUeUEy9GsgPsgvl07IvpWN1LIIcUV4AeZ5i1bQHO17ZNnkS/FvsyQC
+aM43HwOioCSZHPy66Njb2dHkDcnopix/jhIkV52kBMuSL0oTvHkFUwSdFs1
zZHinYWZSZROg2ieFZ2QLIc5WpfMcFDlM5TuifKwx+eD62s1Jqo+QkX3aOtp
dGoWrfz7pO0QYSkU27TFPY0d18WpNCslgvtCqiyO1JKCBZkY9jv2QaCvyP5M
YrJcXQ7SBdL3bhfjcVDXj2QG6JfPcjC/FhyvUTKa2F9BuAHwUgKoXuJEbhFk
VzgWIP7t2+CNR+oNGGuIDfJVKtsZUM2xKApiAcCVu6VbeoyUzlZfHYGovYL6
Neoz0onI5kJe48Mvu/BzFQht4cMvuPAracioBL702gagVke13lTlxF1Jy6tX
8JxJS6zKccJRj7p+K0LEMyBNoibcFSTltM8oWRf+4ihupVORQ7kKPma7MIHQ
hFWYcxCa2bZ/9OTBHqKQ3C6E+escNhRyWNgfQI8ZiXPpCHj0ZJ9CJtrApKAo
jk+eNXTb6awCqXOApjpHpHPESipO5ShALMPFbIAiMLzEh0dHR2D0stNNdU3Y
ZSpDJx1uNiSKk4tivyYgRVNGaiJfs+2ZVj5HCg4WHY7+MCUdpBjaeGXwyFoh
IZrXOWMl0QK2S2HvFIhXucpmM9B28tXXYPf4M5CL7KmmeWNcNFvBUG9423HQ
MiMyIWObmGrkK5Vtre/N4pWOT8Fy5SFRfWWtvEVGXqaeGoLS7m3QmGFamC45
RI27kv7LKSCaew/9OYtyVmTD2FZaLAlDGie7KzA3QzPfHQorSZHOUc5E7mEy
bseSTLf1y51C/Ic+AxpBm3y8QA4Le2/IUtZIAhwUBQi1BmUKvsmTIVjvEfmE
qafbIEo4NrZNT3eMs1JTvYwZKIeLMd+zxa1HZv6OpHSNdE1TlAExBS3O4xSK
WQIExKYwCuQErQqDMBjZ5XkgaXzWC4H3WLq4y1lYT5P718AgJb5iJSCMckVE
mJbnhTNPteK9isYOqKZEiLnl/3J7chkraCvYETb0sA1R5X/TPx128vYFpbwy
QamUV0879b3sTacjLNDrPuTcrW89j+zENIm8eeSDafTW+dND70X2/nv6+B1/
LwX4N+Kvmqp+Ue/hf71ez/5aLUnl58J8jt9qZRQ+xrzCX8Rb/agKEvxG5fCg
KoE53K3hZODUnsEMMcpiyVdpMC58Fh1YD9wpqi8O133xa5JZTxTqkWEAgOHo
F/el2BiPbaYjitMRRWBFcTp1X7CPx/2qqu9S4xLCmr+j9QfFwH0jqkBipfHj
gVQ5iFZuref1i6l/bCpHpuysoniLj8zWdIl83aJapP4bJtsvJHgfkCoH+Qgk
KHWMt/xfh7WKMkWV5lGaRGkGDV8oinLmVATcht3qokRR5rEBTRQHFkXQ6r6w
KKpm2lXzqpp883cORdmzLYNkUdRHAalyEJeinFcVC6N/sCNLP3nbF18VtSHO
cv/D1kD9DYoPxQO1qr0ltepSdrRynibpxI/Df5CWRK4zNCQiDgr1lfIiSFux
3FldYrNdaYOROxKMRuhsxL4CsuBIEb0NcmijLVJ4RwGBiEJRJxdZVyls2uDS
wfkt5YrbkknSBAppvNoFgHCCHjcwEfuClYDeTBmylLkLPgIU942PZVfLgF3s
bpf0612lM9Mv+g9YlF1Oy8JsBbIrZBQF7PUwiha4ELk2OWTOW9nRQq5z4SQT
KzySfqsyVpRGS1qunarhZ2pW/U7HE8dqMqh4FpTOvgEAe7O8xSmbzcoqAnPR
WfAe9aUXvUU/2hTRGdKqMfeFVFPdDSxaMgzJe6FSNFRf6hNszN0wuDXwcGxO
uQ8kVhFHJ2qZ+3JeE/R39k2wi1MrgS5M+k7Gk8N0HR46qGqULPJJUtMIBr7B
g4LUWgJZaO4YiOhoD+/YPqS5gCVlssZL8CgUFLosfV2OyRJolHXEsEUHfZWE
ZFYltjM5yXQcJnc4CNmL1DUHFFcUWVjQmQDq7bCvU55a9iat+FJ3xMAcT4Cx
v3ze2Djl8YINWuVVqsj1wljGkuObM+ADIYcMeuJFsNQcknPoJXf0RyPeazF8
cYvHqqaBSZ/1OdsfOg5UDnPRk8PAV/hPZE5R0Wli/CL8gfadSAYkTkz+bKej
kMnB1NWu9GtngUnqd0P2s8CPbTot5DU4cVbu04mOD47PkWHL5ZQRXDpMAcuS
5eIKpQeMfolM97nOwxTbi6vL5zsCkDd8DZ+fnCTX5OSQmjdGdGXyVfCG/bwi
