<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-opsawg-ipfix-sav-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SAV IPFIX">Export of Source Address Validation (SAV) Information in IPFIX</title>
    <seriesInfo name="Internet-Draft" value="draft-opsawg-ipfix-sav-00"/>
    <author initials="Q." surname="Cao" fullname="Qian Cao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>caoqian@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="B." surname="Claise" fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author initials="T." surname="Zhou" fullname="Tianran Zhou">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Operations and Management</area>
    <workgroup>opsawg</workgroup>
    <keyword>IPFIX, Source Address Validation (SAV)</keyword>
    <abstract>
      <?line 66?>

<t>This document specifies the IP Flow Information Export Information Elements to export the context and outcome of Source Address Validation enforcement data. These SAV-specific Information Elements provide detailed insight into why packets are identified as spoofed by capturing the specific SAV rules that triggered validation decisions. This operational visibility is essential for network operators to verify SAV effectiveness, audit rule correctness, and analyze source address spoofing events.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) serves as a fundamental defense mechanism against IP source address spoofing. Despite its critical role in network security, current SAV implementations lack operational visibility, making it difficult to answer essential operational questions:</t>
      <ul spacing="normal">
        <li>
          <t>How many packets are identified as spoofed and dropped by SAV?</t>
        </li>
        <li>
          <t>Which interfaces receive spoofed packets and which source prefixes are targeted?</t>
        </li>
        <li>
          <t>Which specific SAV rules trigger the enforcement actions?</t>
        </li>
        <li>
          <t>Are SAV rules functioning as intended or potentially misconfigured?</t>
        </li>
      </ul>
      <t>This document introduces a set of SAV-specific IP Flow Information Export (IPFIX) Information Elements (IEs) that enable detailed reporting of Source Address Validation enforcement actions. These elements align with the SAV concepts and operational models defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, and provide traffic observations that can be operationally correlated with the SAV configuration and state information available via the YANG data model <xref target="I-D.li-savnet-sav-yang"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This document makes use of the terms defined in <xref target="RFC7011"/>, and <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <t>The following terms are used as defined in <xref target="RFC7011"/>:</t>
      <ul spacing="normal">
        <li>
          <t>IPFIX</t>
        </li>
        <li>
          <t>IPFIX Information Elements</t>
        </li>
        <li>
          <t>Template</t>
        </li>
        <li>
          <t>Template Record</t>
        </li>
        <li>
          <t>Data Record</t>
        </li>
        <li>
          <t>Data Set</t>
        </li>
        <li>
          <t>Exporter</t>
        </li>
        <li>
          <t>Collector</t>
        </li>
      </ul>
      <t>The following terms are used as defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/></t>
      <ul spacing="normal">
        <li>
          <t>SAV rule</t>
        </li>
        <li>
          <t>Validation mode</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sav-overview">
      <name>SAV Overview and IPFIX Export Requirements</name>
      <t>This section outlines the operational requirements for SAV telemetry export using IPFIX, based on the generalized SAV architectural framework defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <t>The SAV framework establishes four canonical validation modes that model validation policies:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Interface-based prefix allowlist (Mode 1):</strong> Validates that a source prefix is explicitly permitted on the incoming interface.</t>
        </li>
        <li>
          <t><strong>Interface-based prefix blocklist (Mode 2):</strong> Validates that a source prefix is not explicitly blocked on the incoming interface.</t>
        </li>
        <li>
          <t><strong>Prefix-based interface allowlist (Mode 3):</strong> Validates that a packet is received on an interface explicitly permitted for its source prefix.</t>
        </li>
        <li>
          <t><strong>Prefix-based interface blocklist (Mode 4):</strong> Validates that a packet is not received on an interface explicitly blocked for its source prefix.</t>
        </li>
      </ul>
      <t>These modes can be applied independently or in combination on a router, following a defined validation procedure (Section 2 of <xref target="I-D.ietf-savnet-general-sav-capabilities"/>). Furthermore, when identifying a packet as spoofed, a range of traffic handling policies (e.g. discard, rate-limit, redirect) can be applied.</t>
      <t>However, the generalized SAV model requires corresponding operational visibility capabilities. Without integrated telemetry, operators face significant challenges in:</t>
      <ul spacing="normal">
        <li>
          <t>Operational Verification: Confirming SAV is actively and correctly enforcing policies</t>
        </li>
        <li>
          <t>Root-Cause Analysis: Determining why specific packets were deemed invalid</t>
        </li>
        <li>
          <t>Threat Intelligence: Quantifying spoofing attempts and analyzing attack patterns</t>
        </li>
      </ul>
      <t>To address these limitations, IPFIX <xref target="RFC7011"/> and <xref target="RFC7012"/> provides a vendor-neutral protocol for SAV telemetry. The exported data must provide insight into:</t>
      <ul spacing="normal">
        <li>
          <t>The validation outcome and specific reason for the decision</t>
        </li>
        <li>
          <t>The identity and type of SAV rule or rule set that influenced the decision</t>
        </li>
        <li>
          <t>The configured rule content that was evaluated during validation</t>
        </li>
        <li>
          <t>The enforcement action applied to spoofed packets</t>
        </li>
      </ul>
      <t>The following section defines the IPFIX IEs that meet these requirements.</t>
    </section>
    <section anchor="sec-IEs">
      <name>IPFIX SAV Information Elements</name>
      <t>This section defines the IEs used for SAV telemetry. These IEs have been specified in accordance with the guidelines in <xref target="RFC7013"/>.</t>
      <section anchor="design-rationale">
        <name>Design Rationale</name>
        <t>The SAV IPFIX IEs are designed to provide detailed visibility into SAV enforcement actions, enabling network operators and automation systems to monitor and troubleshoot SAV operations effectively. The design follows these principles:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Scope</strong>. The SAV-specific IEs are used to report the outcome and context of SAV processing for data plane traffic observations. Interface, device or network-level SAV configuration is out of scope for these IEs and is covered by the SAVNET YANG data model.</t>
          </li>
          <li>
            <t><strong>Conceptual Alignment</strong>. The elements align with the validation modes and rule types defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, ensuring consistency with the architectural SAV concepts.</t>
          </li>
          <li>
            <t><strong>Semantic Correlation</strong>. The IPFIX encoding preserves the semantic relationships defined in <xref target="I-D.li-savnet-sav-yang"/>, which enables correlation between IPFIX Data Record in data-plane and YANG configuration/state data in control-plane comprehensive analysis.</t>
          </li>
          <li>
            <t><strong>Structured Encoding</strong>. The <tt>savMatchedContentList</tt> is encoded as a <tt>subTemplateList</tt> to represent the multi-field tuples of SAV rules. The structure of <tt>subTemplateList</tt> was chosen because it can encapsulate heterogeneous fields (e.g., prefix, length, interface) within a single list element. The list semantics (<tt>allOf</tt>, <tt>exactlyOneOf</tt>) directly encode the SAV validation logic (e.g., matching all rules in an allowlist vs. exactly one in a blocklist) into the data structure.</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savRuleType">