RgOf4t+YZAiyZU7OLsp55o1b6kanYPjkU4DJo0ckIuHGjslZgPGrMJtlJpNc
djYOIzzIJWOZCK/YVj7kg0foxpMOw0d7R+avx/TXDifT50Gkc/HQO40Jo1OA
CREgGz9+fGAaP3h4+IAaA/E++0Hmu17bsd///Pf/zqc1GLpM9fP4yYMHFhBP
Hjw0fz3Z3wdwd55SrhTNUp77GKXAVmLX61WI0pNjkQRozyIu0tsKtFWR6a2I
SOYnYNoD+7qqGaOTsrGI8hA2jkA5S+MT5wQl6BtRACM62E3f7JJ7xYanlFFZ
AoaOVyjeqvgcNXNI/PjqWDbCx5xUcTE4VtmvgfX4X88HL0TuTzAVhhhhBqQm
7sIksk6Rc0R25kfoUQ9k6iduM04UrJ3mYeU0C0Ex1iKap8qYd+KDwNsWczzx
6s90pgBoLey19GM6FYbxM5bERooyu1CStZT5bmFxGvhIT7zhFzONUXFx8wr2
+DAIRhhuV5iUnF/jvRf0ulZuDTIVcnObR3IAPJyQT01Hybwe83KQlqjP88gD
ZgQqw6h+FSTmb27OxTZQ9o/JnFOBdwQ1XRlHdCzXSnnzTRKdTFDqq7NWqMgH
HnE+52gUbDYvo3PLON6uHou05TxJBCnkKg0pSpK5pgWpjNXPFywUGnAzgtMZ
fDpxiYlrxXxbU6KdGQXzoPgwdycjz7I/9WFluhMFv+lrE/S11kFFVoBUMNQd
1MxVmYYNE5XAqC8V6XNA2SHyOUdVzL6Tn85AFqSU2cckqLuawgBLHIybAAsc
xCu9jzQEiE4lB/G4WmbSB7lDySE5boFHE0zwAulLZsPqqWv7k3h4w5xlXDl4
M/UXnCCyTVoj6Wk6aYRC/Ra8FFPALnU6Thh5dIbCqOeGZjgccBeIXxfBgpL1
VMzVjyYJIHQ6M1G1miPm21enJ3j8g06mg93FB83RbsFQxAnAtxLbxwn8og6J
PD54/IRUqUGsItacVySzBDk86uWJV04SUaZrKaIgXygVbWtd5GCLNb8L1vzs
GJjU9VhZbNGPVB4XmQz4beFDoxQ7GqUJrLrxjt8fvzw5Fc9Ofzh7cf1dR6mj
a4YWb2HfrHz4XfJksd/bf9rhOgV0GoDcGFsLMLCxrz7sEX+W9d/Moj7wOGzZ
Xzs97G+ewhzegBmawpOnuJlBs8a0IGpNELCi/pYGlJ/j86f0IA0oaKurDWwB
FsTDJ0/2+2gqzwBwkwuA5llGo76vGkfj1cN0P2c8BK12NER63xqmKvAtR+0I
5YeRZXCwD6pL8PLyevDzD2J7k9o0O9QrWvJ4+J76gi5+Dm5h84vGugbLiao/
wxOBZphA3OcCN3nSLxS46fBnAy7rAr8VKrdYP7+XPVTWVPmu1FFdAZWKHgv1
Tcp9lSqaVIFVLDBS7qZcUaSin1J5j3I/1cU8KvpqKtrxHa0xn7CYG5ohm9o+
riLP+Fv5HHWFExgKc55Pwn0M6OVTydvDHXGwd/CAC2bcYFEpHYLGzCvKs+Cj
6iEfAKEOZDEL5cjCA20o+NC6w24xtRZzm8gfQQ2unMwlNscoN1xkySKV541u
w5iqB8C0MpldkkhEKuscJqoNqS5xb0zSY1/KIs0Wfox6E5udYHdgxQDuQJ2V
BFkeY3o2nnLg7SS5Kvsswdilw5PPrk9gl9C33B4VMgCMikLg6VeaxlFvqKPT
Gn9fZ+I8mGD5IhQsxBEUDiKZypfw5yfyOIZ8v622MdX2CqxaUhJqD5d8R6GU
yEJxbHWAreCGUEf+kXX9GX6ewjzIgSkhgsdhngXRWDpbYAEjgh3UFTrJvUVs
Og14IkgqR97eQ2/vSPLMIrEii0NPBnShGvW2GvgpArVpzbWSU91UVTOsd/cb
1hWfS3cz/bXbwVfSAy0qovZNs1KnFNR5V0Cr41ilUwvoMRpS7ikuh4JU+isN
dAqEQqh+w+F16/sM7cZPNxyZDvSaxok6m1Q3mB0023CoSZTcGo19g4kqCjjj
+G9oaMDEhK1IcS1UJzpxyXysLD7tajFwWRDoUZQ/isdA74/p62nduEzUmT1l
M6z0A5CH3rIGFTKk+V4FS/BxQcFCKYq5tgdCOl48SmRbtcE9+UnVoOrUMjev
xPj87sieoztg7UTPVHtOtxJnl9BNq9EefpzRHrYYDX2AHzoYdOEMFAZZxdYh
zROI19o5E/kIxw6HnnIB1q6g6oKGVbED7bXh4IaSEFHgj4XbIxdkJBugLz9/
ePS0o7Z8cTgY8MVidguDAOdwR9OjvFezrJ6Kh2GKe07IjXJYMyOjzhnGmrE9
4MeYL/W3brbSt7rJNA+0n7Ni2Zz+PnwWB8qj3Goa91izg8o4V/WS8SCfbMUO
1q1YdOCp8EztFItBvrXTYZw9LQ0WztcNclgahE6OVDEuwBeeVXVZFKkBGnt4
PGfL/WCrEX1KGJXHrJ28XLZKqaNX0MoTs141MFm1WPWwArTXdlm2ahSZXsps
wqwS/ih7JdXBubfrxn8lP6xHzfph35eGp9hOOwAu9KcfF4TbNPFHBRDoeNnW
KMCg2MhD5chLUg/tm+1eb9ddw67YssAU34qtr9kx1Ufd4eudLYcIqicH03sZ
c/ExMNHovAadPgGtwZ7cWiJ5pufy4TiqYB+HbdlHeWc77COcl9kFua092uW1
nR/TNxz0rBuAeuAjWw5nCEcaA7Mw9nQKzX4jj6AR17GDcFRkAZwQ/XTdcnHv
2i2SbrqRy0v0a9IgvepKCdTOz2wS0y+5NzM0v6HD5NpW5SnicIc1rPHgZTPz
vQxSjuUK7KQewYQAQxt1815Ll+hSWj/N6EDPshLqdcJRwmvkrIHXGeawzTD1
m0gNc1g1DL2C9SpvMQ4seQBd+ma9AqBzH0i9cQ4nNmBQ97wGg27v0g51RzE7
pWbfFVTFRgWqdg9iUCXWilRzpoDNsXX027KhoW15CxOow3To8eQ+JrTu0GWw
bXh16kINhDJI7s384T8NRnJGl7Iq1gB8F/nxbwFilfCxBlwm+I8JrwJgE7g5
VCyzC7oUVDZlyvrFjJSsa7elR14hnaU46zKLVtznsAX3OdT8wU7++Gjsp9T9
/fhP0cPwMRaz4GtoXMTGnJ46RiSTbj4lN6qE3Qackwmd9J8acGf5wlMZQZ8R
2AKi7bykNdtbEtQnAdVNiGrG75oNXsitkplSdh/qC5lLBeppNMpKuVRWlpY8
lmr3YaVm8UfjyJ+oIlgU8LgNMTdMsxu7ccHbZjMWiXMrC+vePpR7U4Ua+Obm
3Ha4SNBUztTnggsX2MBm0q3sUlEVYCqqzcLPhkEQmQZQRRfXwYTSFa5kkhfm
fbMXe/v66u7hjrg+O7EOzmBtoOsr7+Ly/NrQFnyScY0Zrjeo055MO85jVZMG
MyWIGpBC7/+paMEJihKYdWI1jBtM5zOVZtYsST+K59ydeu2MyyexZOZbeUk4
ma4gsz4RWDxWE1B1VlXewqpShzZaazR5S4NKd9zGXvt0BpTrdW+jvpCvTZ9l
weSSDVTJ9Sg//FQotzpupaT+tpTGe2O9Ht+nLdHb1snSjpDJ3WF7Nmpe5G8+
zBfTco2dUQ/rwDmsBUenAzcC1ZKbl0aF3uvYmDwHohengYfJClG8Po2S5AOD
ee1Zi6Fwfa1OhRjxhx9Lntf5iRSMeBaqXmQoXB+uZ14S14VrjD6D2F7HUz4H
lmvHVsAV0WzvJHkArXkjtdUJuC9DZVWOj/ZBN5Wib2SA8akbx7iawHoPe62Y
KHdWzypqfO0Vdheevvuo5k0t3pUhY+bkW2f/KmgvnY8/NUxjQL8DUu25RnOs
sQLS0Sj55Bo2noE0cFYchqxnUfp0Ri2HOvnIgn6NEPtYMZU1nLQxtGJGc3Sh
mhGb9SFHNjdwsFXzIJcsSgrHbupG4x6rRzOlIxsHLC574XjQIpb8iQ9Pu8PL
qFS9SKyntpbz3Jz4WikzDvpAR/pAEmwl0wtjHtbuVFlPpnafcsosF26rOGzf
ZAg5UdU6XtQcpGzcRgUu05LkCiOoTuoQZLKbm70jlD7dHk2UaFDEEKUa6DzY
5hB4PeJYQBQyivFnfX5RIQfXIL0ODDe1yLSvyUWoWE5CRGklN8FE/QL/hjGx
juwKpf3qSO/YSf2vS2j9YFqjEo3DirH+70B2YwrMxyDBymVY48r5vwxVDapF
7cAmxbSSdtZZhdVA1TiaVLL4BRbyLZxXDRVgnDyevemvr7JZv+eunbujqmuO
Vp1/s07AUYnbssSs2vRChGNPHWDZqjgsdA/KrEuUsjsvbZCiIHQBKxwh0h3T
LsITvM1gmjM3Po9mnyviYx58rJ9nYIisXHyMqgdbB6oL2y6uSKBomXBngKRj
JtiRPHZnSlFV7yr9voRVOsJUhVD3YJSLzzJX+m1ylMqlplI0zYTISmmN0mcr
rC7K7ONda1SGwLrReTNY3nfey/Ptpy9Orr+zj713vipdfIhlzU2xann/lV3s