        <name>savRuleType (unsigned8)</name>
        <t>The <tt>savRuleType</tt> element classifies the rule as either an allowlist or a blocklist. The values correspond to the check type concepts in the SAV architecture:</t>
        <ul spacing="normal">
          <li>
            <t>A value of <tt>0</tt> (allowlist) indicates the packet was validated against an allowlist.</t>
          </li>
          <li>
            <t>A value of <tt>1</tt> (blocklist) indicates the packet was validated against a blocklist.</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savTargetType">
        <name>savTargetType  (unsigned8)</name>
        <t>The <tt>savTargetType</tt> element specifies the lookup key used by the SAV rule. It may be used in conjunction with <tt>savRuleType</tt> to fully define the validation mode applied.</t>
        <ul spacing="normal">
          <li>
            <t>A value of <tt>0</tt> (interface-based) indicates the rule is indexed by an interface (e.g., "on interface X, what prefixes are allowed/blocked?").</t>
          </li>
          <li>
            <t>A value of <tt>1</tt> (prefix-based) indicates the rule is indexed by a source prefix (e.g., "for prefix Y, which interfaces are allowed/blocked?").</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savMatchedContentList">
        <name>savMatchedContentList (subTemplateList)</name>
        <t>The <tt>savMatchedContentList</tt> element carries the content of the rules that were relevant to the validation decision, encoded as a <tt>subTemplateList</tt> according to <xref target="RFC6313"/>. Each element in the list represents a complete SAV rule tuple. The content and semantics of the list are defined by the <tt>savRuleType</tt>:</t>
        <ul spacing="normal">
          <li>
            <t><strong>For Allowlist non-matches (<tt>savRuleType=0</tt>)</strong>: The <tt>savMatchedContentList</tt> consists of the set of all rule tuples from the consulted SAV allowlist at the time of the packet's processing. The subTemplateList semantic SHOULD be <tt>allOf</tt> (0x03), indicating that the packet was validated against all these rules and did not match any of them.</t>
          </li>
          <li>
            <t><strong>For Blocklist matches (<tt>savRuleType=1</tt>)</strong>: The <tt>savMatchedContentList</tt> contains the first rule tuple that matched the packet from the SAV blocklist. The subTemplateList semantic SHOULD be <tt>exactlyOneOf</tt> (0x01), indicating that the packet matched this specific rule.</t>
          </li>
        </ul>
        <t><strong>Semantic Interpretation of Standard Information Elements:</strong>
When standard IPFIX IEs (such as <tt>ingressInterface</tt>, <tt>sourceIPv4Prefix</tt>,<tt>sourceIPv4PrefixLength</tt> or their IPv6 equivalents) are used within the subTemplateList of <tt>savMatchedContentList</tt>, they represent values from the SAV rule configuration, rather than from the actual packet being validated. This contextual distinction is critical for correct interpretation:</t>
        <ul spacing="normal">
          <li>
            <t><strong>In the parent Data Record</strong>: These IEs describe attributes of the actual spoofed packets that were validated by SAV.</t>
          </li>
          <li>
            <t><strong>Within <tt>savMatchedContentList</tt></strong>: These same IEs describe the configured SAV rule parameters that were evaluated during validation.</t>
          </li>
        </ul>
        <t>This approach ensures clear semantic distinction by reusing existing IEs, without requiring definition of new elements for SAV rule parameters.</t>
      </section>
      <section anchor="subsec-IEs-savPolicyAction">
        <name>savPolicyAction (unsigned8)</name>
        <t>The <tt>savPolicyAction</tt> indicates the action applied to packets identified as spoofed. The action taken is a matter of local policy. This element reports the outcome.</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>The SAV-specific IPFIX IEs defined in this document enable network operators to answer critical operational questions that are currently unaddressable without telemetry for SAV:</t>
      <t><strong>SAV Effectiveness Monitoring:</strong> Use <tt>savRuleType</tt> (TBD1), <tt>savTargetType</tt> (TBD2), <tt>savPolicyAction</tt> (TBD4)  and standard IPFIX counters, to quantify spoofing attempt volumes, analyze their distribution across different validation modes, and identify applied enforcement actions (discard, rate-limit, redirect) to spoofed traffic.</t>
      <t><strong>Rule-Level Attribution and Troubleshooting:</strong> Use<tt>savMatchedContentList</tt> (TBD3)  to determine the specific SAV rule configuration that triggered enforcement decisions , including the exact rule parameters (interfaces, prefixes) evaluated during validation, whether for allowlist failures or blocklist matches.</t>
      <t><strong>Forensic Analysis and Compliance:</strong> Correlate SAV Data Records with packet-level details using <tt>selectionSequenceId</tt> for incident investigation and gather evidence to support external trust initiatives and regulatory compliance reporting.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>While this document defines new IPFIX IEs using standard IPFIX mechanisms, implementors should consider:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Exporter Implementation:</strong> Exporters MUST properly encode the <tt>subTemplateList</tt> structure for <tt>savMatchedContentList</tt> and ensure semantic consistency between <tt>savRuleType</tt> and list contents. Exporters MUST also define the sub-templates (e.g., 901-904) used in <tt>savMatchedContentList</tt> prior to exporting Data Records that use them.</t>
        </li>
        <li>
          <t><strong>Collector Processing:</strong> Collectors MUST be capable of parsing <tt>subTemplateList</tt> structure and understanding the context-dependent semantics of standard IEs within <tt>savMatchedContentList</tt>. Collectors MUST associate the sub-templates with the main template for correct interpretation.</t>
        </li>
      </ul>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The mappings between the SAV YANG data model and IPFIX IEs are considered based on the common foundation of the general SAV capabilities document <xref target="I-D.ietf-savnet-general-sav-capabilities"/>. The operational correlation is demonstrated in Table 1, which defines the values for the designed IEs mapped from the corresponding <xref target="I-D.li-savnet-sav-yang"/> SAV Management YANG Module.</t>
      <artwork><![CDATA[
+---------------------+---------------------------------------+
| YANG Elements       | IPFIX IEs                             |
+---------------------+---------------------------------------+
| sav-check-type      | savRuleType                           |
|   sav:sav-allow-list|     0 (allowlist)                     |
|   sav:sav-block-list|     1 (blocklist)                     |
+---------------------+---------------------------------------+
| sav-mode            | savTargetType                         |
|   sav:sav-im        |     0 (interface-based)               |
|   sav:sav-cm        |     1 (prefix-based)                  |
+---------------------+---------------------------------------+
| SAV Rules attributes| savMatchedContentList                 |
|   source-prefix     |     sourceIPv4Prefix/sourceIPv6Prefix |
|   incoming-interface|     ingressInterface                  |
+---------------------+---------------------------------------+
]]></artwork>
      <t>Table 1: Mappings between SAV YANG Data Model and IPFIX Information Elements</t>
      <t>The <tt>savPolicyAction</tt> element carries real-time SAV decisions applied to
spoofed packets. It does not directly map to YANG configuration node.</t>
      <t>The code points for these IEs are maintained by IANA in the corresponding subregistries of the IPFIX registry. Future additions or changes are managed via Expert Review as described in <xref target="IANA">IANA Considerations</xref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no additional security considerations regarding allocation of these new IPFIX IEs compared to <xref target="RFC7012"/>.