W19dV12qSZbDd2isK9TtHnT/i8MzTHH/Hl6UFWamLDUfzsV09bdv1cnRg94+
kjBX+nmIZQxMkaAIk5NDpw8vSrBE1nbh7sMdU0yECmhR9XcczSochr4nuopm
xPkbWLkn0sVftq29bk2KudZOr1S922G8hap8VM7OKhZP/MAqSm1Xhv/eFDAQ
1tJQYj/fPcJnWPkaQl0TIcOtr1Q1hljVEFuxtFOr0DXbA2+hRRNOVqPS2gF7
8+Bhnvscd8frkMRd6At/wYHtTF3Nw5dbqoJg1ilbebMxB8BLd4OIKJlQcbPS
Hetc8Bp3pIbZrhtG1ybJDCFAP110BSzjdsXnNpM0lNfA6ortjA2f7nnI5b1s
OdfeU1fHnVyUa7brPVKs2Z4GkgD56nJVMENdESwBs+60kMfGw7Sypj7lXQY+
1s0x8+VuzAoC1yWHqrwHoqLCmmZHPB5zX8RBjHe6yiscdSFNJMhQ3SdoSo+P
nNLjmxcMR1XmW89LE5cH/K6+EPg71aCmwLZdjVR/W1e+2i5Jyl+2LAKue64s
At4ORgVabYFl+zOquPquND3z/rD5Pde9tesoI86d8qrlOsot8ddmIqI4EeEC
KooTqXuv85Dt0sWlfgtNS2hq/srKyygXQ7aB0fVxPwIwlQPYtXHtWstVi6d/
bHpm4fS76mLLDpF2KqZQgL8EfMN7XWi5nuCEBbbuwCU4re64QAl3UFEEqu59
IYm9NNnyfKqm3PxVKamnXPe4QDwfAZjKASoLK9cshP6pK6s8aiirfFJXVpnK
YJDsMMpL5c0To+LNEyBbz9xbga/s+4rffmVfX6xGs4rGWd/ikbKVOlhfdS82
3aCtRL59xybf/SLMzfHF5vJ+GnMHzh20TaREBcmVUwEWWWlVX9tDxWXkS0+X
8cV80lmYySpGXB855oRbwVdHmet+zA0wqAKkwRTVwbtAVYY2Gmts11Polu79
uRj8RReI8LHKi+wgt6571xe+8amzRNdxG/pzDnKEUuO1NWj3wusf1T3yJQDw
/mG6ThzvV1R36rKZrAcmvVuXtCZNlW/rXanbVHgNgWwcItn39g9lOTZOa2OP
zZgDlMUrZuRtWcou4TWzpiH2j2Rnmd3bCMu+xbK0HP0vnIQxV6fRNSVkQWa6
MhHPYam7frNSVocoH4WnzMl53lXJShlnFNvVghmPdsongkPXKX6S4eSNzjhg
zqWIeMNQraPpKiNFHe9mlDq78bto4iIS0lXAZcXvngBS14+GfkyXq1aNYlmS
9K1GQOlLVeH6EHARU5lP4D0LvLGOEEANyUYoog8pIgjVZUWl2s/yUjz3ZcEi
Il2dqpgrW1ErSTIFHEw5U9CTT2TgHZv6N6vqeUiXcaLlSXdSjpIFnpIlgKkg
1VFxgnJBN5zhYdMMD/+pM3wAM1TFBpx5gJWrVsBcNl6erv7skMiZSBAzF3wq
NVlk7oQ3ffsu8yS2fisrdhObUqP5Ex83XatZPZS21mSCV3rnhpiw94Ya4XoJ
5JTlXHVVEusiAZmsZRU+V+nYXZMCiX9Y3eMsWLxhZ05lzV7nURFm+wwrdlK6
hlFDS2htgPUjQfiYblzwR1zMVjGDKtSaSRg/hrOPzHClHaXmIdfbbAPSNLu6
SHiSVmAE5K0sJv0ERTy7Aooln+0LumVDPtegChfjtOhiCXkXmYNvy6esOKSU
6z2s66hcZFzYmuuTBm/mScby0C/tCXiINdJJkPxNWfM0uqfVgdXfep39PUD/
WJyAYoTV69R1k0ePHuA9EFzDFa/Brbyv00gXXRTKl2lZoLD+YWtv6xdVIVe7
OTKls+AFoapG9/6+wqukTKz+F3I92a59x53gOysqiJOxSyLdBMXtYtB88Gwc
0Q3J6gsYGkTvi/LUJI513XWtOUby+kGjSsoyuVTUH7OWUBWi6dDYfgU9oZPJ
EX9lfovj8xDywkek1lWPD5SYexborkyr1mu3VAsXL5jnLo1st4rgKmLjBaRy
DvD0b9zkb0q7KnY6shM1rN7kpbnqJDKdQ3MvsFBKHSn/sJV36iCQKEESPTSb
TmOKauzzr3zsSyn3//nv/2Fdfo2eTqyktYhjgBR0/nkCaIBvbJriDahWRGPF
KKREWwu8/kUeMfP5UmbqzNrKACvIdpUs4ag1haDkFCv2Yxn5ZSz3gFG99TUh
rlJa6KFSkVTuRfIZL32suSzZrcSVJnu0215leNWhvt337VfqDlww04AnEK8e
y31jaesYSlImoWPcvWeGiLzOF1uTJBlt6aItVFXMPcI6EstkEWFHQ+6BLoDR