Other security considerations described in <xref target="I-D.ietf-savnet-general-sav-capabilities"/> apply to this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests IANA to create four new IEs under the "IPFIX Information Elements" registry <xref target="RFC7012"/> available at <xref target="IANA-IPFIX"/>.</t>
      <artwork><![CDATA[
+------------+-----------------------+
| Element ID | Name                  |
+------------+-----------------------+
| TBD1       | savRuleType           |
| TBD2       | savTargetType         |
| TBD3       | savMatchedContentList |
| TBD4       | savPolicyAction       |
+------------+-----------------------+
]]></artwork>
      <section anchor="savruletype">
        <name>savRuleType</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD1</t>
          </li>
          <li>
            <t><strong>Name</strong>: savRuleType</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Identifies the validation rule type triggered during SAV enforcement.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savRuleType">savRuleType</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savtargettype">
        <name>savTargetType</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD2</t>
          </li>
          <li>
            <t><strong>Name</strong>: savTargetType</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Specifies the entity type against which validation was performed.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savTargetType">savTargetType</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savmatchedcontentlist">
        <name>savMatchedContentList</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD3</t>
          </li>
          <li>
            <t><strong>Name</strong>: savMatchedContentList</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: subTemplateList</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: list</t>
          </li>
          <li>
            <t><strong>Description</strong>: The content of the SAV rules relevant to the validation decision.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savMatchedContentList">savMatchedContentList</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savpolicyaction">
        <name>savPolicyAction</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD4</t>
          </li>
          <li>
            <t><strong>Name</strong>: savPolicyAction</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Action applied to packets identified as spoofed.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savPolicyAction">savPolicyAction</xref></t>
          </li>
        </ul>
        <t>Additionally, IANA is requested to create new subregistries under the IPFIX IEs registries. The subregistries contain values for the <tt>savRuleType</tt>, <tt>savTargetType</tt> and <tt>savPolicyAction</tt> IEs. The allocation policy is Expert Review <xref target="RFC8126"/>. Experts should consult the SAVNET architecture <xref target="I-D.ietf-savnet-general-sav-capabilities"/> to ensure new values are consistent with SAV validation concepts and operational models.</t>
      </section>
      <section anchor="ipfix-savruletype-tbd1-subregistry">
        <name>IPFIX savRuleType (TBD1) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 2 (Validation Modes)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should ensure that new values are consistent with the SAV architecture concepts defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, particularly the validation modes and rule types (allowlist or blocklist).</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+-----------+--------------------------------------------------+
| Value |   Name    |                  Description                     |
+-------+-----------+--------------------------------------------------+
|   0   | allowlist |  The packet was validated against an allowlist   |
|   1   | blocklist |  The packet was validated against an blocklist   |
+-------+-----------+--------------------------------------------------+
]]></artwork>
      </section>
      <section anchor="ipfix-savtargettype-tbd2-subregistry">
        <name>IPFIX savTargetType (TBD2) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 2 (Validation Modes)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should consult <xref target="I-D.ietf-savnet-general-sav-capabilities"/> to ensure new values align with the defined target types (interface-based or prefix-based).</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+-----------------+----------------------------------------+
| Value |       Name      |              Description               |
+-------+-----------------+----------------------------------------+
|   0   | interface-based |   The rule is indexed by an interface  |
|   1   |   prefix-based  |   The rule is indexed by a prefix      |
+-------+-----------------+----------------------------------------+
]]></artwork>
      </section>
      <section anchor="ipfix-savpolicyaction-tbd4-subregistry">
        <name>IPFIX savPolicyAction (TBD4) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 4 (Traffic Handling Policies)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should ensure that new actions are consistent with the SAV traffic handling policies defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+----------+---------------------------------------------------+
| Value |   Name   |                  Description                      |
+-------+----------+---------------------------------------------------+
|   0   |  permit  |The packet was allowed to proceed (monitoring only)|
|   1   |  discard | Packet was discarded or dropped                   |
|   2   |rate-limit| Traffic was subjected to rate limiting            |
|   3   | redirect | Packet was redirected to alternative destination  |
| 4-255 |unassigned| Reserved for future assignment                    |