VLorYTWOrD9sydXf+gWLfVdU2Pmr+wwazO+O4GsJxa4UWZ96GIpktx/k1yTb
dZjm5nCWu2AYOgODbWspHhZixiYojuXYz6kcO1d+/zxr9PDzrNHDxjVSTK52
FLeavgYUa3Hb5G1wmmjeq48+yuTDbA1eq2AJPj7tf4Jh2uFVD2Jquq/fAffq
SO8DU7/J2QDuxTF4XQqlQVPuNPqUNl+n+1KmBrD15D98pE13gbyfBzfDfGzt
AMXuSVX3DtxaKR/G6A922SjaqMlviAOvL6lfrKdv4pMb1NPXxfRVSHl9+f2u
/CYOcryqwvOHsy1VaP/wiK785g9MhNd6jzfKd/i9DAVbL5/Q9eego/EH0r3k
yZCwKmmlGzw43Pvwsv6UpvEpa/pTroYp6F+q5r/uvoHSbQD46DOWiHahtVbd
hS6GJw2wIWn0xQsZ3D927jgZkF2iLrFgWCsHt1IwnLHDcfPIh30xsK4iuNA1
4HVatHWlQOXI6nIWZ9g0bx72Sd2wqgqAGbS8DNsvLk4G4l+ZJncqgarZHy6Q
kcqTq4YS9lBfMxIJ3rl066rVOpWpGBKIzpfrGgodfbmu4eNd12Al6lRc0/Dl
hgbx/+INDYRteQsCrQT1iRM/G7wYADpuozCbwlxUKpl0tI2TRSxFmHSuECu7
RBEdUIg0DSa4WKsCWMvlshfC1iaQ+Iopgn6XNIG5bv/PvkPigbd3CP9rOtjz
W75D4ssVEr/5Wx1Y67TryVZA9gyzsHUjdD0zH12Jkke0qg4/hdXUcUWZ0W2N
+3Q9QvxiCLZ2mMOPMcxh0zCFChb3Gyi2rtirH8o5xXLPGanVMdcWWidYWl9i
4AaD1h1mPbGSoN0Qk0mImaOdP6KaAMYXrqhZh5/Rg6+DZUYJ4KCZTv1RcTnV
XFYI7Ki/b0hcZpQ4TDNQN4JMQcQHGd3LESVL/M2AJdkxn1zw7BNYpZCYe869
+ixD3fI5JbvBKhJjP8qC5sNupTCE2ZuYEo5xAhJQ7mTUWJseRlI53lu7ad6X
lhD+6vJ0VR8vM9XCv+Um1d+psuHtzg6hedmX8T8PZrTy/Ciqpf/BaFS4zL32
qJt91NGhbuu1LHdeOnz03kFOOO4bA5WAD5xn+Ifh31XTrz6hdI+p1ynNpfSa
0nU8GyHEOTPkIgPMzn6NfVogkIYvq3BUcYLmHggatThdswEizAmcNWdvgnmU
rAhFx5h1ONJ28ukb0P5D4oYYUVN/qPM4mdTSgeVw0py8D5ySrzK2Uyas/hNf
00xXxVHZoJL5FJqhynzGr00yYxeDf5NFOMKEMvtied2jSjzkdEBozXlvVsUO
fDsB428R8RWxxayFwLn1XZ6P0KF+lfWYzMB6oSNCfjjjnDzOKwXtCB2qfAdu
gPetcjInBYFBJKTJPMXjHBTlntG5Dr7LVGdqYqIOFfx6Qxd03wWyH/ti3mlI
tRR/XYTD1/qaaGU+stGGZqJMQNFHkaZBNCdg+XZinNyvaMkpPKCuDb2NFkM0
81Q9LM50w0TUPIVV1MFv/PouiRby+hVJtceXr3A5YFIZZdThnMaLlCK2Nt5R
AMgrXrtOzmc2nAYzn8TEJIhhGQF6wm4Qy9qSFopVmkTuZ69xCiptAGC0rkFX
dVYTTMw46Nm3m+OVyPqq2aW/yjgXAEEpq4/uISmZuWDC8jEvMJ6O4aQrtLx9
JmgvTRJO0ggCvAo6kfFmOkujpA6mDYFB6mOqER7RwfB8oUsJms+ZzZzDqJpb
6WB4BsxfZEaBcy8mdgLsaGwnEyYTlTQ2Aj2IzDxQRhZDdWLTOo48u6VEU2kR
684xP9bP1HIVFmqEVuuMKah0l29GWZKXOm85GcPildJhmsru6IROuvQbwVBV
YrcTWc/UDgVzQeGdrnbDWASMjdMAWEtMSb/i7PjiUtyEM0wtkOWQZ7A5MdeA
s4uOHj8+4kNw8sRVrhKclE7LSxmFnB1jNmB5RvZdbAamLiYeczYF8wHkefIa
auqN1wgTULAzRIEmB9K7fKYUZCqYgSVexpTYME34RGEhKc4V0s516hKrXRHQ
lpwm6OZRI6jg4609cVKUbwOZfy4ToOUMaWrWdhmq5ESchU8JxHax8MyKwKHf
CgD6wz6KBeJcbyhFDBPnKSWV83njRF567mRLGpEhe/J1BpepcdWFxUB/i2ls
AxhmKotEpnjijeHycnCrk0yoW9N5y5O0pr2s8q1IIKgjeZZKxjPX8UsVqjQV
wFRMj2i4oSGfPTF3yaviE5jVysdcAfeYe2VRgpp5xHfN8dXuecW+g6XGSnCU
4ckLLk9NtvpUJbc2bIiGrCPKYOUZYFqf5uS2F8DX+LdurVd5XUSaWlA4FGIE
yI7Mj2MAinl7fpQAIAVZoEWvykMmEJl1EBtnVgh0OEaUFGhTwWNdzg4cM7Po
CNtsc2YzweZOkQoYy6zJAFYPkaeVO869HvGV7ZTOiR5Gkm3wdjhFxzjSqQvW
mIRRYRz5MapEfsoz4/F2KE13YLJb1akQRIEqES0XahQAlvSFHryEYWTpZglu
twWf9ZA6mZWzqzVjTLs1h1WqTjWTropMS6ZSj4Jg3iXUxuEMtVU34RQ1LT7B
q56zrgFCJMPgFXWCeWfF40LX8N9F1um8SDjZDt2bp0AQGLVwNGbme5QpOEuQ
p8nVIp+yhNwnhwx00Suo28AIE+bubCktSBS/jumUbOGsi3SeG01BKlt08AT7
VKfWeUg50ZArNMCSKIZMH3P90yD3TlIgC97roXVGh1gxNCLPIJo4t8z4EA2P
nhwd9NjnYZk/5MMsgKyOO1u4ss9H4epmuQkJwOdhbikuStRRR/AHcURyFiHQ
mVwW1FEvowC9HzEt1lTOPQr1nJGtWxnZBSIhETNKAmZA+HIl2HBhipFHexBG
VBhZE57BImP6sQjGGOsgfeMWmT+sAwt/EPTKg2nfEG4OVktlB8Bd+uyTJd0C
hiN0EJfEKBBWzzYnAfhQucSiL/n0DINR8rQLq/kLtUlxdwBRAItjVKjql2UC
S+WpcXVyqoe+eM5iJZVzxPEeLpYvIec8zmJXuO3ojL48imdNn8PA7m7LCtUN
KkpAaPTaQh8gxtPwkmTxFgZMpIpDSmVNR0vSl7Q6Ko3TcbJIlWGKZ0qG0QKN
NbAyvxF8/Vsygz2ekvDpihsw8ab+8rXYt34/tH5/AO2OkcX1xZ8O9vbO4c+f
OHLaFxd/7orLG/jnT8//3EFfWHoXRBH0fv6IEGPF7UsY4dC+h4w5CpGtg0Ec
ezIEeH0++LPgvWcX0igewjspYNTU4eCiGhJQgJP1HIvQ3C2CueGacPyckPV7
FeyaAONf3GIgdjfx5ipC7flLUF9wp3qUTcDRcpWHIisdkKzd/a7TeWkd/jPu
CZ1tnJXJlVQ3lTgvZYolIoeu/4Omb/k96JAoBicXZMoWvCVvv8rkm/c1BGy+
8AyZriFjlTj1XvFq8p/bQT6u2SHTj6goB9vopmIHrM9ZbkWz5WKHOgjTJR+x
ZAu6QAeZNcQhR0FWOqhK0mshT23wjrYLa7DzRYIIX8ggo+aYfOSDmKypAGHs
iSVgyScfQfGtjCmjv33kkZgmryadd7m6RM4+QL44nHatoy3Aci3VTK0CkEO2
CDKh6ltKhdNGLg1pKS+KQijy7m5Ga3VLpWssYUbPkQuTZkXyNpjNKT/fkZqm
2sxh7xFVmznzTnoq3wl68dLx8PHR3qPbMCPKvCmAruiluI0NRVXmN9CMyRWA
6qHR2oZsQVKBFWIyLPdnJo9GO9u7hH/UYF6c3hy/fPFcWssPDzAVj4js6vTa
fvN472hP2tFZsK57sb2/o+8cYV8LYT5gY4WClKSkKWX/+vpHZa8fPDjAfL6b
82s18tHRQ5Xh96dXZ8fy8ZO9PQBohx5vH7jDzRY5KgSYo4EbSPrdeAHaJ5OJ
7ReD44sdJ0tReRNZueNTTzAoiFU0OXK5CDIFJYWh0aumkYwbQKEV4EwzGVpD
hVEbEIbX0y3imj9XdaLVxsTNnSLTJs57qtKM3GEGJNyUyHtydGOqrWxXeul0
rhNTBgy3cuELrQbaFI0agrMHrVEA7rtFhH5DUlMw72UWmMI98V2YJrE8Gi4t
RxBAmcxd47QWbWMiQArZkoaQ7Cd4HgT+8Rif8oid8b3uSA6SOXMtlIbKnaoB
sBxoojBerekTvVlrrCZK7HpXzVSehAfJemyHgcqFjNiEhQ/7ihYrIJW5zSmY
SuTCtzIybjE3iKpHYbWl19ScDXg8lCWNJORznBLUta1WVUMoyIc9HD/KEnaa
UlfkJkoodyaMsa02//nRWDLJQLoUh2QeosrP7el4YBKjkUXlv1lzHqak2yfj
HaaDYqBNrSp7Vnib+6O/o0JsdY2O7zyYrJxza2T3YQJQSfxj7g6eN8KX0kcU
ZFKucMqPnItZ/ldXZ0oN2YqzLcSfSg5Sp5zpHen2f744B92a36p848OHjx+/
f9/nfGMMAUGPfSFqEoPX5fZiB3IEn8NBmADZZ7vt7PT6Byr3AXDAoxe7g6f6