+-------+----------+---------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.li-savnet-sav-yang" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-sav-yang-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-sav-yang.xml">
          <front>
            <title>YANG Data Model for Intra-domain and Inter-domain Source Address Validation (SAVNET)</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Tianhao Wu" initials="T." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <date day="9" month="October" year="2025"/>
            <abstract>
              <t>This document describes a YANG data model for Intra-domain and Inter-domain Source Address Validation (SAVNET). The model serves as a base framework for configuring and managing an SAV subsystem, including SAV rule and SAV Tables, and expected to be augmented by other SAV technology models accordingly. Additionally, this document also specifies the model for the SAV Static application.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-sav-yang-07"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7011" target="https://www.rfc-editor.org/info/rfc7011" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7012" target="https://www.rfc-editor.org/info/rfc7012" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7012.xml">
          <front>
            <title>Information Model for IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document defines the data types and management policy for the information model for the IP Flow Information Export (IPFIX) protocol. This information model is maintained as the IANA "IPFIX Information Elements" registry, the initial contents of which were defined by RFC 5102. This information model is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and the Exporting Process. Although this model was developed for the IPFIX protocol, it is defined in an open way that allows it to be easily used in other protocols, interfaces, and applications. This document obsoletes RFC 5102.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7012"/>
          <seriesInfo name="DOI" value="10.17487/RFC7012"/>
        </reference>
        <reference anchor="RFC7013" target="https://www.rfc-editor.org/info/rfc7013" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7013.xml">
          <front>
            <title>Guidelines for Authors and Reviewers of IP Flow Information Export (IPFIX) Information Elements</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document provides guidelines for how to write definitions of new Information Elements for the IP Flow Information Export (IPFIX) protocol. It provides instructions on using the proper conventions for Information Elements to be registered in the IANA IPFIX Information Element registry, and provides guidelines for expert reviewers to evaluate new registrations.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="184"/>
          <seriesInfo name="RFC" value="7013"/>
          <seriesInfo name="DOI" value="10.17487/RFC7013"/>
        </reference>
        <reference anchor="RFC6313" target="https://www.rfc-editor.org/info/rfc6313" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6313.xml">
          <front>
            <title>Export of Structured Data in IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="G. Dhandapani" initials="G." surname="Dhandapani"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <author fullname="S. Yates" initials="S." surname="Yates"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies an extension to the IP Flow Information Export (IPFIX) protocol specification in RFC 5101 and the IPFIX information model specified in RFC 5102 to support hierarchical structured data and lists (sequences) of Information Elements in data records. This extension allows definition of complex data structures such as variable-length lists and specification of hierarchical containment relationships between Templates. Finally, the semantics are provided in order to express the relationship among multiple list elements in a structured data record. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6313"/>
          <seriesInfo name="DOI" value="10.17487/RFC6313"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-11" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="27" month="August" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-11"/>
        </reference>
        <reference anchor="IANA-IPFIX" target="https://www.iana.org/assignments/ipfix/ipfix.xhtml">
          <front>
            <title>IP Flow Information Export (IPFIX) Entities</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 339?>

<section anchor="ipfix-encoding-examples">
      <name>IPFIX Encoding Examples</name>
      <t>This appendix provides encoding examples for the SAV-specific IPFIX IEs defined in this document.</t>
      <section anchor="template-record-and-data-record-with-sub-template-list">
        <name>Template Record and Data Record with Sub-Template List</name>
        <t>This example demonstrates the encoding for two observed SAV enforcement events representing different validation scenarios and address families as shown in Table 2.</t>
        <artwork><![CDATA[
+-----+--------------+---------+---------+-----------+-------------+
|Event|Source Address|Interface|Rule Type|Target Type|Policy Action|
+-----+--------------+---------+---------+-----------+-------------+
|  1  | 192.0.2.100  |  5001   |Allowlist| Interface | Rate-limit  |
|  2  | 2001:db8::1  |  5001   |Blocklist| Prefix    | Discard     |
+-----+--------------+---------+---------+-----------+-------------+
]]></artwork>
        <t>Table 2: Two Observed SAV Validation Events</t>
        <t>The first event represents an IPv4 allowlist non-match event where a packet from source 192.0.2.100 arriving on interface 5001 failed to match any source prefixes configured in the interface-based allowlist.