RBXPk2ZDZiuCqnOVOeR9f8A+FVQcAIOmm6yYk14lV8fKecfuXuAQ7lryYj3c
OwCh4ixsITVsS+eGWUuK/cHU2izeCzW7D6OBS0rThT44lIiPMCQvc/nQ1gSM
fQ/D8dLIrK6+0FlmnbZwfwygixDfA1wmBdjZx5b9DFvaNqffc+LFC5BVd+J4
6g+nMxnAJUtOXK+AXDBYeRYPuSzO/qM98TPmb9z4GSgy4iTl59fw+0+g/XbF
8UA8ebB/eESPX8V0UyB6kbhsxmAGlsfQp5enmNLaF/GQBzbpsQj1YIjuH9Aq
J6pUja+fOOVqpOTWLh1d/oRN5RiQSLmeZEKNQe29RT5If/10Ja7CO3LyXoEW
HYuffeB+MIVpisXpgmfpIpQ1O8BkHSYZTvMfpCP4MUuMZ0Gc/O//CTs48kOc
/U9JgL+nrwMyjcUliAhQ2y98EExT8VOAh52hPz8OwSL2F5EYhPnrQA5yBf+s
xLMFfKmiRJhvGCylijJjYW+Pf+4D7USweufTJH/t63a4CU9eHt+8vLqWfXTx
ru5JiCBHSZ6H+tOXl9cnZ1f6KxzqGgPOC4A6zwCYcGb6PXtxYz4GSDzPE4hQ
ojQOUpwkMrUxEz9gfiOHUb6HFaSwlgyrwOq9Qs8nllShILEMAKooQBpYznaq
jKEUH+m7hhVC7T2mtEw+XQvsBjTD3MqjIn+wL0sR2kE7O35dEcATZCV7CCsZ
FXNQVYnfSrc4UhsDjB0vpysNuFToCrDLGJpMn/IG12fHYFFM0dMsD8Yhh8ak
JlXHg92/AM/CZCU6h9jFHSY+q1BLZcUk6VAndYFNap2RgBBQScpMn3Q3Z7+7
XNJHHaFnAAlrNgCy3oHCSBhFC9YuMpngPZsZ5yUphjnYPVlhoRW+mCrYxFb1
bkx2unSBk5ecK3DqGr/KrZ8GMyweYZeZQo99Ooro7P646GzXnjF7UkDRinb1
qX8Wa1Ewzu1z7fIx5a737bNRwvezO+tWl8qfbz3z8+2ab+2adO/Wf6sssjbf
XlLKVot+EV78/39thhe56r8N5wuC+R3wJ/xjTdcSFBsEGzvOz50Eo/LHgutd
xRgtoOjowfkfBxLnr+pX3xowDATvHHDetX3VuXrjed+Jyx//sotXmH+Lf5xJ
kuS/nsmzyvTHqXzDf5lW34mbN1UAXYbzIEIHcRmgmlcGOQ0YWPsKub5yufWp
S4ph4unt6ED9Qae54ZWpzSGsV/mbMkXplyou3PCJe1C87kNdf/DMgdb5kUFs
vKes/lVtM5VSUP+qtukinY9rX5qYeqdYglCKNFV58LQozBRTnpiz11iD8DoA
gQF/gKB+I54Jq4IHMVZZRs6k3WqpK+vKYY4QJfFIp0BVxgyoDwqca2rtOaVT
QB9kr7Os+vv2K1n/V2qBYEujaxHEoOT2JinN6gQEOUyCmDeV8h1iyokqJFwE
vgJwJ+vNVRXIHwS6wgRgMELR7bMwJe5BjW9FHck8U2X7HA9qpv2noHC9Eydn
18eDqxPv+HxwfQ2bVd9/giAL8/5qcHNq/XnyCh6cvXwBj8xu/B63vko6UIl8
7zrv+i6XXfN38bXn9Z1H/fIHHgyipG0pzyM6QFYAcM5Btwj8mVKFsCpeGL+W
GRDvxHd4dAK51jvxcnsflLwdePgX+P+N/xrEvmpNbXS1NCwb4yVjD8+d4Z+N
gBQZB/adgoWX5vDb7/+gxoc/3gnELPrnebE27RYkOBglEwr8WDMTNLVMTezF
vftXx2KjBFhBaQALd1cJcBIyl2R2BI7U+y/fqOwd+JWIhg4pvNMzbw2Zvtz8
o8/Z7Rmz/UuE0m627cY4k/dscxVL3t2lofbkWIiiU+hN1S9SCb6N4+lTLLCL
mXblzXFNMyLaryf1oDCUEbeENVU2qpK63ZVo3VM9rM/IwMCjHkMMY9E6wKQT
oSDGIHdyF+gCTO+URGNPfEGkSRlyjIzQuzA8V8oPVVn3awXP18rz9bXNM78G
MREtZhTkuk3AlHIZLlXo01YpihYOIXwlnmPKXDlaSuV9KajmhXap3mLhXXKh
UZ7PKPQnKTAurBiv7SqYYE7xVX2epL95zXh0gnWEdSSl7sO+0vyKl9LU1ZZX
5ZXr6rZbJdWbyp3bn0nF5HvSc9z7LQtfUl2P76VGVP0lj1tdit0qtL0WNtEa
NtEaNtWnKWpt1yu3x6poj1+0rLyvEVFZef8TrKAsx/3OfsalY2om8656VRsX