The second event represents an IPv6 blocklist match event where a packet from source 2001:db8::1 was received on interface 5001, which matched a prefix-based blocklist rule.</t>
        <section anchor="sub-template-definitions">
          <name>Sub-Template Definitions</name>
          <t>The following sub-templates are defined for use within the <tt>savMatchedContentList</tt> element to encode different types of SAV rule mappings based on address family and validation target type. The <tt>savMatchedContentList</tt> element is encoded as a <tt>subTemplateList</tt> according to <xref target="RFC6313"/>.</t>
          <t>The template IDs used in these examples are exemplary and chosen arbitrarily. In actual implementations, exporters MUST assign unique template IDs within the IPFIX session for these sub-templates.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 901: IPv4 Interface-to-Prefix Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is used when <tt>savTargetType=0</tt>(interface-based validation mode) for IPv4 traffic. It contains the mapping from an interface to source IPv4 prefixes as defined in the SAV rule configuration. It can be used for both blocklist and allowlist.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 901       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv4Prefix = 44     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv4PrefixLength = 9  |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 902: IPv6 Interface-to-Prefix Mapping</strong>
This sub-template is the IPv6 equivalent of Sub-Template 901, used for interface-based validation with IPv6 traffic.</t>
            </li>
          </ul>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 902       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv6Prefix = 170    |        Field Length = 16      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv6PrefixLength = 29 |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 903: IPv4 Prefix-to-Interface Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is used when <tt>savTargetType=1</tt>(prefix-based validation mode) for IPv4 traffic. It contains the mapping from a source IPv4 prefixes to interface as defined in the SAV rule configuration. It can be used for both blocklist and allowlist.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 903       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv4Prefix = 44     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv4PrefixLength = 9  |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 904: IPv6 Prefix-to-Interface Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is the IPv6 equivalent of Sub-Template 903, used for prefix-based validation with IPv6 traffic.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 904       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv6Prefix = 170    |        Field Length = 16      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv6PrefixLength = 29 |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="main-template-record">
          <name>Main Template Record</name>
          <t>The main Template Record (ID 400) contains fields for exporting detailed SAV enforcement information including the validation outcome and the specific rule content that triggered the action. The template incorporates the <tt>savMatchedContentList</tt> element as a variable-length <tt>subTemplateList</tt> to carry the relevant SAV rule contents using the appropriate sub-templates defined above.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 28          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Template ID = 400      |        Field Count = 5        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|  observationTimeMicrosec=324|        Field Length = 8       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|      savRuleType = TBD1     |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|     savTargetType = TBD2    |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| savMatchedContentList=TBD3  |      Field Length = 0xFFFF    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   savPolicyAction = TBD4    |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="data-set-example">
          <name>Data Set Example</name>
          <t>The following Data Set contains two Data Records that represent the two SAV validation scenarios in Table 2. The <tt>savMatchedContentList</tt> element for the first record encodes the complete set of allowed prefixes using Sub-Template 901 with the <tt>allOf</tt> semantic (0x03). The allowlist includes three sav rules. The <tt>savMatchedContentList</tt> element for the second record encodes the specific blocked interface using Sub-Template 904 with the <tt>exactlyOneOf</tt> semantic (0x01), indicating the packet matched this particular rule.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 400         |          Length = 88          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              observationTimeMicrosec =                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      0x5D2F0A0000000000                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| savRuleType=0 | savTargetType=0|     255     |   List Length  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     = 33      |semantic=(allOf)|      Template ID = 901       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                ingressInterface[0] = 5001                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              sourceIPv4Prefix[0] = 198.51.100.0               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|sourceIPv4PrfLen[0]=24|         ingressInterface[1] =          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      5001     |         sourceIPv4Prefix[1] =                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  203.0.113.0  | sourceIPv4PrfLen[1]=24|  ingressInterface[2] =|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               5001            |       sourceIPv4Prefix[2] =   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         192.10.2.0   |sourceIPv4PrfLen[2]=24|savPolicyAction=2|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              observationTimeMicrosec =                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      0x5D2F0A0000000001                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| savRuleType=1 | savTargetType=1|     255     |   List Length  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     = 27      |semantic=exactlyOneOf|   Template ID = 904     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     sourceIPv6Prefix[0]                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|sourceIPv6PrfLen[0]=32||     ingressInterface[0] =             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       5001    |savPolicyAction=1|            padding          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