X1bzdppWVN6B6bhPf3GbiaqW9dOrIYVmWq2hiraNZEGn0rvyflnTWXnbtBhd
lyj6J41/S/lJVeO32icVDdqMj9/9mmS/sx7J1sU68MXeQTVQP+4e2xjoDSD+
yGzObGDT/boNXLW+jXzPbGDTdKMN7PTWagM7LdpuYKdR2w3sNCps4OKk19JC
PYLbjF7awJ95/NIG1v+WF2JNd+VFaKQw6+4KB/4iecvH6ZvS4xLtt1h002yY
Dj2CYa0e4DQL2cLwZv5wPZLLze5ARWvefZXNaI7r1kC2ycuYEptyieL2X7sI
m+1XaxWwimC2mJmlaNduli88dd7qPuvA8LbFqLHaW41F6pw0SjVGWrRRwGVh
+3FUm8i/DaIPppCWu13rt+pemHXsuwUnmtMZzhZ0UKmWNzOPdoSvxNww+n49
1FW7pHLyLaZuRmyLK8st/Xllhtq2fDjzd1XvRa0qVvhXrNHJqj/faHKm2WZi
0bjuW4xDnHE+3mwJR6PE4paNxO7ee+TMytaChf2iGvvOJ014dz5sg3GnQTOu
aUNGydJRhcVb93JV1zZepxlbFvIXa7cRXNPoi7X7xdr91NbuF8u1EdzNN6PT
6Ivl+sVy3aDZF8u1EtAvlmuhzRfL9Yvl2nbqXyxX+fPFcv3/xHKVWRyV90+X
DVFR3N+i9eZ2vmzUfa1BDstN2+u+uploq/sWW7SSpcVGrXTfYiNb97XfteIj
FQ2aF744uqv7fv7xXd3XflteiDXdlRehkcL0thVNHFMUeq/esMWv2gC9AcQl
Q9Q8tq4kb70Zq9aq9kt3M5qmG21GB8WtNqPTou1mdBq13YyiYTOKTTdDscHa
pRWNm/Ezj1/ajGJTui42aDN+wRDVvVSR9zvHBrIfl2hf/jTBaZq1MUQrmrUx
RBuaNRmiDc2aDNEipvIypsSmXKK4/dcuwmb71VqFNoZoRbtWhmgDQhsN0RJG
WxiixTZtDNFimzaGaF2bJkO0PYW03O0lQ1S/KfezdiK6yVpDVJiPjSHqAFXD
PNoRvhJzTYaoO9phi8m3mPpaQ7Q0Qulkz+eSGWrb2oZo4b2oVasKX4k1+lX1
5xtNzjTbTCyuNUSLDdYaosUGaw1RA7priDqvbI3WeVGNfeeTJrw7H7bBuNOg
HtdugXXKb7cKRVmJ7aMPTmw/+bDEdvsqhXY3KTjYqP9OJ8KnSe0NFd+IulCN
aEqYx06XldnW69PsoWGLQDV81SJRnT9cl6euBq3ILW0CV7QCV7QFV7QF1/RY
lD2lgUqtNSFtduvEPUilLk+fO6kmjabMfhp5PVkkbq4CP2qRqsAfrguOyhEO
Sw03zVMQ1Q1rJmY32CBLQZSn1b5NOUfBRkHLaHcFYlsMXZWg8NkGr8pOENb7
jeL8bQbnzwqOXH5Y68Tl12scuC3hbQ+ss/+LfLJ674pWe1cU9q6NmBbe3RZ7
VxT2rt1wU9euaL93Cw02cOxWLUnrNmW3rmi9fcrft3Fqiuq9+5kHr3Lo2ou/
kWu0zeD8metAKgoi4UoK47l4575o6T0qtGrpPCq0auk7qmm1xnVU02qN58hu
khdwJDZmBhUhnCbcbxZxMchv6TMqNGvrMqpB5DqPkYPJdg4ju0lLf1EVZGvc
RVVN1niLWlFFm22tRnVdRU3MeT27aecokt86uvoaHtE6oolCaI2TqHpL1Mx6
/ZzbeIic/l0H0eeRBmaDFrxD76x/q1Wswkf6uzWxt/sJmk3FjQ14G8eQ/X0b
v5D9fRu3kGYYJa9QQaktPG/yCa1Bd+G79h6h9SjWtnHTJYRNL+9lJVdkQDje
k8ov3qmPSsbusq2xu2xl7C7Lxu7yvsZusaEQa4zd5T2M3eU9jN1lo7Hb7FCp
+n4De3O5xtj9xIM3G7utB6/CfRNNVRi7y2Zjd9nG2G0Bb3tgXadgQ6aS2YX2
FFtqqmt2oSjsQrvhPc3WNruw0GBzs7XlLhT1u1BsuBHK328gTYu78DMP3my2
th68CvdNNFVpti4rVdJlnem0vJfZuryX2bq8l9m6vJfZutzcbF3WGSgbMIMq
s7UB9/cyW5f3M1uX9zNbl/cwW5ebm63Lzc3W5eZm63Jzs7WBKtqarcsGs7VM
A+vZTXuztRhiWsMj2puty7Zm67LSbC3Oev2cNzNbl41m6yeTBmaDrjFby8pS
4SP93SZm6ybzslttJOs2M1uXG5qty9Zm67LWbF3WmK2VSC980c5sbYHowvet
8hj+D/sxwiJkNwEA

-->

</rfc>
